15
Dr. Virginijus Valevičius Business Area Manager/ Industry Management and Automation / May 17 th 2018 Adding value with Industry 4.0 Cyber Security Practices and Challenges Facing Various industries

6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

Dr. Virginijus Valevičius

Business Area Manager/ Industry Management and Automation / May 17th 2018

Adding value with Industry 4.0

Cyber Security Practices and Challenges Facing Various industries

Page 2: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

... for the intelligent networking of business processes, things,

plants, components and people and is the key to future success.

Digitalization is the basis …

Industrie 4.0

Page 3: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

YES… and what about security?

https://nvd.nist.gov/general/visualizations

Page 4: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

Stuxnet: Targeting critical infrastructure

Quelle: ibtimes

First detection in 2010

Infected around 100.000 industrial

plants worldwide

Targeted to Iranian nuclear industry

Spread over service laptops, USB and

network

Attack routine only install and initiated

on certain Siemens PLC setups

Attacked PLC directly by changing

values

All changes are invisible to operators

Three modules: the main payload of

the attack; a link file that automatically

executes the propagated copies; and

a rootkit component responsible for

hiding all malicious files and

processes, preventing detection of the

presence

Quelle: newscientist

https://en.wikipedia.org/wiki/Stuxnet

Page 5: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry

http://www.welivesecurity.com/

On December 23rd, 2015, around half

of the homes in the Ivano-Frankivsk

region in Ukraine (population around

1.4 million) were left without electricity

for a few hours.

Prykarpattya Oblenergo, a power

distributor that serves 538,000

customers, says 27 of its substations

went dead.

According to the Ukrainian news

media outlet TSN, the cause of the

power outage was a “hacker attack”

utilizing a “virus”.

In a public statement three weeks after

the incident, Prykarpattya Oblenergo

claimed there had been "a hacker

attack" on its computer network.

http://money.cnn.com/

http://money.cnn.com/2016/01/18/technology/ukraine-hack-russia/

http://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/

Page 6: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

CYBER THREAT LANDSCAPE IN UKRAINE 2014-2016

https://boozallen.com/content/dam/boozallen/documents/2016/09/ukraine-report

Page 7: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

ICS SECURITY: 2017 IN REVIEW

73 percent of industrial organizations’

networks are vulnerable to hackers

(Positive Technologies testing in 2018),

Most vulnerabilities detected in 2017 can

be exploited remotely without needing to

obtain any privileges in advance.

The research revealed 175,632 ICS

components accessible online.

https://www.ptsecurity.com/ww-en/about/news/

Page 8: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

Remigijus Dambrauskas

Business Area Manager Industrial Components & Electronics / May 17th 2018

Adding value with Industry 4.0

Cyber Security Opportunities and Risks

Page 9: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

Questions every executive should consider regarding

cybersecurity

Page 10: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

Industrial IT Security

POTENTIAL RISKS

Page 11: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

Industrial IT Security Risk: Remote access

a_0059859.eps

Global network

Page 12: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

Industrial IT Security Risk: Service technicians

Page 13: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

a_0046262_int.eps

Customer dialog

Industrial IT Security Risk: Business partners

Page 14: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

Assesment and planning We inspect your system with you and analyze your individual threat and risk situation,

documentation and processes. We provide you with a customized consultation.

Implementation We implement your security and network requirements. We support and advise you in the

technical restructuring process or new requirements in your system from the field level all the

way to the company level.

Maintenance and support

Updates must be installed regularly, the rules of the firewall adapted and messages evaluated.

We focus on eliminating anomalies such as defective device configurations and identified

security gaps. Through our support in the areas of security and Industrial Ethernet, we safeguard

your production and as a result, minimize downtimes.

Seminars

We provide awareness instructions and practical trainings that are tailored to your individual

requirements. Thanks to our cyber security competence center in Berlin, we also have in-depth

specialist knowledge in the area of industrial cyber security.

Service offerings

Page 15: 6,20 6,00 Cyber Security Practices and Challenges …site-352420.mozfiles.com/files/352420/Adding_value_with...Cyber Security Practices and Challenges Facing Various industries P14f

P14f 4:3

9,00 9,00

6,00

6,20

6,80 6,80

9,00

11,60 11,60

Contact information

Let’s connect on