Submit Search
Upload
Bart de Wijs Discusses ABB's Approach to Cyber Security Challenges
•
3 likes
•
1,129 views
AI-enhanced title
Community Protection Forum
Follow
by Bart de Wijs Head of Cyber Security, ABB Power Systems
Read less
Read more
Technology
Business
Report
Share
Report
Share
1 of 11
Download now
Download to read offline
Recommended
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
Mitch Cardoza, SPHR, Workforce Solutions Exec.
Cyber Security Challenges and Strategies
Cyber Security Challenges and Strategies
Tom Freer
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
Neil Parker
The Cyber Attack Risk
The Cyber Attack Risk
Skyport Systems
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Bryan Len
cyber security
cyber security
km. nahid
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!
Hiring for cybersecurity
Hiring for cybersecurity
Hays Recruitment North America
Recommended
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
Mitch Cardoza, SPHR, Workforce Solutions Exec.
Cyber Security Challenges and Strategies
Cyber Security Challenges and Strategies
Tom Freer
Understanding the Risk & Challenges of Cyber Security
Understanding the Risk & Challenges of Cyber Security
Neil Parker
The Cyber Attack Risk
The Cyber Attack Risk
Skyport Systems
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Bryan Len
cyber security
cyber security
km. nahid
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!
Hiring for cybersecurity
Hiring for cybersecurity
Hays Recruitment North America
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Edureka!
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
PaloAltoNetworks
Bl cybersecurity z_dooly
Bl cybersecurity z_dooly
zdooly
A military perspective on cyber security
A military perspective on cyber security
Joey Hernandez
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Edureka!
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
Starting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Cyber Security
Cyber Security
Ramiro Cid
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
R-Style Lab
Cyber security
Cyber security
abithajayavel
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
WAJAHAT IQBAL
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Edureka!
Cyber Security
Cyber Security
Neha Gupta
IBM Cybersecurity Analyst
IBM Cybersecurity Analyst
Mustafa TOPÇU
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
Cyber Security –PPT
Cyber Security –PPT
Rajat Kumar
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Edureka!
Cyber security cdg.io
Cyber security cdg.io
CyberGroup
Case study Millars bank
Case study Millars bank
Jean-Charles Constanty
Social Media Case Study - Wipro e.Go using social media to engage and establi...
Social Media Case Study - Wipro e.Go using social media to engage and establi...
Windchimes Communications Pvt Ltd
More Related Content
What's hot
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Edureka!
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
PaloAltoNetworks
Bl cybersecurity z_dooly
Bl cybersecurity z_dooly
zdooly
A military perspective on cyber security
A military perspective on cyber security
Joey Hernandez
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Edureka!
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
Starting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Cyber Security
Cyber Security
Ramiro Cid
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
R-Style Lab
Cyber security
Cyber security
abithajayavel
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
WAJAHAT IQBAL
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Edureka!
Cyber Security
Cyber Security
Neha Gupta
IBM Cybersecurity Analyst
IBM Cybersecurity Analyst
Mustafa TOPÇU
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
Cyber Security –PPT
Cyber Security –PPT
Rajat Kumar
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Edureka!
Cyber security cdg.io
Cyber security cdg.io
CyberGroup
What's hot
(20)
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
Cybersecurity Tools | Popular Tools for Cybersecurity Threats | Cybersecurity...
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
Bl cybersecurity z_dooly
Bl cybersecurity z_dooly
A military perspective on cyber security
A military perspective on cyber security
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Starting your Career in Information Security
Starting your Career in Information Security
The view of auditor on cybercrime
The view of auditor on cybercrime
Cyber Security
Cyber Security
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
Cyber security
Cyber security
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Cyber Security
Cyber Security
IBM Cybersecurity Analyst
IBM Cybersecurity Analyst
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
Cyber Security –PPT
Cyber Security –PPT
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Cyber security cdg.io
Cyber security cdg.io
Viewers also liked
Case study Millars bank
Case study Millars bank
Jean-Charles Constanty
Social Media Case Study - Wipro e.Go using social media to engage and establi...
Social Media Case Study - Wipro e.Go using social media to engage and establi...
Windchimes Communications Pvt Ltd
IT Strategies for the New Economy v02 - with Banking as a Case Study
IT Strategies for the New Economy v02 - with Banking as a Case Study
Rajeev Arora
Effects of relationship marketing (rm) on customer loyalty case study mehr ba...
Effects of relationship marketing (rm) on customer loyalty case study mehr ba...
Uniglobe College
Case Study - YES Bank IPL
Case Study - YES Bank IPL
Windchimes Communications Pvt Ltd
Millars bank case study ppt
Millars bank case study ppt
William Marques
Mobey Forum - Case Study: Banking the Banked with NMB Mobile
Mobey Forum - Case Study: Banking the Banked with NMB Mobile
Dan Armstrong
CASE STUDY: How Pega used the changing B2B buyer journey and persona's to tra...
CASE STUDY: How Pega used the changing B2B buyer journey and persona's to tra...
B2B Marketing
ICICI Bank - A Case Study
ICICI Bank - A Case Study
Sameer Dalvi
Enterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking Sector
CONFENIS 2012
Case Study: Open Banking, APIs and Digital Transformation—the Banco Original ...
Case Study: Open Banking, APIs and Digital Transformation—the Banco Original ...
CA Technologies
Case study Research
Case study Research
Dr Muireann O'Keeffe
Case studies in marketing (ppt)
Case studies in marketing (ppt)
shreyasakaria
Viewers also liked
(13)
Case study Millars bank
Case study Millars bank
Social Media Case Study - Wipro e.Go using social media to engage and establi...
Social Media Case Study - Wipro e.Go using social media to engage and establi...
IT Strategies for the New Economy v02 - with Banking as a Case Study
IT Strategies for the New Economy v02 - with Banking as a Case Study
Effects of relationship marketing (rm) on customer loyalty case study mehr ba...
Effects of relationship marketing (rm) on customer loyalty case study mehr ba...
Case Study - YES Bank IPL
Case Study - YES Bank IPL
Millars bank case study ppt
Millars bank case study ppt
Mobey Forum - Case Study: Banking the Banked with NMB Mobile
Mobey Forum - Case Study: Banking the Banked with NMB Mobile
CASE STUDY: How Pega used the changing B2B buyer journey and persona's to tra...
CASE STUDY: How Pega used the changing B2B buyer journey and persona's to tra...
ICICI Bank - A Case Study
ICICI Bank - A Case Study
Enterprise Information Systems Security: A Case Study in the Banking Sector
Enterprise Information Systems Security: A Case Study in the Banking Sector
Case Study: Open Banking, APIs and Digital Transformation—the Banco Original ...
Case Study: Open Banking, APIs and Digital Transformation—the Banco Original ...
Case study Research
Case study Research
Case studies in marketing (ppt)
Case studies in marketing (ppt)
Similar to Bart de Wijs Discusses ABB's Approach to Cyber Security Challenges
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
IBMGovernmentCA
Integrating of security activates in agile process
Integrating of security activates in agile process
Zubair Rahim
111.pptx
111.pptx
JESUNPK
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
aztechcouncil
Secure Software Development Lifecycle
Secure Software Development Lifecycle
1&1
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
Iaetsd Iaetsd
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennai
Abhay Bhargav
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Stefaan Van daele
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IBM Switzerland
CYBER SECURITY.pptx
CYBER SECURITY.pptx
lidiyamekonnen
Digital Security by Design Vision
Digital Security by Design Vision
KTN
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit Approach
Atanu Roy Chowdhury
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
Arun Prabhakar
Walls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application Security
Abdul Jaleel
cyber security ppt.pptx
cyber security ppt.pptx
lidiyamekonnen
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET Journal
Similar to Bart de Wijs Discusses ABB's Approach to Cyber Security Challenges
(20)
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
Integrating of security activates in agile process
Integrating of security activates in agile process
111.pptx
111.pptx
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
Secure Software Development Lifecycle
Secure Software Development Lifecycle
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
we45 SecDevOps Presentation - ISACA Chennai
we45 SecDevOps Presentation - ISACA Chennai
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
CYBER SECURITY.pptx
CYBER SECURITY.pptx
Digital Security by Design Vision
Digital Security by Design Vision
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit Approach
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
Walls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application Security
cyber security ppt.pptx
cyber security ppt.pptx
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
More from Community Protection Forum
The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
Community Protection Forum
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Community Protection Forum
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
Community Protection Forum
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
Community Protection Forum
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
Community Protection Forum
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
Community Protection Forum
Security Projects & Projects Safety
Security Projects & Projects Safety
Community Protection Forum
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
Community Protection Forum
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
Community Protection Forum
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Community Protection Forum
Touristic Port Security
Touristic Port Security
Community Protection Forum
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
Community Protection Forum
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Community Protection Forum
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Community Protection Forum
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
Community Protection Forum
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Community Protection Forum
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
Community Protection Forum
Cyber Security and the National Central Banks
Cyber Security and the National Central Banks
Community Protection Forum
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
Community Protection Forum
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
Community Protection Forum
More from Community Protection Forum
(20)
The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
Security Projects & Projects Safety
Security Projects & Projects Safety
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Touristic Port Security
Touristic Port Security
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
Cyber Security and the National Central Banks
Cyber Security and the National Central Banks
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
The DRIHM Infrastructure Design and Projects Experience
The DRIHM Infrastructure Design and Projects Experience
Recently uploaded
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
Sri Ambati
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
RankYa
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Recently uploaded
(20)
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Bart de Wijs Discusses ABB's Approach to Cyber Security Challenges
1.
Bart de Wijs,
Head of Cyber Security, ABB Power Systems Cyber Security Challenges – How are we facing them?
2.
Focus of todays
talk 4 key questions 1. Advanced security architectures? 2. What are the main Cyber Security challenges? 3. How should the challenges be addressed? 4. What does ABB offer and how can ABB help? Image: edudemic.com © ABB Group 21 October, 2013 | Slide 2
3.
Substation Automation Systems Advanced
Security Architecture Automation Systems Manager Legend: Disabled ports / services Removable media access Advanced Service Appliance (ASA) Individual User Accounts Malware protection Firewall Router Encryptet communication Industrial Defender Agent Patch Management © ABB Group 21 October, 2013 | Slide 3
4.
The Biggest Challenges Organizational Risk
Management Awareness Competence Management Disruptive Changes Images: www.guardianconsultants.co.uk © ABB Group 21 October, 2013 | Slide 4 wegilant.com www.floris-cm.nl blogpool4tool.com
5.
The Biggest Challenges Technical Installed
Base Sustaining Security Situational Awareness Heterogeneity Compliance Vulnerabilities Images: www.zazzle.co.nz © ABB Group 21 October, 2013 | Slide 5 www.zoho.com blog.monitorscout.com www.leadthefish.com nl.123rf.com www.ccure.it
6.
How should the
challenges be addressed? 4 key questions Can we really defend ourselves? Do we know our infrastructure and systems? Can we identify potentially malicious activities? Can we recover from any incident? Images: www.techieapps.com © ABB Group 21 October, 2013 | Slide 6 technorati.com www.calibersecurity.com cert.org
7.
How should the
challenges be addressed? Better preparation Requires a change from all of us! Make an inventory of what you have Know the behavior of your infrastructure and systems Compare your actual with your baseline Monitor vulnerability disclosures Patch your systems and stay up to date Image: howstuffworks.com © ABB Group 21 October, 2013 | Slide 7 blog.optimizely.com lisagroup.com.au dhs.org cve.mitre.org securityfocus.com www.marketingzen.com
8.
What ABB offers
– A holistic approach to Cyber Security Defense in Depth in all phases of the System Lifecycle Procedures and Policies Physical Security Security Updates User Access Control Intrusion Protection Intrusion Detection High availability solutions © ABB Group 21 October, 2013 | Slide 8
9.
Conclusions Cyber security is
a key aspect of ICS in Critical Infrastructure Cyber security is a real challenge and must become a high priority item for all involved stakeholders Effective cyber security solutions require a joint effort by vendors, integrators, operating system providers, end users and governments Effective cyber security will require solutions that cover both legacy and new installations Security is about risk management - perfect security is neither existent nor economically feasible © ABB Group 21 October, 2013 | Slide 9
10.
Contact information Questions, Comments,
etc. cybersecurity@ch.abb.com www.abb.com/cybersecurity © ABB Group 21 October, 2013 | Slide 10
Download now