The Charter of Trust

DefCamp
DefCampDefCamp
charter-of-trust.com | #Charter of Trust
Charter of Trust
on Cybersecurity
Stefan Zarinschi
Senior Penetration Tester @Siemens
CISSP, SSCP, CISM, CISA
1 – The beginning
Why do we need a Charter of Trust?
2 – The principles
What do they mean and how we achieve
them concretely (examples from various partners)
3 – The future
How do we develop the Charter of Trust
into a global standard for all things cybersecurity
Plan
1 The beginning
Why do we need a Charter of Trust?
… and risks
Exposure to malicious cyber attacks is also
growing dramatically, putting our lives and
the stability of our society at risk
Digitalization creates …
Opportunities
Blue Boxing
CryptovirologyAOHell
Level Seven Crew hack
Denial-of-service attacks
Cloudbleed
sl1nk SCADA hacks Meltdown/Spectre
Infineon/TPM
AT&T Hack Morris Worm Melissa Worm ILOVEYOU
WannaCry
NotPetya
Heartbleed
Industroyer/Chrashoverride
Stuxnet
2000 2004 2008 2012 2016 202019961988 1992
Billions of devices are being connected
by the Internet of Things, and are the
backbone of our infrastructure and economy
50.1B (2020)
IoT Inception (2009)
8.7B (2012)
11.2B (2013)
14.2B (2014)
18.2B (2015)
22.9B (2016)
28.4B (2017)
42.1B (2019)
0.5B (2003)
Connected Systems
Connected Facilities/Plant/Site
Connected Products
34.8B (2018)
Billion of Devices
And it‘s common truth
We can’t expect people to
actively support the digital
transformation if we cannot
TRUST in the security of data
and networked systems.
That’s why together with strong partners
we have signed a “Charter of Trust” –
aiming at three important objectives
1. Protect the data of individuals
and companies
2. Prevent damage to people,
companies and infrastructures
3. Create a reliable foundation on
which confidence in a networked,
digital world can take root and grow
The Charter of Trust
The principles2
Cybersecurity
A critical factor for the success
of the digital economy
01 Ownership of cyber and IT security
02 Responsibility throughout the digital supply chain
03 Security by default
04 User-centricity
05 Innovation and co-creation
06 Education
07 Certification for critical infrastructure and solutions
08 Transparency and response
09 Regulatory framework
10 Joint initiatives
Key principles
Charter of Trust
Principle 1
01 Ownership of cyber and IT security
Anchor the responsibility for cybersecurity at the highest governmental
and business levels by designating specific ministries and CISOs.
Establish clear measures and targets as well as the right mindset
throughout organizations – “it is everyone’s task”.
What does that mean and
why is it so important?
People, organizations and entire societies must rely on digital technologies
and will support this transformation only if the security of their data and
networked systems can be ensured. It requires clear responsibilities at the
highest levels – in companies as well as governments.
Concrete implementation steps
Siemens example
In January 2018 we established a new cybersecurity unit headed by Natalia Oropeza,
our new Chief Cybersecurity Officer (CCSO). In this function, she reports directly to
the Managing Board of Siemens AG. With this new position we’re fulfilling one of our
requirements in the Charter of Trust.
“Cybersecurity is more than a challenge. It’s a huge
opportunity. By setting standards with a dedicated and global
team to make the digital world more secure, we are investing
in the world's most valuable resource: TRUST.
Our concrete answers to today’s upcoming cybersecurity
issues and our proposals for more advanced cybersecurity
rules and standards are invaluable to our partners,
stakeholders and societies around the world. That is what we
call “ingenuity at work.”
Natalia Oropeza,
Chief Cybersecurity Officer, Siemens AG
Charter of Trust
Principle 2
02 Responsibility throughout
the digital supply chain
Throughout a reasonable life cycle of products, solutions and
services, the digital supply chain has to ensure appropriate integrity,
confidentiality and availability. The weakest link in the chain defines
its overall strength.
Identity and access management
Connected devices must have secure identities and safeguarding
measures that only allow authorized users and devices to use them
Encryption
Connected devices must ensure confidentiality for data storage
and transmission purposes, wherever appropriate
Continuous protection
Companies must offer updates, upgrades and patches throughout a
reasonable lifecycle for their products, systems and services via a
secure update mechanism
Concrete implementation steps
Siemens example
To protect industrial plants from internal and external cyber attacks, all levels must be
protected simultaneously – from the plant management level to the field level and
from access control to copy protection.
With defense in-depth, Siemens provides a multi-layer concept that gives plants
both all-round and in-depth protection. The concept is based on plant security,
network security and system integrity as recommended by ISA 99/IEC 62443.
Siemens products and systems offer integrated security
Know-how and
copy protection
Authentication and
user management
Firewall and VPN
(Virtual Private
Network)
System hardening
and continuous
monitoring
Siemens Plant Security Services
Assess
Security
Implement
Security
Manage
Security
Charter of Trust
Principle 3
03 Security by default
Adopt the highest appropriate level of security and data protection
and ensure that it is pre-configured into the design of products,
functionalities, processes, technologies, operations, architectures
and business models.
Concrete implementation steps
Siemens example
The Siemens Elektronikwerk Amberg is a prime example of a digital factory. The
factory uses cutting-edge technologies to produce approximately 15 million SIMATIC
products each year. Early on in the lifecycle, each SIMATIC product is analyzed for their
functionalities as well as the necessary security measures to be integrated into their
designs. A holistic security concept is applied throughout the lifecycle, from design
and development, to the production and maintenance of the product.
What does that mean and
why is it so important?
Only if security requirements are already taken into account in the early
phase of a product, especially in its design phase, can the highest
appropriate level of security be offered proactively.
The same applies to all the other steps in the value chain – from the
functionalities and the default security configuration settings of a
product, to the manufacturing processes, technologies used and the
operational processes. This also includes the underlying architectures
and business models.
“Considering our extensive network, which multiplies the
number of possible points of entry to our IT infrastructure, we
cannot assume that yesterday’s solutions will protect against
today’s potential threats.
Since introducing SIEM, we have much higher transparency
about the effectiveness of our measures to protect against
cyberattacks.”
Gunter Beitinger,
Chief Executive Officer (CEO),
Siemens Elektronikwerk Amberg
Charter of Trust
Principle 4
04 User-centricity
Serve as a trusted partner throughout a reasonable lifecycle,
providing products, systems and services as well as guidance
based on the customer’s cybersecurity needs, impacts and risks.
Concrete implementation steps
Siemens example
With Siemens Industrial Security Services, industrial
companies benefit from the comprehensive know-how
as well as the technical expertise of a global network
of specialists for automation and cybersecurity.
The holistic approach of the industry-specific concept
is based on state-of-the-art technologies as well as
the applicable security rules and standards.
Siemens proactively offers security solutions along the
industrial lifecycle. Threats and malware are detected
at an early stage, vulnerabilities analyzed in detail and
appropriate comprehensive security measures are
initiated.
Continuous monitoring gives plant operators the greatest
possible transparency regarding the security of their
industrial facility and optimal investment protection
at all times.
What does that mean and
why is it so important?
Companies are exposed to the same risks as any other user of IT and the
internet. In addition, companies are the targets of additional type of
attacks that do not occur in the private environment. That’s why
companies need products, systems and services that meet their security
needs – over an appropriate lifecycle.
Assess
Security
Implement
Security
Manage
Security
Charter of Trust
User-centricity
Siemens Plant Security Services
A triple dose of more security
Evaluation of current security status
– Analysis of threats and vulnerabilities to identify,
evaluate and classify risks
– Assessment of business impact
– Execution from process engineering and automation view
– Basis for the establishment of a security program
Comprehensive security through
monitoring and proactive protection
– Close security gaps with continuous updates and backups
– Identify and handle security incidents thanks to continuous security
monitoring
– Early adaptation to changing threat scenarios
Assess
Security
Implement
Security
Manage
Security Risk mitigation through
implementation of security measures
– Design and implement technical security measures
– Develop and deploy security-relevant processes
– Enhance security awareness thanks to specific trainings
Charter of Trust
Principle 5
05 Innovation and co-creation
Combine domain know-how and deepen a joint understanding
between firms and policymakers of cybersecurity requirements and
rules in order to continuously innovate and adapt cyber-security
measures to new threats; drive and encourage contractual Public
Private Partnerships, among other things.
Concrete implementation steps
Siemens example
Siemens has been taking a stand in cybersecurity for 30 years – through leading
technologies, proven know-how and services as well as educational efforts. Currently,
our company has about 1275 cybersecurity experts worldwide, which includes about
25 whitehat hackers who continuously challenge the security of both internal IT
systems and products being shipped to customers.
The ability to supply customers with secure products and systems is a competitive
advantage within a growing business field. The unique combination of technical know-
how in Cybersecurity and the very deep domain know-how puts Siemens in an ideal
position to be both a market and thought leader.
In our Core Technology Field (CCT), Cybersecurity experts from our Business Units and
our central research and development unit – Corporate Technology – are working on
new technologies for safeguarding critical infrastructure, protecting sensitive
information and assuring business continuity.
What does that mean and
why is it so important?
Only if we intensify the cooperation between companies and
policymakers and create a common understanding of cyber threats will
we succeed in the long run.
That’s why we need to build this partnership and increase our shared
knowledge across industries, universities and R&D institutions.
Charter of Trust
Innovation and co-creation
in our CCT Cybersecurity
Security automation in R&D, e.g.
– Automated penetration testing
– Automated hardening and secure configuration
Technologies for security services
in operations, e.g.
– Security analytics platform
– Artificial intelligence for security
– Automatic response, malware containment
Small footprint
IoT cryptography
One-way
gateway
IoT public key infra-
structure, identity and
access management
Security Components, e.g. Cloud security for industrial applications
Security for lifecycles in the field
Charter of Trust
Principle 6
06 Education
Include dedicated cybersecurity courses in school curricula – as
degree courses in universities, professional education and trainings –
in order to lead the transformation of skills and job profiles needed
for the future.
Concrete implementation steps
Siemens example
By carrying out regular cybersecurity awareness training sessions worldwide, Siemens
ensures all employees have a high level of security awareness. We invest in building
dedicated security expertise for products, solutions and services with a role-specific
curriculum.
InfoSec Cards, for example, give practical hints categorized in different topics to support our
employees in implementing Siemens-specific InfoSec rules and regulations. With annually
renewed Trend Cards, we provide an overview of the most important current technical and
non-technical trends in the broader field of cybersecurity that may possibly influence the
Siemens portfolio.
And our “Applying Digitalization to your Business” training session, featuring cybersecurity
as key element, has been rolled out throughout the company and consists of four important
pillars:
What does that mean and
why is it so important?
A significant number of cybersecurity incidents are attributed to human
error or negligence. Raising everyone’s awareness of cyber risks and
protection measures is the first line of defense.
To continue developing IT security at the technological level, people
need to be able to acquire the skills and qualifications that are needed
for the digital transformation. Only in this way can people adapt to the
new job profiles.
That’s why corresponding supportive programs for schools, universities
and companies should be continued and expanded.
Design
business
Implement
and scale
business
Understand
technology
Experience
technology
Applying digitalization
to our business
A hands-on training to
accompany digital
transformation
Charter of Trust
Principle 7
07 Certification for critical
infrastructure and solutions
Companies and – if necessary – governments establish mandatory
independent third-party certifications (based on future-proof
definitions, where life and limb is at risk in particular) for critical
infrastructure as well as critical IoT solutions.
Concrete implementation steps
Siemens example
The biggest challenge facing cybersecurity standards is holistic, system-oriented approaches.
Many existing standards focus on the level of the individual product or system. What is missing
are standards for overarching topics such as Smart Cities, which then continue in concrete
specifications for sub-areas such as mobility, energy and water supply.
One of the key platforms for building consensus on standards for requirements and procedures
for assessing compliance is the IEC (International Electrotechnical Commission). It has already
established more than 100 cybersecurity standards. Siemens was involved in around 90
percent of this.
What does that mean and
why is it so important?
Critical infrastructure and critical IoT solutions (e.g. autonomous cars,
collaborative robots) will be increasingly exposed to cybersecurity
threats. Independent certifications for security-relevant processes or
security-relevant technical solutions can help to reduce the risk of
cybersecurity incidents, where harm for life and limb of people are at
risk. It’s up to companies – and governments, if necessary.
The overarching strategy of standardization work in the
area of cybersecurity is being driven by Siemens within
the IEC. In addition, Siemens is represented in many
individual committees. The same applies to the
committees at the IEEE, IEFF and ISO.
An example of the success of a holistic standard is IEC
62443. It defines basic standards for “Security by Design,”
holistically addressing operators as well as products and
services included in IoT solutions. IEC 62443 is universally
applicable, “from the high-speed locomotive to the light
switch.” It sets the standards
that engineers should consider as early on as the design
stage.
Charter of Trust
Principle 8
08 Transparency and response
Participate in an industrial cybersecurity network in order to share
new insights, information on incidents et al.; report incidents beyond
today’s practice, which focusses on critical infrastructure.
Concrete implementation steps
Siemens example
Siemens is a member of FIRST, the umbrella organization for all CERTS (Cyber Emergency
Response Teams). We also have a very good relationship with national CERTs (such as US-
CERT, CERT-EU and ICS-CERT) and law enforcement agencies (such as the FBI, BKA and
Europol). And we gather Cyber Threat Intelligence and share them within these partners.
We’ve formed partnerships for developing industrial IT and standards and collaborations
with universities, business partners, customers, startups and respected research institutes
for cybersecurity innovations. And with our own Cyber Defense Teams, we are waging a
determined battle against approx. 1,000 cyber attacks every month.
What does that mean and
why is it so important?
The digital world is all about one thing: speed. When cyber attacks
occur, you need an immediate, coordinated and goal-oriented response.
That's why it's so important for companies to team up and work
together to create an industrial cybersecurity network to instantly share
new insights and information about attacks and incidents.
We have effective strategies that help us
handle the large number of attacks, because
we can incorporate our findings from defense
activities directly into new technologies.
Thomas Schreck
Head of the Cyber Emergency
Response Team at Siemens AG
Charter of Trust
Principle 9
09 Regulatory framework
Promote multilateral collaborations in regulation and standardization
to create a level playing field that matches the global reach of WTO;
inclusion of rules for cybersecurity in Free Trade Agreements (FTAs).
Concrete implementation steps
Siemens example
Siemens welcomes all international networking
on topics at every relevant level. We actively
participate in a comprehensive cybersecurity
network (relevant criminal prosecutors, ISA,
FIRST, CERT Community, Software Assurance
Forum for Excellence in Code (SAFECode).
We gather threat information and disseminate
it through these partnerships.
Our Government Affairs activities, which include
the initiative to create a Charter of Trust, are
committed to helping bring cybersecurity to the
agenda and translating it into concrete
regulations and standards.
What does that mean and
why is it so important?
Regulation and standardization are only successful if they are based on
multilateral cooperation. We therefore wish to expand these further in
order to create a level playing field for all involved. The World Trade
Organization, with its global reach, is our role model.
Cybersecurity is so important that it should also be included as an
integral part of Free Trade Agreements.
Charter of Trust
Principle 10
10 Joint initiatives
Drive joint initiatives including all relevant stakeholders in order to
implement the aforementioned principles in the various parts of the
digital world without undue delay.
Concrete implementation steps
Siemens example
On February 16 at the MSC, we laid the cornerstone for the joint “Charter of Trust”
initiative with partners – aspiring and desiring to recruit more comrades in arms for
our initiative worldwide and to create a digital world that is based on trust in the
digital and hyper-connected world. One that’s independent of competitors and
regions. Trust must not stop at geographical or industry borders.
And this can only be a starting point. This is not a challenge that can be solved by this
group or any individual company alone. That’s why we invite companies sharing our
ambition and ownership for trust to join the Charter of Trust initiative. We also invite
governments of the world and civil society to engage in a focused dialogue: Trust
matters to everyone. It’s everyone’s task.
What does that mean and
why is it so important?
Only when we become active together will we achieve our goals. The
Charter of Trust is therefore an important nucleus for further joint
initiatives to promptly implement the 10 principles in the various areas
of the digital world.
The Future
How do we develop the Charter into a global
standard for all things in cybersecurity?
3
Together we strongly believe
─ Effective cybersecurity is a precondition for
an open, fair and successful digital future
─ By adhering to and promoting our principles,
we are creating a foundation of trust for all
charter-of-trust.com
As a credible and reliable voice, we
collaborate with key stakeholders to
achieve trust in cybersecurity for
global citizens.
Be part of a network that does not only
sign, but collaborates on Cybersecurity!
Let us be your
trusted partners
for cybersecurity
and digitalization
Together we will
improve our
technology, people
and processes
Join us by following
our principles and
making the digital
world more secure
We sign for
cybersecurity!
We sign the
Charter of Trust.
1 de 24

Recomendados

Brochure network security-en por
Brochure network security-enBrochure network security-en
Brochure network security-ensandeep1721
356 vistas32 diapositivas
SBIC Enterprise Information Security Strategic Technologies por
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesEMC
1.2K vistas20 diapositivas
IBM Security Strategy por
IBM Security StrategyIBM Security Strategy
IBM Security StrategyCamilo Fandiño Gómez
2K vistas34 diapositivas
Symantec_2004_AnnualReport por
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReportfinance40
2K vistas80 diapositivas
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct... por
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...Abhishek Goel
31 vistas19 diapositivas
Securing the Cloud by Matthew Rosenquist 2016 por
Securing the Cloud by Matthew Rosenquist 2016Securing the Cloud by Matthew Rosenquist 2016
Securing the Cloud by Matthew Rosenquist 2016Matthew Rosenquist
5.5K vistas19 diapositivas

Más contenido relacionado

La actualidad más candente

Maloney slides por
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
346 vistas27 diapositivas
2017 K12 Educators Security Briefing - Matthew Rosenquist por
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew RosenquistMatthew Rosenquist
648 vistas24 diapositivas
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi... por
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
1.7K vistas22 diapositivas
Infrastructure security por
Infrastructure security Infrastructure security
Infrastructure security Adhar kashyap
1.5K vistas27 diapositivas
Csirs Trabsport Security September 2011 V 3.6 por
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6David Spinks
247 vistas23 diapositivas
Top firewall companies 2020 converted por
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 convertedemmaelice
70 vistas6 diapositivas

La actualidad más candente(20)

Maloney slides por Onkar Sule
Maloney slidesMaloney slides
Maloney slides
Onkar Sule346 vistas
2017 K12 Educators Security Briefing - Matthew Rosenquist por Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
Matthew Rosenquist648 vistas
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi... por Edureka!
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!1.7K vistas
Infrastructure security por Adhar kashyap
Infrastructure security Infrastructure security
Infrastructure security
Adhar kashyap1.5K vistas
Csirs Trabsport Security September 2011 V 3.6 por David Spinks
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
David Spinks247 vistas
Top firewall companies 2020 converted por emmaelice
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
emmaelice70 vistas
SCADA Security Training por Bryan Len
SCADA Security TrainingSCADA Security Training
SCADA Security Training
Bryan Len300 vistas
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems por Dr Dev Kambhampati
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati142 vistas
Security models for security architecture por Vladimir Jirasek
Security models for security architectureSecurity models for security architecture
Security models for security architecture
Vladimir Jirasek17.9K vistas
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra... por Craig Martin
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Craig Martin29.5K vistas
113505 6969-ijecs-ijens por geekmodeboy
113505 6969-ijecs-ijens113505 6969-ijecs-ijens
113505 6969-ijecs-ijens
geekmodeboy688 vistas
Cisco ccna security por Mt Mostafa
Cisco ccna securityCisco ccna security
Cisco ccna security
Mt Mostafa239 vistas
Proposal for IT Security Team por Rishabh Gupta
Proposal for IT Security TeamProposal for IT Security Team
Proposal for IT Security Team
Rishabh Gupta570 vistas
The new era of Cyber Security IEC62443 por WoMaster
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
WoMaster116 vistas
ADAM ADLER FLORIDA por AdamAdler10
ADAM ADLER FLORIDA ADAM ADLER FLORIDA
ADAM ADLER FLORIDA
AdamAdler1089 vistas
Information Assurance & Reliability Architecture por Srikar Sagi
Information Assurance & Reliability ArchitectureInformation Assurance & Reliability Architecture
Information Assurance & Reliability Architecture
Srikar Sagi446 vistas

Similar a The Charter of Trust

Securing the Digital Economy: Reinventing the Internet por
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
5K vistas12 diapositivas
Securing the Digital Economy: Reinventing the Internet por
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
707 vistas12 diapositivas
Securing the digital economy por
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
670 vistas16 diapositivas
Securing the Digital Economy: Reinventing the Internet por
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
907 vistas16 diapositivas
16231 por
1623116231
16231James Grant
276 vistas8 diapositivas
Make things come alive in a secure way - Sigfox por
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxSigfox
114 vistas10 diapositivas

Similar a The Charter of Trust(20)

Securing the Digital Economy: Reinventing the Internet por accenture
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture5K vistas
Securing the Digital Economy: Reinventing the Internet por accenture
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture707 vistas
Securing the digital economy por accenture
Securing the digital economySecuring the digital economy
Securing the digital economy
accenture670 vistas
Securing the Digital Economy: Reinventing the Internet por accenture
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture907 vistas
Make things come alive in a secure way - Sigfox por Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - Sigfox
Sigfox114 vistas
111.pptx por JESUNPK
111.pptx111.pptx
111.pptx
JESUNPK3 vistas
1973-16 Tackling the challenges of cyber security_19_03_15 por shed59
1973-16 Tackling the challenges of cyber security_19_03_151973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_15
shed59297 vistas
Security solutions for a smarter planet por Vincent Kwon
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
Vincent Kwon1.3K vistas
Software security, secure software development in the age of IoT, smart thing... por LabSharegroup
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup5.3K vistas
withsecure-elements-epp-brochure-en.pdf por MdZabedHossain2
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
MdZabedHossain224 vistas
The 5 most trusted cyber security companies to watch. por Merry D'souza
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
Merry D'souza44 vistas
CIO Review - Top 20 CyberSecurity por Bob Guimarin
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
Bob Guimarin137 vistas
IT Security: Implications for the Technology Vision 2015 por accenture
IT Security: Implications for the Technology Vision 2015IT Security: Implications for the Technology Vision 2015
IT Security: Implications for the Technology Vision 2015
accenture5.9K vistas
Accenture Security Services: Defending and empowering the resilient digital b... por Accenture Technology
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology4.6K vistas
GE디지털 월드테크 브로셔(GE Digital Wurldtech) por GE코리아
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE코리아468 vistas

Más de DefCamp

Remote Yacht Hacking por
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
1.7K vistas89 diapositivas
Mobile, IoT, Clouds… It’s time to hire your own risk manager! por
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
974 vistas167 diapositivas
Internet Balkanization: Why Are We Raising Borders Online? por
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
309 vistas22 diapositivas
Bridging the gap between CyberSecurity R&D and UX por
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
260 vistas13 diapositivas
Secure and privacy-preserving data transmission and processing using homomorp... por
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp
470 vistas102 diapositivas
Drupalgeddon 2 – Yet Another Weapon for the Attacker por
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDefCamp
269 vistas35 diapositivas

Más de DefCamp(20)

Remote Yacht Hacking por DefCamp
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht Hacking
DefCamp1.7K vistas
Mobile, IoT, Clouds… It’s time to hire your own risk manager! por DefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp974 vistas
Internet Balkanization: Why Are We Raising Borders Online? por DefCamp
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp309 vistas
Bridging the gap between CyberSecurity R&D and UX por DefCamp
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
DefCamp260 vistas
Secure and privacy-preserving data transmission and processing using homomorp... por DefCamp
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp470 vistas
Drupalgeddon 2 – Yet Another Weapon for the Attacker por DefCamp
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp269 vistas
Economical Denial of Sustainability in the Cloud (EDOS) por DefCamp
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp254 vistas
Trust, but verify – Bypassing MFA por DefCamp
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
DefCamp323 vistas
Threat Hunting: From Platitudes to Practical Application por DefCamp
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
DefCamp218 vistas
Building application security with 0 money down por DefCamp
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
DefCamp179 vistas
Implementation of information security techniques on modern android based Kio... por DefCamp
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
DefCamp215 vistas
Lattice based Merkle for post-quantum epoch por DefCamp
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
DefCamp241 vistas
The challenge of building a secure and safe digital environment in healthcare por DefCamp
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
DefCamp323 vistas
Timing attacks against web applications: Are they still practical? por DefCamp
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
DefCamp258 vistas
Tor .onions: The Good, The Rotten and The Misconfigured por DefCamp
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp816 vistas
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t... por DefCamp
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp294 vistas
We will charge you. How to [b]reach vendor’s network using EV charging station. por DefCamp
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp442 vistas
Connect & Inspire Cyber Security por DefCamp
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
DefCamp290 vistas
The lions and the watering hole por DefCamp
The lions and the watering holeThe lions and the watering hole
The lions and the watering hole
DefCamp225 vistas
Catch Me If You Can - Finding APTs in your network por DefCamp
Catch Me If You Can - Finding APTs in your networkCatch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your network
DefCamp304 vistas

Último

SAP Automation Using Bar Code and FIORI.pdf por
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
23 vistas38 diapositivas
Vertical User Stories por
Vertical User StoriesVertical User Stories
Vertical User StoriesMoisés Armani Ramírez
14 vistas16 diapositivas
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
21 vistas15 diapositivas
Scaling Knowledge Graph Architectures with AI por
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AIEnterprise Knowledge
38 vistas15 diapositivas
Case Study Copenhagen Energy and Business Central.pdf por
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdfAitana
16 vistas3 diapositivas
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
40 vistas69 diapositivas

Último(20)

SAP Automation Using Bar Code and FIORI.pdf por Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Virendra Rai, PMP23 vistas
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab21 vistas
Case Study Copenhagen Energy and Business Central.pdf por Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 vistas
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker40 vistas
Data Integrity for Banking and Financial Services por Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely25 vistas
6g - REPORT.pdf por Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex10 vistas
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson92 vistas
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc11 vistas
Serverless computing with Google Cloud (2023-24) por wesley chun
Serverless computing with Google Cloud (2023-24)Serverless computing with Google Cloud (2023-24)
Serverless computing with Google Cloud (2023-24)
wesley chun11 vistas
"Running students' code in isolation. The hard way", Yurii Holiuk por Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays17 vistas

The Charter of Trust

  • 1. charter-of-trust.com | #Charter of Trust Charter of Trust on Cybersecurity Stefan Zarinschi Senior Penetration Tester @Siemens CISSP, SSCP, CISM, CISA
  • 2. 1 – The beginning Why do we need a Charter of Trust? 2 – The principles What do they mean and how we achieve them concretely (examples from various partners) 3 – The future How do we develop the Charter of Trust into a global standard for all things cybersecurity Plan
  • 3. 1 The beginning Why do we need a Charter of Trust?
  • 4. … and risks Exposure to malicious cyber attacks is also growing dramatically, putting our lives and the stability of our society at risk Digitalization creates … Opportunities Blue Boxing CryptovirologyAOHell Level Seven Crew hack Denial-of-service attacks Cloudbleed sl1nk SCADA hacks Meltdown/Spectre Infineon/TPM AT&T Hack Morris Worm Melissa Worm ILOVEYOU WannaCry NotPetya Heartbleed Industroyer/Chrashoverride Stuxnet 2000 2004 2008 2012 2016 202019961988 1992 Billions of devices are being connected by the Internet of Things, and are the backbone of our infrastructure and economy 50.1B (2020) IoT Inception (2009) 8.7B (2012) 11.2B (2013) 14.2B (2014) 18.2B (2015) 22.9B (2016) 28.4B (2017) 42.1B (2019) 0.5B (2003) Connected Systems Connected Facilities/Plant/Site Connected Products 34.8B (2018) Billion of Devices
  • 5. And it‘s common truth We can’t expect people to actively support the digital transformation if we cannot TRUST in the security of data and networked systems.
  • 6. That’s why together with strong partners we have signed a “Charter of Trust” – aiming at three important objectives 1. Protect the data of individuals and companies 2. Prevent damage to people, companies and infrastructures 3. Create a reliable foundation on which confidence in a networked, digital world can take root and grow
  • 7. The Charter of Trust The principles2
  • 8. Cybersecurity A critical factor for the success of the digital economy 01 Ownership of cyber and IT security 02 Responsibility throughout the digital supply chain 03 Security by default 04 User-centricity 05 Innovation and co-creation 06 Education 07 Certification for critical infrastructure and solutions 08 Transparency and response 09 Regulatory framework 10 Joint initiatives Key principles
  • 9. Charter of Trust Principle 1 01 Ownership of cyber and IT security Anchor the responsibility for cybersecurity at the highest governmental and business levels by designating specific ministries and CISOs. Establish clear measures and targets as well as the right mindset throughout organizations – “it is everyone’s task”. What does that mean and why is it so important? People, organizations and entire societies must rely on digital technologies and will support this transformation only if the security of their data and networked systems can be ensured. It requires clear responsibilities at the highest levels – in companies as well as governments. Concrete implementation steps Siemens example In January 2018 we established a new cybersecurity unit headed by Natalia Oropeza, our new Chief Cybersecurity Officer (CCSO). In this function, she reports directly to the Managing Board of Siemens AG. With this new position we’re fulfilling one of our requirements in the Charter of Trust. “Cybersecurity is more than a challenge. It’s a huge opportunity. By setting standards with a dedicated and global team to make the digital world more secure, we are investing in the world's most valuable resource: TRUST. Our concrete answers to today’s upcoming cybersecurity issues and our proposals for more advanced cybersecurity rules and standards are invaluable to our partners, stakeholders and societies around the world. That is what we call “ingenuity at work.” Natalia Oropeza, Chief Cybersecurity Officer, Siemens AG
  • 10. Charter of Trust Principle 2 02 Responsibility throughout the digital supply chain Throughout a reasonable life cycle of products, solutions and services, the digital supply chain has to ensure appropriate integrity, confidentiality and availability. The weakest link in the chain defines its overall strength. Identity and access management Connected devices must have secure identities and safeguarding measures that only allow authorized users and devices to use them Encryption Connected devices must ensure confidentiality for data storage and transmission purposes, wherever appropriate Continuous protection Companies must offer updates, upgrades and patches throughout a reasonable lifecycle for their products, systems and services via a secure update mechanism Concrete implementation steps Siemens example To protect industrial plants from internal and external cyber attacks, all levels must be protected simultaneously – from the plant management level to the field level and from access control to copy protection. With defense in-depth, Siemens provides a multi-layer concept that gives plants both all-round and in-depth protection. The concept is based on plant security, network security and system integrity as recommended by ISA 99/IEC 62443. Siemens products and systems offer integrated security Know-how and copy protection Authentication and user management Firewall and VPN (Virtual Private Network) System hardening and continuous monitoring Siemens Plant Security Services Assess Security Implement Security Manage Security
  • 11. Charter of Trust Principle 3 03 Security by default Adopt the highest appropriate level of security and data protection and ensure that it is pre-configured into the design of products, functionalities, processes, technologies, operations, architectures and business models. Concrete implementation steps Siemens example The Siemens Elektronikwerk Amberg is a prime example of a digital factory. The factory uses cutting-edge technologies to produce approximately 15 million SIMATIC products each year. Early on in the lifecycle, each SIMATIC product is analyzed for their functionalities as well as the necessary security measures to be integrated into their designs. A holistic security concept is applied throughout the lifecycle, from design and development, to the production and maintenance of the product. What does that mean and why is it so important? Only if security requirements are already taken into account in the early phase of a product, especially in its design phase, can the highest appropriate level of security be offered proactively. The same applies to all the other steps in the value chain – from the functionalities and the default security configuration settings of a product, to the manufacturing processes, technologies used and the operational processes. This also includes the underlying architectures and business models. “Considering our extensive network, which multiplies the number of possible points of entry to our IT infrastructure, we cannot assume that yesterday’s solutions will protect against today’s potential threats. Since introducing SIEM, we have much higher transparency about the effectiveness of our measures to protect against cyberattacks.” Gunter Beitinger, Chief Executive Officer (CEO), Siemens Elektronikwerk Amberg
  • 12. Charter of Trust Principle 4 04 User-centricity Serve as a trusted partner throughout a reasonable lifecycle, providing products, systems and services as well as guidance based on the customer’s cybersecurity needs, impacts and risks. Concrete implementation steps Siemens example With Siemens Industrial Security Services, industrial companies benefit from the comprehensive know-how as well as the technical expertise of a global network of specialists for automation and cybersecurity. The holistic approach of the industry-specific concept is based on state-of-the-art technologies as well as the applicable security rules and standards. Siemens proactively offers security solutions along the industrial lifecycle. Threats and malware are detected at an early stage, vulnerabilities analyzed in detail and appropriate comprehensive security measures are initiated. Continuous monitoring gives plant operators the greatest possible transparency regarding the security of their industrial facility and optimal investment protection at all times. What does that mean and why is it so important? Companies are exposed to the same risks as any other user of IT and the internet. In addition, companies are the targets of additional type of attacks that do not occur in the private environment. That’s why companies need products, systems and services that meet their security needs – over an appropriate lifecycle. Assess Security Implement Security Manage Security
  • 13. Charter of Trust User-centricity Siemens Plant Security Services A triple dose of more security Evaluation of current security status – Analysis of threats and vulnerabilities to identify, evaluate and classify risks – Assessment of business impact – Execution from process engineering and automation view – Basis for the establishment of a security program Comprehensive security through monitoring and proactive protection – Close security gaps with continuous updates and backups – Identify and handle security incidents thanks to continuous security monitoring – Early adaptation to changing threat scenarios Assess Security Implement Security Manage Security Risk mitigation through implementation of security measures – Design and implement technical security measures – Develop and deploy security-relevant processes – Enhance security awareness thanks to specific trainings
  • 14. Charter of Trust Principle 5 05 Innovation and co-creation Combine domain know-how and deepen a joint understanding between firms and policymakers of cybersecurity requirements and rules in order to continuously innovate and adapt cyber-security measures to new threats; drive and encourage contractual Public Private Partnerships, among other things. Concrete implementation steps Siemens example Siemens has been taking a stand in cybersecurity for 30 years – through leading technologies, proven know-how and services as well as educational efforts. Currently, our company has about 1275 cybersecurity experts worldwide, which includes about 25 whitehat hackers who continuously challenge the security of both internal IT systems and products being shipped to customers. The ability to supply customers with secure products and systems is a competitive advantage within a growing business field. The unique combination of technical know- how in Cybersecurity and the very deep domain know-how puts Siemens in an ideal position to be both a market and thought leader. In our Core Technology Field (CCT), Cybersecurity experts from our Business Units and our central research and development unit – Corporate Technology – are working on new technologies for safeguarding critical infrastructure, protecting sensitive information and assuring business continuity. What does that mean and why is it so important? Only if we intensify the cooperation between companies and policymakers and create a common understanding of cyber threats will we succeed in the long run. That’s why we need to build this partnership and increase our shared knowledge across industries, universities and R&D institutions.
  • 15. Charter of Trust Innovation and co-creation in our CCT Cybersecurity Security automation in R&D, e.g. – Automated penetration testing – Automated hardening and secure configuration Technologies for security services in operations, e.g. – Security analytics platform – Artificial intelligence for security – Automatic response, malware containment Small footprint IoT cryptography One-way gateway IoT public key infra- structure, identity and access management Security Components, e.g. Cloud security for industrial applications Security for lifecycles in the field
  • 16. Charter of Trust Principle 6 06 Education Include dedicated cybersecurity courses in school curricula – as degree courses in universities, professional education and trainings – in order to lead the transformation of skills and job profiles needed for the future. Concrete implementation steps Siemens example By carrying out regular cybersecurity awareness training sessions worldwide, Siemens ensures all employees have a high level of security awareness. We invest in building dedicated security expertise for products, solutions and services with a role-specific curriculum. InfoSec Cards, for example, give practical hints categorized in different topics to support our employees in implementing Siemens-specific InfoSec rules and regulations. With annually renewed Trend Cards, we provide an overview of the most important current technical and non-technical trends in the broader field of cybersecurity that may possibly influence the Siemens portfolio. And our “Applying Digitalization to your Business” training session, featuring cybersecurity as key element, has been rolled out throughout the company and consists of four important pillars: What does that mean and why is it so important? A significant number of cybersecurity incidents are attributed to human error or negligence. Raising everyone’s awareness of cyber risks and protection measures is the first line of defense. To continue developing IT security at the technological level, people need to be able to acquire the skills and qualifications that are needed for the digital transformation. Only in this way can people adapt to the new job profiles. That’s why corresponding supportive programs for schools, universities and companies should be continued and expanded. Design business Implement and scale business Understand technology Experience technology Applying digitalization to our business A hands-on training to accompany digital transformation
  • 17. Charter of Trust Principle 7 07 Certification for critical infrastructure and solutions Companies and – if necessary – governments establish mandatory independent third-party certifications (based on future-proof definitions, where life and limb is at risk in particular) for critical infrastructure as well as critical IoT solutions. Concrete implementation steps Siemens example The biggest challenge facing cybersecurity standards is holistic, system-oriented approaches. Many existing standards focus on the level of the individual product or system. What is missing are standards for overarching topics such as Smart Cities, which then continue in concrete specifications for sub-areas such as mobility, energy and water supply. One of the key platforms for building consensus on standards for requirements and procedures for assessing compliance is the IEC (International Electrotechnical Commission). It has already established more than 100 cybersecurity standards. Siemens was involved in around 90 percent of this. What does that mean and why is it so important? Critical infrastructure and critical IoT solutions (e.g. autonomous cars, collaborative robots) will be increasingly exposed to cybersecurity threats. Independent certifications for security-relevant processes or security-relevant technical solutions can help to reduce the risk of cybersecurity incidents, where harm for life and limb of people are at risk. It’s up to companies – and governments, if necessary. The overarching strategy of standardization work in the area of cybersecurity is being driven by Siemens within the IEC. In addition, Siemens is represented in many individual committees. The same applies to the committees at the IEEE, IEFF and ISO. An example of the success of a holistic standard is IEC 62443. It defines basic standards for “Security by Design,” holistically addressing operators as well as products and services included in IoT solutions. IEC 62443 is universally applicable, “from the high-speed locomotive to the light switch.” It sets the standards that engineers should consider as early on as the design stage.
  • 18. Charter of Trust Principle 8 08 Transparency and response Participate in an industrial cybersecurity network in order to share new insights, information on incidents et al.; report incidents beyond today’s practice, which focusses on critical infrastructure. Concrete implementation steps Siemens example Siemens is a member of FIRST, the umbrella organization for all CERTS (Cyber Emergency Response Teams). We also have a very good relationship with national CERTs (such as US- CERT, CERT-EU and ICS-CERT) and law enforcement agencies (such as the FBI, BKA and Europol). And we gather Cyber Threat Intelligence and share them within these partners. We’ve formed partnerships for developing industrial IT and standards and collaborations with universities, business partners, customers, startups and respected research institutes for cybersecurity innovations. And with our own Cyber Defense Teams, we are waging a determined battle against approx. 1,000 cyber attacks every month. What does that mean and why is it so important? The digital world is all about one thing: speed. When cyber attacks occur, you need an immediate, coordinated and goal-oriented response. That's why it's so important for companies to team up and work together to create an industrial cybersecurity network to instantly share new insights and information about attacks and incidents. We have effective strategies that help us handle the large number of attacks, because we can incorporate our findings from defense activities directly into new technologies. Thomas Schreck Head of the Cyber Emergency Response Team at Siemens AG
  • 19. Charter of Trust Principle 9 09 Regulatory framework Promote multilateral collaborations in regulation and standardization to create a level playing field that matches the global reach of WTO; inclusion of rules for cybersecurity in Free Trade Agreements (FTAs). Concrete implementation steps Siemens example Siemens welcomes all international networking on topics at every relevant level. We actively participate in a comprehensive cybersecurity network (relevant criminal prosecutors, ISA, FIRST, CERT Community, Software Assurance Forum for Excellence in Code (SAFECode). We gather threat information and disseminate it through these partnerships. Our Government Affairs activities, which include the initiative to create a Charter of Trust, are committed to helping bring cybersecurity to the agenda and translating it into concrete regulations and standards. What does that mean and why is it so important? Regulation and standardization are only successful if they are based on multilateral cooperation. We therefore wish to expand these further in order to create a level playing field for all involved. The World Trade Organization, with its global reach, is our role model. Cybersecurity is so important that it should also be included as an integral part of Free Trade Agreements.
  • 20. Charter of Trust Principle 10 10 Joint initiatives Drive joint initiatives including all relevant stakeholders in order to implement the aforementioned principles in the various parts of the digital world without undue delay. Concrete implementation steps Siemens example On February 16 at the MSC, we laid the cornerstone for the joint “Charter of Trust” initiative with partners – aspiring and desiring to recruit more comrades in arms for our initiative worldwide and to create a digital world that is based on trust in the digital and hyper-connected world. One that’s independent of competitors and regions. Trust must not stop at geographical or industry borders. And this can only be a starting point. This is not a challenge that can be solved by this group or any individual company alone. That’s why we invite companies sharing our ambition and ownership for trust to join the Charter of Trust initiative. We also invite governments of the world and civil society to engage in a focused dialogue: Trust matters to everyone. It’s everyone’s task. What does that mean and why is it so important? Only when we become active together will we achieve our goals. The Charter of Trust is therefore an important nucleus for further joint initiatives to promptly implement the 10 principles in the various areas of the digital world.
  • 21. The Future How do we develop the Charter into a global standard for all things in cybersecurity? 3
  • 22. Together we strongly believe ─ Effective cybersecurity is a precondition for an open, fair and successful digital future ─ By adhering to and promoting our principles, we are creating a foundation of trust for all charter-of-trust.com As a credible and reliable voice, we collaborate with key stakeholders to achieve trust in cybersecurity for global citizens.
  • 23. Be part of a network that does not only sign, but collaborates on Cybersecurity! Let us be your trusted partners for cybersecurity and digitalization Together we will improve our technology, people and processes Join us by following our principles and making the digital world more secure
  • 24. We sign for cybersecurity! We sign the Charter of Trust.

Notas del editor

  1. Today I will present you a very interesting project developed by Siemens in cooperation with a series of partners.
  2. The Plan for today is:
  3. Why Siemens initiated this project?
  4. Through CoT we defined 10 principles to be followed and addressed in order to achieve our objectives
  5. In January 2018, Siemens has established a new cybersecurity unit headed by Natalia Oropeza, our new Chief Information Security Officer (CISO). In this function, she reports directly to the Managing Board of Siemens AG.
  6. Throughout a reasonable life cycle of products, solutions and services, the digital supply chain has to ensure appropriate integrity, confidentiality and availability. The weakest link in the chain defines its overall strength.
  7. At Siemens the security requirements are taken into account from the design phase of any new product SIMATIC is a prime example of this. In an early phase in the life cycle, each SIMATIC product is analyzed for necessary security measures to be integrated in its design and functionalities. A holistic security concept is applied along the life cycle, from design to development, production and maintenance of the product.