SlideShare a Scribd company logo
1 of 32
Cyber Security in the
Manufacturing Industry
New Challenges in the Information Age
Source: Deloitte
Industry 4.0
Digitalization is the basis …
Industry 4.0
... for the intelligent networking of business processes, things,
plants, components and people and is the key to future success.
YES… and what about security ?
 World Wide Web was invented in 1989
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
 Data volumes online will be 50 times greater in 2020 than they were in 2016
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
 Data volumes online will be 50 times greater in 2020 than they were in 2016
 A business will fall victim to a ransomware attack every 14 seconds by 2019,
increasing from every 40 seconds in 2017
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
 Data volumes online will be 50 times greater in 2020 than they were in 2016
 A business will fall victim to a ransomware attack every 14 seconds by 2019,
increasing from every 40 seconds in 2017
 The 5 most cyber-attacked industries in 2015-2018:
Healthcare, Manufacturing, Financial Services, Government, Transportation
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
 Data volumes online will be 50 times greater in 2020 than they were in 2016
 A business will fall victim to a ransomware attack every 14 seconds by 2019,
increasing from every 40 seconds in 2017
 The 5 most cyber-attacked industries in 2015-2018:
Healthcare, Manufacturing, Financial Services, Government, Transportation
 The manufacturing industry is now one of the most frequently hacked sectors
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
 Data volumes online will be 50 times greater in 2020 than they were in 2016
 A business will fall victim to a ransomware attack every 14 seconds by 2019,
increasing from every 40 seconds in 2017
 The 5 most cyber-attacked industries in 2015-2018:
Healthcare, Manufacturing, Financial Services, Government, Transportation
 The manufacturing industry is now one of the most frequently hacked sectors
 Nearly half of all cyberattacks are committed against small businesses
Facts
Cyber Security
History of cyber attacks
Stuxnet: Targeting critical infrastructure
Quelle: ibtimes
 First detection in 2010
 Infected around 100.000 industrial
plants worldwide
 Targeted to Iranian nuclear industry
 Spread over service laptops, USB and
network
 Attack routine only install and initiated
on certain Siemens PLC setups
 Attacked PLC directly by changing
values
 All changes are invisible to operators
Quelle: newscientist
https://en.wikipedia.org/wiki/Stuxnet
BlackEnergy trojan strikes again: Attacks
Ukrainian electric power industry
http://www.welivesecurity.com/
 On December 23rd, 2015, around half
of the homes in the Ivano-Frankivsk
region in Ukraine (population around
1.4 million) were left without electricity
for a few hours.
 Prykarpattya Oblenergo, a power
distributor that serves 538,000
customers, says 27 of its substations
went dead.
http://money.cnn.com/
http://money.cnn.com/2016/01/18/technology/ukraine-hack-russia/
http://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/
CYBER THREAT LANDSCAPE IN UKRAINE
2014-2016
https://boozallen.com/content/dam/boozallen/documents/2016/09/ukraine-report
ICS SECURITY: 2019 IN REVIEW
73 percent of industrial organizations’
networks are vulnerable to hackers
(Positive Technologies testing in 2018),
Most vulnerabilities detected can be
exploited remotely without needing to
obtain any privileges in advance.
The research revealed 175,632 ICS
components accessible online.
https://www.ptsecurity.com/ww-en/about/news/
https://www.ptsecurity.com/ww-en/about/news/
Number of Internet-accessible ICS components, by country
Internet-Facing Industrial Control Systems
https://4sics.se/john-released-an-ics-world-map-at-4sics/
Internet-Facing Industrial Control Systems
https://www.shodan.io/
Rather than to locate specific content on a particular search
term, SHODAN is designed to help the user find specific nodes
(desktops, servers, routers, switches, etc.) with specific content
in their banners
Questions every executive
should consider regarding
cybersecurity
Network security - Industrial vs Office IT
Preference Industrial IT Network Office IT Network
Priorities order
(availabilitiy, integrity, confidentiality)
Life Cycle (years)
Data communication (delays accepted, real
time?)
Network availability (losses accepted?)
Patch management (updates frequency)
Location of security hardware (decentralized
vs centralized)
IT security implementation level (low – high)
Network security - Industrial vs Office IT
Preference Industrial IT Network Office IT Network
Priorities order
(availability, integrity, confidentiality)
1. Availability
2. Integrity
3. Confidentiality
1. Confidentiality
2. Integrity
3. Availability
Life Cycle (years) 10 -20 years 3 - 5 years
Data communication (delays accepted, real
time?)
Real time Delays accepted
Network availability (losses accepted?) 24/365 Losses accepted
Patch management (update frequency) Infrequent Frequent
Location of security hardware
(decentralized vs centralized)
Decentralized Central
IT security implementation level (low – high) Low or none High
Is our Industrial Control Systems
(ICS) environment protected from
the Internet and how have we
validated that?
Industrial IT Security
Important questions
Who is the manager ultimately
responsible for cybersecurity or
do we rely on third-party support?
Industrial IT Security
Important questions
Do we have remote access to our
ICS network? If so, why do we need
it, and how is it protected and
monitored?
Industrial IT Security
Important questions
Industrial IT Security
Estimated costs of security failure
1 Data loss:
Suddenly, your entire data is lost. What would be the costs for reconstructing the data?
Euro _______
2 Loss of know-how:
Your competitor gains access to your confidential data (characteristic data, construction plans etc.). How great would
the damage be for You? Euro _______
3 Downtimes:
Due to a security problem, the production site stands still for several hours. How much would that cost You?
Euro _______
4 Employees' working hours:
How many working hours of your employees would You have to invest to compensate for the results of a security
failure? Euro _______
5 Hijacking of your computers:
How great would the communication effort be if a stranger used your (!) computer to spy on or attack a third party?
Euro _______
6 Reputation:
How great would the damage to your reputation be if your customers would not trust You any longer?
Euro _______
Total: Euro _______
Industrial IT Security
POTENTIAL RISKS
Production plant defense concept
Plan security
 Physical access protection
 Processes and guidelines
Network security
 Network segmentation
 Cell protection
 Firewall and VPN-Access
 Authentication
 Firewall logging
System integrity
 Patch management
 White listing
 Virus scan
Industrial IT Security
Identify all possible RISKS and
avoid them
Let’s connect on
Thank you
and keep your assets protected!

More Related Content

What's hot

Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsSchneider Electric
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorOlivier Busolini
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architectureDenise Bailey
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementCA Technologies
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopLife Cycle Engineering
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Yehia Mamdouh
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architectureMubashirAslam5
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP SystemsOnapsis Inc.
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architectureVladimir Jirasek
 

What's hot (20)

Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity Management
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architecture
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Security audit
Security auditSecurity audit
Security audit
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 

Similar to Cyber Security Challenges in Manufacturing Industry

Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Black Duck by Synopsys
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfssuserc1c354
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...Lounge47
 
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbHIT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbHM2M Alliance e.V.
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...SG Analytics
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?Yasmin AbdelAziz
 

Similar to Cyber Security Challenges in Manufacturing Industry (20)

Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
188
188188
188
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
 
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbHIT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?
 

More from Ekonomikas ministrija

Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanai
Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanaiValsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanai
Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanaiEkonomikas ministrija
 
Atbalsts digitālajai transformācijai un citas #ESfondi iespējas
Atbalsts digitālajai transformācijai un citas #ESfondi iespējasAtbalsts digitālajai transformācijai un citas #ESfondi iespējas
Atbalsts digitālajai transformācijai un citas #ESfondi iespējasEkonomikas ministrija
 
EDIC atbalsta iespējas uzņēmuma digitalizācijai /
EDIC atbalsta iespējas uzņēmuma digitalizācijai /EDIC atbalsta iespējas uzņēmuma digitalizācijai /
EDIC atbalsta iespējas uzņēmuma digitalizācijai /Ekonomikas ministrija
 
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?Ekonomikas ministrija
 
Nauda biznesam ar valsts un ES atbalstu (Altum)
Nauda biznesam ar valsts un ES atbalstu  (Altum)Nauda biznesam ar valsts un ES atbalstu  (Altum)
Nauda biznesam ar valsts un ES atbalstu (Altum)Ekonomikas ministrija
 
SIA “Himalayan International” pieredzes stāsts
SIA  “Himalayan International” pieredzes stāstsSIA  “Himalayan International” pieredzes stāsts
SIA “Himalayan International” pieredzes stāstsEkonomikas ministrija
 
Plānošanas reģiona pašvaldību atbalsts uzņēmējiem
Plānošanas reģiona pašvaldību atbalsts uzņēmējiemPlānošanas reģiona pašvaldību atbalsts uzņēmējiem
Plānošanas reģiona pašvaldību atbalsts uzņēmējiemEkonomikas ministrija
 
Atbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiAtbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiEkonomikas ministrija
 
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?Ekonomikas ministrija
 
Atbalsts digitālo platformu un inovāciju radīšanai 
Atbalsts digitālo platformu un inovāciju radīšanai Atbalsts digitālo platformu un inovāciju radīšanai 
Atbalsts digitālo platformu un inovāciju radīšanai Ekonomikas ministrija
 
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas Ekonomikas ministrija
 
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...Ekonomikas ministrija
 
Atbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiAtbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiEkonomikas ministrija
 
Atbalsts digitālo platformu un inovāciju radīšanai
 Atbalsts digitālo platformu un inovāciju radīšanai Atbalsts digitālo platformu un inovāciju radīšanai
Atbalsts digitālo platformu un inovāciju radīšanaiEkonomikas ministrija
 
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?Ekonomikas ministrija
 
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpā
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpāKā uzņēmējam viegli (ne) pazaudēt naudu kibertelpā
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpāEkonomikas ministrija
 
Procesu digitalizācija - iespējas attstībai
Procesu digitalizācija - iespējas attstībai Procesu digitalizācija - iespējas attstībai
Procesu digitalizācija - iespējas attstībai Ekonomikas ministrija
 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai Ekonomikas ministrija
 

More from Ekonomikas ministrija (20)

Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanai
Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanaiValsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanai
Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanai
 
Atbalsts digitālajai transformācijai un citas #ESfondi iespējas
Atbalsts digitālajai transformācijai un citas #ESfondi iespējasAtbalsts digitālajai transformācijai un citas #ESfondi iespējas
Atbalsts digitālajai transformācijai un citas #ESfondi iespējas
 
EDIC atbalsta iespējas uzņēmuma digitalizācijai /
EDIC atbalsta iespējas uzņēmuma digitalizācijai /EDIC atbalsta iespējas uzņēmuma digitalizācijai /
EDIC atbalsta iespējas uzņēmuma digitalizācijai /
 
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?
 
Nauda biznesam ar valsts un ES atbalstu (Altum)
Nauda biznesam ar valsts un ES atbalstu  (Altum)Nauda biznesam ar valsts un ES atbalstu  (Altum)
Nauda biznesam ar valsts un ES atbalstu (Altum)
 
SIA “Himalayan International” pieredzes stāsts
SIA  “Himalayan International” pieredzes stāstsSIA  “Himalayan International” pieredzes stāsts
SIA “Himalayan International” pieredzes stāsts
 
Plānošanas reģiona pašvaldību atbalsts uzņēmējiem
Plānošanas reģiona pašvaldību atbalsts uzņēmējiemPlānošanas reģiona pašvaldību atbalsts uzņēmējiem
Plānošanas reģiona pašvaldību atbalsts uzņēmējiem
 
Drošība digitālajā vidē
Drošība digitālajā vidēDrošība digitālajā vidē
Drošība digitālajā vidē
 
Atbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiAtbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanai
 
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
 
Atbalsts digitālo platformu un inovāciju radīšanai 
Atbalsts digitālo platformu un inovāciju radīšanai Atbalsts digitālo platformu un inovāciju radīšanai 
Atbalsts digitālo platformu un inovāciju radīšanai 
 
Atbalsts procesu digitalizācijai
Atbalsts procesu digitalizācijaiAtbalsts procesu digitalizācijai
Atbalsts procesu digitalizācijai
 
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas
 
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...
 
Atbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiAtbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanai
 
Atbalsts digitālo platformu un inovāciju radīšanai
 Atbalsts digitālo platformu un inovāciju radīšanai Atbalsts digitālo platformu un inovāciju radīšanai
Atbalsts digitālo platformu un inovāciju radīšanai
 
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
 
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpā
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpāKā uzņēmējam viegli (ne) pazaudēt naudu kibertelpā
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpā
 
Procesu digitalizācija - iespējas attstībai
Procesu digitalizācija - iespējas attstībai Procesu digitalizācija - iespējas attstībai
Procesu digitalizācija - iespējas attstībai
 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai 
 

Recently uploaded

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 

Recently uploaded (20)

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 

Cyber Security Challenges in Manufacturing Industry

  • 1. Cyber Security in the Manufacturing Industry New Challenges in the Information Age
  • 3. Digitalization is the basis … Industry 4.0 ... for the intelligent networking of business processes, things, plants, components and people and is the key to future success.
  • 4. YES… and what about security ?
  • 5.  World Wide Web was invented in 1989 Facts
  • 6.  World Wide Web was invented in 1989  The first-ever website went live in 1991 Facts
  • 7.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites Facts
  • 8.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites  Data volumes online will be 50 times greater in 2020 than they were in 2016 Facts
  • 9.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites  Data volumes online will be 50 times greater in 2020 than they were in 2016  A business will fall victim to a ransomware attack every 14 seconds by 2019, increasing from every 40 seconds in 2017 Facts
  • 10.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites  Data volumes online will be 50 times greater in 2020 than they were in 2016  A business will fall victim to a ransomware attack every 14 seconds by 2019, increasing from every 40 seconds in 2017  The 5 most cyber-attacked industries in 2015-2018: Healthcare, Manufacturing, Financial Services, Government, Transportation Facts
  • 11.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites  Data volumes online will be 50 times greater in 2020 than they were in 2016  A business will fall victim to a ransomware attack every 14 seconds by 2019, increasing from every 40 seconds in 2017  The 5 most cyber-attacked industries in 2015-2018: Healthcare, Manufacturing, Financial Services, Government, Transportation  The manufacturing industry is now one of the most frequently hacked sectors Facts
  • 12.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites  Data volumes online will be 50 times greater in 2020 than they were in 2016  A business will fall victim to a ransomware attack every 14 seconds by 2019, increasing from every 40 seconds in 2017  The 5 most cyber-attacked industries in 2015-2018: Healthcare, Manufacturing, Financial Services, Government, Transportation  The manufacturing industry is now one of the most frequently hacked sectors  Nearly half of all cyberattacks are committed against small businesses Facts
  • 13. Cyber Security History of cyber attacks
  • 14. Stuxnet: Targeting critical infrastructure Quelle: ibtimes  First detection in 2010  Infected around 100.000 industrial plants worldwide  Targeted to Iranian nuclear industry  Spread over service laptops, USB and network  Attack routine only install and initiated on certain Siemens PLC setups  Attacked PLC directly by changing values  All changes are invisible to operators Quelle: newscientist https://en.wikipedia.org/wiki/Stuxnet
  • 15. BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry http://www.welivesecurity.com/  On December 23rd, 2015, around half of the homes in the Ivano-Frankivsk region in Ukraine (population around 1.4 million) were left without electricity for a few hours.  Prykarpattya Oblenergo, a power distributor that serves 538,000 customers, says 27 of its substations went dead. http://money.cnn.com/ http://money.cnn.com/2016/01/18/technology/ukraine-hack-russia/ http://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/
  • 16. CYBER THREAT LANDSCAPE IN UKRAINE 2014-2016 https://boozallen.com/content/dam/boozallen/documents/2016/09/ukraine-report
  • 17. ICS SECURITY: 2019 IN REVIEW 73 percent of industrial organizations’ networks are vulnerable to hackers (Positive Technologies testing in 2018), Most vulnerabilities detected can be exploited remotely without needing to obtain any privileges in advance. The research revealed 175,632 ICS components accessible online. https://www.ptsecurity.com/ww-en/about/news/
  • 19. Internet-Facing Industrial Control Systems https://4sics.se/john-released-an-ics-world-map-at-4sics/
  • 20. Internet-Facing Industrial Control Systems https://www.shodan.io/ Rather than to locate specific content on a particular search term, SHODAN is designed to help the user find specific nodes (desktops, servers, routers, switches, etc.) with specific content in their banners
  • 21. Questions every executive should consider regarding cybersecurity
  • 22. Network security - Industrial vs Office IT Preference Industrial IT Network Office IT Network Priorities order (availabilitiy, integrity, confidentiality) Life Cycle (years) Data communication (delays accepted, real time?) Network availability (losses accepted?) Patch management (updates frequency) Location of security hardware (decentralized vs centralized) IT security implementation level (low – high)
  • 23. Network security - Industrial vs Office IT Preference Industrial IT Network Office IT Network Priorities order (availability, integrity, confidentiality) 1. Availability 2. Integrity 3. Confidentiality 1. Confidentiality 2. Integrity 3. Availability Life Cycle (years) 10 -20 years 3 - 5 years Data communication (delays accepted, real time?) Real time Delays accepted Network availability (losses accepted?) 24/365 Losses accepted Patch management (update frequency) Infrequent Frequent Location of security hardware (decentralized vs centralized) Decentralized Central IT security implementation level (low – high) Low or none High
  • 24. Is our Industrial Control Systems (ICS) environment protected from the Internet and how have we validated that? Industrial IT Security Important questions
  • 25. Who is the manager ultimately responsible for cybersecurity or do we rely on third-party support? Industrial IT Security Important questions
  • 26. Do we have remote access to our ICS network? If so, why do we need it, and how is it protected and monitored? Industrial IT Security Important questions
  • 27. Industrial IT Security Estimated costs of security failure 1 Data loss: Suddenly, your entire data is lost. What would be the costs for reconstructing the data? Euro _______ 2 Loss of know-how: Your competitor gains access to your confidential data (characteristic data, construction plans etc.). How great would the damage be for You? Euro _______ 3 Downtimes: Due to a security problem, the production site stands still for several hours. How much would that cost You? Euro _______ 4 Employees' working hours: How many working hours of your employees would You have to invest to compensate for the results of a security failure? Euro _______ 5 Hijacking of your computers: How great would the communication effort be if a stranger used your (!) computer to spy on or attack a third party? Euro _______ 6 Reputation: How great would the damage to your reputation be if your customers would not trust You any longer? Euro _______ Total: Euro _______
  • 29. Production plant defense concept Plan security  Physical access protection  Processes and guidelines Network security  Network segmentation  Cell protection  Firewall and VPN-Access  Authentication  Firewall logging System integrity  Patch management  White listing  Virus scan
  • 30. Industrial IT Security Identify all possible RISKS and avoid them
  • 32. Thank you and keep your assets protected!

Editor's Notes

  1. Industrial Control Systems (ICS)
  2. https://en.wikipedia.org/wiki/Stuxnet
  3. http://money.cnn.com/2016/01/18/technology/ukraine-hack-russia/ http://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/
  4. 17
  5. 18
  6. https://icsmap.shodan.io/ Want to do your own analysis of the data and get a historic picture of publicly accessible ICS devices? All the data used for the above image is made available as a download below: Bacnet (port 47808) DNP3 (port 20000) EtherNet/IP (port 44818) Niagara Fox (ports 1911 and 4911) IEC-104 (port 2404) Red Lion (port 789) Modbus (port 502) Siemens S7 (port 102)
  7. 21
  8. 24
  9. 25
  10. 26