SlideShare a Scribd company logo
1 of 32
Cyber Security in the
Manufacturing Industry
New Challenges in the Information Age
Source: Deloitte
Industry 4.0
Digitalization is the basis …
Industry 4.0
... for the intelligent networking of business processes, things,
plants, components and people and is the key to future success.
YES… and what about security ?
 World Wide Web was invented in 1989
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
 Data volumes online will be 50 times greater in 2020 than they were in 2016
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
 Data volumes online will be 50 times greater in 2020 than they were in 2016
 A business will fall victim to a ransomware attack every 14 seconds by 2019,
increasing from every 40 seconds in 2017
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
 Data volumes online will be 50 times greater in 2020 than they were in 2016
 A business will fall victim to a ransomware attack every 14 seconds by 2019,
increasing from every 40 seconds in 2017
 The 5 most cyber-attacked industries in 2015-2018:
Healthcare, Manufacturing, Financial Services, Government, Transportation
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
 Data volumes online will be 50 times greater in 2020 than they were in 2016
 A business will fall victim to a ransomware attack every 14 seconds by 2019,
increasing from every 40 seconds in 2017
 The 5 most cyber-attacked industries in 2015-2018:
Healthcare, Manufacturing, Financial Services, Government, Transportation
 The manufacturing industry is now one of the most frequently hacked sectors
Facts
 World Wide Web was invented in 1989
 The first-ever website went live in 1991
 Today there are more than 1.2 billion websites
 Data volumes online will be 50 times greater in 2020 than they were in 2016
 A business will fall victim to a ransomware attack every 14 seconds by 2019,
increasing from every 40 seconds in 2017
 The 5 most cyber-attacked industries in 2015-2018:
Healthcare, Manufacturing, Financial Services, Government, Transportation
 The manufacturing industry is now one of the most frequently hacked sectors
 Nearly half of all cyberattacks are committed against small businesses
Facts
Cyber Security
History of cyber attacks
Stuxnet: Targeting critical infrastructure
Quelle: ibtimes
 First detection in 2010
 Infected around 100.000 industrial
plants worldwide
 Targeted to Iranian nuclear industry
 Spread over service laptops, USB and
network
 Attack routine only install and initiated
on certain Siemens PLC setups
 Attacked PLC directly by changing
values
 All changes are invisible to operators
Quelle: newscientist
https://en.wikipedia.org/wiki/Stuxnet
BlackEnergy trojan strikes again: Attacks
Ukrainian electric power industry
http://www.welivesecurity.com/
 On December 23rd, 2015, around half
of the homes in the Ivano-Frankivsk
region in Ukraine (population around
1.4 million) were left without electricity
for a few hours.
 Prykarpattya Oblenergo, a power
distributor that serves 538,000
customers, says 27 of its substations
went dead.
http://money.cnn.com/
http://money.cnn.com/2016/01/18/technology/ukraine-hack-russia/
http://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/
CYBER THREAT LANDSCAPE IN UKRAINE
2014-2016
https://boozallen.com/content/dam/boozallen/documents/2016/09/ukraine-report
ICS SECURITY: 2019 IN REVIEW
73 percent of industrial organizations’
networks are vulnerable to hackers
(Positive Technologies testing in 2018),
Most vulnerabilities detected can be
exploited remotely without needing to
obtain any privileges in advance.
The research revealed 175,632 ICS
components accessible online.
https://www.ptsecurity.com/ww-en/about/news/
https://www.ptsecurity.com/ww-en/about/news/
Number of Internet-accessible ICS components, by country
Internet-Facing Industrial Control Systems
https://4sics.se/john-released-an-ics-world-map-at-4sics/
Internet-Facing Industrial Control Systems
https://www.shodan.io/
Rather than to locate specific content on a particular search
term, SHODAN is designed to help the user find specific nodes
(desktops, servers, routers, switches, etc.) with specific content
in their banners
Questions every executive
should consider regarding
cybersecurity
Network security - Industrial vs Office IT
Preference Industrial IT Network Office IT Network
Priorities order
(availabilitiy, integrity, confidentiality)
Life Cycle (years)
Data communication (delays accepted, real
time?)
Network availability (losses accepted?)
Patch management (updates frequency)
Location of security hardware (decentralized
vs centralized)
IT security implementation level (low – high)
Network security - Industrial vs Office IT
Preference Industrial IT Network Office IT Network
Priorities order
(availability, integrity, confidentiality)
1. Availability
2. Integrity
3. Confidentiality
1. Confidentiality
2. Integrity
3. Availability
Life Cycle (years) 10 -20 years 3 - 5 years
Data communication (delays accepted, real
time?)
Real time Delays accepted
Network availability (losses accepted?) 24/365 Losses accepted
Patch management (update frequency) Infrequent Frequent
Location of security hardware
(decentralized vs centralized)
Decentralized Central
IT security implementation level (low – high) Low or none High
Is our Industrial Control Systems
(ICS) environment protected from
the Internet and how have we
validated that?
Industrial IT Security
Important questions
Who is the manager ultimately
responsible for cybersecurity or
do we rely on third-party support?
Industrial IT Security
Important questions
Do we have remote access to our
ICS network? If so, why do we need
it, and how is it protected and
monitored?
Industrial IT Security
Important questions
Industrial IT Security
Estimated costs of security failure
1 Data loss:
Suddenly, your entire data is lost. What would be the costs for reconstructing the data?
Euro _______
2 Loss of know-how:
Your competitor gains access to your confidential data (characteristic data, construction plans etc.). How great would
the damage be for You? Euro _______
3 Downtimes:
Due to a security problem, the production site stands still for several hours. How much would that cost You?
Euro _______
4 Employees' working hours:
How many working hours of your employees would You have to invest to compensate for the results of a security
failure? Euro _______
5 Hijacking of your computers:
How great would the communication effort be if a stranger used your (!) computer to spy on or attack a third party?
Euro _______
6 Reputation:
How great would the damage to your reputation be if your customers would not trust You any longer?
Euro _______
Total: Euro _______
Industrial IT Security
POTENTIAL RISKS
Production plant defense concept
Plan security
 Physical access protection
 Processes and guidelines
Network security
 Network segmentation
 Cell protection
 Firewall and VPN-Access
 Authentication
 Firewall logging
System integrity
 Patch management
 White listing
 Virus scan
Industrial IT Security
Identify all possible RISKS and
avoid them
Let’s connect on
Thank you
and keep your assets protected!

More Related Content

What's hot

Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscapeJisc
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Kunal Adhikari
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical SystemsBob Marcus
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
Honeypot based intrusion detection system PPT
Honeypot based intrusion detection system PPTHoneypot based intrusion detection system PPT
Honeypot based intrusion detection system PPTparthan t
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementPriyanka Aash
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsTarika Verma
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSChris Sistrunk
 

What's hot (20)

Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Honeypot based intrusion detection system PPT
Honeypot based intrusion detection system PPTHoneypot based intrusion detection system PPT
Honeypot based intrusion detection system PPT
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 

Similar to Cyber Security in the Manufacturing Industry: New challenges in the information age

Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Black Duck by Synopsys
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfssuserc1c354
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Black Duck by Synopsys
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...Lounge47
 
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbHIT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbHM2M Alliance e.V.
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...SG Analytics
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?Yasmin AbdelAziz
 

Similar to Cyber Security in the Manufacturing Industry: New challenges in the information age (20)

Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
188
188188
188
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
Open Source Insight: Meltdown, Spectre Security Flaws “Impact Everything”
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
Open Source Insight: Hospital, Medical Devices, Banking, and Automotive Cyber...
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
 
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbHIT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?
 

More from Ekonomikas ministrija

Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanai
Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanaiValsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanai
Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanaiEkonomikas ministrija
 
Atbalsts digitālajai transformācijai un citas #ESfondi iespējas
Atbalsts digitālajai transformācijai un citas #ESfondi iespējasAtbalsts digitālajai transformācijai un citas #ESfondi iespējas
Atbalsts digitālajai transformācijai un citas #ESfondi iespējasEkonomikas ministrija
 
EDIC atbalsta iespējas uzņēmuma digitalizācijai /
EDIC atbalsta iespējas uzņēmuma digitalizācijai /EDIC atbalsta iespējas uzņēmuma digitalizācijai /
EDIC atbalsta iespējas uzņēmuma digitalizācijai /Ekonomikas ministrija
 
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?Ekonomikas ministrija
 
Nauda biznesam ar valsts un ES atbalstu (Altum)
Nauda biznesam ar valsts un ES atbalstu  (Altum)Nauda biznesam ar valsts un ES atbalstu  (Altum)
Nauda biznesam ar valsts un ES atbalstu (Altum)Ekonomikas ministrija
 
SIA “Himalayan International” pieredzes stāsts
SIA  “Himalayan International” pieredzes stāstsSIA  “Himalayan International” pieredzes stāsts
SIA “Himalayan International” pieredzes stāstsEkonomikas ministrija
 
Plānošanas reģiona pašvaldību atbalsts uzņēmējiem
Plānošanas reģiona pašvaldību atbalsts uzņēmējiemPlānošanas reģiona pašvaldību atbalsts uzņēmējiem
Plānošanas reģiona pašvaldību atbalsts uzņēmējiemEkonomikas ministrija
 
Atbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiAtbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiEkonomikas ministrija
 
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?Ekonomikas ministrija
 
Atbalsts digitālo platformu un inovāciju radīšanai 
Atbalsts digitālo platformu un inovāciju radīšanai Atbalsts digitālo platformu un inovāciju radīšanai 
Atbalsts digitālo platformu un inovāciju radīšanai Ekonomikas ministrija
 
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas Ekonomikas ministrija
 
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...Ekonomikas ministrija
 
Atbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiAtbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiEkonomikas ministrija
 
Atbalsts digitālo platformu un inovāciju radīšanai
 Atbalsts digitālo platformu un inovāciju radīšanai Atbalsts digitālo platformu un inovāciju radīšanai
Atbalsts digitālo platformu un inovāciju radīšanaiEkonomikas ministrija
 
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?Ekonomikas ministrija
 
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpā
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpāKā uzņēmējam viegli (ne) pazaudēt naudu kibertelpā
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpāEkonomikas ministrija
 
Procesu digitalizācija - iespējas attstībai
Procesu digitalizācija - iespējas attstībai Procesu digitalizācija - iespējas attstībai
Procesu digitalizācija - iespējas attstībai Ekonomikas ministrija
 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai Ekonomikas ministrija
 

More from Ekonomikas ministrija (20)

Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanai
Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanaiValsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanai
Valsts #atbalstsuzņēmējiem - impulss produktivitātes kāpināšanai
 
Atbalsts digitālajai transformācijai un citas #ESfondi iespējas
Atbalsts digitālajai transformācijai un citas #ESfondi iespējasAtbalsts digitālajai transformācijai un citas #ESfondi iespējas
Atbalsts digitālajai transformācijai un citas #ESfondi iespējas
 
EDIC atbalsta iespējas uzņēmuma digitalizācijai /
EDIC atbalsta iespējas uzņēmuma digitalizācijai /EDIC atbalsta iespējas uzņēmuma digitalizācijai /
EDIC atbalsta iespējas uzņēmuma digitalizācijai /
 
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?
Kā LIAA var palīdzēt Tava uzņēmuma attīstībai?
 
Nauda biznesam ar valsts un ES atbalstu (Altum)
Nauda biznesam ar valsts un ES atbalstu  (Altum)Nauda biznesam ar valsts un ES atbalstu  (Altum)
Nauda biznesam ar valsts un ES atbalstu (Altum)
 
SIA “Himalayan International” pieredzes stāsts
SIA  “Himalayan International” pieredzes stāstsSIA  “Himalayan International” pieredzes stāsts
SIA “Himalayan International” pieredzes stāsts
 
Plānošanas reģiona pašvaldību atbalsts uzņēmējiem
Plānošanas reģiona pašvaldību atbalsts uzņēmējiemPlānošanas reģiona pašvaldību atbalsts uzņēmējiem
Plānošanas reģiona pašvaldību atbalsts uzņēmējiem
 
Drošība digitālajā vidē
Drošība digitālajā vidēDrošība digitālajā vidē
Drošība digitālajā vidē
 
Atbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiAtbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanai
 
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
Uzņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
 
Atbalsts digitālo platformu un inovāciju radīšanai 
Atbalsts digitālo platformu un inovāciju radīšanai Atbalsts digitālo platformu un inovāciju radīšanai 
Atbalsts digitālo platformu un inovāciju radīšanai 
 
Atbalsts procesu digitalizācijai
Atbalsts procesu digitalizācijaiAtbalsts procesu digitalizācijai
Atbalsts procesu digitalizācijai
 
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas
Valsts un #Atveseļošanasfonds atbalsts jaunām investīcijām – iespējas
 
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...
SIA "Himalayan International" ceļš uz procesu pārskatāmību jeb atbrīvošanos n...
 
Atbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanaiAtbalsts procesu digitalizācijai un to pilnveidošanai
Atbalsts procesu digitalizācijai un to pilnveidošanai
 
Atbalsts digitālo platformu un inovāciju radīšanai
 Atbalsts digitālo platformu un inovāciju radīšanai Atbalsts digitālo platformu un inovāciju radīšanai
Atbalsts digitālo platformu un inovāciju radīšanai
 
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
zņēmuma digitalizācija: ar ko sākt un bez kā neiztikt?
 
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpā
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpāKā uzņēmējam viegli (ne) pazaudēt naudu kibertelpā
Kā uzņēmējam viegli (ne) pazaudēt naudu kibertelpā
 
Procesu digitalizācija - iespējas attstībai
Procesu digitalizācija - iespējas attstībai Procesu digitalizācija - iespējas attstībai
Procesu digitalizācija - iespējas attstībai
 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai 
Aizdevums ar kapitāla atlaidi uzņēmuma digitalizācijai 
 

Recently uploaded

Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfwill854175
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...pujan9679
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book nowkapoorjyoti4444
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 

Recently uploaded (20)

Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 

Cyber Security in the Manufacturing Industry: New challenges in the information age

  • 1. Cyber Security in the Manufacturing Industry New Challenges in the Information Age
  • 3. Digitalization is the basis … Industry 4.0 ... for the intelligent networking of business processes, things, plants, components and people and is the key to future success.
  • 4. YES… and what about security ?
  • 5.  World Wide Web was invented in 1989 Facts
  • 6.  World Wide Web was invented in 1989  The first-ever website went live in 1991 Facts
  • 7.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites Facts
  • 8.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites  Data volumes online will be 50 times greater in 2020 than they were in 2016 Facts
  • 9.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites  Data volumes online will be 50 times greater in 2020 than they were in 2016  A business will fall victim to a ransomware attack every 14 seconds by 2019, increasing from every 40 seconds in 2017 Facts
  • 10.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites  Data volumes online will be 50 times greater in 2020 than they were in 2016  A business will fall victim to a ransomware attack every 14 seconds by 2019, increasing from every 40 seconds in 2017  The 5 most cyber-attacked industries in 2015-2018: Healthcare, Manufacturing, Financial Services, Government, Transportation Facts
  • 11.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites  Data volumes online will be 50 times greater in 2020 than they were in 2016  A business will fall victim to a ransomware attack every 14 seconds by 2019, increasing from every 40 seconds in 2017  The 5 most cyber-attacked industries in 2015-2018: Healthcare, Manufacturing, Financial Services, Government, Transportation  The manufacturing industry is now one of the most frequently hacked sectors Facts
  • 12.  World Wide Web was invented in 1989  The first-ever website went live in 1991  Today there are more than 1.2 billion websites  Data volumes online will be 50 times greater in 2020 than they were in 2016  A business will fall victim to a ransomware attack every 14 seconds by 2019, increasing from every 40 seconds in 2017  The 5 most cyber-attacked industries in 2015-2018: Healthcare, Manufacturing, Financial Services, Government, Transportation  The manufacturing industry is now one of the most frequently hacked sectors  Nearly half of all cyberattacks are committed against small businesses Facts
  • 13. Cyber Security History of cyber attacks
  • 14. Stuxnet: Targeting critical infrastructure Quelle: ibtimes  First detection in 2010  Infected around 100.000 industrial plants worldwide  Targeted to Iranian nuclear industry  Spread over service laptops, USB and network  Attack routine only install and initiated on certain Siemens PLC setups  Attacked PLC directly by changing values  All changes are invisible to operators Quelle: newscientist https://en.wikipedia.org/wiki/Stuxnet
  • 15. BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry http://www.welivesecurity.com/  On December 23rd, 2015, around half of the homes in the Ivano-Frankivsk region in Ukraine (population around 1.4 million) were left without electricity for a few hours.  Prykarpattya Oblenergo, a power distributor that serves 538,000 customers, says 27 of its substations went dead. http://money.cnn.com/ http://money.cnn.com/2016/01/18/technology/ukraine-hack-russia/ http://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/
  • 16. CYBER THREAT LANDSCAPE IN UKRAINE 2014-2016 https://boozallen.com/content/dam/boozallen/documents/2016/09/ukraine-report
  • 17. ICS SECURITY: 2019 IN REVIEW 73 percent of industrial organizations’ networks are vulnerable to hackers (Positive Technologies testing in 2018), Most vulnerabilities detected can be exploited remotely without needing to obtain any privileges in advance. The research revealed 175,632 ICS components accessible online. https://www.ptsecurity.com/ww-en/about/news/
  • 19. Internet-Facing Industrial Control Systems https://4sics.se/john-released-an-ics-world-map-at-4sics/
  • 20. Internet-Facing Industrial Control Systems https://www.shodan.io/ Rather than to locate specific content on a particular search term, SHODAN is designed to help the user find specific nodes (desktops, servers, routers, switches, etc.) with specific content in their banners
  • 21. Questions every executive should consider regarding cybersecurity
  • 22. Network security - Industrial vs Office IT Preference Industrial IT Network Office IT Network Priorities order (availabilitiy, integrity, confidentiality) Life Cycle (years) Data communication (delays accepted, real time?) Network availability (losses accepted?) Patch management (updates frequency) Location of security hardware (decentralized vs centralized) IT security implementation level (low – high)
  • 23. Network security - Industrial vs Office IT Preference Industrial IT Network Office IT Network Priorities order (availability, integrity, confidentiality) 1. Availability 2. Integrity 3. Confidentiality 1. Confidentiality 2. Integrity 3. Availability Life Cycle (years) 10 -20 years 3 - 5 years Data communication (delays accepted, real time?) Real time Delays accepted Network availability (losses accepted?) 24/365 Losses accepted Patch management (update frequency) Infrequent Frequent Location of security hardware (decentralized vs centralized) Decentralized Central IT security implementation level (low – high) Low or none High
  • 24. Is our Industrial Control Systems (ICS) environment protected from the Internet and how have we validated that? Industrial IT Security Important questions
  • 25. Who is the manager ultimately responsible for cybersecurity or do we rely on third-party support? Industrial IT Security Important questions
  • 26. Do we have remote access to our ICS network? If so, why do we need it, and how is it protected and monitored? Industrial IT Security Important questions
  • 27. Industrial IT Security Estimated costs of security failure 1 Data loss: Suddenly, your entire data is lost. What would be the costs for reconstructing the data? Euro _______ 2 Loss of know-how: Your competitor gains access to your confidential data (characteristic data, construction plans etc.). How great would the damage be for You? Euro _______ 3 Downtimes: Due to a security problem, the production site stands still for several hours. How much would that cost You? Euro _______ 4 Employees' working hours: How many working hours of your employees would You have to invest to compensate for the results of a security failure? Euro _______ 5 Hijacking of your computers: How great would the communication effort be if a stranger used your (!) computer to spy on or attack a third party? Euro _______ 6 Reputation: How great would the damage to your reputation be if your customers would not trust You any longer? Euro _______ Total: Euro _______
  • 29. Production plant defense concept Plan security  Physical access protection  Processes and guidelines Network security  Network segmentation  Cell protection  Firewall and VPN-Access  Authentication  Firewall logging System integrity  Patch management  White listing  Virus scan
  • 30. Industrial IT Security Identify all possible RISKS and avoid them
  • 32. Thank you and keep your assets protected!

Editor's Notes

  1. Industrial Control Systems (ICS)
  2. https://en.wikipedia.org/wiki/Stuxnet
  3. http://money.cnn.com/2016/01/18/technology/ukraine-hack-russia/ http://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/
  4. 17
  5. 18
  6. https://icsmap.shodan.io/ Want to do your own analysis of the data and get a historic picture of publicly accessible ICS devices? All the data used for the above image is made available as a download below: Bacnet (port 47808) DNP3 (port 20000) EtherNet/IP (port 44818) Niagara Fox (ports 1911 and 4911) IEC-104 (port 2404) Red Lion (port 789) Modbus (port 502) Siemens S7 (port 102)
  7. 21
  8. 24
  9. 25
  10. 26