SlideShare a Scribd company logo
1 of 22
Download to read offline
IT-Security in Industrial Automation
Josef Waclaw, CEO Infotecs GmbH
INDUSTRIAL CONTROL
SYSTEMS
2
Cyber Attacks & Cyber Threats:
Underlying Premises
Global automation
Mass implementation of typical ICS
Internet used as communication channel
Integration of ICS with ERP and MES
Development of remote monitoring systems
Service business model come to industrial
Industry 4.0
IoT
Politics
3
4
Industry 4.0
“85% of responding
companies will have
implemented industry
4.0 technologies in
their key areas by
2020” (Source: PwC)
The capacity is used up
till Monday
I must be at the
output in 2 hours
I am filling the
pallet
Fill the pallet
Few on stock
Drill hole
overrange
New product order:
500 pcs till Dec
Deliver 100 pcs in
2 days
Traffic jam ETA is
2 pm
New CNC program
installed on machine „X“
I perform the main-
tenance of machine „X“
Machine „X“ needs
maintenance
Quality Control Management
Storage Location
Technical SupportSupplier
Engineering department
-
5
Industry and Cyber Security
“By 2020, the number of connected industrial devices will
triple”
“The underlying concept of Industry 4.0 is to connect
embedded systems and smart production facilities to generate
a digital convergence between industry, smart production
facilities to generate a digital convergence between industry,
business and internal functions and processes”
6
Cyber Attack Risks
 Operational downtime
 Product manipulation
 Intellectual property
 Product quality
 Reputation
 Revenue lost
7
Cyber Attack Examples
“The target for Dragonfly is the
intellectual property of
pharmaceutical organizations”,
September 2014
 Target pharmaceutical
facilities
 Remote access Trojan
 Phishing software attachment
8
Cyber Attack Examples
 Ukrainian power blackout
that affected 700k homes,
production plants in January
2016
 Target Ukrainian electric
utilities MS Office
documents/Marcos SCADA
System Manipulation
 Shutdown of power plant,
complex restart procedure
Source: The Telegraph
9
Cyber Attack Examples
Steal plant Germany:
Shutdown blast furnace
German nuclear plant:
Virus cyber attack
Hospital in Germany:
Virus attack “Locky”
Source: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Securitysituation/IT-Security-Situation-in-Germany-2015.pdf
10
Cyber Attack Examples
Source: Department of Homeland Security, 2015
Reported Cyber Incidents,
By Critical Infrastructure Sector
11
Cyber Attack Tools
Source: https://www.shodan.io/
Cyber Attacks & Cyber Threats:
Statistics
©2015, ОАО «ИнфоТеКС».
12
Incidents from August 2014 to August 2015
ICS-CERT, USA
Attack on Saudi Aramco
performed by the
“Cutting Sword of
Justice” terrorist group
to stop oil production
in Saudi Arabia
Vulnerability
Vendors Statistics
Массовое
внедрение
типовых АСУ
ТП
General Electric
(31 vulnerabilities)
Advantech
(51 vulnerabilities)
Schneider Electric
(96 vulnerabilities)
Siemens
(125 vulnerabilities)
Other vendor
combine to «Other»
0
20
40
60
80
100
120
140
Critical Medium LowVulnerability
Research from Positive Technologies, 2014
13
-
Data Breaches
14Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
-
IoT Attacks
15
“In the future, intelligence services might use the
internet of things for identification, surveillance,
monitoring, location tracking, […] ”
James Clapper, director of US national intelligence
Source: https://www.theguardian.com/technology/2016/feb/09/internet-of-things-smart-home-devices-government-surveillance-james-clapper
16
ERP, MES Enterprise resource planning systems
Manufacturing execution systems
Top level
of ICS
SCADA/HMI
Operator’s workstation
Control and monitoring centers
Controller
level
PLC
Smart device
Remote Terminal Unit (RTU)
Field
level
Sensor
Actuator
Industrial Control Systems
Structure
17
Particularity of ICS
Operating conditions:
Temperatures
Vibration
Dust and damp-proof
equipment
Computational environment:
Limited computational resources
Proprietary software
Low-maintenance systems
High mean time between failures
Connections:
Industrial interfaces other than
Ethernet
Industrial protocols
Real-time
Equipment specifications:
Power supply other than 220V
Limited capacity
Limited space
Limited accessibility
INDUSTRIAL CONTROL SYSTEM
Complete, Multi-Layer Security for
Industrial Systems and the Extended Enterprise
Quality Management
Administration Logistics
Maintenance & Service
ViPNet Coordinator IG:
Typical Scenarios
19
Security integration to ICS with ERP and MES
OPC-Server
SCADA Server
ViPNet HW
ERP Server
Workstation
Workstation
HMI Station
PLC
PLC
PLC
ViPNet IG
ViPNet IG
ViPNet IG
Administrator
ViPNet HW
ViPNet Coordinator IG Application (with security)
20
ViPNet VPN
HMI computers
Administrator
Engineering
Workstation
Telemetry Server
ViPNet HW1000
Communication
Service Provider
ViPNet VPN
RS-485-IEC 60870-5-101
RS-485-IEC 60870-5-101
Multifunctional Power Meter
Protective relaying and automation
Digital relay Digital relay
Electricity metering
Electricity meter
RS-485
ViPNet
Coordinator IG
Industrial Telemetry System
Transmission Substation
Distribution Substation
Media Converter
Ethernet / RS-485
©2015, ОАО «ИнфоТеКС».
21
ViPNet SIES: Application (with security)
Electricity meter
Electricity metering
ViPNet SIES Core
ViPNet
SIES CoreDigital relay Digital relay
Protective relaying and automation
RS-485-IEC 60870-5-103/Moduls
ViPNet
SIES
Server
HMI
Engineering
Workstation
RS-485-IEC 60870-5-101
RS-485-IEC 60870-5-101
Telemetry
Server
SCADA Server
ViPNet
SIES SM
Multifunctional Power Meter
Communication
Service Provider
3G Router
Industrial
Internet Switch
Media Converter
Ethernet / RS-485
ViPNet
SIES Pack
Infotecs GmbH
Josef Waclaw, CEO
Tel: +49 30 2064366-14
Email: josef.waclaw@infotecs.de
Web: www.infotecs.biz
22

More Related Content

What's hot

É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?Anchises Moraes
 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control SystemsEric Andresen
 
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornSecuring Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornEric Andresen
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use casesAbhishek Sood
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingTonex
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015Hildebrand Technology
 
Cybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityCybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityVertex Holdings
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...TI Safe
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Aarkstore Enterprise
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...TI Safe
 
The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas Ghazi Wadi, PMP
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - mediumusmsystem
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSJim Gilsinn
 
OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션 OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션 GE코리아
 
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTCristian Garcia G.
 
5 Smart Manufacturing Terms to Know
5 Smart Manufacturing Terms to Know5 Smart Manufacturing Terms to Know
5 Smart Manufacturing Terms to KnowMonarch Metal
 
Get to zero stealth natural gas_executive_overview_ch
Get to zero stealth natural gas_executive_overview_chGet to zero stealth natural gas_executive_overview_ch
Get to zero stealth natural gas_executive_overview_chSherid444
 

What's hot (20)

É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control Systems
 
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornSecuring Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT: 3 keys to handling the oncoming barrage of use cases
 IoT: 3 keys to handling the oncoming barrage of use cases IoT: 3 keys to handling the oncoming barrage of use cases
IoT: 3 keys to handling the oncoming barrage of use cases
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Cybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityCybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway Cybersecurity
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
 
The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - medium
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션 OpShield 운영기술 환경 보안 솔루션
OpShield 운영기술 환경 보안 솔루션
 
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
5 Smart Manufacturing Terms to Know
5 Smart Manufacturing Terms to Know5 Smart Manufacturing Terms to Know
5 Smart Manufacturing Terms to Know
 
Get to zero stealth natural gas_executive_overview_ch
Get to zero stealth natural gas_executive_overview_chGet to zero stealth natural gas_executive_overview_ch
Get to zero stealth natural gas_executive_overview_ch
 

Viewers also liked

Connectivity for a better world
Connectivity for a better worldConnectivity for a better world
Connectivity for a better worldM2M Alliance e.V.
 
IoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessIoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessM2M Alliance e.V.
 
Is today’s Information Technology smart enough for a Smart World?
Is today’s Information Technology smart enough for a Smart World?Is today’s Information Technology smart enough for a Smart World?
Is today’s Information Technology smart enough for a Smart World?M2M Alliance e.V.
 
Tackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoTTackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoTM2M Alliance e.V.
 
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...M2M Alliance e.V.
 
Connected cars: making navigation personal, adding telematics features and en...
Connected cars: making navigation personal, adding telematics features and en...Connected cars: making navigation personal, adding telematics features and en...
Connected cars: making navigation personal, adding telematics features and en...M2M Alliance e.V.
 
The Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten SchroeerThe Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten SchroeerM2M Alliance e.V.
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital LeadershipM2M Alliance e.V.
 
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...M2M Alliance e.V.
 
Effective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sourcesEffective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sourcesM2M Alliance e.V.
 

Viewers also liked (14)

Connectivity for a better world
Connectivity for a better worldConnectivity for a better world
Connectivity for a better world
 
IoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessIoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do business
 
Is today’s Information Technology smart enough for a Smart World?
Is today’s Information Technology smart enough for a Smart World?Is today’s Information Technology smart enough for a Smart World?
Is today’s Information Technology smart enough for a Smart World?
 
Autonomous driving
Autonomous driving Autonomous driving
Autonomous driving
 
Tackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoTTackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoT
 
IoT - THE NEW NORMAL?
IoT - THE NEW NORMAL?IoT - THE NEW NORMAL?
IoT - THE NEW NORMAL?
 
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...
The Future of Industrial IoT by Stephen Mellor, CTO Industrial Internet Conso...
 
Connected cars: making navigation personal, adding telematics features and en...
Connected cars: making navigation personal, adding telematics features and en...Connected cars: making navigation personal, adding telematics features and en...
Connected cars: making navigation personal, adding telematics features and en...
 
From Vision to Reality
From Vision to RealityFrom Vision to Reality
From Vision to Reality
 
The Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten SchroeerThe Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital Leadership
 
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...
Security for Condition Monitoring and Predictive Maintenance: Need to Know vs...
 
Standardization for M2M
Standardization for M2MStandardization for M2M
Standardization for M2M
 
Effective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sourcesEffective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sources
 

Similar to IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH

Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksBGA Cyber Security
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfMehedi Hasan
 
Industrial Cyber Security - EVF 2019 Alexandre Darcherif
Industrial Cyber Security - EVF 2019 Alexandre DarcherifIndustrial Cyber Security - EVF 2019 Alexandre Darcherif
Industrial Cyber Security - EVF 2019 Alexandre DarcherifAlexandre Darcherif
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropePositive Hack Days
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar  CIC Qatar 2018 AgendaiFluids Cybersecurity Seminar  CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar CIC Qatar 2018 AgendaJohn Kingsley
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich TopCyberNewsMAGAZINE
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 

Similar to IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH (20)

Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
FICCI-talk
FICCI-talkFICCI-talk
FICCI-talk
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist Attacks
 
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdfCYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
CYBER ATTACKS ON INDUSTRIAL AUTOMATION.pdf
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Industrial Cyber Security - EVF 2019 Alexandre Darcherif
Industrial Cyber Security - EVF 2019 Alexandre DarcherifIndustrial Cyber Security - EVF 2019 Alexandre Darcherif
Industrial Cyber Security - EVF 2019 Alexandre Darcherif
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
SCADA White Paper March2012
SCADA White Paper March2012SCADA White Paper March2012
SCADA White Paper March2012
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar  CIC Qatar 2018 AgendaiFluids Cybersecurity Seminar  CIC Qatar 2018 Agenda
iFluids Cybersecurity Seminar CIC Qatar 2018 Agenda
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 

More from M2M Alliance e.V.

Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0M2M Alliance e.V.
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - OverviewM2M Alliance e.V.
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentM2M Alliance e.V.
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...M2M Alliance e.V.
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System M2M Alliance e.V.
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsM2M Alliance e.V.
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business AdvantageM2M Alliance e.V.
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserM2M Alliance e.V.
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology M2M Alliance e.V.
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingM2M Alliance e.V.
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living M2M Alliance e.V.
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation M2M Alliance e.V.
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...M2M Alliance e.V.
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsM2M Alliance e.V.
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesM2M Alliance e.V.
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteM2M Alliance e.V.
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthM2M Alliance e.V.
 

More from M2M Alliance e.V. (20)

M2M Journal 2017
M2M Journal 2017M2M Journal 2017
M2M Journal 2017
 
Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - Overview
 
VR Industry Solutions
VR Industry Solutions VR Industry Solutions
VR Industry Solutions
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M Environment
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory Applications
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business Advantage
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA Teaser
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device Hacking
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of Things
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future Revenues
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from Remote
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential Growth
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

IT-Security in Industrial Automation by Josef Waclaw, CEO Infotecs GmbH

  • 1. IT-Security in Industrial Automation Josef Waclaw, CEO Infotecs GmbH
  • 3. Cyber Attacks & Cyber Threats: Underlying Premises Global automation Mass implementation of typical ICS Internet used as communication channel Integration of ICS with ERP and MES Development of remote monitoring systems Service business model come to industrial Industry 4.0 IoT Politics 3
  • 4. 4 Industry 4.0 “85% of responding companies will have implemented industry 4.0 technologies in their key areas by 2020” (Source: PwC) The capacity is used up till Monday I must be at the output in 2 hours I am filling the pallet Fill the pallet Few on stock Drill hole overrange New product order: 500 pcs till Dec Deliver 100 pcs in 2 days Traffic jam ETA is 2 pm New CNC program installed on machine „X“ I perform the main- tenance of machine „X“ Machine „X“ needs maintenance Quality Control Management Storage Location Technical SupportSupplier Engineering department
  • 5. - 5 Industry and Cyber Security “By 2020, the number of connected industrial devices will triple” “The underlying concept of Industry 4.0 is to connect embedded systems and smart production facilities to generate a digital convergence between industry, smart production facilities to generate a digital convergence between industry, business and internal functions and processes”
  • 6. 6 Cyber Attack Risks  Operational downtime  Product manipulation  Intellectual property  Product quality  Reputation  Revenue lost
  • 7. 7 Cyber Attack Examples “The target for Dragonfly is the intellectual property of pharmaceutical organizations”, September 2014  Target pharmaceutical facilities  Remote access Trojan  Phishing software attachment
  • 8. 8 Cyber Attack Examples  Ukrainian power blackout that affected 700k homes, production plants in January 2016  Target Ukrainian electric utilities MS Office documents/Marcos SCADA System Manipulation  Shutdown of power plant, complex restart procedure Source: The Telegraph
  • 9. 9 Cyber Attack Examples Steal plant Germany: Shutdown blast furnace German nuclear plant: Virus cyber attack Hospital in Germany: Virus attack “Locky” Source: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Securitysituation/IT-Security-Situation-in-Germany-2015.pdf
  • 10. 10 Cyber Attack Examples Source: Department of Homeland Security, 2015 Reported Cyber Incidents, By Critical Infrastructure Sector
  • 11. 11 Cyber Attack Tools Source: https://www.shodan.io/
  • 12. Cyber Attacks & Cyber Threats: Statistics ©2015, ОАО «ИнфоТеКС». 12 Incidents from August 2014 to August 2015 ICS-CERT, USA Attack on Saudi Aramco performed by the “Cutting Sword of Justice” terrorist group to stop oil production in Saudi Arabia
  • 13. Vulnerability Vendors Statistics Массовое внедрение типовых АСУ ТП General Electric (31 vulnerabilities) Advantech (51 vulnerabilities) Schneider Electric (96 vulnerabilities) Siemens (125 vulnerabilities) Other vendor combine to «Other» 0 20 40 60 80 100 120 140 Critical Medium LowVulnerability Research from Positive Technologies, 2014 13
  • 15. - IoT Attacks 15 “In the future, intelligence services might use the internet of things for identification, surveillance, monitoring, location tracking, […] ” James Clapper, director of US national intelligence Source: https://www.theguardian.com/technology/2016/feb/09/internet-of-things-smart-home-devices-government-surveillance-james-clapper
  • 16. 16 ERP, MES Enterprise resource planning systems Manufacturing execution systems Top level of ICS SCADA/HMI Operator’s workstation Control and monitoring centers Controller level PLC Smart device Remote Terminal Unit (RTU) Field level Sensor Actuator Industrial Control Systems Structure
  • 17. 17 Particularity of ICS Operating conditions: Temperatures Vibration Dust and damp-proof equipment Computational environment: Limited computational resources Proprietary software Low-maintenance systems High mean time between failures Connections: Industrial interfaces other than Ethernet Industrial protocols Real-time Equipment specifications: Power supply other than 220V Limited capacity Limited space Limited accessibility INDUSTRIAL CONTROL SYSTEM
  • 18. Complete, Multi-Layer Security for Industrial Systems and the Extended Enterprise Quality Management Administration Logistics Maintenance & Service
  • 19. ViPNet Coordinator IG: Typical Scenarios 19 Security integration to ICS with ERP and MES OPC-Server SCADA Server ViPNet HW ERP Server Workstation Workstation HMI Station PLC PLC PLC ViPNet IG ViPNet IG ViPNet IG Administrator ViPNet HW
  • 20. ViPNet Coordinator IG Application (with security) 20 ViPNet VPN HMI computers Administrator Engineering Workstation Telemetry Server ViPNet HW1000 Communication Service Provider ViPNet VPN RS-485-IEC 60870-5-101 RS-485-IEC 60870-5-101 Multifunctional Power Meter Protective relaying and automation Digital relay Digital relay Electricity metering Electricity meter RS-485 ViPNet Coordinator IG Industrial Telemetry System Transmission Substation Distribution Substation Media Converter Ethernet / RS-485
  • 21. ©2015, ОАО «ИнфоТеКС». 21 ViPNet SIES: Application (with security) Electricity meter Electricity metering ViPNet SIES Core ViPNet SIES CoreDigital relay Digital relay Protective relaying and automation RS-485-IEC 60870-5-103/Moduls ViPNet SIES Server HMI Engineering Workstation RS-485-IEC 60870-5-101 RS-485-IEC 60870-5-101 Telemetry Server SCADA Server ViPNet SIES SM Multifunctional Power Meter Communication Service Provider 3G Router Industrial Internet Switch Media Converter Ethernet / RS-485 ViPNet SIES Pack
  • 22. Infotecs GmbH Josef Waclaw, CEO Tel: +49 30 2064366-14 Email: josef.waclaw@infotecs.de Web: www.infotecs.biz 22