Cyber Security in Aluminium WorkshopDay two: Towards a solution to the challenges of cyber...
Transcript of Cyber Security in Aluminium WorkshopDay two: Towards a solution to the challenges of cyber...
Cyber Security in Aluminium Workshop
Coombe Abbey, Coventry | 26-27 February 2020
Day one: Cyber Resilience and the Aluminium Sector
§ Morning: Presentations - § Paul Hingley, Siemens. Industrial Security
§ Dr Alexeis Garcia-Perez, Coventry University. Cyber Security or Digital Resilience in Aluminium?
§ Prof. Umut Turksen, Coventry University. Digital Legacies & Integrity: Risks, Compliance and Success in
Cyber Eco-systems
§ Paola Angelilli, Danieli. Cybersecurity: Danieli Experience and Roadmap
§ Afternoon: Collaborative cyber security simulation exercise
Day two: Towards a solution to the challenges of cyber resilience in the Aluminium sector
§ Presentations: § David Haake, Business Development Director at IBM Security Solutions § Anthony Dickinson, Chief Revenue Officer at 2MC
§ Collaborative development of the foundation for a solution to the cyber resilience of
the sector
§ A Cyber Security Advisory Board for the sector.
OT Security in the Aluminum Industry
David Haake Director, Business Development
IBM Security
IBM Security: A short commercial
• Largest enterprise security provider
• 17,500+ customers
• 133 countries
• 3,500+ security patents
• 20 acquisitions since 2002 • 6000+ in R&D and Consulting
DOMAIN SEGMENT ANALYST RANKINGS
Security Operations and Response
Security Intelligence LEADER
Network & Endpoint Protection LEADER
Information Risk and Protection
Identity Governance & Access Management
LEADER
LEADER
LEADER
LEADER
Data Security LEADER
Application Security LEADER
Mobile Protection LEADER
Fraud Protection LEADER
Security Transformation Services
Consulting and Managed Services
LEADER
LEADER
LEADER in 12 out of 12 security market segments
• Monitors more than one trillion events monthly, and 200K+ threat intelligence daily
• Nine global locations
X-FORCE COMMAND CENTERS
ABOUT US
6 © 2018 IBM Corporation
Grow Business
Stop Threats
Prove Compliance
Get Ahead of
Compliance
Enhance Security Hygiene
Detect & Stop
Advanced Threats
Orchestrate Incident
Response
Master Threat Hunting
Secure Hybrid Cloud
Protect Critical Assets
Prevent Advanced
Fraud
Govern Users and Identities
Let’s focus on the most critical security use cases
Outcome-driven security
6 © 2018 IBM Corporation
7 © 2018 IBM Corporation
The future of security is AI and Orchestration What if you could augment your teams’ intelligence and response?
Respond quickly with confidence Orchestrate a complete and dynamic response, enabling faster, more intelligent remediation
– Create dynamic playbooks built on NIST / CERT / SANS
– Deploy response procedures and expertise
Use AI to gain a head start Automatically investigate incidents and anomalies to identify the most likely threats
– Quickly gather insights from millions of external sources
– Apply cognitive reasoning to build relationships
IBM QRadar Advisor with Watson IBM Resilient
8 © 2018 IBM Corporation
The future of security is Cloud Can you confidently say yes to digital transformation?
Gain Visibility IBM QRadar Cloud Security Analytics
Manage Access IBM Cloud Identity Connect
Protect Data IBM Multi-Cloud Data Encryption
Get Help from Experts | IBM X-Force Cloud Security Service 8 © 2018 IBM Corporation
9 © 2018 IBM Corporation
The future of security is Collaboration Are you part of the bigger picture?
Share real-time threat intelligence Interact with 41K+ users and 800+ TB of threat intelligence on the IBM X-Force Exchange
Join an ecosystem of defenses Customize your security with 140+ apps on the IBM Security App Exchange
©2018IBMCorporation 4 March 2020 10
IBMIndustryAcademyIBMInstituteforBusinessValueIBMResearch
Disruptiveforces• CyberterrorismandIT/OTsecurityaregrowingconcerns
• DisruptionisalreadyrifeinareasoftheE2Evaluechain
• Newwaysofinnovationandefficiencyarebeingpursued
• Technologyisenablingnewecosystems
• Talenthiringandcuratingremainschallenging
• IndustryIoTiscreatingsystemsofsystems
Pressingchallenges• Executivesmustfocusoncreatinganattractivebusinesswithcustomers,suppliers,partnersandemployees
• Anend-to-enddigitaloperatingmodelelevatesnewbusinessmodelsandservices,customerexperienceandoperationalefficiency
• Organizationalagilitywithservicedeliveryandadaptivenesstomarketchangesisanecessity
Provocativeopportunities• Anticipatecustomerneedsbyleveragingprolificdata
• Implementnewbusinessmodelsaspartofdigitallyreinventedenterprise
• Driveknowledgecaptureanddeployment
• Promotedeepercollaborationandinnovationwithecosystempartners
Emergingconsequences• Companiesmustaddresshighercustomerexpectations,reshapetheirenterprisesandtransformthemarketsinwhichtheycompete
• Coopetitionandcompetitionwillmanifestinnewforms;therewillbedisruptors,specialistas-a-servicefirms,networksandplatforms
Executive Summary
Disruptive environmental forces are driving seismic shifts within the Metals Industry
11
“We'reinthemiddleofthreeClimateChanges,notJustone.Theworldismovingfrombeinganinterconnectedone,tobeinginterdependent,anditisthemostadaptivethatsurvive”-ThomasFriedman,BusinessCommentator
Portfolio and assets optimization
Grow through Substitution
Leverage Sustainability Trends
ENVIRONMENT
Increase Customer Centricity Strengthen Core
Focus on Profitability
Invest with Future Focus
Organizations need adaptive ecosystem- coalitions
The Change The Imperatives
GLOBALIZATION TECHNOLOGY
The Norsk Hydro Locker Gaga Ransomware attack March 19, 2019
22,000PCsaffectedat170sitesworldwideEndpointprotectionandnetworkdetectionsoftwarefailedtodetecttheattackFortunately,theiremailhadbeenmovedtoa3rdpartycloudserviceandwasn’thurt60productionsiteswereforcedintomanualoperations,formonthsRemediationcostsof$60-70MUSD
An example from Mining Extending OT Security services to the GMG membership
13
MiningandMetalsInformationSharingAnalysisCenter
CybersecurityWorkingGroup
IBMSecurity
IntegratedIT/OTSecurityThreatAnalysisandremediation
IBMOTSecurityAssessmentsiteservices-toassessvulnerabilitiesandimplement“runbooks”andsystems(egNozomi)- QradarOTManagedservicer
dedicatedclientOTSOCwherereq’d-CanofferSecurityCloudPakforoneview
If
ExistingITthreatanalysissharingserviceproviderWith14subscribingminingclientssharinganMSIEMoperatedbyPerchSecurity-anonprofitJVfundedbyGMGcompanies
Smarter devices, better connected, always on
Continuous data collection shared across applications, reporting tools and the supply chain
Automation driving down costs, increasing production
Constant change with winners and losers
Digital Transformation is Driving Change in Operational Technology
$
Attack Surface is Expanding
Rapidly Changing Advanced Threats
Increased Security Complexity
Impact of Digital Transformation on Operational Technology
Unique OT Security Challenges
OTEnvironment
SafetyProductivity
PredictabilityFlexibilityAnalytics
Separation/Isolation
AccessControlObscurity/Proprietary Connectivity
COTSCloud
NationStatesMalwareLegacyOS
Principles
Goals
Security
Demands
Risks
Process
Translating IT security practices and IT security technology alone
to address OT security needs does not result in a secure OT
environment
People
Unique OT process implications - safety, business continuity and
physical security not typically considered in IT processes.
Culture
Cultural, language and process problems between disciplines for products and
services
Security Transformation: Understanding the differences between IT & OT Security
CorporateLevelISA95-Levels4,5
ShopfloorLevelISA95-Levels0,1,2
LocalNetwork
ITEnabledIndustrialEquipment
Industry 4.0 is Cloudification of the PLANTS – Extending Cloud Capabilities to the Industrial Edge
PlantLevelISA95-Level3 IndustrialEdge
PrivateSoftwareDefinedNetworks
Industry Solutions Corporate Data Lake
Multi-Cloud Management Edge Management and Control
Cybersecurity
PublicCloud
IBM Industry Solutions
ISV & OT Solutions
Client Corporate
Applications
IBMCloudPakforManufacturing
Industry Solutions IT-OT Security
Data & Analytics at the Edge Local runtimes
Containers & VM virtualization Edge Gateways & Servers
Multi-Access Edge Computing
IBM End-to-end Security
Plant Service Bus
QRadar
Data & Analytics at the Edge
Cloud management vm
IBM Industry Solutions
(plant level) Production Optimization
Asset Performance Management Quality Insights
Customer Plant Applications
Pla
nt A
pplic
atio
ns
Virtu
aliz
atio
n
Pla
nt N
etw
ork
Virtu
aliz
atio
n
Edge Management DevOps
1
Corporate LevelISA95-Levels 4,5
Shopfloor LevelISA95-Levels 0,1,2
Local Network
IT Enabled Industrial Equipment
Industry 4.0 is Cloudification of the PLANTS – Extending Cloud Capabilities to the Industrial Edge
Plant LevelISA95-Level 3 Industrial Edge
Private Software Defined Networks
Industry SolutionsCorporate Data Lake
Multi-Cloud Management Edge Management and Control
Cybersecurity
Public Cloud
IBM Industry Solutions
ISV & OT Solutions
Client Corporate
Applications
IBM Cloud Pak for Manufacturing
Industry SolutionsIT-OT Security
Data & Analytics at the EdgeLocal runtimes
Containers & VM virtualizationEdge Gateways & Servers
Multi-Access Edge Computing
IBM End-to-end Security
Plant Service Bus
QRadar
Data & Analytics at the Edge
Cloud managementvm
IBM Industry Solutions
(plant level)Production Optimization
Asset Performance ManagementQuality Insights
Customer Plant Applications
Plan
t App
licat
ions
Vi
rtua
lizat
ion
Plan
tNet
wor
k Vi
rtua
lizat
ion
Edge ManagementDevOps
OT Security in an IND4.0 World
IBMSecurity/©2019IBMCorporation 19
LTE / 5G Connectivity
Edge-Based Containerization
Open Edge-To-Cloud Platform
Layered Security
Data & Analytics
IIoT Integration
1
Manufacturing Execution
Production Management Logistics Health &
Safety
Process Manufacturing Strategy
Enabled By
Integrated Across Functions and Stakeholders
Pervasive ConnectivityCloud Computing
Operational Excellence & Cost Reduction
Cognitive Driven Business Models
Improve Productivity & Skill of People
Driving Outcomes that Matter
LTE / 5GConnectivity
Data & Analytics
IIoT Integration
Layered Security
Sensible Instrumentation
Maintenance Quality
Optimization&Integration
[â Event Resolution Cycle Time] [á Product Unit Quality]
Productivity &Efficiency
[â Data Gathering]
[á MTBF]
[â Reduce Maintenance] [á Throughput]
Computer Vision
Edge-BasedContainerization
Asset Reliability &Utilization
Scalability
[â Time to Market] [â Cost of Deployment]
Three Step Execution
Open Edge-To-Cloud Platform
Partner with IBM to Edge enable Industry 4.0 Deployments
IBM Confidential
Connectivity Deployment
Industrial Edge Platform
Digital Transformation for Manufacturing Sites