Industrial cybersecurity: Protecting your digital ... Assets/IIM-Digital-Transformatio… · from...

1
© 2020 AVEVA Group plc and its subsidiaries. All rights reserved. AVEVA and the AVEVA logo are a trademark or registered trademark of AVEVA Group plc in the U.S. and other countries. linkedin.com/company/aveva www.aveva.com @avevagroup facebook.com/avevasolutions Counted on by the world’s most trusted industrial leaders 550+ Refineries 9/10 Shipyards 4,600 Food and beverage processing plants 3,200+ Infrastructure customers 1,000+ Power generation units Speak to an expert There is no better time to take advantage of the IIoT and cloud technologies. Digital transformation is a journey that allows you to transform your existing automation investment into an improved way of doing business. We are dedicated to earning and retaining your digital trust. That is why we transparently publish our security statement. View it for yourself at trust.aveva.com Physical security Where are their cloud services physically deployed? Where will my data actually reside? Where and how will my data be captured, stored and used? Data security How is your information protected – at rest and in motion? Does your vendor support unidirectional data transfer? How does your supplier deal with network outages? Application security How do they handle authentication, authorization and account management? What is their approach to identity and access management (IAM)? Do they offer a flexible, scalable solution? Continuous monitoring Do they have proactive monitoring and active security policies in place? Can they identify abnormal behavior and catch anomalous activity? What procedures are there to detect and isolate suspicious activity online? Security assessments Do they have a proactive program of external security audits? How do they deal with ongoing compliance with regulations e.g. GDPR? Do they have a published security statement that you can read? Projects and delivery Are their project delivery teams certified to global standards such as CMMi Level 5, or ISO 9001? Do they have a Computer Security Incident Response Team (CSIRT) ready to mobilize? Do they have strategic partnerships with key security experts such as Cylance or Claroty? Cybersecurity checklist for your vendor When it comes to cybersecurity, who you partner with is crucial. Software vendors play an important part in your cyber defence strategy. When considering a cloud or IIoT partner here are some key questions to consider. Cybersecurity is a multi-faceted discipline requiring a proactive approach across the business. Best-prepared businesses report a focus on the following key areas. Your cybersecurity checklist Partners Select vendors that will partner with you to protect your critical data Understand their security, privacy and legal policies Determine where your data will be collected and stored Devices Change your IoT device passwords from the factory default Extend your security and password policies to mobile devices Conduct regular intrusion testing and anomaly detection on your devices Network Ensure a unidirectional gateway between IT and OT systems Run vulnerability scans and issue patches regularly Install anti-malware solutions for industrial end points Processes Develop, document and validate your cybersecurity program Ensure cross department buy-in e.g. from management, IT, security Cover a range of activities including security audits and vulnerability scans People Invest in security training for staff, contractors and 3rd parties Educate on dangers of USBs, malware, phishing Make your people active cybersecurity partners Connected devices We build security from the ground up – using components that meet recognized standards, and include enforced encryption. Edge control We incorporate security protection into our system design and development process, including rigorous testing and validation. Apps, analytics, and cloud services Security must be integral to design and fundamentally built into the services that support the operation of your systems. Potential risks of an OT breach Extreme cases could result in loss of life Exposure of intellectual property Damaging brand and reputation loss Serious fines and penalties Serious environmental impact Lost production and waste End-to-end security Key security considerations for operational technology The proof is in the portfolio Deployed in 100,000+ sites globally Monitoring 20 Billion industrial parameters Processing 10+ Trillion industrial transactions per day Storing and managing 12,000 TB of information per year +2100% Increase in industrial cyber attacks over the past three years 279 days Average time to identify and contain a data breach 5,200 The average number of attacks on IoT devices per month $3.92 million Typical financial impact of a single cyber attack. Source: IBM Security $133.7 billion Forecasted spend on cybersecurity by 2022 Source: Gartner Rapid advances in technology have seen a corresponding rise in cybersecurity risks. Yet according to most experts, industrial systems are not protected well enough. With many underestimating the risks and impact a breach may have on their business. Cybersecurity requires a proactive stance involving the entire organization. Balance needs to be achieved between mitigating risks and enabling new business initiatives. Focus not only on training staff but on selecting appropriate technology partners. The safety and security of your data is our top priority. As an established leader with over 50 years experience delivering industrial software portfolio, we recognize that your data demands a stringent cybersecurity posture and the highest set of operating standards. Cybersecurity by the numbers Industrial cybersecurity: Protecting your digital transformation initiatives The industrial landscape has never been more uncertain, or more ready for digital transformation. With the need to enable remote work and team collaboration, technologies such as Cloud, Edge and IIoT not only provide new ways to enhance business performance, but also pave the way for improved business processes and procedures. Along with safety, the most critical area to address during this change is industrial cybersecurity.

Transcript of Industrial cybersecurity: Protecting your digital ... Assets/IIM-Digital-Transformatio… · from...

Page 1: Industrial cybersecurity: Protecting your digital ... Assets/IIM-Digital-Transformatio… · from management, IT, security Cover a range of activities including security audits and

© 2020 AVEVA Group plc and its subsidiaries. All rights reserved.AVEVA and the AVEVA logo are a trademark or registered trademark of AVEVA Group plc in the U.S. and other countries.

linkedin.com/company/avevawww.aveva.com @avevagroup facebook.com/avevasolutions

Counted on by the world’s most trusted industrial leaders

550+Refineries

9/10Shipyards

4,600Food and beverageprocessing plants

3,200+Infrastructure

customers

1,000+Power generation

units

Speak to an expert

There is no better time to take advantage of the IIoT and cloud technologies.Digital transformation is a journey that allows you to transform your existing

automation investment into an improved way of doing business.

We are dedicated to earning and retaining your digital trust. That is why we transparentlypublish our security statement. View it for yourself at trust.aveva.com

Physical securityWhere are their cloud services physically deployed?Where will my data actually reside?Where and how will my data be captured, stored and used?

Data securityHow is your information protected – at rest and in motion?Does your vendor support unidirectional data transfer? How does your supplier deal with network outages?

Application securityHow do they handle authentication, authorization and account management?What is their approach to identity and access management (IAM)?Do they offer a flexible, scalable solution?

Continuous monitoringDo they have proactive monitoring and active security policies in place?Can they identify abnormal behavior and catch anomalous activity?What procedures are there to detect and isolate suspicious activity online?

Security assessmentsDo they have a proactive program of external security audits?How do they deal with ongoing compliance with regulations e.g. GDPR? Do they have a published security statement that you can read?

Projects and deliveryAre their project delivery teams certified to global standards such as CMMi Level 5, or ISO 9001?Do they have a Computer Security Incident Response Team (CSIRT) ready to mobilize? Do they have strategic partnerships with key security experts such as Cylance or Claroty?

Cybersecurity checklist for your vendor

When it comes to cybersecurity, who you partner with is crucial. Software vendorsplay an important part in your cyber defence strategy. When considering a cloud

or IIoT partner here are some key questions to consider.

Cybersecurity is a multi-faceted discipline requiring a proactive approach across the business.Best-prepared businesses report a focus on the following key areas.

Your cybersecurity checklist

Partners

Select vendors that will partnerwith you to protect your critical data

Understand their security, privacyand legal policies

Determine where your data willbe collected and stored

Devices

Change your IoT device passwordsfrom the factory default

Extend your security and passwordpolicies to mobile devices

Conduct regular intrusion testing andanomaly detection on your devices

Network

Ensure a unidirectional gatewaybetween IT and OT systems

Run vulnerability scans and issuepatches regularly

Install anti-malware solutionsfor industrial end points

Processes

Develop, document and validateyour cybersecurity program

Ensure cross department buy-in e.g.from management, IT, security

Cover a range of activities includingsecurity audits and vulnerability scans

People

Invest in security training for staff,contractors and 3rd parties

Educate on dangers of USBs,malware, phishing

Make your people activecybersecurity partners

Connecteddevices

We build security from theground up – using components

that meet recognized standards,and include enforced encryption.

Edgecontrol

We incorporate securityprotection into our system design

and development process, includingrigorous testing and validation.

Apps, analytics,and cloud services

Security must be integral todesign and fundamentally builtinto the services that supportthe operation of your systems.

Potential risks of an OT breach

Extreme casescould resultin loss of life

Exposureof intellectual

property

Damagingbrand and

reputation loss

Seriousfines andpenalties

Seriousenvironmental

impact

Lostproductionand waste

End-to-end security

Key security considerations for operational technology

The proof is in the portfolio

Deployed in

100,000+sites globally

Monitoring

20 Billionindustrial parameters

Processing

10+ Trillionindustrial transactions per day

Storing and managing

12,000 TBof information per year

+2100%Increase in industrial

cyber attacks over thepast three years

279 daysAverage time to

identify and containa data breach

5,200The average number

of attacks on IoTdevices per month

$3.92 millionTypical financial impactof a single cyber attack.

Source: IBM Security

$133.7 billionForecasted spend on

cybersecurity by 2022Source: Gartner

Rapid advances in technology have seen a correspondingrise in cybersecurity risks. Yet according to most experts,industrial systems are not protected well enough. Withmany underestimating the risks and impact a breachmay have on their business.

Cybersecurity requires a proactive stance involvingthe entire organization. Balance needs to be achievedbetween mitigating risks and enabling new businessinitiatives. Focus not only on training staff but onselecting appropriate technology partners.

The safety and security of your data is our top priority.As an established leader with over 50 years experience delivering

industrial software portfolio, we recognize that your data demands astringent cybersecurity posture and the highest set of operating standards.

Cybersecurity by the numbers

Industrial cybersecurity:Protecting your digitaltransformation initiatives

The industrial landscape has never been more uncertain, or more ready for digital transformation.With the need to enable remote work and team collaboration, technologies such as Cloud, Edge

and IIoT not only provide new ways to enhance business performance, but also pave the wayfor improved business processes and procedures. Along with safety, the most critical area

to address during this change is industrial cybersecurity.