Cyber Security Fingerprint Secure systems, protect production

Slides:



Advertisements
Similar presentations
Agenda What is Compliance? Risk and Compliance Management
Advertisements

Microsoft Operations Framework (MOF) 4.0
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Computer Security: Principles and Practice
Enhancing Paper Mill Performance through Advanced Diagnostics Services Dr. BS Babji Process Automation Division ABB India Ltd, Bangalore IPPTA Zonal Seminar.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
US Corporate Research Center (USCRC). © ABB USCRC 2 Strengthening Research in U.S. US Corporate Research - A branch of ABB’s Global R&D Labs  Raleigh.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Developing an IS/IT Strategy
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Integrated Enterprise-wide Risk Management Protecting Critical Information Assets and Records FIRM Forum.
© 2007 CH-RD MB - 1 ISA S99 – WG4 IEC Markus Brändle CHCRC.C5.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
ISA–The Instrumentation, Systems, and Automation Society ISA SP-99 Introduction: Manufacturing and Control Systems Security -- Kickoff Meeting Call to.
Rudan ltd. For efficient energy management. Our Vision With efficient management and application of new technologies, to become a leading company in the.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Introduction to Information Security
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
ISA99 - Industrial Automation and Controls Systems Security
Energy Auditing – Energy Conservation and Efficiency Measures PRESENTER Mr. A. Hamukale BENG, Meng,MBA,PEEIZ,REng.
Inter-American Development Bank BIMILACI 2007 QUALITY PROCUREMENT Third Party Review May 2007 Project Procurement Division.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Standards Certification Education & Training Publishing Conferences & Exhibits 1 Copyright © ISA, All Rights reserved ISA99 - Industrial Automation and.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Industrial Control Systems.
READ ME FIRST Use this template to create your Partner datasheet for Azure Stack Foundation. The intent is that this document can be saved to PDF and provided.
Penn State Center for e-Design Site Vision and Capabilities
Security measures deployed by e-communication providers
Smart Grid cyber security within IEC TC57 WG15
Day 1 Session 2/ Programme Objectives
Agenda Control systems defined
Attention CFOs How to tighten your belt and still survive May 18, 2017.
Security Risk Profiles – Tips and Tricks
Cisco Data Virtualization
Leverage What’s Out There
PCD MEM Medical Device IT Management
Business Risks of Insecure Networks
Cyber Security Fingerprint Secure systems, protect production
Cyber Threat Intelligence Sharing Standards-based Repository
CompTIA CAS-003 Exam Study Material - CompTIA CAS-003 Exam Dumps Realexamdumps.com
I have many checklists: how do I get started with cyber security?
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Cyber-security and IEC International Standards
How can metros and municipalities operate to ensure that revenue generated from electricity sales is sustainable? by Dr Minnesh Bipath and Dr Willie de.
Welcome: How to use this presentation
Our new quality framework and methodology:
Check Point Connectra NGX R60
Mitigation Principles PROPOSAL OICA/CLEPA
Securing Your Web Application and Database
IIA District Conference Seminar Presenter David Cole, CPA, CISA, CRISC
Understand mechanisms to control organisational IT security
Smart Grid cyber security within IEC TC57 WG15
Copyright © PRUDOUR 2017, All Rights Reserved Global Smart Building Market Threats, Analysis, Key Players, Growth, and Forecast 2026 July 2017.
Cybersecurity ATD technical
Group Meeting Ming Hong Tsai Date :
Mandate of the Eurostat Working Group
IS4680 Security Auditing for Compliance
4/16/2019 5:07 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Fertilizer Industry Safety Information Analysis and Sharing Program
The Secure Contingency Plan
Cyber Security ISA 99 / IEC D14 DLC-Meet, Jan 2019.
<offer name> with Microsoft 365 Business Secure Deployment
Introduction to Fiscal Policy Program
Energy Storage & Cyber Security
OU BATTLECARD: E-Business Suite Courses and Certifications
Presentation transcript:

Cyber Security Fingerprint Secure systems, protect production Advanced Services Cyber Security Fingerprint Secure systems, protect production

Cyber Security Fingerprint What does the fingerprint do? Provides a comprehensive view of your site’s cyber security status Identifies strengths and weaknesses for defending against an attack within your plant’s control systems Reduces potential for system and plant disruptions Increases plant and community protection Supplies a solid foundation from which to build a sustainable cyber security strategy It does NOT make the system completely secure. © ABB Group | Slide ‹#›

Cyber Security Fingerprint Service with a defined scope Benefits: Consistent – same everywhere High and even quality Repeatable Based on best practicies Data Collect Store View Analyze Interpret Report © ABB Group | Slide ‹#›

Cyber Security Fingerprint Diagnose, implement and sustain 4 Track 2 3 Manage Performance Gap Scan Hands-on System Potential 1 Fingerprint Diagnose Implement Sustain Time © ABB Group | Slide ‹#›

Cyber Security Fingerprint Security in depth Physical Security Procedures and Policies Microsoft Firewall Computer Policies Account Management Security Updates Antivirus Solutions © ABB Group | Slide ‹#›

Cyber Security Fingerprint Service with a defined scope Design Details Energy Industrial Automation IT IEC 62351 Technical Aspects ISA 99* NIST 800-53 IEEE P 1686 NERC CIP Details of Operations Relevance for Manufacturers ISO 27K CPNI Operator Manufacturer Completeness © ABB Group | Slide ‹#› * Since the closing of the ESCoRTS project, ISA decided to relabel the ISA 99 standard to ISA 62443 to make the alignment with the IEC 62443 series more explicit and obvious.

Cyber Security Fingerprint Key Performance Indicators © ABB Group | Slide ‹#›

Cyber Security Fingerprint Control System Architecture - what to protect © ABB Group | Slide ‹#›

Cyber Security Fingerprint Security Logger Data Collection Tool Collects data without affecting the production No installation Only collects data The collected data is saved as an encrypted file Serves as support during interviews with key plant personnel Over 90% timesaving compared to manual data collection © ABB Group | Slide ‹#›

Cyber Security Fingerprint Security Analyzer Tool Analyze the collected data The only tool that can read the encrypted file Apply different profiles © ABB Group | Slide ‹#›

Cyber Security Fingerprint Report with recommendations and action plan © ABB Group | Slide ‹#›

Cyber Security Fingerprint Report: Risk Profile High risk Low risk While the Fingerprint is an indicator of your security status at a given time, any system, no matter how many precautions are taken, can be compromised. © ABB Group | Slide ‹#›

Cyber Security Fingerprint Recommendations © ABB July 17, 2012 | Slide 15

Cyber Security Fingerprint Success Stories © ABB Group INTERNAL USE ONLY

Cyber Security Fingerprint Pilot results © ABB Group | Slide ‹#›

Cyber Security Monitoring Service (powered by ServicePort) © ABB Group | Slide ‹#›

ServicePort Leverage the experts and reduce cost © ABB Group November 8, 2018 | Slide 19

ServicePort Cyber Security Monitoring Service 9AKK105713A6279 A © ABB Group

© ABB Group | Slide ‹#›