SlideShare a Scribd company logo
1 of 10
Download to read offline
Securing the Manufacturing
Digital Thread
Frank Backes
President - CTRAC
Center for Technology, Research and
Commercialization
Why Security
Business Stability & Profitability
Improving Safety, Reliability and Availability
Customer/Market Imposed Requirements
Regulatory Requirements
Corporate Image and Reputation
Legal Liabilities
Potential Consequences
Physical – Economic – Social
National Security
Loss of Production
Injury
Damage to Equipment
Environmental Damage
Product Contamination
Loss of Intellectual Property
Impacted Reputation
WHO
Information
Technology
Operations
Technology
Build and Train a Cross-Functional Team
CSO
Control Engineers
Control Systems Operators
Subject Mater Experts
CIO
Network Engineers
IT Administrators
IT Support
TRADITION
Step 1 – Assess Existing Systems
Step 2 – Document Policies & Procedures
Step 3 – Train Personnel & Contractors
Step 4 – Segment the Control System Network
Step 5 – Control Access to the System
Step 6 – Harden the Components of the System
Step 7 – Monitor & Maintain System Security
EFFECTIVE • PREDICTABLE • COMPLEX • SLOW • EXPENSIVE • HARD TO GET STARTED
AGILE SECURITY
ASSESS
PRIORITIZE
EXECUTE
ITTERATE
START NOW – ONE PROJECT – INCREMENTAL IMPROVEMENT
FIRST PROJECT
NETWORK SEGREGATION
CONTROL NETWORK
COPORATE NETWORK
Users
Control
Server
DMZ
HMI
Data
Historian
Data
Server
Cross
Domain
Guard Protocol B
Protocol A
NIST Recommendation
QUESTIONS?

More Related Content

What's hot

NRB MAINFRAME DAY 09 - Gamal Khaldi - Wrap up and conclusions
NRB MAINFRAME DAY 09 - Gamal Khaldi - Wrap up and conclusionsNRB MAINFRAME DAY 09 - Gamal Khaldi - Wrap up and conclusions
NRB MAINFRAME DAY 09 - Gamal Khaldi - Wrap up and conclusionsNRB
 
Digital enterprise intro requirements collaboration for elec v11 may 2020
Digital enterprise intro   requirements collaboration for elec v11 may 2020Digital enterprise intro   requirements collaboration for elec v11 may 2020
Digital enterprise intro requirements collaboration for elec v11 may 2020Trey Reeser
 
The use of Asset Management and BIM to Generate Information Requirements #COM...
The use of Asset Management and BIM to Generate Information Requirements #COM...The use of Asset Management and BIM to Generate Information Requirements #COM...
The use of Asset Management and BIM to Generate Information Requirements #COM...Comit Projects Ltd
 
Artificial Intelligence (AI) in construction
Artificial Intelligence (AI) in construction Artificial Intelligence (AI) in construction
Artificial Intelligence (AI) in construction LogiKal Projects
 
Architectural and Technical Detailing - Building Systems Integration
Architectural and Technical Detailing - Building Systems IntegrationArchitectural and Technical Detailing - Building Systems Integration
Architectural and Technical Detailing - Building Systems IntegrationYasser Mahgoub
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processessommerville-videos
 
mHealth Summit EU 2015
mHealth Summit EU 2015mHealth Summit EU 2015
mHealth Summit EU 20153GDR
 
Bus2.0 - IT architecture
Bus2.0 - IT architectureBus2.0 - IT architecture
Bus2.0 - IT architectureUNSW Canberra
 
Artificial Intelligence and BIM
Artificial Intelligence and BIMArtificial Intelligence and BIM
Artificial Intelligence and BIMAlex Ferguson
 
Switch Automation Case study v2.0
Switch Automation Case study v2.0Switch Automation Case study v2.0
Switch Automation Case study v2.0Oleh Mykhaylovych
 
The Application of AI in Construction
The Application of AI in ConstructionThe Application of AI in Construction
The Application of AI in ConstructionLogiKal Projects
 
EDTP 2015 D1 Tomorrow's World - Fran Rabuck, Futurist
EDTP 2015 D1 Tomorrow's World - Fran Rabuck, FuturistEDTP 2015 D1 Tomorrow's World - Fran Rabuck, Futurist
EDTP 2015 D1 Tomorrow's World - Fran Rabuck, FuturistComit Projects Ltd
 
Digital Transformation in Energy and Infrastructure #COMIT2018
Digital Transformation in Energy and Infrastructure #COMIT2018Digital Transformation in Energy and Infrastructure #COMIT2018
Digital Transformation in Energy and Infrastructure #COMIT2018Comit Projects Ltd
 
Ibm itsm portfolio
Ibm itsm portfolioIbm itsm portfolio
Ibm itsm portfolioDetlef Wolf
 
Get Your ERP & Operational Data Working Together
Get Your ERP & Operational Data Working TogetherGet Your ERP & Operational Data Working Together
Get Your ERP & Operational Data Working TogetherInductive Automation
 
Automated Construction - Why manufacturing is the future of the sector #COMIT...
Automated Construction - Why manufacturing is the future of the sector #COMIT...Automated Construction - Why manufacturing is the future of the sector #COMIT...
Automated Construction - Why manufacturing is the future of the sector #COMIT...Comit Projects Ltd
 

What's hot (20)

NRB MAINFRAME DAY 09 - Gamal Khaldi - Wrap up and conclusions
NRB MAINFRAME DAY 09 - Gamal Khaldi - Wrap up and conclusionsNRB MAINFRAME DAY 09 - Gamal Khaldi - Wrap up and conclusions
NRB MAINFRAME DAY 09 - Gamal Khaldi - Wrap up and conclusions
 
Digital enterprise intro requirements collaboration for elec v11 may 2020
Digital enterprise intro   requirements collaboration for elec v11 may 2020Digital enterprise intro   requirements collaboration for elec v11 may 2020
Digital enterprise intro requirements collaboration for elec v11 may 2020
 
The use of Asset Management and BIM to Generate Information Requirements #COM...
The use of Asset Management and BIM to Generate Information Requirements #COM...The use of Asset Management and BIM to Generate Information Requirements #COM...
The use of Asset Management and BIM to Generate Information Requirements #COM...
 
Industrial Software
Industrial SoftwareIndustrial Software
Industrial Software
 
resume.doc
resume.docresume.doc
resume.doc
 
Artificial Intelligence (AI) in construction
Artificial Intelligence (AI) in construction Artificial Intelligence (AI) in construction
Artificial Intelligence (AI) in construction
 
Architectural and Technical Detailing - Building Systems Integration
Architectural and Technical Detailing - Building Systems IntegrationArchitectural and Technical Detailing - Building Systems Integration
Architectural and Technical Detailing - Building Systems Integration
 
Requirements engineering processes
Requirements engineering processesRequirements engineering processes
Requirements engineering processes
 
Fives DyAG Corp.
Fives DyAG Corp.Fives DyAG Corp.
Fives DyAG Corp.
 
mHealth Summit EU 2015
mHealth Summit EU 2015mHealth Summit EU 2015
mHealth Summit EU 2015
 
Bus2.0 - IT architecture
Bus2.0 - IT architectureBus2.0 - IT architecture
Bus2.0 - IT architecture
 
History of globalisation
History of globalisationHistory of globalisation
History of globalisation
 
Artificial Intelligence and BIM
Artificial Intelligence and BIMArtificial Intelligence and BIM
Artificial Intelligence and BIM
 
Switch Automation Case study v2.0
Switch Automation Case study v2.0Switch Automation Case study v2.0
Switch Automation Case study v2.0
 
The Application of AI in Construction
The Application of AI in ConstructionThe Application of AI in Construction
The Application of AI in Construction
 
EDTP 2015 D1 Tomorrow's World - Fran Rabuck, Futurist
EDTP 2015 D1 Tomorrow's World - Fran Rabuck, FuturistEDTP 2015 D1 Tomorrow's World - Fran Rabuck, Futurist
EDTP 2015 D1 Tomorrow's World - Fran Rabuck, Futurist
 
Digital Transformation in Energy and Infrastructure #COMIT2018
Digital Transformation in Energy and Infrastructure #COMIT2018Digital Transformation in Energy and Infrastructure #COMIT2018
Digital Transformation in Energy and Infrastructure #COMIT2018
 
Ibm itsm portfolio
Ibm itsm portfolioIbm itsm portfolio
Ibm itsm portfolio
 
Get Your ERP & Operational Data Working Together
Get Your ERP & Operational Data Working TogetherGet Your ERP & Operational Data Working Together
Get Your ERP & Operational Data Working Together
 
Automated Construction - Why manufacturing is the future of the sector #COMIT...
Automated Construction - Why manufacturing is the future of the sector #COMIT...Automated Construction - Why manufacturing is the future of the sector #COMIT...
Automated Construction - Why manufacturing is the future of the sector #COMIT...
 

Viewers also liked

REIQ Digital Twin Workbook
REIQ Digital Twin WorkbookREIQ Digital Twin Workbook
REIQ Digital Twin WorkbookPeter Brewer
 
Industrial Digital Strategy
Industrial Digital StrategyIndustrial Digital Strategy
Industrial Digital StrategyAjay Gaonkar
 
Digital Thread eBook - Final
Digital Thread eBook - FinalDigital Thread eBook - Final
Digital Thread eBook - FinalAndrea Ramirez
 
IW13 Keynote, Bill Ruh, GE Software—The Emerging Industrial Internet
IW13 Keynote, Bill Ruh, GE Software—The Emerging Industrial Internet  IW13 Keynote, Bill Ruh, GE Software—The Emerging Industrial Internet
IW13 Keynote, Bill Ruh, GE Software—The Emerging Industrial Internet Software AG
 
E1: Building the Digital Twin (Predix Transform 2016)
E1: Building the Digital Twin (Predix Transform 2016)E1: Building the Digital Twin (Predix Transform 2016)
E1: Building the Digital Twin (Predix Transform 2016)Predix
 

Viewers also liked (6)

REIQ Digital Twin Workbook
REIQ Digital Twin WorkbookREIQ Digital Twin Workbook
REIQ Digital Twin Workbook
 
Industrial Digital Strategy
Industrial Digital StrategyIndustrial Digital Strategy
Industrial Digital Strategy
 
Digital Thread eBook - Final
Digital Thread eBook - FinalDigital Thread eBook - Final
Digital Thread eBook - Final
 
Jawsug hpc@jaws festa2016
Jawsug hpc@jaws festa2016Jawsug hpc@jaws festa2016
Jawsug hpc@jaws festa2016
 
IW13 Keynote, Bill Ruh, GE Software—The Emerging Industrial Internet
IW13 Keynote, Bill Ruh, GE Software—The Emerging Industrial Internet  IW13 Keynote, Bill Ruh, GE Software—The Emerging Industrial Internet
IW13 Keynote, Bill Ruh, GE Software—The Emerging Industrial Internet
 
E1: Building the Digital Twin (Predix Transform 2016)
E1: Building the Digital Twin (Predix Transform 2016)E1: Building the Digital Twin (Predix Transform 2016)
E1: Building the Digital Twin (Predix Transform 2016)
 

Similar to Securing the Manufacturing Digital Thread

ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and StandardsICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and StandardsMohammad Abdul Matin Emon
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4CrispnCrunch
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfBabyBoy55
 
محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتeng_SamMoh
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Frameworkssuser65fa31
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalrkadayam
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Expetec Company Overview
Expetec Company OverviewExpetec Company Overview
Expetec Company Overviewexpetec
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company ProfileKGanzy
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.360factors
 
Key Considerations for Scoping Reinstrumentation Projects
Key Considerations for Scoping Reinstrumentation ProjectsKey Considerations for Scoping Reinstrumentation Projects
Key Considerations for Scoping Reinstrumentation ProjectsYokogawa1
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitecturePriyank Hada
 
Walls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityWalls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityAbdul Jaleel
 
Cyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS NetworkCyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS NetworkGabriel E Ozique
 
IT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDIT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDVishnu Murali
 
Project Proposal - Employee Monitoring Systems Evaluation
Project Proposal - Employee Monitoring Systems EvaluationProject Proposal - Employee Monitoring Systems Evaluation
Project Proposal - Employee Monitoring Systems EvaluationMegan B. McDaniel
 

Similar to Securing the Manufacturing Digital Thread (20)

ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and StandardsICAB - ITA Chapter 5 class 9-10 - Controls and Standards
ICAB - ITA Chapter 5 class 9-10 - Controls and Standards
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
CIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdfCIA-Triad-Presentation.pdf
CIA-Triad-Presentation.pdf
 
محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكات
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Expetec Company Overview
Expetec Company OverviewExpetec Company Overview
Expetec Company Overview
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
 
Institute of Internal Auditors Presentation 2014
Institute of Internal Auditors Presentation 2014Institute of Internal Auditors Presentation 2014
Institute of Internal Auditors Presentation 2014
 
Key Considerations for Scoping Reinstrumentation Projects
Key Considerations for Scoping Reinstrumentation ProjectsKey Considerations for Scoping Reinstrumentation Projects
Key Considerations for Scoping Reinstrumentation Projects
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Walls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityWalls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application Security
 
Cyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS NetworkCyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS Network
 
IT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATEDIT OT Integration_Vishnu_Murali_05262016_UPDATED
IT OT Integration_Vishnu_Murali_05262016_UPDATED
 
Project Proposal - Employee Monitoring Systems Evaluation
Project Proposal - Employee Monitoring Systems EvaluationProject Proposal - Employee Monitoring Systems Evaluation
Project Proposal - Employee Monitoring Systems Evaluation
 
Identifying critical security controls
Identifying critical security controlsIdentifying critical security controls
Identifying critical security controls
 

Securing the Manufacturing Digital Thread