Strategic Approaches to Secure Industrial Control System Environments
Facebook X LinkedIn

Strategic Approaches to Secure Industrial Control System Environments

Combined Session
Thursday, November 10, 2022 15:00—16:00
Location: Caroline von Humboldt

Strategic Approaches to Secure Industrial Control System Environments

 

Industrial environments and critical infrastructure often have different types of computing equipment, a wide array of manufacturers, different communications protocols, physical access controls, and stringent regulatory compliance requirements compared to general purpose or "office" environments. Operational Technology (OT) and Critical Infrastructure ecosystems also have requirements for high security and sometimes face different types of threats. In this session, we'll consider how OT and ICS environments differ from regular IT, the challenges they face in securing their assets, as well as technical approaches to providing layered security for OT and ICS.

Strategic Approaches to Secure Industrial Control System Environments
Event Recording
Strategic Approaches to Secure Industrial Control System Environments
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Strategic Approaches to Secure Industrial Control System Environments
Presentation deck
Strategic Approaches to Secure Industrial Control System Environments
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
John Tolbert
John Tolbert
KuppingerCole
  John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises...

UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity

 

Vehicles have long ceased to be isolated objects. Whether in their production process or in their daily use, they are part of an automotive ecosystem. Every area from design and production to ongoing operation and maintenance is subject to cyber threats.  Legislators and regulators have understood this as a central challenge and are taking the industry (OEMs, supply chain) substantially to task. UNECE R155, ISO/SAE 21434, Automotive SPICE and other frameworks demand for wide ranging Cybersecurity concepts. The implementation of a Cyber Security Management System (CSMS) is an essential foundation for the development, production and operation of connected and intelligent vehicles within a very short timeframe for these industries. 

This must lead to a fundamental cultural change in the automotive industry towards security-by-design. Matthias Reinwarth gives an overview of what is required and when,  and where we stand in the implementation today.

UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity
Event Recording
UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity
Presentation deck
UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Matthias Reinwarth
Matthias Reinwarth
KuppingerCole
Matthias is Head of Advisory and oversees and leads the KuppingerCole advisory team. Additionally he acts as lead advisor in various customer projects. As head of the IAM practice, Matthias...
Subscribe for updates
Please provide your email address