Der Blätterkatalog benötigt Javascript.
Bitte aktivieren Sie Javascript in Ihren Browser-Einstellungen.
The Blätterkatalog requires Javascript.
Please activate Javascript in your browser settings.
Lassen Sie sich von Hilscher inspirieren auf der sps 08 – 10 11 2022 Nürnberg Halle 5 Stand 130 www hilscher com Empowering you Wir bleiben neugierig Jeden Tag So finden wir Antworten für morgen Und für Sie Hilscher TZ-SPS 22 Tag 1-3 gleiches Motiv pdf S 1 Format 255 00 x 112 00 mm 05 Oct 2022 12 05 45 4 Messe Aktuell DONNeRstAG 10 NOveMbeR „The IT OT convergence is inevitable“ Andrea Gillhuber Computer Automation Cybersecurity is essential in production environments Dr Terence Lui from TXOne Networks talks about the biggest challenges in securing OT networks and the convergence of OT and IT What is the biggest security risk in OT environments and how can it be avoided? The disconnect between the traditional Confidentiality-Integrity-Availability security triad CIA mindset and the mindset of OT people For those in OT they will sacrifice a great deal to keep the operation running until something goes seriously wrong Security solutions for IT cannot properly address OT issues due to their complexity and incompatibility with legacy systems OT managers have a hard time finding OTcentric security partners with the empathy to truly understand and cope with the technical and business restrictions that come with applying security to OT environments Perfect security never exists so the OTcentric security solution should be practical and adequate Good enough is good enough We want the OT security to be good enough in every aspect at every major checkpoint and through every layer What is the best way to secure a production network? It’s always a dilemma when it comes to smart manufacturing and cybersecurity The more modern features are adapted the more network connection is required Airgapping is a common approach to secure a production network and it will continue to be In addition we can’t emphasize the importance of network microsegmentation enough This is the key to resilience after a security breach Moreover we’ve long since adopted the concept of OT Zero Trust This methodology is a process of continuous verification with a devicecentric approach that covers all stages in the asset life cycle Every device should be inspected before being introduced to the production network and thereafter continuously monitored and protected while they are active That is to secure a production network a networkbased solution is not enough From the OT Zero Trust perspective a combination of techniques will be needed Why is the optimal interaction of IT and OT security so important? The IT OT convergence is inevitable You won’t see such a huge paradigm shift in the blink of an eye but it’s happening Today a high percentage of attacks in OT were caused by malicious tools in the IT world After all it’s the same WannaCry ransomware landing on the same Windows OS Despite the security implementation differences between OT IT the goal is the same and the targets are often the same as well As the OT IT boundary blurs security events will likely come across each other OT IT security are not standing on opposite shores In fact they walk side by side and move in the same direction Moving forward more shared business intelligence will be exchanged between OT IT and that will shape tomorrow’s security deployment landscape It’s also a security planner’s challenge to be more adaptive in their security solutions in order to maximize the benefits and interests of the organization Hall 6 Booth 248 Dr Terence Liu CEO of TXOne Networks „It’s always a dilemma when it comes to smart manufacturing and cybersecurity The more modern features are adapted the more network connection is required “ Im ag e TX On e-Ne tw or ks