Securing Critical Infrastructure with Advanced Cybersecurity Controls – a Webinar from Mocana



Securing Critical Infrastructure with Advanced Cybersecurity Controls with Keao Caindec, VP of Marketing and Dean Weber, CTO, Mocana. This webinar was originally webcast on August 1, 2017.

The US Department of Homeland Security has defined 16 critical infrastructure sectors, including: chemical, communications, critical manufacturing, dams, defense, energy, financial, food and agriculture, healthcare, IT, nuclear, transportation and water and waste management.

Securing the industrial control systems (ICS) and SCADA networks requires a different approach that goes beyond threat detection, perimeter-based security, firewalls and physical security protections.

In this webinar, you’ll learn about how to architect and embed strong cybersecurity controls such as: secure boot, multi-factor authentication, secure software updates, secure communications between industrial devices (PLCs, sensors, IEDs, RTUs and controllers), gateways and industrial clouds. You’ll also learn about how to enable applications to call cryptographic functions that leverage hardware secure elements such as TPM, SGX, TrustZone as well as HSMs and SIMs.

In the Aerospace & Defense industry, Mocana technology is used by more than 200 OEMs to protect more than 100 million devices. Mocana’s end-to-end cybersecurity system is a FIPS 140-2 validated embedded cybersecurity software solution that ensures device trustworthiness and secure communications by giving avionics, aerospace and aircraft manufacturers an easy way to harden electronic control units, FADECs and controllers with multi-factor authentication and trust chaining, as well as secure boot to validate the firmware, OS and applications. For more information see https://www.mocana.com/solutions/aerospace-defense

In the manufacturing arena, under the GDPR, more than €20 million is at stake per incident of noncompliance. Industrial automation manufacturers and critical infrastructure operators must ensure compliance with cybersecurity standards such as NIST 800-53, IEC 62443-3-3, and FIPS 140-2. Furthermore, certain industries must comply with additional standards such as NERC CIP 003 for electric utilities and DO-178 for avionics. Keeping up with these standards as well as emerging standards from the Industrial Internet Consortium (IIC) and Industrie 4.0 is challenging. Older protocols such as Modbus, DNP3 and BacNet can be difficult to secure. For more information see https://www.mocana.com/solutions/manufacturing

In the healthcare field, according to MPO Magazine, there are 6+ million medical devices in the market and 6,500+ manufacturers in the U.S. alone. Aging medical devices such as imaging equipment, pumps, surgical equipment, implantable medical devices, hospital and home patient monitors, and medical Internet of Things (IoT) edge devices are vulnerable due to a lack of strong cryptographic controls, including: multi-factor authentication, secure boot, secure update, and secure, encrypted communications. Medical equipment manufacturers and healthcare providers must ensure compliance with HIPAA, HITECH Breach, and cybersecurity standards such as NIST 800-53, Revision 4, IEC 62443-3-3, and FIPS 140-2. Keeping up with these standards as well as emerging standards from the Industrial Internet Consortium (IIC) and Industrie 4.0 can be challenging. New regulations such as GDPR in Europe raise the stakes for non-compliance to more than €20 million per incident. Older protocols such as Modbus, DNP3 and BacNet can be difficult to secure. For more info, see https://www.mocana.com/solutions/medical

Contact us at sales@mocana.com

Be sure to subscribe to our YouTube channel.

source

Leave a Reply

%d bloggers like this: