APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Digital Infrastructure
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Impact of Digital Transformation in Insurance

    Mohammed Sadiq, Head of Digital Analytics, BI & Automation at Al Rajhi Takaful.

    Cheers To Digital Partnerships In The Corporate World

    Pierre-Yves Calloc’h, Chief Digital Officer, Pernod Ricard

    How Being A Product Guy Is Shaping My Digital Marketing Mindset

    Pratama Agus Nugroho, Head Of Digital Marketing, Mnc Media Indonesia

    Beyond Digital Transformation

    EDWIN SUGIANTO, CHIEF OPERATING AND MARKETING OFFICER OF MANDIRI AXA GENERAL INSURANCE [EPA: CS]

    Digital Transformation: Is Change the Only Real Constant?

    Tim Glover, Head of Digital Technology, Countdown, New Zealand.

    How to Build A Successful Identity and Access Management (IAM) Program?

    Carlos Rodriguez, Director, IT Security & Risk, Citizens Property Insurance

    Securing Telco Cloud for the 5G Era

    Srinivas Bhattiprolu, Head of Advanced Consulting Service, Nokia Software

    Preempting Future Risks with Advanced Security Technologies

    TzerYeu Pang, Head of Information Security Office, Mediacorp

    right

    Industrial Security: Protection of New Digital Infrastructures

    Matthias Springer, Senior Vice President Functional Safety & Security at TÜV NORD

    Tweet
    content-image

    Matthias Springer, Senior Vice President Functional Safety & Security at TÜV NORD

    The coronavirus pandemic will have a lasting impact on the global business and industry. Despite the broadly discussed negative developments, companies have made quantum leaps with regard to digitalisation in a very short time. What used to be a rather sketchy plan has turned into concrete measures. With enormous speed, industrial companies have been able to implement digitalisation and automation projects. Remote accessibility of plants and systems, remote monitoring and predictive maintenance are elementary in times of shutdown and home office in order to maintain operations. What we are currently experiencing is akin to a paradigm shift. Unfortunately, with the naturally understandable euphoria about digital transformation in record time, security aspects often fade into the background. Unprotected networked systems pose an immense risk–a fact that is often acknowledged too late.

    Industrial Plants ss Targets of Cyber Attacks

    Petya, WannaCry, TRITON–they all have become known to the public as malware which has produced considerable damage in recent years. The terms are now synonymous with cyber-attacks, which have raised awareness of how vulnerable digital industrial plants are today. Petya and WannaCry were Trojans and used for rather widespread attacks that targeted more or less every Windows-based computer. Not only global companies were affected in Europe but also hospitals, ministries, and infrastructure. With these cyber-attacks came numerous ransom demands. The publicly known incident TRITON was directed against an industrial safety control in the Middle East. This incident triggered the secure state–but it is suspected that the attackers were actually trying to disable the safety control. Only by chance or a bug in the malware did the catastrophe–the explosion of a petrochemical plant–not occur. It is likely that more attacks will follow in the future.

    Securing the Future for Industrial Companies

    In view of such threat scenarios, new approaches to risk analysis and the technical inspection of installations and products must be taken. Functional safety and IT security should therefore no longer be treated as separate fields of action. Security means the security of data in terms of availability, confidentiality, and integrity.

    Safety refers to the safety of people and the environment, for example in terms of functionality, electrical, and constructional safety.

    The merger of safety and security into one approach came with the development of smart manufacturing. For years now, networking of sensors and actuators has been indispensable in the process and manufacturing industry.

    Cloud infrastructures are implemented to develop new business models. Very common today are digital twins of industrial plants–the simulation of the plant in the cloud, which in turn opens up completely new applications and potential. These trends are often part of digitisation strategies of companies or entire sectors. But their opportunities also lead to new risks.

    Any kind of networking and the associated opening of a system entails the risk of misuse by unauthorised persons. Every industrial company therefore needs not only a digitisation strategy, but also a strategy to safeguard its own values–the production process, the know-how of its employees, and the key elements of its business model. Such a cyber security strategy should be based on solid concepts and methods. The IEC 62443 standard was defined for industrial safety and contains an established process model for an industrial cyber security strategy.

    Comprehensive Security Concept for Smart Manufacturing

    Within the framework of smart manufacturing, IEC 62443 has established itself as an internationally recognised standard for IT security in the process and automation industry. In addition, many other branches of industry, including critical infrastructures, are now using this standard. IEC 62443 has thus become the central standard for smart manufacturing solutions. Wherever digitalisation, networking, and automation are used in the industrial sector, this standard provides a security guide–independent of the sector. Based on the criteria and requirements, companies can ensure the reliability of their facilities and applications, prove the availability of security functions and the integrity of components and systems, with operators, integrators, and component manufacturers benefitting equally.

    • The IEC 62443 standard takes a holistic approach to cybersecurity

    Certification according to IEC 62443 also offers sustainable protection against cyber-attacks. Hackers and cybercriminals are also aware of the companies’ rapid conversion to digital infrastructures. Any security gap not considered and closed today can turn into an existential problem tomorrow. Operators of industrial plants, for example, must ensure protection against digital threats. Otherwise unauthorised persons could, at worst, bring the plant to a standstill or even cause personal injury and environmental damage. Integrators also face ever-increasing security requirements, since today they not only provide a network for industrial plants, but also connect the plant to cloud services. The manufacturers of components face similar challenges like operators of industrial plants as their products are expected to function in an increasingly networked way.

    Using the Digital Upswing

    The coronavirus pandemic has increased the need for digitalisation and hence the pressure on industrial companies to act. At the same time, there is an increasing necessity to secure the newly acquired digital infrastructures today in order to sustainably benefit from them also tomorrow. The IEC 62443 standard takes a holistic approach to cybersecurity. A certification proves that the company is working according to the "state of the art" and complies with its legal duties of care–important prerequisites for minimising liability risks.

    tag

    Remote Monitoring

    Predictive Maintenance

    Digital Twins

    Weekly Brief

    loading
    Top 10 Digital Infrastucture Solutions Companies - 2022
    ON THE DECK

    Digital Infrastructure 2022

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://digital-infrastructure.apacciooutlook.com/views/industrial-security-protection-of-new-digital-infrastructures-nwid-8917.html