harri piik new automation 19.5.2016 technologies … new auto… · cloud, mobility, analytics •...
Post on 08-Oct-2020
0 Views
Preview:
TRANSCRIPT
NEW AUTOMATION
TECHNOLOGIES BEYOND 2020Harri Piik
19.5.2016
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Bio
1
Harri Piik, Honeywell Oy
Harri Piik is Sr. Account Manager for Honeywell, Finland.
His special knowledge covers Alcont and Experion PKS
technologies and he is currently involved in Alcont migration
to Experion PMD initiative as technology specialist.
Another special interest area is Advanced Solutions.
Harri has more than 30 years of process automation
experience in sales, estimation and product management
positions.
He graduated from Lappeenranta University of Technology in
chemical engineering.
https://www.linkedin.com/in/harri-piik-
48611b18?trk=nav_responsive_tab_profile
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Abstract
• What is Connected Enterprise?
• Automation Infrastructure Change
• Future Control Room
• Industrial Cyber Security
2
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
What is Connected Enterprise?
3
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Connected Enterprise
4
Transformative Time
Cloud
Big DataPredictive Analytics
Connectivity
IndustrialInternet of Things
Mobility
Gartner’s Predictions
“Key business transformation drivers”
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Challenges: Need for a Paradigm Shift
5
…Leading to
*Global Energy Talent, 2015
** PWC, 2014
The need to transforming
how things are done to
remain competitive, taking
advantage of:
Customer Challenges…
average age of production engineers in
North America, leading to a 38%
forecasted shortage in talent by end of
decade*
Workforce
Expertise51
More with
Less40%
estimated OPEX reduction (vs. ‘14)
needed within fields in the North Sea to
remain vital at current oil prices**
Data
Overload/
Accessibility22%
of average annual revenue was lost due
to not being able to leverage information
collected***
Market
Pressure40%
percent of process upsets caused by
human error. Increased competition &
more frequent market volatility is making
uptime even more critical****
• Business process
management and redesign
• Industrial Internet of Things
• Technology enablers:
Cloud, Mobility, Analytics
• Operational consolidation
• Reduced Lifecycle cost of
technology deployment
• Performance contracting
***Oracle “From Overload to Impact: An Industry Scorecard,” 2015
****ARC “Improving Margins with Smart Operations,”2015
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Digital Transformation
6
1. Connectivity
Easier integration leading to pervasive analytics
2. Real-time
Now and always up to date information
3. Collaboration
Work process transformation. Knowledge retention
OPC UA Connectivity
Digital Transformation
Alarm & Operations
Management Solutions
Profit Solutions
Simulation & Competency
Solutions
Product Management,
Planning & Scheduling Solutions
Data, Analytics &
Collaboration Solutions
Industry Vertical
Solutions
Cloud
Mobility
Powered by Mobility, Cloud and OPC UA
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Bringing ‘Smart’ to the Operations
7
Operating Assets
Data Integration
Analytics
Reporting / Dashboards
Enterprise
Decision Support System
Evaluate Opportunities
Prioritize / Execute
Data Knowledge Action
Work Process Transformation
Aligning Business Objectives to Operational decisions
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Example: Alcont Migration + Smart Operations
8
UPS Engineering AnalyticsPHD
Tag sync.
Alarms
Bringing ‘Smart’ to
the Operations
+
+
=
+
DynAMo
Alarm
Management
Asset
Sentinel
Equipment
Health
Analytics
KPI
Monitoring
Performance
management
INSIGHT
Visualization
Analysis
Common
User Interface
Technology
Analytics
Collaboration &
Workflow
Alcont Graphics Experion Graphics
I/O
Connectivity
Mobility
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Automation Infrastructure Change
9
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Continuous Change...
10
Virtualization &Proprietary
• General purpose
• Integration
• Management
• Component cost
• Long-life
Processor+
Network+
Applications+
Storage+
Integration
Windows &Proprietary
• Dedicated
• Integration
• Management
• Component cost
• Short-life
Processor+
Network
Proprietary
• Dedicated
• Integration
• Management
• Component cost
• Long-life
Processor
1 2 4
General-purpose
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Future Control Room
11
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Challenges in Today’s Control Rooms
12
Today’s Control Rooms
Operator Fatigue
Poor Ergonomics, Lighting & Acoustics
Lagging Best Office
Environment Technology
Lack of Mobility
Inefficient Collaboration
& Comms
Inefficient Graphics
Inefficient Wall Screens
Access to Engineering & Business Information
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Orion Console Benefits
13
• Handle a greater scope of
responsibility
• Assess and respond faster
to abnormal situations
• More alert, comfortable
and reduced stress and
fatigue
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Ergonomic Design
14
• Design based on
ergonomic best
practices for screen
viewing angle,
location of interface
devices
(keyboard/mouse/
touchpanel)
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
New Workspace Design
15
L1 Display
L2 Display L3 Display
Alarm Summary
Trends
Faceplates
SupportingInfo
Faceplates
Level 1 Overview Displays
Level 2 Displays Level 3 Displays
Trends and optimized TargetsAlarms
CCTV
APC Level 4, Task Displays & Trends
Alarms
CCTV
Level 2
Level 3
Level 1 Displays
Level 3
Level 3
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Integration Business PC or other Applications
16
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Limit Repository
17
• Define the operating envelope
• Provides a comprehensive viewof limits from many applications,making it possible to see limitstogether and in context,regardless of source
• Single data model of the limit space- variables, - boundaries, - constraints, - operating limits, - modesenables limits to be consistently managed (storage and retrieval)
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Industrial Cyber Security
18
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Importance of Industrial Cyber Security
19
“There are two kinds of big companies in the United States.
There are those who’ve been hacked…
and those who don’t know they’ve been hacked”
James Comey - Director, Federal Bureau of Investigation
Sources: PWC & Kaspersky Lab
• Cyber attacks up 48%
• New malware targets ICS
• Limited internal resources
• 42.8 million attacks expected
• 117, 339 attacks per day
In 2014
2015 Forecast
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Levels of Security
20
Security
level 4
Security
level 3
Security
level 2
Security
level 1
Ma
turi
ty
leve
l 0
Ma
turi
ty
Le
ve
l 1
Ma
turi
ty
Le
ve
l 2
Ma
turi
ty
Le
ve
l 4
3
Critical
infrastructure
Typical critical infrastructure:
Oil & gas, power, water
Non-critical
infrastructure
Typical non-critical infrastructure:
Plastics, steel, resins, food, paper, beverages
Classifications of criticality can
differ by country!
Where are we
today?In our security assessments most companies
score between SL 1 and SL 2 and ML 0 and ML 1
What is your Risk Appetite?
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Levels of Security
21IE
C 6
24
43
-T
ech
nic
al p
rote
ctio
n le
ve
l
C2M2 - Maturity level
SL 4 – Protects against intentional security incidents using sophisticated means and having
extended resources – Nation State
SL 3 – Protects against intentional security incidents using sophisticated means –
Hacktivist, Terrorist
SL 2 – Protects against intentional security incidents using simple means – Cyber Crime,
Hacker
SL 1 – Protects against casual security incidents – Careless Employee or Contractor
IEC 62443-3-3 – Security Levels
ML 3 – Practices are managed with policies and governance from organization. Policies
are reviewed and adjustments made as needed and include compliance with specified
standards and/or guidelines.
ML 2 – Risk practices are approved by management and expressed as policy, policies,
processes, and procedures are defined, implemented and validated. Adequate resources
are provided.
ML 1 – Risk practices are performed but may be adhoc, typically by individual thus
outcome may vary depending on the individual.
ML 0 – Practices are not formalized, often case by case, and risk is managed in an ad hoc
and sometimes reactive manner.
NIST / C2M2 – Maturity Levels (As Examples)
What is an appropriate
protection level for my plant?
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Where would your Security Profile be?
22
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Security Design
23
PROTECT
Technical controls
(Firewall, AWL, AV, IPS, DC,
network segmentation, ….)
DETECT
Technical controls
(IPS, IDS, SIEM, Security
Dashboard …)
RESPOND
Technical controls
(IPS, Recovery CD, …)
RECOVER
Technical controls
(Back-up Control Center, …)
IDENTIFY
Non-technical controls
(Assessments, Risk management)
Non-technical controls
(Security Policies & Procedures)
Non-technical controls
(Security monitoring)
Non-technical controls
(Security incident response,
Disconnection management)
Non-technical controls
(Data recovery, Disaster recovery)
Technical controls
(Vulnerability scanning,
Monitoring …)
TIME TO
BREACH THE
PROTECTION
TIME TO
DETECT THE
EVENT
TIME TO
RESPOND TO
THE EVENT> +
IF TRUE THE PLANT IS SECURE
TB > (TD + TR )
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
Summary
24
New automation
technologies beyond
2020
Honeywell Confidential - © 2016 by Honeywell International Inc. All rights reserved.
New automation technologies beyond 2020
25
Enabling Broader Operator Scope While Improving Safety and Reliability
Operations Transformation
Operator Environment Today
More Complex Than Ever
More Situational Awareness, Faster Response, Operate Closer to Limits
Centralize Operations and Expertise
Consolidated or Remote Operations
Virtualization: General-purpose platforms
Apply the Best Resources Wherever They Are in the World
80%+ Reduction in Maintenance, Space, Energy Use and Better Security
Industrial Cyber Security
To Learn more…www.becybersecure.com
top related