did you know? · convergence who is behind these attacks? reduce risk industrial pc virtualization...

1
Want to learn more? www.cisco.com/go/connectedfactory Securely Connect Securely connect things, machines, workflows, databases and people, who are on plant networks with those on enterprise networks. See new patterns, and optimize operations and supply chain workflows New attack vectors with enterprise and operations convergence Who Is Behind these Attacks? Reduce Risk Industrial PC virtualization helps reduce risk by streamlining your operating system and software patch updates Share Share intellectual property securely with global employees, partners, and vendor ecosystems, helping scale expert resources Safety Minimize operational risk to plant equipment and employee safety Protect Protect intellectual property Adhere Adhere to regulatory requirements New Internet of Things (IoT) landscape with millions of connected machines globally Islands of vulnerability on factory floors Legacy industrial control systems Extended plant-floor access for partners and vendors across multiple sites © 2016 Cisco and/or its a_liates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its a_liates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) C96-734465-01 09/16 What’s the Impact of a Security Breach? Why Are Industrial Networks Vulnerable? Loss of proprietary or confidential information and intellectual property Sabotage of safety systems Health and safety risks for workers Damaged brand, and loss of public confidence Physical or environmental damage and violation Economic loss: downtime, disrupted production schedules, and damaged machines/Lost revenue and market-share growth Did You Know? More than 1,000 IACS were targeted by the Dragonfly espionage malware program in 2014 Second in percentage of spam in email by industry Third in spear-phishing One of the top three industries targeted in cyberespionage 3 Manufacturing is 72% of manufacturers believe the main purpose of security is to reduce risk versus being a competitive advantage 2 20% increase in 2015 in cyber attacks on the U.S. manufacturing sector 1 1 http://www.insurancejournal.com/news/national/2016/01/15/395281.htm 2 https://www.cisco.com/c/dam/assets/offers/pdfs/cybersecurity-growth-advantage.pdf (page 8 in the report; 11 in the pdf) 3 http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ 72% 20% Security for Today’s Digital Factories Protect the manufacturing process from end to end Benefits of Cisco Connected Factory Security ? State-sponsored corporate espionage groups Dishonest employees Hackers Human error and outside vendors Global organized crime groups 01101001 00110001 01101001 00110001

Upload: others

Post on 25-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Did You Know? · convergence Who Is Behind these Attacks? Reduce Risk Industrial PC virtualization helps reduce risk by streamlining your operating system and software patch updates

Want to learn more?www.cisco.com/go/connectedfactory

Securely ConnectSecurely connect things, machines, work�ows, databases and people, who are on plant networks with those on enterprise networks. See new patterns, and optimize operations and supply chain work�ows

New attack vectors with enterprise and operations convergence

Who Is Behind these Attacks?

Reduce RiskIndustrial PC virtualization helps reduce risk by streamliningyour operating system and software patch updates

ShareShare intellectual property securely with global employees,

partners, and vendor ecosystems, helping scale expert resources

SafetyMinimize operational risk to plant equipment and employee safety

ProtectProtect intellectualproperty

AdhereAdhere to regulatory requirements

New Internet of Things (IoT) landscape with millions of connected machines globally

Islands of vulnerability on

factory �oors

Legacy industrial control systems

Extended plant-�oor access for partners and vendors across multiple sites

© 2016 Cisco and/or its a_liates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its a_liates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

C96-734465-01 09/16

What’s the Impact of a Security Breach?

Why Are Industrial Networks Vulnerable?

Loss of proprietary or con�dential information and intellectual property

Sabotage of safety systems

Health and safety risks for workers

Damaged brand, and loss of public con�dence

Physical or environmental damage and violation

Economic loss: downtime, disrupted production schedules,

and damaged machines/Lost revenue and market-share growth

Did You Know?

More than 1,000 IACS were targeted by

the Dragon�y espionage malware program in 2014

Second in percentage of spam in email by industry

Third in spear-phishing

One of the top three industries targeted in cyberespionage3

Manufacturing is

72% of manufacturersbelieve the main purposeof security is to reduce

risk versus being a competitive advantage2

20% increase in 2015 in cyber attacks on the

U.S. manufacturing sector1

1 http://www.insurancejournal.com/news/national/2016/01/15/395281.htm2 https://www.cisco.com/c/dam/assets/o�ers/pdfs/cybersecurity-growth-advantage.pdf (page 8 in the report; 11 in the pdf)3 http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/

72%20%

Security for Today’s Digital FactoriesProtect the manufacturing process from end to end

Bene�ts of Cisco Connected Factory Security

?

State-sponsored corporate espionage

groups

Dishonest employees

Hackers

Human error and outside

vendors

Global organized crime groups

01101001001100010110100100110001