did you know? · convergence who is behind these attacks? reduce risk industrial pc virtualization...
TRANSCRIPT
![Page 1: Did You Know? · convergence Who Is Behind these Attacks? Reduce Risk Industrial PC virtualization helps reduce risk by streamlining your operating system and software patch updates](https://reader036.vdocuments.us/reader036/viewer/2022070814/5f0d92367e708231d43b0422/html5/thumbnails/1.jpg)
Want to learn more?www.cisco.com/go/connectedfactory
Securely ConnectSecurely connect things, machines, work�ows, databases and people, who are on plant networks with those on enterprise networks. See new patterns, and optimize operations and supply chain work�ows
New attack vectors with enterprise and operations convergence
Who Is Behind these Attacks?
Reduce RiskIndustrial PC virtualization helps reduce risk by streamliningyour operating system and software patch updates
ShareShare intellectual property securely with global employees,
partners, and vendor ecosystems, helping scale expert resources
SafetyMinimize operational risk to plant equipment and employee safety
ProtectProtect intellectualproperty
AdhereAdhere to regulatory requirements
New Internet of Things (IoT) landscape with millions of connected machines globally
Islands of vulnerability on
factory �oors
Legacy industrial control systems
Extended plant-�oor access for partners and vendors across multiple sites
© 2016 Cisco and/or its a_liates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its a_liates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
C96-734465-01 09/16
What’s the Impact of a Security Breach?
Why Are Industrial Networks Vulnerable?
Loss of proprietary or con�dential information and intellectual property
Sabotage of safety systems
Health and safety risks for workers
Damaged brand, and loss of public con�dence
Physical or environmental damage and violation
Economic loss: downtime, disrupted production schedules,
and damaged machines/Lost revenue and market-share growth
Did You Know?
More than 1,000 IACS were targeted by
the Dragon�y espionage malware program in 2014
Second in percentage of spam in email by industry
Third in spear-phishing
One of the top three industries targeted in cyberespionage3
Manufacturing is
72% of manufacturersbelieve the main purposeof security is to reduce
risk versus being a competitive advantage2
20% increase in 2015 in cyber attacks on the
U.S. manufacturing sector1
1 http://www.insurancejournal.com/news/national/2016/01/15/395281.htm2 https://www.cisco.com/c/dam/assets/o�ers/pdfs/cybersecurity-growth-advantage.pdf (page 8 in the report; 11 in the pdf)3 http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
72%20%
Security for Today’s Digital FactoriesProtect the manufacturing process from end to end
Bene�ts of Cisco Connected Factory Security
?
State-sponsored corporate espionage
groups
Dishonest employees
Hackers
Human error and outside
vendors
Global organized crime groups
01101001001100010110100100110001