This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

10. The role of third-party testing in securing Industrial Internet of Things (IIoT) compliance

30 January 2018

Matt Jakuc – Cybersecurity Technical Lead, CSA Group. 
Weds 14.00 – 14.40: Seminar room

The Industrial Internet of Things (IIoT) is well on its way to becoming perhaps the most significant of all the ‘industrial revolutions’ to date and the most complex.  With some projections claiming a 300% increase in IoT-ready devices in just the next 4 years (some 22.5 billion by 2021), and other forecasts suggesting that IIoT investment will make up as much as 40% of some organisations’ capex budgets, the Internet of Things in the Industrial space is already well and truly here.

The major benefits of IIoT are well known – efficiency & reliability gains, coupled with the ability to record big data for remote analysis. Yet, the challenges and opportunities that IIoT brings in the quest for protecting lives requires an equal focus, particularly when you consider how IIoT will be incorporated into a Hazardous Location (explosive atmosphere). Here, there are a number of elements to consider, including continued hazardous location safety compliance, functional safety assurance and cybersecurity protocols.

The convergence of information technology (IT) operational technology (OT) networks, has tremendously increased the risk of cyberattacks that may affect safety, reliability and availability.

Modern control systems are no longer isolated but are part of a larger connected infrastructure that can offer significant cost savings but also cybersecurity concerns. Security risks associated with integrating, modifying or maintaining a controller in process can impact overall safety and security. 

This changes the risk profile that should be considered when designing and/or integrating components in the systems.

Often, little consideration is made to their security requirements due to cost constraints.  Vendors, system integrators and asset owners face challenges in keeping their systems secure including technical expertise and privacy concerns. The integrators, asset owners and facility managers need cybersecurity assurance when selecting potential hardware and software-based solutions. These solution should be specifically designed and formally evaluated to identify and prevent cybersecurity threats in industrial environments.

During this presentation we will uncover:
1. Challenges & risks in IIoT – covering Hazardous Locations, Functional Safety and Cybersecurity
2. Steps to limit the likelihood of such incidents and their impact
3. Keys to third-party evaluation and testing
4. Steps to successful attestation and certification of connected devices

Matt Jakuc is the Global Business Manager for Cybersecurity Services at CSA Group.  Mr. Jakuc holds a Master of Science degree in Electrical Engineering and has more than twenty years of experience in product research and development. 

His professional experience spans across the areas of the architecture and design of SCADA systems, production automation equipment, consumer electronics, and embedded systems.  He is currently focusing on cybersecurity services that improve the safety and security of IoT and IIoT products, including secure development lifecycle implementation, penetration testing, gap assessments, and certification programs.

Contact Details and Archive...

Print this page | E-mail this page