IoT Security at the Japan Security Summit
The best "lessons learned," solutions and approaches from a six-part workshop series on "Best Practice Industrial IoT-Security" were presented by the economic spokesperson of the Cybersecurity Topic Platform Dr. Thomas Nowey and the head of the Cybersecurity Topic Platform Dr. Robert Couronné presented in a video dialogue at the invitation of the Japan Security Summit .
The video dialogue was divided into 8 episodes, so that relevant episodes are directly accessible for you. It was recorded at Krones AG in Regensburg.
As a manufacturer of food production and filling equipment, the company is responsible for configuring, maintaining and ensuring the operation of globally distributed systems on behalf of customers. Dr. Nowey is responsible for this as Chief Information Security Officer.
The videos are in English.
IoT Security - Introduction
Dr. Christian Geltinger, representative of the Free State of Bavaria in Japan obtained the invitation Japanese Cyber Security Summit and introduces the topic.
IoT Security @ Krones
In the second video you can learn more about why Krones was chosen as the studio.
IoT Security - Remote Maintenance
The next two videos will focus on the topic of secure remote access to industrial equipment.
How can risks be effectively reduced through basic measures?
IoT Security - Secure Operation
It all starts with a careful inventory of the IT infrastructure and the components present in the network. Often, legacy devices are discovered that are no longer needed, were no longer visible but provide easy entry points for attackers. The next step is to divide the IT network into segments, each of which is protected with its own firewalls.
IoT Security - Anomaly Detection
Secure operation must be monitored and anomalies must be analyzed and evaluated. The following video is about anomaly detection and what knowledge is required to reliably classify events.
IoT Security - Security Architecture
What if the IT component, for example the control for a load switch, is hanging on a power pole somewhere in the world? SW apps with a sophisticated security architecture allow secure access in environments that are maximally untrustworthy
.IoT Security - Security by Design
What is the key to the secure operation of industrial systems in the future? - Security by Design!
IoT Security - Norms & Standards
Norms and standards form the backbone for sustainable IT security. How can security be further strengthened by combining ISO 27000 and IEC 62443?
IoT Security - Human Firewall
No security without the important human firewall. Why awareness, education and regular training are important for security awareness and security is a permanently important management task
.