top of page

Archive - Electricity 2017 Archive - Electricity

 

TPM seat 4

Cyber Threats in Smart Systems - Cyber Threats in Smart Systems

 

Thursday | 9.11.2017 | 14:00

TPM 4.1

Built-in cyber capabilities in process controllers - CYBER-ePAC

Nissim Hai

Schneider Electric

Israel

Nissim Chai (40) is a product manager in the Industrial Control Division, at Schneider Electric Israel.

In his role, he is responsible for the commercial / marketing aspect of the industrial control world, which includes industrial controllers, control and monitoring systems (SCADA), HMI products and a variety of products and solutions aimed at the industrial sector.

Seniority at Schneider Electric - 4 years. Nissim has practical experience of over 18 years in the field of industrial control, BMS systems, characterization and leadership of international projects in the field of ICT.

In the past, he has held a variety of roles ranging from project management, leading software development teams, consulting, initiating and leading funded projects with the Chief Scientist and the European Union.

Summary

The conflict between the need to implement an advanced, reliable and open control environment that relies on an enterprise communications infrastructure, and the need to maintain the production environment as isolated from vulnerabilities as possible is a key consideration in designing industrial control systems in the new era. The accelerated technological development in the field of computing and communication, pushes the manufacturers of industrial control equipment to invest enormous efforts in the development of advanced communication and cyber capabilities as an integral part of the process controllers connected to the operational network. The demand for more secure control products is growing year by year and forms the basis for creating diverse solutions for more reliable and secure industrial control, but until recently the solutions were external to the process controller. This required complex integration and extensive knowledge in the field of information security and communication networks. Implementing new information security technologies embedded as part of the controller's operating system is the last word. That is, process controllers are becoming increasingly "aware" of the environment in which they are installed and respond to a variety of threats accordingly. Controllers that include cyber capabilities, include a variety of internal protection mechanisms that come as an integral part of the hardware / operating system in the controller. These mechanisms allow the controller to deal with attacks in the control network, manage smart access control, use encryption capabilities and even report attempted hacking and disruption in real time. Controllers built into cyber capabilities now include a variety of advanced capabilities that allow the controller to defend against cyber attacks such as: preventing access from unauthorized addresses, controlling software / hardware changes and reporting anomalies, encrypted communication to SCADA systems, identifying the controller operating system and even a variety of capabilities The domain of managed switches and industrial firewalls. In the lecture I will review the cyber capabilities that can be found today as an integral part of process controllers, what the added value of these capabilities is and how these capabilities reduce the vulnerability of those controllers to attacks and even human errors that can harm production.

TPM 4.2

Cyber Security Center as a New Service

Abstract

The issue of cyber became one of the most talked-about subjects in the world.

Cyber threats and advanced attacks are on the rise threatening organizations and individuals, targeting critical information assets and valuable operations.

Many organizations would like to be protected from cyber crime, but do not have the necessary knowledge and budget to purchase advanced cyber protection products.

Recently more and more attacks target SCADA systems, thus threatening the core business of companies, especially in the field of critical infrastructures.

Our solution (YDAN ENTERPRISE Ltd and YANAI Ltd) is CYBER SECURITY CENTER (CSC)

which manages detection, defense and response services for different organizations.

The most advanced cyber security products of SCADA are installed in CSC and integrated in three unique levels, which oversee and monitor organizations` entire Cyber Security status.

The main benefits of such a service is: concentrating all cyber security services under one rooftop,  24/7 ongoing service, tailor made solutions, enabling the organizations to focus on core business activities without burdening the workforce and budget.

The CSC will attract the R&D activities of advanced institutes and laboratories, especially in the field of deep learning activities.

Our presentation will describe the new methodology and special features of CSC which is operated and maintained by YANAI Ltd and YDAN ENTERPRISE Ltd companies

Yakov Hain

Ydan Enterprise

Israel

2015-2017 - Founder and Chairman of YDAN ENTERPRISE Ltd.

2013-2014 - Senior Executive Vice President of IECo

2013-2014 -  Co-founder of CYBERGYM

2012-2013 - Chairman of Israel National Coal Supply Company

2007-2012 - Executive Engineering and Business Development VP of IECo

TPM 4.3

Facing Cyber Threats to Intelligent Power Generation and Supply Systems

Abstract

Smart (intelligent) systems serves us for almost a decade, in recent years those systems are entering to hundreds of new systems and can be found in almost every field.

Since the  essence  of those systems is based on wide connectivity, they are more exposed to cyber based attacks.  

This lecture will cover the accurate definition of smart systems and the essential basis for their existence and will offer ways for facing and confronting updated cyber threats' while keeping their operational safety, efficiency and productivity.

The "smart" system has been with us for about a decade in various fields, in recent years these systems have entered hundreds of new fields and are found in almost every field.

Because the essence of these systems is based on extensive connectivity, these systems are more vulnerable to cyber-based attacks.

In this lecture we will define more precisely what smart systems are and what is the necessary basis for their existence and accordingly we will offer ways to deal with current and future cyber threats while maintaining the safe, proper and beneficial functioning of these systems.

Yigal Goweta

Scadasudo

Israel

Yigal Goite (BSc, MSc) - Founder and CEO of Skadeshudo Ltd. A cyber protection solutions planning firm, a cyber protection expert with a unique specialization in the protection of industrial control and monitoring systems. Extensive knowledge and many years of experience in consulting and planning protection solutions for civilian and security systems in Israel and abroad. He currently serves as a leading consultant to the major bodies in the economy and to security bodies and the IDF, as well as to various development bodies in the field of cyber.  

TPM 4.4

M2 Scada and between M2M - Smart  OT concept of cyber protection in the environment

Shlomo Kalamaro

Afcon Control & Automation

Israel

education:

1994-1997: BSCTE Holon Institute of Electrical Engineering

1992-1994: Practical Studies in Electrical Engineering and Control from the Sanglovsky College

1985-1989 - ORT Singlovsky Command and Control major

Experience:

1997-2014 - to date works at Afcon Control

I have held a range of technical and managerial positions ranging from execution engineer and control systems programmer

Managing complex projects in the field of Scada control and communications

Customer management

Management of the control division

And currently manages the control activities at the South branch

20 years in the field of control systems, construction, construction and operation

Summary

Hardening the new generation of control systems from theory to practice

In today's arena of threats, organizations invest heavily in protecting the organization's IT systems in the IT network, with large resources being invested in these issues, especially in server farms, to protect the computing and communications infrastructure. When the OT arena the corporate operational network is sometimes isolated from the IT network and sometimes connected is not hardened enough due to lack of appropriate means and readiness of control equipment and systems.

The world's control manufacturers are working on open spaces adapted to the world of OT, which requires on the one hand functional continuity in real time and on the other hand hardening, encryption, and information security management. MODICON has developed information security solutions on a platform of a controller family that was fundamentally developed in the aspect of information security. Solutions that enable system hardening, access permissions management, management of access to controllers securely. In the first stage with the help of IPSEC support. A TLS mechanism is currently being developed that will enable a secure and encrypted dialogue between M2M and M2Scada.

The development of this platform enables the transfer of outdated LEGACY systems and their technological leap to the new generation. The controllers support IO Old Series, 800 Series, Momentum, Premium, and even Quantum. In addition, it enables the ability to transfer controller-based systems made by AB and Siemens to the new platform, both in terms of hardware and by converting the software perfectly to the M580 controller.

In addition, aspects of secure access to the controller were developed by biometric identification, management of INTEGRITY reliability testing both in OFFLINE and at runtime to verify that the operating system and DLLs in the controller are genuine from the manufacturer and have not been processed by a hostile entity.

In addition this platform undergoes global regulatory approvals such as Achilles 2, CSPN by the French National Cyber Authority due to the use of nuclear control controllers, CITSEC Chinese Cyber Authority, and ISASECURE approval processes as the only PAC controller at this stage to comply with this standard.

TPM 4.5

Siemens OT Cyber Security - Secure Plant Concept

Abstract

In the age of Digitalization, Industrial Cyber Security is becoming the new attack frontier

Global trends highlight the dynamic development of Cyber Security for Operational Technology

Security is a must - Global and local regulations require strict security from Siemens' customers

Siemens can help organizations protect against these attacks with end-to-end security solutions

Eitan Goldstein

Siemens

USA

Eitan Goldstein is a Director for Strategic Sales and Growth on Siemens' Industrial Cyber Security team. He helps set the strategic direction, develop new products and services and accelerate growth for the Siemens industrial security business worldwide. Prior to coming to Siemens, Eitan was a strategy consultant at the Boston Consulting Group, and worked as an attorney at General Electric. He has a BA from UCLA, and holds a JD from the University of Virginia School of Law, and an MBA from Columbia Business School.

התאגדות מהנדסי חשמל, אלקטרוניקה ואנרגיה בישראל

The Society of Electrical, Electronics and Energy Engineers in Israel 

Tel: (+972) 3 6134116 |  Fax: (+972) 3 6134117

מזכירות הכינוס

לבירורים ושאלות, בנושא הזמנות
ניתן לפנות למרכז הרישום

electricity2025@kenes-events.com

  • Youtube
  • SEEEI Facebook
  • SEEEI Linkedin
  • SEEEI Website

כל הזכויות שמורות לחברה הכלכלית של התאגדות מהנדסי חשמל, אלקטרוניקה ואנרגיה בישראל

bottom of page