SlideShare ist ein Scribd-Unternehmen logo
1 von 24
DeltaV Security Don’t Let Your Business Be Caught Without It SRR-MS-2011-00057
Presenters ,[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Landscape ,[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
Facts ,[object Object],[object Object],[object Object],[object Object]
Facts ,[object Object],[object Object]
Facts ,[object Object],[object Object],[object Object]
Facts ,[object Object],[object Object]
The Simple Facts
Where do I Start? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Tools & Terms ,[object Object],[object Object],[object Object],[object Object]
The Model Assess Perform Risk Assessment & Gap Analysis Establish Areas and Vectors Determine Targets Change Align Areas and Vectors to Acceptable Levels Confirm results New Security Level Maintain Periodically Assess Update Stay Current
The Model – Likelihood vs Consequence Moderate Risk High Risk Low Risk Moderate Risk Likelihood Consequence
The Model – Probability vs Impact Probability   Impact     4 = Very Likely 4 = Severe Impact 3 = Likely 3 = Major Impact 2 = Not Likely 2 = Minor Impact 1 = Beyond Unlikely   1 =  No Impact
The Model – Probability vs Impact Vector   Probability     Internet, Wireless (Open) 4 = Very Likely Internet, Wireless (Password) 3 = Likely Internet, Wireless (Authenticated) 2 = Not Likely No Outside Connection   1 = Beyond Unlikely
The Model – Probability vs Impact Impact   1 = No Impact 2 = Minor Impact 3 = Major Impact 4 = Severe Impact     Public View Ok Tarnished Recoverable Lost Confidence Environmental Ok Damaged Broken Destroyed Personnel Ok First Aid, Medical Treatment Hospitalization Fatality Production   No Loss Minor Loss Moderate Loss Major Loss
The Model – Risk Matrix
Participant Interaction ,[object Object],[object Object],[object Object],[object Object]
Business Results Achieved ,[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object]
Where To Get More Information ,[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Improving Security Metrics
Improving Security MetricsImproving Security Metrics
Improving Security MetricsDoug Copley
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and responseZyrellLalaguna
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Resolver Inc.
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Enterprise security incident management
Enterprise security incident managementEnterprise security incident management
Enterprise security incident managementzapp0
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)ishan parikh production
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 
ArrowMiner
ArrowMinerArrowMiner
ArrowMinerdtsiolis
 
Incident Mgmt Nov 08
Incident Mgmt Nov 08Incident Mgmt Nov 08
Incident Mgmt Nov 08empower
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.comKeatonJennings98
 
The Missing Approach for Threat Detection
The Missing Approach for Threat DetectionThe Missing Approach for Threat Detection
The Missing Approach for Threat DetectionCDXAdmin
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentCigital
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
App Showcase: Compliance
App Showcase: ComplianceApp Showcase: Compliance
App Showcase: ComplianceResolver Inc.
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSouth Tyrol Free Software Conference
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101Resolver Inc.
 

Was ist angesagt? (20)

Improving Security Metrics
Improving Security MetricsImproving Security Metrics
Improving Security Metrics
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Enterprise security incident management
Enterprise security incident managementEnterprise security incident management
Enterprise security incident management
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
ArrowMiner
ArrowMinerArrowMiner
ArrowMiner
 
Incident Mgmt Nov 08
Incident Mgmt Nov 08Incident Mgmt Nov 08
Incident Mgmt Nov 08
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
The Missing Approach for Threat Detection
The Missing Approach for Threat DetectionThe Missing Approach for Threat Detection
The Missing Approach for Threat Detection
 
Get Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM AssessmentGet Your Board to Say "Yes" to a BSIMM Assessment
Get Your Board to Say "Yes" to a BSIMM Assessment
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
App Showcase: Compliance
App Showcase: ComplianceApp Showcase: Compliance
App Showcase: Compliance
 
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply ChainSFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
 
Integrated Risk Management 101
Integrated Risk Management 101Integrated Risk Management 101
Integrated Risk Management 101
 

Andere mochten auch

Philippe Cotelle’s presentation on SPICE at AIRBUS, FERMA Forum 2015
Philippe Cotelle’s presentation on SPICE at AIRBUS, FERMA Forum 2015Philippe Cotelle’s presentation on SPICE at AIRBUS, FERMA Forum 2015
Philippe Cotelle’s presentation on SPICE at AIRBUS, FERMA Forum 2015FERMA
 
Using Syncade Workflow and AMS Device Manager for SIF Proof Testing on a Delt...
Using Syncade Workflow and AMS Device Manager for SIF Proof Testing on a Delt...Using Syncade Workflow and AMS Device Manager for SIF Proof Testing on a Delt...
Using Syncade Workflow and AMS Device Manager for SIF Proof Testing on a Delt...Emerson Exchange
 
New DeltaV Module Templates to Easily Configure, View, and Trend Advanced Pre...
New DeltaV Module Templates to Easily Configure, View, and Trend Advanced Pre...New DeltaV Module Templates to Easily Configure, View, and Trend Advanced Pre...
New DeltaV Module Templates to Easily Configure, View, and Trend Advanced Pre...Emerson Exchange
 
Project Management Successes with Global Teams
Project Management Successes with Global TeamsProject Management Successes with Global Teams
Project Management Successes with Global TeamsEmerson Exchange
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
One Day Version 10.3 Upgrade - How a Large Biotech Plant's DeltaV Systems Wer...
One Day Version 10.3 Upgrade - How a Large Biotech Plant's DeltaV Systems Wer...One Day Version 10.3 Upgrade - How a Large Biotech Plant's DeltaV Systems Wer...
One Day Version 10.3 Upgrade - How a Large Biotech Plant's DeltaV Systems Wer...Emerson Exchange
 
CHARMED Upgrading the UT Pickle Separations to DeltaV v11
CHARMED Upgrading the UT Pickle Separations to DeltaV v11CHARMED Upgrading the UT Pickle Separations to DeltaV v11
CHARMED Upgrading the UT Pickle Separations to DeltaV v11Emerson Exchange
 
Application of kalman filtering in delta v
Application of kalman filtering in delta vApplication of kalman filtering in delta v
Application of kalman filtering in delta vEmerson Exchange
 
Interesting and Useful Features of the DeltaV PID, Ratio and Bias/Gain Contro...
Interesting and Useful Features of the DeltaV PID, Ratio and Bias/Gain Contro...Interesting and Useful Features of the DeltaV PID, Ratio and Bias/Gain Contro...
Interesting and Useful Features of the DeltaV PID, Ratio and Bias/Gain Contro...Emerson Exchange
 
Recovery from a process saturation condition benefits of using delta v pid_plus
Recovery from a process saturation condition benefits of using delta v pid_plusRecovery from a process saturation condition benefits of using delta v pid_plus
Recovery from a process saturation condition benefits of using delta v pid_plusEmerson Exchange
 
State-of-the-Art Automation at Asphalt Loading/Blending Terminal
State-of-the-Art Automation at Asphalt Loading/Blending TerminalState-of-the-Art Automation at Asphalt Loading/Blending Terminal
State-of-the-Art Automation at Asphalt Loading/Blending TerminalEmerson Exchange
 
Introduction to Fuzzy Logic in Networks
Introduction to Fuzzy Logic in NetworksIntroduction to Fuzzy Logic in Networks
Introduction to Fuzzy Logic in NetworksDr. Edwin Hernandez
 
Device Revisions Management - Best Practices
Device Revisions Management - Best PracticesDevice Revisions Management - Best Practices
Device Revisions Management - Best PracticesEmerson Exchange
 
Interfacing delta v to motorized actuators addressing control applications
Interfacing delta v to motorized actuators addressing control applications Interfacing delta v to motorized actuators addressing control applications
Interfacing delta v to motorized actuators addressing control applications Emerson Exchange
 
OPC .NET 3.0 Simplifies Client Access to DeltaV
OPC .NET 3.0 Simplifies Client Access to DeltaVOPC .NET 3.0 Simplifies Client Access to DeltaV
OPC .NET 3.0 Simplifies Client Access to DeltaVEmerson Exchange
 
Interesting and Useful Features of the DeltaV PID Controller
Interesting and Useful Features of the DeltaV PID ControllerInteresting and Useful Features of the DeltaV PID Controller
Interesting and Useful Features of the DeltaV PID ControllerJim Cahill
 
Pepperl fuchs 2011 Emerson Global Users Exchange Intrinsically Safe CHARMS S...
Pepperl fuchs 2011 Emerson Global Users Exchange  Intrinsically Safe CHARMS S...Pepperl fuchs 2011 Emerson Global Users Exchange  Intrinsically Safe CHARMS S...
Pepperl fuchs 2011 Emerson Global Users Exchange Intrinsically Safe CHARMS S...Kristen_Barbour_PF
 
OTS - Everything you wanted to know but didn't ask
OTS - Everything you wanted to know but didn't askOTS - Everything you wanted to know but didn't ask
OTS - Everything you wanted to know but didn't askJeff Hackney
 

Andere mochten auch (20)

Philippe Cotelle’s presentation on SPICE at AIRBUS, FERMA Forum 2015
Philippe Cotelle’s presentation on SPICE at AIRBUS, FERMA Forum 2015Philippe Cotelle’s presentation on SPICE at AIRBUS, FERMA Forum 2015
Philippe Cotelle’s presentation on SPICE at AIRBUS, FERMA Forum 2015
 
Using Syncade Workflow and AMS Device Manager for SIF Proof Testing on a Delt...
Using Syncade Workflow and AMS Device Manager for SIF Proof Testing on a Delt...Using Syncade Workflow and AMS Device Manager for SIF Proof Testing on a Delt...
Using Syncade Workflow and AMS Device Manager for SIF Proof Testing on a Delt...
 
New DeltaV Module Templates to Easily Configure, View, and Trend Advanced Pre...
New DeltaV Module Templates to Easily Configure, View, and Trend Advanced Pre...New DeltaV Module Templates to Easily Configure, View, and Trend Advanced Pre...
New DeltaV Module Templates to Easily Configure, View, and Trend Advanced Pre...
 
DeltaV Virtualization
DeltaV VirtualizationDeltaV Virtualization
DeltaV Virtualization
 
Project Management Successes with Global Teams
Project Management Successes with Global TeamsProject Management Successes with Global Teams
Project Management Successes with Global Teams
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
One Day Version 10.3 Upgrade - How a Large Biotech Plant's DeltaV Systems Wer...
One Day Version 10.3 Upgrade - How a Large Biotech Plant's DeltaV Systems Wer...One Day Version 10.3 Upgrade - How a Large Biotech Plant's DeltaV Systems Wer...
One Day Version 10.3 Upgrade - How a Large Biotech Plant's DeltaV Systems Wer...
 
CHARMED Upgrading the UT Pickle Separations to DeltaV v11
CHARMED Upgrading the UT Pickle Separations to DeltaV v11CHARMED Upgrading the UT Pickle Separations to DeltaV v11
CHARMED Upgrading the UT Pickle Separations to DeltaV v11
 
Application of kalman filtering in delta v
Application of kalman filtering in delta vApplication of kalman filtering in delta v
Application of kalman filtering in delta v
 
Interesting and Useful Features of the DeltaV PID, Ratio and Bias/Gain Contro...
Interesting and Useful Features of the DeltaV PID, Ratio and Bias/Gain Contro...Interesting and Useful Features of the DeltaV PID, Ratio and Bias/Gain Contro...
Interesting and Useful Features of the DeltaV PID, Ratio and Bias/Gain Contro...
 
Recovery from a process saturation condition benefits of using delta v pid_plus
Recovery from a process saturation condition benefits of using delta v pid_plusRecovery from a process saturation condition benefits of using delta v pid_plus
Recovery from a process saturation condition benefits of using delta v pid_plus
 
State-of-the-Art Automation at Asphalt Loading/Blending Terminal
State-of-the-Art Automation at Asphalt Loading/Blending TerminalState-of-the-Art Automation at Asphalt Loading/Blending Terminal
State-of-the-Art Automation at Asphalt Loading/Blending Terminal
 
Introduction to Fuzzy Logic in Networks
Introduction to Fuzzy Logic in NetworksIntroduction to Fuzzy Logic in Networks
Introduction to Fuzzy Logic in Networks
 
Device Revisions Management - Best Practices
Device Revisions Management - Best PracticesDevice Revisions Management - Best Practices
Device Revisions Management - Best Practices
 
Interfacing delta v to motorized actuators addressing control applications
Interfacing delta v to motorized actuators addressing control applications Interfacing delta v to motorized actuators addressing control applications
Interfacing delta v to motorized actuators addressing control applications
 
DeltaV Operator Training
DeltaV Operator Training DeltaV Operator Training
DeltaV Operator Training
 
OPC .NET 3.0 Simplifies Client Access to DeltaV
OPC .NET 3.0 Simplifies Client Access to DeltaVOPC .NET 3.0 Simplifies Client Access to DeltaV
OPC .NET 3.0 Simplifies Client Access to DeltaV
 
Interesting and Useful Features of the DeltaV PID Controller
Interesting and Useful Features of the DeltaV PID ControllerInteresting and Useful Features of the DeltaV PID Controller
Interesting and Useful Features of the DeltaV PID Controller
 
Pepperl fuchs 2011 Emerson Global Users Exchange Intrinsically Safe CHARMS S...
Pepperl fuchs 2011 Emerson Global Users Exchange  Intrinsically Safe CHARMS S...Pepperl fuchs 2011 Emerson Global Users Exchange  Intrinsically Safe CHARMS S...
Pepperl fuchs 2011 Emerson Global Users Exchange Intrinsically Safe CHARMS S...
 
OTS - Everything you wanted to know but didn't ask
OTS - Everything you wanted to know but didn't askOTS - Everything you wanted to know but didn't ask
OTS - Everything you wanted to know but didn't ask
 

Ähnlich wie DeltaV Security - Don’t Let Your Business Be Caught Without It

Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke PatchlinkBen Rothke
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017zapp0
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management IIzapp0
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...PECB
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Peter1020
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingTory Quinton
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015CBIZ, Inc.
 
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...Plus Consulting
 
You will be breached
You will be breachedYou will be breached
You will be breachedMike Saunders
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic SecurityChad Korosec
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security FrameworkJerod Brennen
 

Ähnlich wie DeltaV Security - Don’t Let Your Business Be Caught Without It (20)

Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
 
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
Cyber-Security Threats: Why We are Losing the Battle (and Probably Don't Even...
 
You will be breached
You will be breachedYou will be breached
You will be breached
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
 

Mehr von Emerson Exchange

Using Wireless Measurements in Control Applications
Using Wireless Measurements in Control ApplicationsUsing Wireless Measurements in Control Applications
Using Wireless Measurements in Control ApplicationsEmerson Exchange
 
Aplication of on line data analytics to a continuous process polybetene unit
Aplication of on line data analytics to a continuous process polybetene unitAplication of on line data analytics to a continuous process polybetene unit
Aplication of on line data analytics to a continuous process polybetene unitEmerson Exchange
 
Utilizing DeltaV Advanced Control Innovations to Improve Control Performance
Utilizing DeltaV Advanced Control Innovations to Improve Control PerformanceUtilizing DeltaV Advanced Control Innovations to Improve Control Performance
Utilizing DeltaV Advanced Control Innovations to Improve Control PerformanceEmerson Exchange
 
Process Education on Demand
Process Education on Demand Process Education on Demand
Process Education on Demand Emerson Exchange
 
Control using wireless measurements
Control using wireless measurementsControl using wireless measurements
Control using wireless measurementsEmerson Exchange
 
Boot camp advanced tools and techniques
Boot camp   advanced tools and techniquesBoot camp   advanced tools and techniques
Boot camp advanced tools and techniquesEmerson Exchange
 
Application of online data analytics to a continuous process polybutene unit
Application of online data analytics to a continuous process polybutene unitApplication of online data analytics to a continuous process polybutene unit
Application of online data analytics to a continuous process polybutene unitEmerson Exchange
 
Addressing control applications using wireless hart devices
Addressing control applications using wireless hart devicesAddressing control applications using wireless hart devices
Addressing control applications using wireless hart devicesEmerson Exchange
 
Advanced control foundation tools and techniques
Advanced control foundation   tools and techniquesAdvanced control foundation   tools and techniques
Advanced control foundation tools and techniquesEmerson Exchange
 
The semantic web an inside look at the creation of control loop foundation
The semantic web   an inside look at the creation of control loop foundationThe semantic web   an inside look at the creation of control loop foundation
The semantic web an inside look at the creation of control loop foundationEmerson Exchange
 
Master the Mystery and Marvels of DeltaV MPC
Master the Mystery and Marvels of DeltaV MPCMaster the Mystery and Marvels of DeltaV MPC
Master the Mystery and Marvels of DeltaV MPCEmerson Exchange
 
PID Advances in Industrial Control
PID Advances in Industrial ControlPID Advances in Industrial Control
PID Advances in Industrial ControlEmerson Exchange
 
Intelligent PID Product Design
Intelligent PID Product DesignIntelligent PID Product Design
Intelligent PID Product DesignEmerson Exchange
 
Future Perspectives of PID Control
Future Perspectives of PID ControlFuture Perspectives of PID Control
Future Perspectives of PID ControlEmerson Exchange
 
A Quick and Easy Way to Connect to FOUNDATION fieldbus using Emerson’s USB Fi...
A Quick and Easy Way to Connect to FOUNDATION fieldbus using Emerson’s USB Fi...A Quick and Easy Way to Connect to FOUNDATION fieldbus using Emerson’s USB Fi...
A Quick and Easy Way to Connect to FOUNDATION fieldbus using Emerson’s USB Fi...Emerson Exchange
 
Calibration Excellence: Intelligent Application of Smart Technology is Just t...
Calibration Excellence: Intelligent Application of Smart Technology is Just t...Calibration Excellence: Intelligent Application of Smart Technology is Just t...
Calibration Excellence: Intelligent Application of Smart Technology is Just t...Emerson Exchange
 
When the Heat is On, Control with Wireless
When the Heat is On, Control with WirelessWhen the Heat is On, Control with Wireless
When the Heat is On, Control with WirelessEmerson Exchange
 
Maximizing the return on your control investment meet the experts sessions part2
Maximizing the return on your control investment meet the experts sessions part2Maximizing the return on your control investment meet the experts sessions part2
Maximizing the return on your control investment meet the experts sessions part2Emerson Exchange
 
Maximizing the return on your control investment meet the experts sessions pa...
Maximizing the return on your control investment meet the experts sessions pa...Maximizing the return on your control investment meet the experts sessions pa...
Maximizing the return on your control investment meet the experts sessions pa...Emerson Exchange
 

Mehr von Emerson Exchange (20)

Using Wireless Measurements in Control Applications
Using Wireless Measurements in Control ApplicationsUsing Wireless Measurements in Control Applications
Using Wireless Measurements in Control Applications
 
Aplication of on line data analytics to a continuous process polybetene unit
Aplication of on line data analytics to a continuous process polybetene unitAplication of on line data analytics to a continuous process polybetene unit
Aplication of on line data analytics to a continuous process polybetene unit
 
Utilizing DeltaV Advanced Control Innovations to Improve Control Performance
Utilizing DeltaV Advanced Control Innovations to Improve Control PerformanceUtilizing DeltaV Advanced Control Innovations to Improve Control Performance
Utilizing DeltaV Advanced Control Innovations to Improve Control Performance
 
Process Education on Demand
Process Education on Demand Process Education on Demand
Process Education on Demand
 
Control using wireless measurements
Control using wireless measurementsControl using wireless measurements
Control using wireless measurements
 
Boot camp advanced tools and techniques
Boot camp   advanced tools and techniquesBoot camp   advanced tools and techniques
Boot camp advanced tools and techniques
 
Application of online data analytics to a continuous process polybutene unit
Application of online data analytics to a continuous process polybutene unitApplication of online data analytics to a continuous process polybutene unit
Application of online data analytics to a continuous process polybutene unit
 
Addressing control applications using wireless hart devices
Addressing control applications using wireless hart devicesAddressing control applications using wireless hart devices
Addressing control applications using wireless hart devices
 
Advanced control foundation tools and techniques
Advanced control foundation   tools and techniquesAdvanced control foundation   tools and techniques
Advanced control foundation tools and techniques
 
The semantic web an inside look at the creation of control loop foundation
The semantic web   an inside look at the creation of control loop foundationThe semantic web   an inside look at the creation of control loop foundation
The semantic web an inside look at the creation of control loop foundation
 
Adventures in pH Control
Adventures in pH ControlAdventures in pH Control
Adventures in pH Control
 
Master the Mystery and Marvels of DeltaV MPC
Master the Mystery and Marvels of DeltaV MPCMaster the Mystery and Marvels of DeltaV MPC
Master the Mystery and Marvels of DeltaV MPC
 
PID Advances in Industrial Control
PID Advances in Industrial ControlPID Advances in Industrial Control
PID Advances in Industrial Control
 
Intelligent PID Product Design
Intelligent PID Product DesignIntelligent PID Product Design
Intelligent PID Product Design
 
Future Perspectives of PID Control
Future Perspectives of PID ControlFuture Perspectives of PID Control
Future Perspectives of PID Control
 
A Quick and Easy Way to Connect to FOUNDATION fieldbus using Emerson’s USB Fi...
A Quick and Easy Way to Connect to FOUNDATION fieldbus using Emerson’s USB Fi...A Quick and Easy Way to Connect to FOUNDATION fieldbus using Emerson’s USB Fi...
A Quick and Easy Way to Connect to FOUNDATION fieldbus using Emerson’s USB Fi...
 
Calibration Excellence: Intelligent Application of Smart Technology is Just t...
Calibration Excellence: Intelligent Application of Smart Technology is Just t...Calibration Excellence: Intelligent Application of Smart Technology is Just t...
Calibration Excellence: Intelligent Application of Smart Technology is Just t...
 
When the Heat is On, Control with Wireless
When the Heat is On, Control with WirelessWhen the Heat is On, Control with Wireless
When the Heat is On, Control with Wireless
 
Maximizing the return on your control investment meet the experts sessions part2
Maximizing the return on your control investment meet the experts sessions part2Maximizing the return on your control investment meet the experts sessions part2
Maximizing the return on your control investment meet the experts sessions part2
 
Maximizing the return on your control investment meet the experts sessions pa...
Maximizing the return on your control investment meet the experts sessions pa...Maximizing the return on your control investment meet the experts sessions pa...
Maximizing the return on your control investment meet the experts sessions pa...
 

Kürzlich hochgeladen

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Kürzlich hochgeladen (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

DeltaV Security - Don’t Let Your Business Be Caught Without It

  • 1. DeltaV Security Don’t Let Your Business Be Caught Without It SRR-MS-2011-00057
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 13.
  • 14.
  • 15. The Model Assess Perform Risk Assessment & Gap Analysis Establish Areas and Vectors Determine Targets Change Align Areas and Vectors to Acceptable Levels Confirm results New Security Level Maintain Periodically Assess Update Stay Current
  • 16. The Model – Likelihood vs Consequence Moderate Risk High Risk Low Risk Moderate Risk Likelihood Consequence
  • 17. The Model – Probability vs Impact Probability   Impact     4 = Very Likely 4 = Severe Impact 3 = Likely 3 = Major Impact 2 = Not Likely 2 = Minor Impact 1 = Beyond Unlikely   1 = No Impact
  • 18. The Model – Probability vs Impact Vector   Probability     Internet, Wireless (Open) 4 = Very Likely Internet, Wireless (Password) 3 = Likely Internet, Wireless (Authenticated) 2 = Not Likely No Outside Connection   1 = Beyond Unlikely
  • 19. The Model – Probability vs Impact Impact   1 = No Impact 2 = Minor Impact 3 = Major Impact 4 = Severe Impact     Public View Ok Tarnished Recoverable Lost Confidence Environmental Ok Damaged Broken Destroyed Personnel Ok First Aid, Medical Treatment Hospitalization Fatality Production   No Loss Minor Loss Moderate Loss Major Loss
  • 20. The Model – Risk Matrix
  • 21.
  • 22.
  • 23.
  • 24.

Hinweis der Redaktion

  1. 310 Square Mile site in southwest SC, on border of GA, along the Savannah River. Used to be major production site for nuclear weapons program. Now, mostly cleanup. Some limited life component processing (Tritium); looking forward to future missions for the site, like energy park, modular reactors, hydrogen fuels, etc…
  2. A Vulnerability in human terms – example: a guy who does not exercise control over his desire to pursue women other than his wife The Risk here is that his wife will discover his actions and cause him irreparable harm; what is the likelihood (very likely) and severity (slow and painful death; or worse)