SlideShare a Scribd company logo
1 of 2
Download to read offline
RISK &SECURITY 
Industrial cyber security 
• Evaluate your industrial control system (ICS) exposure to cyber attacks and its consequences 
OUR VISION 
> 7 fundamentals for securing industrial control systems 
Industrial systems, due to rising interconnection and standardization, become more exposed to cyberattacks 
leading to potentially disastrous consequences affecting safety, production and environment. 
With our offer, you will identify your systems’ vulnerabilities, categorize them according to operational impact, 
and select the security measures adapted to your industry. 
REMOTE 
MAINTENANCE 
ENHANCED 
CONTROL 
> Cyber security risk management during engineering, construction and operation 
Risk analysis, risk governance and cyber security policies for ICS and production line components, security 
specifications and whitelists, project and operations team training to IS, network and cyber security 
> Vendor, EPC, and industrial control systems audits 
Cyber security audit/FAT/SAT, attack simulation on programmable logic controllers, and post-incident 
analysis 
> Cyber security assistance for large industrial programs 
Integration of cyber security in complex industrial programs using consistent risk monitoring, design of 
specialized security solutions, and implementation of security requirements 
OUR BELIEFS 
 Multiplication of external factors and adoption of new technologies amplify exposure of Industrial 
information systems to threats. 
 Industrial information systems are based on an increasing number of equipment such as black 
box” services, operating for several decades: typical security solutions must be adapted. 
 Availability and integrity of industrial processes are critical, particularly for safety functions which 
need to be a priority. 
HARDENING OF SYSTEMS AND 
PROGRAMMABLE LOGIC CONTROLLERS 
OPERATIONAL SECURITY 
MANAGEMENT 
RESTRICTION OF OPERATOR, 
ENGINEER AND MAINTENANCE 
ACCESS RIGHTS 
IEC 62443 LAYERS 
SEGREGATION 
ALIGNMENT WITH 
PHYSICAL SECURITY 
APPLICATION 
WHITELISTING 
OUR OFFER 
ICSS 
ICS SCADA 
DCS 
# 
• Design innovative and reliable cyber security solutions with operation constraints 
• Maintain a sustained security level on your industrial systems throughout a long lifecycle
RISK SECURITY # Industrial cyber security 
YOUR STAKES OUR STRENGTHS 
Manage your cyber security risks 
• Personnel safety through vital equipment control 
• Long term availability of critical systems 
• Integrity of the control parameters of the industrial 
process 
• Virus attacks, safety functions failures and cyber hijacking 
prevention 
SECWAY  BEIJAFLORE, one of a kind partnership 
• Our offer combines both a solid and practical technical 
expertise in SCADA / ICS and a recognized proficiency in the 
design of risk management systems and efficient security 
policies 
• Our commitment to quality recognized through our ISO9001 
certification on Industrial Cyber Security Services 
SUCCESS STORIES 
For a water treatment company (Operation phase) 
Improvement of ICS reliability to ensure a sustainable service for 
water transportation and treatment 
Objectives 
• Identify security measures to guarantee an acceptable risk level for 
water transportation network monitoring system 
• Backup site capacity assessment to ensure continuity in the event of 
a main monitoring system failure 
Achievements 
• Identification of major business threats, classification of information 
and resources in terms of Confidentiality, Integrity and Availability 
• Execution of technical penetration tests 
• Risk assessment for ICS security 
• Definition of the associated 3 year risk reduction plan 
Obtained gains 
45main threats identified 
Raised business and management awareness of industrial system 
security risks 
Risk reduction plan endorsed by top management 
Paris office and headquarters 
Pavillon Bourdan 
11-13 avenue du Recteur Poincaré 
75016 Paris 
Tel. no: +33 1 44 30 90 00 
Maxime de Jabrun 
Vice President|Head of Risk  Security 
11-13 avenue du Recteur Poincaré 
75016 Paris 
Tel. no: +33 1 44 30 91 95 
mdejabrun410@beijaflore.com 
Manage Industrial systems specificities and constraints 
• Addressing the gap between the long industrial lifecycle 
and rapid evolution of IS technologies 
• Industrial IS hastily adopting new technologies and 
interconnecting with enterprise networks 
A community of experts 
• Our RD center provides a practical and up-to-date knowledge 
of the main standards: IEC 62443 (ISA99), NIST SP 800- 
32/39/82, ISO27001/2/5, ISO15408, ISO61508, WIB, ISF SoGP 
and ISF IRAM 
Ensure global protection consistency 
• Consistency of the cyber security and safety approaches 
•Management of industrial projects complexity and 
supplier  subcontractor diversity 
ICS environment expertise 
• Our experience in cyber security of Control Systems is based 
on a hundred audits of system from the main providers around 
the world 
• Our in-depth knowledge of industrial systems and solutions 
allows us to bring applicable solutions to industrial IS 
minimizing operations impacts 
For a major OG company (Project) 
Definition of cyber security specifications 
Implementation management and audit of 83 suppliers of the 
industrial system for a major platform (several billion US$) 
Objectives 
• Strengthen project cyber security related to economic and safety 
issues 
• Educate users, protect systems against virus attacks and optimize 
procedures 
Achievements 
• Design of the body of cyber security policies, procedures and 
hardening guidelines for industrial control and safety systems 
• Audit of various offshore and onshore facilities at different stages 
of the project ( 2000 devices) 
• Management and control of cyber security of all suppliers systems 
from design phase to commissioning at site 
• Identification, assessment and monitoring of cyber security risks 
for the whole industrial system ( 4200 risks amongst all systems) 
Obtained gains 
Highlighting of the vulnerabilities of industrial systems and design of 
corrective and preventive action plans 
Cyber security awareness of project’s stakeholders ( 100) 
Decrease of industrial systems risks exposure following on site 
recommendation 
www.beijaflore.com • http://blogrisqueetsecurite.beijaflore.com

More Related Content

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

I rs0006-prs-c10167748 d-beijaflore-secway-leaflet-offer-industrial it cyber_security_en

  • 1. RISK &SECURITY Industrial cyber security • Evaluate your industrial control system (ICS) exposure to cyber attacks and its consequences OUR VISION > 7 fundamentals for securing industrial control systems Industrial systems, due to rising interconnection and standardization, become more exposed to cyberattacks leading to potentially disastrous consequences affecting safety, production and environment. With our offer, you will identify your systems’ vulnerabilities, categorize them according to operational impact, and select the security measures adapted to your industry. REMOTE MAINTENANCE ENHANCED CONTROL > Cyber security risk management during engineering, construction and operation Risk analysis, risk governance and cyber security policies for ICS and production line components, security specifications and whitelists, project and operations team training to IS, network and cyber security > Vendor, EPC, and industrial control systems audits Cyber security audit/FAT/SAT, attack simulation on programmable logic controllers, and post-incident analysis > Cyber security assistance for large industrial programs Integration of cyber security in complex industrial programs using consistent risk monitoring, design of specialized security solutions, and implementation of security requirements OUR BELIEFS Multiplication of external factors and adoption of new technologies amplify exposure of Industrial information systems to threats. Industrial information systems are based on an increasing number of equipment such as black box” services, operating for several decades: typical security solutions must be adapted. Availability and integrity of industrial processes are critical, particularly for safety functions which need to be a priority. HARDENING OF SYSTEMS AND PROGRAMMABLE LOGIC CONTROLLERS OPERATIONAL SECURITY MANAGEMENT RESTRICTION OF OPERATOR, ENGINEER AND MAINTENANCE ACCESS RIGHTS IEC 62443 LAYERS SEGREGATION ALIGNMENT WITH PHYSICAL SECURITY APPLICATION WHITELISTING OUR OFFER ICSS ICS SCADA DCS # • Design innovative and reliable cyber security solutions with operation constraints • Maintain a sustained security level on your industrial systems throughout a long lifecycle
  • 2. RISK SECURITY # Industrial cyber security YOUR STAKES OUR STRENGTHS Manage your cyber security risks • Personnel safety through vital equipment control • Long term availability of critical systems • Integrity of the control parameters of the industrial process • Virus attacks, safety functions failures and cyber hijacking prevention SECWAY BEIJAFLORE, one of a kind partnership • Our offer combines both a solid and practical technical expertise in SCADA / ICS and a recognized proficiency in the design of risk management systems and efficient security policies • Our commitment to quality recognized through our ISO9001 certification on Industrial Cyber Security Services SUCCESS STORIES For a water treatment company (Operation phase) Improvement of ICS reliability to ensure a sustainable service for water transportation and treatment Objectives • Identify security measures to guarantee an acceptable risk level for water transportation network monitoring system • Backup site capacity assessment to ensure continuity in the event of a main monitoring system failure Achievements • Identification of major business threats, classification of information and resources in terms of Confidentiality, Integrity and Availability • Execution of technical penetration tests • Risk assessment for ICS security • Definition of the associated 3 year risk reduction plan Obtained gains 45main threats identified Raised business and management awareness of industrial system security risks Risk reduction plan endorsed by top management Paris office and headquarters Pavillon Bourdan 11-13 avenue du Recteur Poincaré 75016 Paris Tel. no: +33 1 44 30 90 00 Maxime de Jabrun Vice President|Head of Risk Security 11-13 avenue du Recteur Poincaré 75016 Paris Tel. no: +33 1 44 30 91 95 mdejabrun410@beijaflore.com Manage Industrial systems specificities and constraints • Addressing the gap between the long industrial lifecycle and rapid evolution of IS technologies • Industrial IS hastily adopting new technologies and interconnecting with enterprise networks A community of experts • Our RD center provides a practical and up-to-date knowledge of the main standards: IEC 62443 (ISA99), NIST SP 800- 32/39/82, ISO27001/2/5, ISO15408, ISO61508, WIB, ISF SoGP and ISF IRAM Ensure global protection consistency • Consistency of the cyber security and safety approaches •Management of industrial projects complexity and supplier subcontractor diversity ICS environment expertise • Our experience in cyber security of Control Systems is based on a hundred audits of system from the main providers around the world • Our in-depth knowledge of industrial systems and solutions allows us to bring applicable solutions to industrial IS minimizing operations impacts For a major OG company (Project) Definition of cyber security specifications Implementation management and audit of 83 suppliers of the industrial system for a major platform (several billion US$) Objectives • Strengthen project cyber security related to economic and safety issues • Educate users, protect systems against virus attacks and optimize procedures Achievements • Design of the body of cyber security policies, procedures and hardening guidelines for industrial control and safety systems • Audit of various offshore and onshore facilities at different stages of the project ( 2000 devices) • Management and control of cyber security of all suppliers systems from design phase to commissioning at site • Identification, assessment and monitoring of cyber security risks for the whole industrial system ( 4200 risks amongst all systems) Obtained gains Highlighting of the vulnerabilities of industrial systems and design of corrective and preventive action plans Cyber security awareness of project’s stakeholders ( 100) Decrease of industrial systems risks exposure following on site recommendation www.beijaflore.com • http://blogrisqueetsecurite.beijaflore.com