{"id":659,"date":"2019-04-09T06:36:08","date_gmt":"2019-04-09T04:36:08","guid":{"rendered":"http:\/\/itkp.com\/?page_id=659"},"modified":"2019-04-16T16:15:52","modified_gmt":"2019-04-16T14:15:52","slug":"clients-2-2","status":"publish","type":"page","link":"https:\/\/itkp.com\/en\/clients-2-2\/","title":{"rendered":"Cyber Security"},"content":{"rendered":"<p><\/p>\n<h2><span class=\"tlid-translation translation\" lang=\"de\"><span title=\"\">Cyber Security<br \/>\n<\/span><\/span><\/h2>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">There is hardly another topic that has picked up so much in recent years.<\/span> <span title=\"\">Operational Technology (OT) systems that have been in operation for decades are suddenly in the focus of classic IT solutions, such as the call for a virus attack to patch an old process plant with the latest malware and the associated malware<\/span> <span title=\"\">Challenges such as upgrades of control systems, re-qualification and business interruptions.<\/span><br \/>\n<span title=\"\">This is precisely where ITKP comes in by analyzing the security requirements from the point of view of automation experts, engineers who have broadened their expertise in the direction of IT and can &#8220;translate&#8221; into the language of the engineer.<\/span><\/span><\/p>\n<p><span title=\"\">ITKP&#8217;s cyber security experts support you in the following areas:<\/span><\/p>\n<h2><span style=\"font-size: 14pt;\"><strong><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Definitions and language in OT<\/span><\/span><\/strong><\/span><\/h2>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Engineers, logistics experts, laboratory experts (OT) and classic IT speak a similar language, using the same operating systems.<\/span> <span title=\"\">Nevertheless, for example, configuration management means something completely different. IT thinks of a configuration &#8220;ITEM&#8221; in a database OT does not use the term &#8220;configuration management&#8221; or is integrated with change management.<\/span><\/span><\/p>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><br \/>\n<span title=\"\">ITKP has these differences and introduces a common language and Definition.<\/span><\/span><\/p>\n<p><strong>Core Areas<\/strong><\/p>\n<table style=\"width: 1013px;\">\n<tbody>\n<tr>\n<td style=\"width: 19.4333px;\"><\/td>\n<td style=\"text-align: left; vertical-align: top; width: 469.833px;\">\n<ul>\n<li>Definition of Operational Technology (OT)<\/li>\n<\/ul>\n<\/td>\n<td style=\"text-align: left; vertical-align: top; width: 501.733px;\">\n<ul>\n<li>Threats<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 19.4333px;\"><\/td>\n<td style=\"text-align: left; vertical-align: top; width: 469.833px;\">\n<ul>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Protection goals of OT Security<\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<td style=\"text-align: left; vertical-align: top; width: 501.733px;\">\n<ul>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Definitions of IT &#8211; translated in OT<\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 19.4333px;\"><\/td>\n<td style=\"text-align: left; vertical-align: top; width: 469.833px;\">\n<ul>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Differences between IT and OT<\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<td style=\"text-align: left; vertical-align: top; width: 501.733px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">\u00a0<\/span><\/span><\/p>\n<h2><span style=\"font-size: 14pt;\"><strong><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Security aspects in purchasing and design of OT systems, services around OT systems<\/span><\/span><\/strong><\/span><\/h2>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Security starts with the purchase of OT systems, either directly from the manufacturer of a control system or control system, or through the procurement of an automated packaging system.<\/span> <span title=\"\">Of course, you can buy as much &#8220;security&#8221; as you like, or even worse, upgrade it accordingly after sourcing.<\/span><\/span><\/p>\n<p><strong>Core Areas<\/strong><\/p>\n<table style=\"width: 1003px;\">\n<tbody>\n<tr>\n<td style=\"width: 14.0333px;\"><\/td>\n<td style=\"width: 475.967px; text-align: left; vertical-align: top;\">\n<ul>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Requirements, derived from security principles, strategy<\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 491px; text-align: left; vertical-align: top;\">\n<ul>\n<li>Management Support for OT Security<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 14.0333px;\"><\/td>\n<td style=\"width: 475.967px; text-align: left; vertical-align: top;\">\n<ul>\n<li>Protection Levels<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 491px; text-align: left; vertical-align: top;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">\u00a0<\/span><\/span><\/p>\n<h2><span style=\"font-size: 14pt;\"><strong><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Assessments- tailored for your Maturity Level<\/span><\/span><\/strong><\/span><\/h2>\n<p><span class=\"tlid-translation translation\" lang=\"en\">There are many standards in OT security, IEC 62443, to name perhaps the most well-known next to NIST. Here, requirements are defined for the various areas of the life cycle of an OT system. The trend, however, is towards certification of systems and service providers. ITKP is critical of pure certifications &#8211; because security can only be achieved in the interaction between system manufacturer, system integrator and operator.<br \/>\nThere are different levels of participants in this cooperation &#8211; divisible into the maturity levels: Innocense, Awareness, Understanding, Competence and Excellence. Standards move towards excellence, our aim is to take into account the state of the customer and to adapt the assessment accordingly. We do not want to ask questions whose answers are already known, do not suggest solutions that bring more problems than benefits. We believe that in certain situations, malware protection can have the same negative impact as malware itself.<\/span><\/p>\n<p><strong>Core Areas<\/strong><\/p>\n<table style=\"width: 983px;\">\n<tbody>\n<tr>\n<td style=\"width: 19.0167px;\"><\/td>\n<td style=\"width: 468.483px; text-align: left; vertical-align: top;\">\n<ul>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Inventory &#8211; what do you want to protect, in what degree of detail must the information be available<\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 473.5px; text-align: left; vertical-align: top;\">\n<ul>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">System and processes around the systems<\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 19.0167px;\"><\/td>\n<td style=\"width: 468.483px; text-align: left; vertical-align: top;\">\n<ul>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Security Assessment &#8211; tailored to your company<\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 473.5px; text-align: left; vertical-align: top;\">\n<ul>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Proposed solutions to increase the protection of the system<\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">\u00a0<\/span><\/span><\/p>\n<h2><strong><span style=\"font-size: 14pt;\">Technical Solutions<\/span><br \/>\n<\/strong><\/h2>\n<div class=\"result-shield-container tlid-copy-target\" tabindex=\"0\">\n<div class=\"result-shield-container tlid-copy-target\" tabindex=\"0\"><span class=\"tlid-translation translation\" lang=\"en\" tabindex=\"-1\"><span title=\"\">Many companies are quick to suggest a technical solution and implement it where, for example, the problem is not fully understood.<\/span> <span title=\"\">ITKP is convinced that\u00a0its offering to\u00a0translate the problem into the OT &#8220;language&#8221;.<\/span> <span title=\"\">This effectively implements the proposed solutions and integrates them into the processes &#8211; tailored to the OT requirements defined in Module 3.<\/span><\/span><\/div>\n<\/div>\n<p><strong>Core Areas<\/strong><\/p>\n<table style=\"width: 969px;\">\n<tbody>\n<tr>\n<td style=\"width: 11.0333px;\"><\/td>\n<td style=\"width: 470.983px; text-align: left; vertical-align: top;\">\n<ul>\n<li><span class=\"tlid-translation translation\" lang=\"en\"><span title=\"\">Network segmentation<\/span><\/span><\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 464.983px; text-align: left; vertical-align: top;\">\n<ul>\n<li>Vulnerability Management<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 11.0333px;\"><\/td>\n<td style=\"width: 470.983px; text-align: left; vertical-align: top;\">\n<ul>\n<li>Backup Strategies<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 464.983px; text-align: left; vertical-align: top;\">\n<ul>\n<li>User Management<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 11.0333px;\"><\/td>\n<td style=\"width: 470.983px; text-align: left; vertical-align: top;\">\n<ul>\n<li>Endpoint Protection<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 464.983px; text-align: left; vertical-align: top;\">\n<ul>\n<li>Anomaly Detection Systems<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Cyber Security There is hardly another topic that has picked up so much in recent years. Operational Technology (OT) systems that have been in operation for decades are suddenly in the focus of classic IT solutions, such as the call for a virus attack to&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":""},"coauthors":[],"author_meta":{"author_link":"https:\/\/itkp.com\/en\/author\/schmitt\/","display_name":"Wolfgang Schmitt"},"relative_dates":{"created":"Posted 7 years ago","modified":"Updated 7 years ago"},"absolute_dates":{"created":"Posted on 9. April 2019","modified":"Updated on 16. April 2019"},"absolute_dates_time":{"created":"Posted on 9. April 2019 06:36","modified":"Updated on 16. April 2019 16:15"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/itkp.com\/en\/wp-json\/wp\/v2\/pages\/659"}],"collection":[{"href":"https:\/\/itkp.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/itkp.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/itkp.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/itkp.com\/en\/wp-json\/wp\/v2\/comments?post=659"}],"version-history":[{"count":10,"href":"https:\/\/itkp.com\/en\/wp-json\/wp\/v2\/pages\/659\/revisions"}],"predecessor-version":[{"id":816,"href":"https:\/\/itkp.com\/en\/wp-json\/wp\/v2\/pages\/659\/revisions\/816"}],"wp:attachment":[{"href":"https:\/\/itkp.com\/en\/wp-json\/wp\/v2\/media?parent=659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}