{"id":12565,"date":"2018-06-13T11:00:05","date_gmt":"2018-06-13T19:00:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/06\/13\/news-6334\/"},"modified":"2018-06-13T11:00:05","modified_gmt":"2018-06-13T19:00:05","slug":"news-6334","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/06\/13\/news-6334\/","title":{"rendered":"3 Steps Towards Cybersecurity in a Digital World"},"content":{"rendered":"<p><strong>Credit to Author: Herv\u00e9 Coureil| Date: Tue, 12 Jun 2018 21:05:46 +0000<\/strong><\/p>\n<h2 style=\"text-align: center;color: #3dcd56;font-weight: bold\">\u201cSecurity is everyone\u2019s job now.\u201d<\/h2>\n<p>These are wise words from Amazon\u2019s CTO Dr. Werner Vogels, especially for companies embarking on a digital transformation or accelerating their journey.<\/p>\n<p> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-49117 size-full\" title=\"Cybersecurity_digital_thumb_618x163.jpg\" src=\"https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/06\/ff.jpg\" alt=\"Illustration of Digital Thumb Cybersecurity\" width=\"751\" height=\"311\" srcset=\"https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/06\/ff.jpg 751w, https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/06\/ff-300x124.jpg 300w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/> <\/p>\n<p>Why should we all consider this advice? A recent report released by McKinsey<a href=\"#_edn1\" name=\"_ednref1\"><sup>[i]<\/sup><\/a> shows impressive figures: More than 100 billion lines of code are created annually, and hackers produce some 120 million new variants of malware every year. A strong Cybersecurity strategy is essential. Gartner research predicts that \u201cBy 2020, 60% of digital businesses will have suffered a major service failure.\u201d<a href=\"#_edn2\" name=\"_ednref2\"><sup>[ii]<\/sup><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: left;color: #3dcd56;font-weight: bold\">Cybersecurity is a business issue<\/h3>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/www.youtube.com\/embed\/NCP9WDahc3c?feature=oembed\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p>Is it any wonder, then, that Cybersecurity issues keep all of us up at night? The fundamental issue is not about developing new Cybersecurity capabilities as part of business strategy. Instead, it\u2019s about <a href=\"https:\/\/www.schneider-electric.com\/en\/download\/document\/998-20244304\/\">integrating them seamlessly<\/a>.<\/p>\n<p>What do I mean by that? Here, we need a big shift in mindset: first, in thinking that adding a Cybersecurity layer will make software and products more complicated to use and, second, in regarding Cybersecurity only as an IT issue.<\/p>\n<p>In that context, here are three approaches central to a Cybersecurity posture:<\/p>\n<ol>\n<li style=\"list-style-type: none\">\n<ol>\n<li><strong>Digital user-experience: <\/strong>Cybersecurity cannot be an afterthought; it must be completely embedded in the user experience. Worsening the user experience or adding friction can prompt users to find a \u201cwork around\u201d that can ultimately \u2013 and unintentionally \u2013 worsen the overall security posture.<\/li>\n<li><strong>Everyone\u2019s problem: <\/strong>We must find a way to make Cybersecurity something that everyone at a digital company thinks about \u2014 even without <em>overtly<\/em> thinking about it. About two-thirds of malware linked to data breaches or other incidents last year came from malicious email attachments.<a href=\"#_edn3\" name=\"_ednref3\">[iii]<\/a> It takes just one bad click to open the gates to the nefarious cyber underworld. So, Cybersecurity must become engrained in each of our daily actions. As a global company in over 100 countries, Schneider drills down to the individual level, providing ongoing learning and enablement about Cybersecurity.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><strong>A layered approach:<\/strong> For any company, a perimeter defense is not enough in today\u2019s digital world. Everyone is connected <em>constantly<\/em> \u2014 from our homes, smartphones, and across the distributed enterprise network. A layered approach is essential as we cannot just rely on a moat \u2014 as wide as it is \u2014 in today\u2019s hyper-connected world. For that perspective, the <a href=\"https:\/\/www.nist.gov\/cyberframework\">NIST framework<\/a><a href=\"#_edn4\" name=\"_ednref4\">[iv]<\/a>, is an incredibly useful reference as it defines different levels of defense (version 1.1 of the NIST framework was released on April 16<sup>th<\/sup>, 2018), from the identification of risks to the recovery from incidents (resilience).<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: left;color: #3dcd56;font-weight: bold\">The power and profit of IT\/OT convergence<\/h3>\n<p>The Schneider Electric <a href=\"https:\/\/www.schneider-electric.com\/en\/download\/document\/998-20244304\/\">Cybersecurity strategy<\/a> doesn\u2019t mean only building higher walls around the perimeter; instead, it means multiple tiers with a well-defined \u201cdetect and response\u201d strategy front and center.<\/p>\n<p> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-48610\" title=\"digital_services_factory_cybersecurity_Schneider_electric_848x222.jpg\" src=\"https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/05\/test2-300x79.jpg\" alt=\"Futuristic Digital Services Factory Schneider Electric\" width=\"848\" height=\"222\" srcset=\"https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/05\/test2-300x79.jpg 300w, https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/05\/test2.jpg 618w\" sizes=\"auto, (max-width: 848px) 100vw, 848px\" \/> <\/p>\n<p>No company is a castle; in one recent example, hackers even infiltrated a casino\u2019s database through a seemingly innocuous smart thermometer in its lobby aquarium. Considering its global footprint and presence, Schneider is exposed to the risk of Cyberattacks and data privacy breaches just like any organization. With the rapid convergence of IT\/OT, moreover, fueled by the <a href=\"https:\/\/www.schneider-electric.com\/en\/work\/campaign\/innovation\/platform.jsp\">Internet of Things<\/a>, we adopt Vogels\u2019 stance that, \u201cEveryone should be a security engineer in a digital company.\u201d<\/p>\n<p>From our \u201cCybersecurity by design\u201d approach across <a href=\"https:\/\/www.schneider-electric.com\/en\/work\/campaign\/innovation\/overview.jsp\">our IoT-enabled EcoStruxure<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/2.4\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><\/a> architecture to our ensuring that both IT and OT stakeholders have a seat at the Cyber-strategy table, we drive digital transformation with a strong Cybersecurity posture. We pave the way for our customers and partners to thrive in the digital economy. Rest assured.<\/p>\n<p> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-48060\" src=\"https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/05\/998-20258485_GMA-US_300x250-300x250.gif\" alt=\"\" width=\"300\" height=\"250\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-48062\" src=\"https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/05\/998-20258485_GMA-US_300x250-300x250.gif\" alt=\"\" width=\"300\" height=\"250\" \/> <\/p>\n<div id=\"attachment_48064\" style=\"width: 450px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-48064\" title=\"call_to_action_cybersecurity_whitepaper_620x320.jpg\" src=\"https:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2018\/05\/998-20258485_GMA-US_620X350_new-300x169.jpg\" alt=\"Multiracial male workers having discussion near power generator. (age 40s and 50s).\" width=\"440\" height=\"235\" \/><\/p>\n<p class=\"wp-caption-text\">Click here to read our latest white paper on Cybersecurity<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<h6><a href=\"#_ednref1\" name=\"_edn1\"><sup>[i]<\/sup><\/a><a href=\"https:\/\/www.mckinsey.com\/our-people\/thomas-poppensieker\">Thomas Poppensieker<\/a>\u00a0and Rolf Riemenschnitter, McKinsey &amp; Company, \u201cA new posture for cybersecurity in a networked world,\u201d March 2018. Available at https:\/\/www.mckinsey.com\/business-functions\/risk\/our-insights\/a-new-posture-for-cybersecurity-in-a-networked-world<\/h6>\n<h6><a href=\"#_ednref2\" name=\"_edn2\"><sup>[ii]<\/sup><\/a> Gartner Special Report. <em>Cybersecurity at the Speed of Digital Business<\/em>, Refreshed: 7 December 2017 | Published: 30 August 2016 ID: G00315580. The statistic cited at https:\/\/www.gartner.com\/newsroom\/id\/3337617.<\/h6>\n<h6><a href=\"#_ednref3\" name=\"_edn3\"><sup>[iii]<\/sup><\/a> Verizon\u2019s<em> 2017 Data Breach Investigations Report. <\/em>http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/2017\/<\/h6>\n<h6><a href=\"#_ednref4\" name=\"_edn4\"><sup>[iv]<\/sup><\/a> https:\/\/www.nist.gov\/cyberframework<\/h6>\n<\/li>\n<\/ol>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.schneider-electric.com\/cyber-security\/2018\/06\/12\/3-steps-towards-cybersecurity-in-a-digital-world\/\">3 Steps Towards Cybersecurity in a Digital World<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.schneider-electric.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.schneider-electric.com\/cyber-security\/2018\/06\/12\/3-steps-towards-cybersecurity-in-a-digital-world\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Herv\u00e9 Coureil| Date: Tue, 12 Jun 2018 21:05:46 +0000<\/strong><\/p>\n<p>\u201cSecurity is everyone\u2019s job now.\u201d These are wise words from Amazon\u2019s CTO Dr. Werner Vogels, especially for companies embarking on a digital transformation or accelerating their journey. Why should we&#8230;  <a href=\"https:\/\/blog.schneider-electric.com\/cyber-security\/2018\/06\/12\/3-steps-towards-cybersecurity-in-a-digital-world\/\" title=\"Read3 Steps Towards Cybersecurity in a Digital World\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.schneider-electric.com\/cyber-security\/2018\/06\/12\/3-steps-towards-cybersecurity-in-a-digital-world\/\">3 Steps Towards Cybersecurity in a Digital World<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.schneider-electric.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[12608,4500,18733,13084],"class_list":["post-12565","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-cyber-security","tag-cybersecurity","tag-herve-coureil","tag-white-paper"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12565"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12565\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12565"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}