{"id":17009,"date":"2019-11-26T11:00:04","date_gmt":"2019-11-26T19:00:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/11\/26\/news-10746\/"},"modified":"2019-11-26T11:00:04","modified_gmt":"2019-11-26T19:00:04","slug":"news-10746","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/26\/news-10746\/","title":{"rendered":"Cybersecurity Defense Requires a Strong Offense"},"content":{"rendered":"<p><strong>Credit to Author: Nathalie Marcotte| Date: Tue, 26 Nov 2019 14:58:46 +0000<\/strong><\/p>\n<p>Cybersecurity is currently facing a tricky paradox. The number of attacks, and attempted attacks, is rapidly growing but as it stands, companies are struggling to adapt the right approaches in both their technology and employee education.\u00a0 Rapid growth in the number of connected devices and the promise of value from the IIoT makes effective cybersecurity mandatory, not optional.<\/p>\n<p>As I said at Innovation Summit Barcelona, it\u2019s important that we identify the challenges with cybersecurity and then look at some of the best tools and processes companies can adopt.<\/p>\n<p><strong>Recognizing the problems<\/strong><\/p>\n<p>The numbers around cybersecurity are extremely interesting, we see:<\/p>\n<ul>\n<li>An increase in security breaches of<strong> 67% <\/strong>over the last five year<\/li>\n<li>A ransomware attack occurring <strong>every 14 seconds<\/strong><\/li>\n<li><strong>22%<\/strong> of security issues stemming from outdated and unpatched software<\/li>\n<\/ul>\n<p>But at the same time, figures also show:<\/p>\n<ul>\n<li><strong>Only 2% <\/strong>of IT budgets are used for security<\/li>\n<li><strong>70%<\/strong> of employees don\u2019t understand cybersecurity<\/li>\n<\/ul>\n<p><strong>(Source: <\/strong><a href=\"https:\/\/www.thesslstore.com\/blog\/80-eye-opening-cyber-security-statistics-for-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.thesslstore.com\/blog\/80-eye-opening-cyber-security-statistics-for-2019\/<\/a>)<\/p>\n<p>This tells us that, on one hand, everywhere you look there is an increased cybersecurity threat. On the other hand, there is some latency in addressing the challenge \u2013 so it seems there is a need for all of us to really start taking action.<\/p>\n<p>Why is this so important? The average cost of a breach is $3.8 million, but we have seen some global companies spend more than $100 million reacting to a breach and fixing customer issues. And that\u2019s just the financial cost. \u00a0On top of this, firms suffer from a major impact on their reputation in the market place as well as customer confidence.<\/p>\n<p><strong>Act now before it\u2019s too late<\/strong><\/p>\n<p>This is already a major challenge for many companies, and it\u2019s only going to get worse if action is not taken. As our Chairman &amp; CEO John-Pascal Tricoire mentioned during his <a href=\"https:\/\/www.youtube.com\/watch?v=wyjfWqMWeK4\" target=\"_blank\" rel=\"noopener noreferrer\">keynote speech in Barcelona<\/a>, the world is about to see its 200 billionth connected device, that\u2019s 26 per individual on the planet. If we want to benefit from this and get the value from all that connectivity, we need cybersecurity as an enablement for us to really take advantage of all the promises of the IoT and digital. It\u2019s no longer a question of competitive advantage or minimizing the damage, it\u2019s a fundamental requirement of doing business.<\/p>\n<p><strong>Cybersecurity defense requires a strong offence<\/strong><\/p>\n<p>Going forward, we really need to be proactive and take some actions to lead in terms of an offensive approach. And it\u2019s with this in mind that we at Schneider believe we can support our customers in their <a href=\"https:\/\/www.se.com\/ww\/en\/work\/solutions\/cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">cybersecurity journeys<\/a>.<\/p>\n<p>Of course, training is up to the employer. But on the technology side of things, we believe it is an end-to-end challenge. The first way we can protect our clients is making sure all our technology is cybersecure by design \u2013 and we have a team that works across all of our technology to ensure this is the case. We do rigorous testing and the team has the authority to say no to a product going to market if they believe there are still some vulnerabilities to be fixed.<\/p>\n<p>Secondly, when our team goes to customer sites, we make sure our service and engineer teams know the standard cybersecurity practices \u2013 is the system is patched at the right level, what is the customer\u2019s cybersecurity process, and how can we make sure we are delivering the system with basic cybersecurity best practices in mind.<\/p>\n<p>The last piece of the puzzle is to make sure our solution reduces the cybersecurity risk throughout the whole operation.<\/p>\n<p>This is aligned with our <a href=\"https:\/\/www.schneider-electric.com\/en\/work\/campaign\/innovation\/overview.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">EcoStruxure story<\/a>. Our system architecture and platform consist of three layers of solutions \u2013 Connected Products, Edge Control, and Apps, Analytics &amp; Services. Throughout this architecture, we make sure the whole thing is cybersecure end to end.<\/p>\n<p>There is no way to avoid the inevitability of an attack in any business \u2013 which is why employees need to be constantly trained and educated in the best cybersecurity practices. It is important to add, that cybersecurity is always alive and evolving \u2013 it means you can be cybersecure today, but that doesn\u2019t mean you will be tomorrow. But by implementing a cybersecurity culture, including best practices and solutions with inbuilt defenses, companies stand a better chance of fighting off attacks.<\/p>\n<p>For more, I invite you to watch the Expert Learning Session on cybersecurity from Innovation Summit Barcelona, which features insight from myself, Roberto Barbieri the Head of Information Security Operations and Services at Eni, and Mary Ramsey of the International Society of Automation (ISA):<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/f-x-V5dFu24\" width=\"100%\" height=\"420\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" style=\"\"><\/iframe><\/p>\n<p><em>This blog post is part of a series from Innovation Summit Barcelona 2019, a two-day event that brought together more than 3,500 industry professionals, solution experts, and IoT leaders to discuss about global trends, generate bold ideas and foster digital economy. If you want to know more about it, we invite you to read the other posts from this series:<\/em><\/p>\n<ul>\n<li><a href=\"https:\/\/blog.se.com\/building-management\/2019\/10\/21\/re-inventing-buildings-to-be-future-proof\/?utm_source=SE%20Blog&amp;utm_medium=Blog&amp;utm_campaign=Traffic_Initiative_ISB\">Re-inventing buildings to be future-proof<\/a><\/li>\n<li><a href=\"https:\/\/blog.se.com\/datacenter\/2019\/10\/22\/empowering-the-digital-transformation-and-tackling-the-challenges-of-the-edge\/?utm_source=SE%20Blog&amp;utm_medium=Blog&amp;utm_campaign=Traffic_Initiative_ISB\">Empowering the Digital Transformation and Tackling the Challenges of the Edge<\/a><\/li>\n<li><a href=\"https:\/\/blog.se.com\/energy-management-energy-efficiency\/2019\/10\/04\/powering-and-digitizing-the-economy-the-formula-for-a-sustainable-future\/?utm_source=SE%20Blog&amp;utm_medium=Blog&amp;utm_campaign=Traffic_Initiative_ISB\">Powering and digitizing the economy: The formula for a sustainable future<\/a><\/li>\n<li><a href=\"https:\/\/blog.se.com\/building-management\/2019\/10\/23\/making-buildings-efficient-engaging-and-future-ready\/?utm_source=SE%20Blog&amp;utm_medium=Blog&amp;utm_campaign=Traffic_Initiative_ISB\">Making buildings efficient, engaging, and future-ready<\/a><\/li>\n<li><a href=\"https:\/\/blog.se.com\/energy-management-energy-efficiency\/2019\/10\/28\/the-future-is-bright-lets-invent-the-new-electric-world\/?utm_source=SE%20Blog&amp;utm_medium=Blog&amp;utm_campaign=Traffic_Initiative_ISB\">The Future is Bright. Let\u2019s invent the New Electric World!<\/a><\/li>\n<\/ul>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/cyber-security\/2019\/11\/26\/cybersecurity-defense-requires-a-strong-offense\/\">Cybersecurity Defense Requires a Strong Offense<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.se.com\/cyber-security\/2019\/11\/26\/cybersecurity-defense-requires-a-strong-offense\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Nathalie Marcotte| Date: Tue, 26 Nov 2019 14:58:46 +0000<\/strong><\/p>\n<p>Cybersecurity is currently facing a tricky paradox. The number of attacks, and attempted attacks, is rapidly growing but as it stands, companies are struggling to adapt the right approaches in&#8230;  <a href=\"https:\/\/blog.se.com\/cyber-security\/2019\/11\/26\/cybersecurity-defense-requires-a-strong-offense\/\" title=\"ReadCybersecurity Defense Requires a Strong Offense\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/cyber-security\/2019\/11\/26\/cybersecurity-defense-requires-a-strong-offense\/\">Cybersecurity Defense Requires a Strong Offense<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[23565,12608,4500,12432,18263,23236],"class_list":["post-17009","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-customers","tag-cyber-security","tag-cybersecurity","tag-ecostruxure","tag-innovation-summit","tag-innovation-summit-barcelona-2019"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17009"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17009\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17009"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}