{"id":17821,"date":"2020-02-25T11:00:07","date_gmt":"2020-02-25T19:00:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/25\/news-11554\/"},"modified":"2020-02-25T11:00:07","modified_gmt":"2020-02-25T19:00:07","slug":"news-11554","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/25\/news-11554\/","title":{"rendered":"Effective cybersecurity solutions and the Cybersecurity Tech Accord"},"content":{"rendered":"<p><strong>Credit to Author: Christophe Blassiau| Date: Tue, 25 Feb 2020 09:46:06 +0000<\/strong><\/p>\n<p>Earlier today, Schneider Electric joined more than a hundred other industry thought leaders and forward thinkers as a signatory to the <a href=\"https:\/\/www.schneider-electric.us\/en\/about-us\/press-us\/2020\/cybersecurity-tech-accord.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Tech Accord<\/a>. Like us, these companies are committed to the <a href=\"https:\/\/cybertechaccord.org\/accord\/\" target=\"_blank\" rel=\"noopener noreferrer\">fundamental principles<\/a> that encourage and guide deeper, more productive conversations among the stakeholders who are responsible for cybersecurity solutions for our digital economy and ecosystem. Among these principles, Cybersecurity Tech Accord signatories have agreed to \u201cpartner with each other and with likeminded groups to enhance cybersecurity,\u201d which is music to our ears.<\/p>\n<p>Almost daily we see that taking on new, innovative and increasingly dangerous threats can\u2019t be limited to a single company, industry or region. When it comes to cybersecurity, many companies are very conservative&#8211; sometimes for good reasons&#8211; but that needs to change. At Schneider Electric, we believe the most effective way to change global cyber culture is to encourage a <a href=\"https:\/\/blog.se.com\/machine-and-process-management\/2019\/07\/26\/the-isa-global-cybersecurity-alliance-heeding-the-need-for-collaboration-acting-as-agents-of-change\/\" target=\"_blank\" rel=\"noopener noreferrer\">collaborative approach<\/a>.<\/p>\n<p>Our approach is simple. We will collaborate to:<\/p>\n<ul>\n<li><strong>Educate<\/strong> <strong>the ecosystem<\/strong>: It is an economic and social imperative to improve awareness and upgrade the technology skills necessary to take on increasingly complex, diverse threats.<\/li>\n<li><strong>Secure the value chain<\/strong>: We start on the home front to improve our company\u2019s posture and then help others to extend the same level of security vigilance across the ecosystem (from the enterprise to suppliers to partners).<\/li>\n<li><strong>Achieve systemic impact and change:<\/strong> By engaging global to local, across industries, NGOs and government stakeholders, we seek to influence and help you stake a claim on the cybersecurity frontier.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #3dcd58\"><strong>Bringing together people, processes and technology to enable cybersecurity solutions<\/strong><\/span><\/h3>\n<p>First, the best cyber defense is an educated and aware workforce. We believe in empowering employees, who are at the front lines of securing the new electric world. Establishing this \u201cwe\u201d culture helps to connect the dots across the enterprise, fill gaps and maintain always-on vigilance. In many cases, people are the first and last lines of protection. But it\u2019s not enough to have user manuals sitting on a shelf. This is about developing a proactive \u201call for one, one for all\u201d culture. Schneider Electric embeds cybersecurity into our operations, from design to manufacturing, from delivery and commissioning to maintenance and operating. To do that, it takes the enterprise&#8211; everyone, everywhere&#8211; to accept responsibility for cybersecurity. This also means bringing IT and OT together so they can help the entire facility or organization&#8211; not just an area, a function or individual team&#8211; be as secure as possible. This where the \u201csecure-by-design\u201d approach cuts across <a href=\"https:\/\/www.schneider-electric.com\/en\/work\/campaign\/innovation\/overview.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">our IoT-enabled EcoStruxure<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/12.0.0-1\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><\/a> architecture. It ensures both IT and OT stakeholders have a seat at the cyber-strategy table so we can drive digital transformation with a strong cybersecurity posture in focus at all times. To learn more about creating this cyber culture, including use cases, you can check out our <a href=\"https:\/\/go.schneider-electric.com\/US_201909_Cybersecurity-Strategy-e-guide_EA-LP.html?source=Content&amp;sDetail=Cybersecurity-Strategy-e-guide_US\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cBuilding a Cybersecurity Strategy\u201d<\/a> e-guide.<\/p>\n<p>Second, one of the surest ways to identify and eliminate cyber risks is to establish and adhere to robust, standards-based best practices and processes. This will ensure management and governance of the most critical levers that ensure business continuity. For any company, a perimeter defense is not enough. Because everyone is connected <em>constantly&#8211; <\/em>from our homes to our smartphones and across the distributed enterprise network&#8211; a layered approach is essential. For example, the <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noopener noreferrer\">NIST framework<\/a>, an incredibly useful reference, defines different levels of defense, from identifying risks to recovering from incidents (resilience). For us, cybersecurity solutions cut across silos, divisions and business units and goes through consistent, regular risk and threat assessments and gap analyses.<\/p>\n<p>Third, while it is not a silver bullet, technology is crucial. Digital offers, platforms, products and industrial equipment allow prevention, detection and response at scale, for example through partners like <a href=\"https:\/\/www.se.com\/fr\/fr\/download\/document\/998-20728901_20191230_AR0\/\" target=\"_blank\" rel=\"noopener noreferrer\">Claroty<\/a>, whose OT monitoring helps us better protect our customers\u2019 environments. In addition to advanced automation technologies, we offer OEMs such as <a href=\"https:\/\/www.se.com\/ww\/en\/work\/campaign\/life-is-on\/case-study\/berto-coffee-roaster.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Berto Coffee Roaster<\/a> EcoStruxure<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/12.0.0-1\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> Machine Advisor, a cloud-connected service that delivers <a href=\"https:\/\/www.se.com\/us\/en\/work\/services\/field-services\/industrial-automation\/oem\/machine-advisor.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">remote monitoring capabilities<\/a> for Berto\u2019s specialized roasting machines. Plus connected digital services based on data provide the ability to monitor fleets of specialized machines worldwide, competitively grow the OEM service business and even enable the pivot toward new business models such as machine\/equipment uptime-as-a-service models.<\/p>\n<p>Similarly, through <a href=\"https:\/\/exchange.se.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Schneider Electric Exchange<\/a> (our digital business platform and ecosystem), everyone is able create, collaborate and scale new offers, including in the cybersecurity space. For example, <a href=\"https:\/\/exchange.se.com\/collaborate\/service-providers\/001A000000f5p7PIAQ\/BASE%2BSISTEMAS%2BY%2BSUMINISTROS%2BS.A\" target=\"_blank\" rel=\"noopener noreferrer\">Base Sistemas<\/a> was seeking defensive cybersecurity measures for its client\u2019s global petrochemical plants. Through Schneider Electric Exchange, Base Sistemas was connected with <a href=\"https:\/\/shop.exchange.se.com\/apps\/44917\/mercury\" target=\"_blank\" rel=\"noopener noreferrer\">Enigmedia<\/a>, whose cybersecurity offer closed the deal, and they were seamlessly connected.<\/p>\n<h3><span style=\"color: #3dcd58\"><strong>Our collaborative momentum with the Cybersecurity Tech Accord<\/strong><\/span><\/h3>\n<p>As you can see, we firmly believe that succeeding as a digital company requires working across an extended, open, digital ecosystem. Schneider Electric is proud to be a founding member of the <a href=\"https:\/\/www.se.com\/ww\/en\/about-us\/press\/news\/corporate-2019\/founding-member-of-isa-global-cybersecurity-alliance.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">ISA Global Cybersecurity Alliance<\/a>; we\u2019re proud to be a member of the <a href=\"https:\/\/www.marketwatch.com\/press-release\/schneider-electric-joins-the-cybersecurity-coalition-2019-03-16\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Coalition<\/a>; and today we are especially proud to be a signatory to the Cybersecurity Tech Accord.<\/p>\n<p>Alongside us in this endeavor are some prominent partners, such as <a href=\"https:\/\/www.se.com\/ww\/en\/partners\/alliances\/cisco.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco<\/a> and <a href=\"https:\/\/www.se.com\/ww\/en\/partners\/alliances\/microsoft.jsp\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a>, who have been at the forefront of cybersecurity innovation, from the edge to the cloud. Working together with these and other ecosystem partners allows us to <a href=\"https:\/\/blog.se.com\/cyber-security\/2019\/03\/25\/3-lessons-from-it-security-for-industrial-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">improve security for IT \/ OT convergence<\/a> by applying IT best-practices and transferring to OT applications.<\/p>\n<blockquote>\n<p>&#8220;Today, as we celebrate becoming one the newest signatories to the Cybersecurity Tech Accord, we encourage everyone to join this commitment to transparency and collaboration.&#8221;<\/p>\n<\/blockquote>\n<p> <a href=\"https:\/\/twitter.com\/intent\/tweet?text=Today,%20as%20we%20celebrate%20becoming%20one%20the%20newest%20signatories%20to%20the%20Cybersecurity%20Tech%20Accord,%20we%20encourage%20everyone%20to%20join%20this%20commitment%20to%20transparency%20and%20collaboration.%20Discover%20more%20from%20Christophe%20Blassiau%3A%20https%3A\/\/bit.ly\/2T2Px8B%20%40SchneiderElec\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-63418 size-full\" src=\"https:\/\/blog.se.com\/wp-content\/uploads\/2020\/01\/CTA-Twitter.png\" alt=\"Click to Tweet\" width=\"200\" height=\"20\" \/><\/a> <\/p>\n<p>&nbsp;<\/p>\n<p>Not only will we drive needed change, together we will develop the next-gen tools, skills and methods we need to secure and protect the digital economy.<\/p>\n<p>If you would like to learn more about how cybersecurity solutions and collaboration can and should be a part of your digital strategy, I invite you to take part in our virtual event, <a href=\"https:\/\/vshow.on24.com\/vshow\/SchneiderCyberVA\/exhibits\/LiveDay1\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Summit 2020<\/a>, with multiple sessions on a range of cybersecurity topics. \u00a0Join me and a host of other industry leaders and partners on March 17, 2020, as we discuss how strengthening security across your ecosystem is critical to your successful digital transformation. For more details and to register, please visit our <a href=\"https:\/\/vshow.on24.com\/vshow\/SchneiderCyberVA\/exhibits\/LiveDay1\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Virtual Academy<\/a>. I look forward to speaking with you then!<\/p>\n<p>&nbsp;<\/p>\n<p> <a href=\"https:\/\/go.schneider-electric.com\/US_201909_Cybersecurity-Strategy-e-guide_EA-LP.html?source=Content&amp;sDetail=Cybersecurity-Strategy-e-guide_US\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-64311\" src=\"https:\/\/blog.se.com\/wp-content\/uploads\/2020\/02\/CTA-Blog_Cybersecurity-eguide.png\" alt=\"CTA-Blog_Cybersecurity-eguide\" width=\"554\" height=\"150\" srcset=\"https:\/\/blog.se.com\/wp-content\/uploads\/2020\/02\/CTA-Blog_Cybersecurity-eguide.png 554w, https:\/\/blog.se.com\/wp-content\/uploads\/2020\/02\/CTA-Blog_Cybersecurity-eguide-300x81.png 300w\" sizes=\"auto, (max-width: 554px) 100vw, 554px\" \/><\/a> <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/cyber-security\/2020\/02\/25\/effective-cybersecurity-solutions-and-the-cybersecurity-tech-accord\/\">Effective cybersecurity solutions and the Cybersecurity Tech Accord<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.se.com\/cyber-security\/2020\/02\/25\/effective-cybersecurity-solutions-and-the-cybersecurity-tech-accord\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christophe Blassiau| Date: Tue, 25 Feb 2020 09:46:06 +0000<\/strong><\/p>\n<p>Earlier today, Schneider Electric joined more than a hundred other industry thought leaders and forward thinkers as a signatory to the Cybersecurity Tech Accord. Like us, these companies are committed&#8230;  <a href=\"https:\/\/blog.se.com\/cyber-security\/2020\/02\/25\/effective-cybersecurity-solutions-and-the-cybersecurity-tech-accord\/\" title=\"ReadEffective cybersecurity solutions and the Cybersecurity Tech Accord\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/cyber-security\/2020\/02\/25\/effective-cybersecurity-solutions-and-the-cybersecurity-tech-accord\/\">Effective cybersecurity solutions and the Cybersecurity Tech Accord<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[12608,4500,24310,16293,24311,24312],"class_list":["post-17821","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-cyber-security","tag-cybersecurity","tag-cybersecurity-solutions","tag-cybersecurity-strategy","tag-cybersecurity-tech-accord","tag-cybersecurity-tech-accord-signatory"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17821"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17821\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17821"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}