{"id":8483,"date":"2017-07-27T15:00:07","date_gmt":"2017-07-27T23:00:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/27\/news-2257\/"},"modified":"2017-07-27T15:00:07","modified_gmt":"2017-07-27T23:00:07","slug":"news-2257","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/07\/27\/news-2257\/","title":{"rendered":"Why Cybersecurity Matters in Food &#038; Beverage?"},"content":{"rendered":"<p><strong>Credit to Author: Marilidia Clotteau| Date: Thu, 27 Jul 2017 22:01:29 +0000<\/strong><\/p>\n<p>May 2017, the world faced one of the most serious cyber-attacks. The Ransomware Wannacry put at risk 200,000 companies spread over 150 countries.<\/p>\n<p>Immediately after, every company, including those in Food &amp; Beverage, started to assess their vulnerabilities and stance regarding their cybersecurity policy.<\/p>\n<p>June 2017, another ransomware, Petya, infected more than 2,000 companies. For the first time, two major Food &amp; Beverage companies announced publicly they have been attacked.<\/p>\n<p>\u201cBecause cyber-attacks on Food and Agriculture sector offer little financial gain and likely pose only minimal economic disruption, the sector does not perceive itself as a target of such an attack\u201d, as stated in the publication <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cHM6Ly93d3cuZGhzLmdvdi9zaXRlcy9kZWZhdWx0L2ZpbGVzL3B1YmxpY2F0aW9ucy9uaXBwLXNzcC1mb29kLWFnLTIwMTUtNTA4LnBkZg%3D%3D&#038;feed-stats-url-post-id=39644\">Food and Agriculture Sector \u2013 Specific Plan (2015).<\/a><\/p>\n<p>So, what is at stake for the Food &amp; Beverage industry and why should cybersecurity matter for F&amp;B companies?<\/p>\n<p><strong>Cost of Cyber-attacks<\/strong><\/p>\n<p>In June 27, an international <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cDovL3d3dy5tb25kZWxlemludGVybmF0aW9uYWwuY29tL25ld3Nyb29tL291ci1zdG9yaWVzL01lZGlhLVN0YXRlbWVudC1HbG9iYWwtT3V0YWdl&#038;feed-stats-url-post-id=39644\">F&amp;B company<\/a> published that it was impacted by the attack. A Few days later, a <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cDovL2lyLm1vbmRlbGV6aW50ZXJuYXRpb25hbC5jb20vcmVsZWFzZWRldGFpbC5jZm0%2FUmVsZWFzZUlEPTEwMzIzODE%3D&#038;feed-stats-url-post-id=39644\">Press Release<\/a> announced the consequences of the attack: a disruption in their ability to ship and invoice during the last days of their second quarter, and a first estimate on revenue impact.<\/p>\n<p>Furthermore, as stated in <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cHM6Ly9zZWN1cmVsaXN0LmNvbS9rYXNwZXJza3ktc2VjdXJpdHktYnVsbGV0aW4tMjAxNi1leGVjdXRpdmUtc3VtbWFyeS83Njg1OC8%3D&#038;feed-stats-url-post-id=39644\">Kaspersky Labs Security Bulletin 2016<\/a>, the longer it takes to detect a security breach, the higher the mitigation costs and the greater the potential damage. From US400,000$ for an instant detection to more than US1.0 Billion$ for a detection taking over a week.<\/p>\n<p>It is clear that cyber-attacks may dramatically impact your business.<\/p>\n<h4><strong>Food Defence Plan<\/strong><\/h4>\n<p>With the implementation of a <strong>Food Defence Plan<\/strong> as part of a Food Safety Management standard, a Threat (or Vulnerability) Assessment Critical Control Point (TACCP) is recommended (<a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cHM6Ly93d3cuZmRhLmdvdi9kb3dubG9hZHMvRm9vZC9HdWlkYW5jZVJlZ3VsYXRpb24vRlNNQS9VQ001MDM1NjYucGRm&#038;feed-stats-url-post-id=39644\">Food Safety Modernization Act Final Rule for Mitigation Strategies to Protect Food Against Intentional Adulteration<\/a>).<\/p>\n<p>Furthermore, in Europe, <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cHM6Ly93d3cuZm9vZC5nb3YudWsvc2l0ZXMvZGVmYXVsdC9maWxlcy9wYXM5Ni0yMDE0LWZvb2QtZHJpbmstcHJvdGVjdGlvbi1ndWlkZS5wZGY%3D&#038;feed-stats-url-post-id=39644\">the PAS96:2014 Guide to Protecting &amp; Defending Food &amp; Drink from Deliberate Attack<\/a>\u00a0states that &#8220;No Process can guarantee that Food &amp; Food Supply are not the target of Criminal Activity&#8221;. \u201cCybercrime\u201d is clearly listed as a potential threat to be addressed.<\/p>\n<h4><strong>Industrial Control Systems\u00a0<\/strong><\/h4>\n<p>Cybersecurity is also a critical topic for <strong><a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cDovL3d3dy5zY2huZWlkZXItZWxlY3RyaWMuY29tL2IyYi9lbi9wcm9kdWN0cy9hdXRvbWF0aW9uLWFuZC1jb250cm9sLmpzcA%3D%3D&#038;feed-stats-url-post-id=39644\">automation<\/a> architectures<\/strong> such as <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cDovL3d3dy5zY2huZWlkZXItZWxlY3RyaWMuY29tL2VuL3Byb2R1Y3QtY2F0ZWdvcnkvMjEwMC1obWktLXRlcm1pbmFscy1hbmQtaW5kdXN0cmlhbC1wYy0v&#038;feed-stats-url-post-id=39644\">HMI<\/a>s (Human Machine Interfaces) and SCADA (Supervisory Control And Data Acquisition) systems. It becomes even more important with increased connectivity, data exchange and the use of Industrial Internet of Things (IIoT). How do you make sure your process data is protected against cyber-attacks? Do your personnel have a general awareness of cybersecurity topics related to the use of such equipment? These are key challenges to answer.<\/p>\n<p> <img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-39645 aligncenter\" src=\"http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/07\/Feature-Picture-300x123.jpg\" alt=\"\" width=\"300\" height=\"123\" srcset=\"http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/07\/Feature-Picture-300x123.jpg 300w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/07\/Feature-Picture-768x314.jpg 768w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/07\/Feature-Picture-1024x418.jpg 1024w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/07\/Feature-Picture.jpg 1440w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/> <\/p>\n<h4><strong>Security Implementation Is a Solution, Not a Product<\/strong><\/h4>\n<p>Security implementation is a combination of many items. It is about understanding the system, the threats and the risks. It involves people, policies, architectures and products.<\/p>\n<p>Of course, it is under vendor\u2019s responsibilities <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cDovL3d3dy5zY2huZWlkZXItZWxlY3RyaWMuY29tL2IyYi9lbi9zdXBwb3J0L2N5YmVyc2VjdXJpdHkvb3ZlcnZpZXcuanNwPw%3D%3D&#038;feed-stats-url-post-id=39644\">to design products and solutions with security features<\/a>, to ensure they enable customers to comply with security standards and to provide recommendations and methodologies to guide implementation. But the end-users need to define security procedures, to mandate responsible people and to ensure compliance with security standards.<\/p>\n<p>Finally, as Industrial security is more than just IT security, a <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cDovL3d3dy5zY2huZWlkZXItZWxlY3RyaWMuY29tL2IyYi9lbi9zZXJ2aWNlcy9maWVsZC1zZXJ2aWNlcy9pbmR1c3RyaWFsLWF1dG9tYXRpb24vaW5kdXN0cmlhbC1jeWJlcnNlY3VyaXR5L2luZHVzdHJpYWwtY3liZXJzZWN1cml0eS5qc3A%3D&#038;feed-stats-url-post-id=39644\">\u201cDefense-in-Depth\u201d<\/a> approach is recommended. This approach underlines that no single item will provide security for your entire system.<\/p>\n<p>In conclusion, the <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cDovL3d3dy5zY2huZWlkZXItZWxlY3RyaWMuY29tL2IyYi9lbi9zb2x1dGlvbnMvZm9yLWJ1c2luZXNzL2Zvb2QtYW5kLWJldmVyYWdlLw%3D%3D&#038;feed-stats-url-post-id=39644\">Food &amp; Beverage industry<\/a> is also vulnerable to cyber-attacks and cyber-threats which increase in complexity. Therefore, cybersecurity policies should be assessed regularly using the evolving regulations and standards as part of your Food Defence Plan.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-39650 aligncenter\" src=\"http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/07\/FB-Cybersecurity-Infography-Picture-PNG-120x300.png\" alt=\"\" width=\"120\" height=\"300\" srcset=\"http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/07\/FB-Cybersecurity-Infography-Picture-PNG-120x300.png 120w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/07\/FB-Cybersecurity-Infography-Picture-PNG-768x1920.png 768w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/07\/FB-Cybersecurity-Infography-Picture-PNG-410x1024.png 410w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/07\/FB-Cybersecurity-Infography-Picture-PNG.png 800w\" sizes=\"auto, (max-width: 120px) 100vw, 120px\" \/>\u00a0<em>To receive our infographic\u00a0\u201cWhy Cybersecurity Matters in F&amp;B\u201d, please contact us at<\/em><strong><em> <a href=\"mailto:SmartFood@schneider-electric.com\">SmartFood@schneider-electric.com<\/a>.<\/em>\u00a0<\/strong><\/p>\n<p><strong>To know more: <\/strong><\/p>\n<ul>\n<li>Download our <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cDovL2Rvd25sb2FkLnNjaG5laWRlci1lbGVjdHJpYy5jb20vZmlsZXM%2FcF9lbkRvY1R5cGU9V2hpdGUrUGFwZXImYW1wO3BfRmlsZV9JZD0xMTY1NTEzMTE0JmFtcDtwX0ZpbGVfTmFtZT05OTgtMjA5NS0wNC0wOS0xMkFSMF9FTi5QREYmYW1wO3BfUmVmZXJlbmNlPTk5OC0yMDk1LTA0LTA5LTEyQVIwX0VO&#038;feed-stats-url-post-id=39644\">White Paper on \u00a0\u201cSCADA security: Challenges &amp; Solutions\u201d<\/a><\/li>\n<li>Check Schneider Electric Post <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cDovL2Jsb2cuc2NobmVpZGVyLWVsZWN0cmljLmNvbS9jeWJlci1zZWN1cml0eS8yMDE3LzA1LzA1L2N5YmVyc2VjdXJpdHktYnVzaW5lc3MtY2FzZS1hcmR1b3VzLWNoYWxsZW5nZS1wYXJ0LTEv&#038;feed-stats-url-post-id=39644\">\u201cThe Cybersecurity Business case: An Arduous Challenge \u2013 Part 1\u201d<\/a><\/li>\n<\/ul>\n<p>  <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.schneider-electric.com\/?feed-stats-post-id=39644\" width=\"1\" height=\"1\" style=\"display: none;\" \/><\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\/food-and-beverage\/2017\/07\/27\/cybersecurity-matters-food-beverage\/\">Why Cybersecurity Matters in Food &amp; Beverage?<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.schneider-electric.com\/food-and-beverage\/2017\/07\/27\/cybersecurity-matters-food-beverage\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Marilidia Clotteau| Date: Thu, 27 Jul 2017 22:01:29 +0000<\/strong><\/p>\n<p>May 2017, the world faced one of the most serious cyber-attacks. The Ransomware Wannacry put at risk 200,000 companies spread over 150 countries. Immediately after, every company, including those in&#8230;  <a href=\"http:\/\/blog.schneider-electric.com\/food-and-beverage\/2017\/07\/27\/cybersecurity-matters-food-beverage\/\" title=\"ReadWhy Cybersecurity Matters in Food &#38; Beverage?\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\/food-and-beverage\/2017\/07\/27\/cybersecurity-matters-food-beverage\/\">Why Cybersecurity Matters in Food &amp; Beverage?<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[6148,12608,12539,12512,12554,11633,12544,12508,12982],"class_list":["post-8483","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-automation","tag-cyber-security","tag-food-and-beverage","tag-iiot","tag-industrial-cybersecurity","tag-infographic","tag-innovation-at-every-level","tag-machine-and-process-management","tag-security-management"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8483"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8483\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8483"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}