{"id":16443,"date":"2019-09-26T11:01:17","date_gmt":"2019-09-26T19:01:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/09\/26\/news-10183\/"},"modified":"2019-09-26T11:01:17","modified_gmt":"2019-09-26T19:01:17","slug":"news-10183","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/09\/26\/news-10183\/","title":{"rendered":"Creating a more secure digital ecosystem by connecting the dots"},"content":{"rendered":"<p><strong>Credit to Author: Christophe Blassiau| Date: Thu, 26 Sep 2019 13:33:37 +0000<\/strong><\/p>\n<p><span data-contrast=\"none\">T<\/span><span data-contrast=\"none\">he essence of digital<\/span><span data-contrast=\"none\">\u00a0<\/span>is\u00a0<span data-contrast=\"none\">accelerating your business<\/span><span data-contrast=\"none\">. <\/span><span data-contrast=\"none\">Digital is about\u00a0<\/span><span data-contrast=\"none\">enabling\u00a0<\/span><span data-contrast=\"none\">connectivity among people\u00a0<\/span><span data-contrast=\"none\">and<\/span><span data-contrast=\"none\">\u00a0processes<\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-contrast=\"none\">It\u2019s about being able to capture the business value of data through\u00a0<\/span><a href=\"https:\/\/ai.se.com\/\"><span data-contrast=\"none\">artificial intelligence<\/span><\/a><span data-contrast=\"none\">, digital twin, blockchain, and other emerging technologies. <\/span><span data-contrast=\"none\">It\u2019s about<\/span><span data-contrast=\"none\">\u00a0pushing forward<\/span><span data-contrast=\"none\">\u00a0innovative R&amp;D that can solve customer problems. And it\u2019s about transforming the customer experience.\u00a0<\/span><span data-contrast=\"none\">All within a secure <a href=\"https:\/\/blog.se.com\/energy-management-energy-efficiency\/2019\/03\/31\/top-3-priorities-industrial-companies-can-drive-within-a-digital-ecosystem\/\">digital ecosystem<\/a>.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\"> S<\/span><span data-contrast=\"none\">o there really is no question about it:<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">being\u00a0<\/span><span data-contrast=\"none\">connected\u00a0<\/span><span data-contrast=\"none\">also means<\/span><span data-contrast=\"none\">\u00a0welcoming the\u00a0<\/span><span data-contrast=\"none\">m<\/span><span data-contrast=\"none\">any\u00a0<\/span><span data-contrast=\"none\">opportunities brought on by <a href=\"https:\/\/blog.se.com\/energy-management-energy-efficiency\/2019\/04\/01\/harnessing-the-power-of-collaboration-to-advance-the-digital-transformation-of-industry\/\">digital Transformation<\/a>. <\/span><span data-contrast=\"none\">Yet many companies understandably\u00a0<\/span><span data-contrast=\"none\">proceed<\/span><span data-contrast=\"none\">\u00a0with caution. <\/span><span data-contrast=\"none\">Why?\u00a0<\/span><\/p>\n<h3><span style=\"color: #3dcd58\" data-contrast=\"none\">&#8220;The IoT landscape is wider than ever, opening the door to a vast cybersecurity attack surface&#8221;<\/span><\/h3>\n<p> <a href=\"https:\/\/twitter.com\/intent\/tweet?text=%22The%20IoT%20landscape%20is%20wider%20than%20ever,%20opening%20the%20door%20to%20a%20vast%20cybersecurity%20attack%20surface%22%20Discover%20more%3A%20https%3A\/\/blog.se.com\/cyber-security\/2019\/09\/27\/creating-a-more-secure-digital-ecosystem-by-connecting-the-dots\/%20%40SchneiderElec%20%23Cybersecurity\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52576 size-full\" src=\"https:\/\/blog.se.com\/wp-content\/uploads\/2018\/11\/CTA-Twitter.png\" alt=\"Click to tweet - Digital Ecosytem by Christophe Blaussiau\" width=\"200\" height=\"20\" \/><\/a> <\/p>\n<p><span data-contrast=\"none\">As Schneider Electric\u2019s\u00a0<\/span><a href=\"https:\/\/blog.schneider-electric.com\/cyber-security\/2018\/06\/12\/3-steps-towards-cybersecurity-in-a-digital-world\/\"><span data-contrast=\"none\">Chief Digital Officer Herv\u00e9 Coureil has explained<\/span><\/a><span data-contrast=\"none\">, there is no perimeter.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-contrast=\"none\">Strengt<\/span><span data-contrast=\"none\">h<\/span><span data-contrast=\"none\">ening\u00a0<\/span><span data-contrast=\"none\">security<\/span><span data-contrast=\"none\">\u00a0across your end-to-end digital ecosystem, therefore, is key to driving and acceleration digital transformation.\u00a0<\/span><span data-contrast=\"none\">It is the guarantee that we\u00a0<\/span><span data-contrast=\"none\">all\u00a0<\/span><span data-contrast=\"none\">can grow in the digital world.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">But you need a clear cyber roadmap<\/span><span data-contrast=\"none\">:\u00a0<\/span><span data-contrast=\"none\">a strategy that connects<\/span><span data-contrast=\"none\">\u00a0the dots across your\u00a0<\/span><span data-contrast=\"none\">digital<\/span><span data-contrast=\"none\">\u00a0ecosystem<\/span><span data-contrast=\"none\">.<\/span><span data-contrast=\"none\">\u00a0There are two levels of this:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"21\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Establishing a\u00a0<\/span><a href=\"https:\/\/www.schneider-electric.com\/en\/download\/document\/998-20244304\/\"><span data-contrast=\"none\">multi-layered cybersecurity posture<\/span><\/a><span data-contrast=\"none\">\u00a0throughout your\u00a0<\/span><span data-contrast=\"none\">own company<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"21\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Securing\u00a0<\/span><span data-contrast=\"none\">a<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">broad ecosystem\u00a0<\/span><span data-contrast=\"none\">that comprises<\/span><span data-contrast=\"none\"> partners, suppliers, and customer deployments<br \/> <\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\"><br \/> <\/span><\/li>\n<\/ul>\n<p><span style=\"color: #3dcd58\"><b>Securing the interconnected digital ecosystem with a collaborative approach<\/b>\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Being a trustworthy curator of global cybersecurity depends on collaboration\u00a0<\/span><span data-contrast=\"none\">in order to<\/span><span data-contrast=\"none\">:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Leverage\u00a0<\/span><span data-contrast=\"none\">partner\u00a0<\/span><span data-contrast=\"none\">expertise everywhere (e.g., IT\/OT convergence, security operations monitoring, AI-driven cyber solutions, cyber services, etc<\/span><span data-contrast=\"none\">.<\/span><span data-contrast=\"none\">)<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Challenge all suppliers to meet cybersecurity standards<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"none\">Develop digital solutions with embedded cybersecurity designs\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"22\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"none\">Lead a cybersecurity mindset and culture\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"none\">Learn from\u00a0<\/span><a href=\"https:\/\/www.schneider-electric.com\/en\/work\/support\/cybersecurity\/security-notifications.jsp\"><span data-contrast=\"none\">any and every incident<\/span><\/a><span data-contrast=\"none\">\u00a0and share insights with customers and partners<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\"><br \/> <\/span><\/li>\n<\/ul>\n<h3><span style=\"color: #3dcd58\">&#8220;Schneider collaborates with cyber partners to secure our end-to-end digital ecosystem and supply chain, including our own factories&#8221;<\/span><\/h3>\n<p> <a href=\"https:\/\/twitter.com\/intent\/tweet?text=%22Schneider%20collaborates%20with%20cyber%20partners%20to%20secure%20our%20end-to-end%20digital%20ecosystem%20and%20supply%20chain,%20including%20our%20own%20factories%22%20Discover%20more%3A%20https%3A\/\/blog.se.com\/cyber-security\/2019\/09\/27\/creating-a-more-secure-digital-ecosystem-by-connecting-the-dots\/%20%40SchneiderElec%20%23Cybersecurity\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-52576 size-full\" src=\"https:\/\/blog.se.com\/wp-content\/uploads\/2018\/11\/CTA-Twitter.png\" alt=\"Click to tweet - Digital Ecosytem by Christophe Blaussiau\" width=\"200\" height=\"20\" \/><\/a> <\/p>\n<p><span data-contrast=\"none\">We leverage common frameworks (i.e., the NIST framework to Identify risks, Protect against threats, Detect threats, Respond quickly, and Recover by building cyber resilience) and standards (<\/span><span data-contrast=\"none\">e.g<\/span><span data-contrast=\"none\">,\u00a0<\/span><span data-contrast=\"none\">ISA\/IEC\u202f62443<\/span><span data-contrast=\"none\">\u00a0cybersecurity certifications)<\/span><span data-contrast=\"none\">\u00a0to broaden our posture and speak a common language<\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Taking the point of view of customers is critical because it cuts internal siloes and allows us to improve detection capabilities from an external point of view (e.g., from a network perspective) while also being able to<\/span><span data-contrast=\"none\">\u00a0transparently and clearly<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">discuss<\/span><span data-contrast=\"none\">\u00a0cybersecurity needs with both customers and suppliers.<\/span><span data-contrast=\"none\">\u00a0Being customer-centric heightens risk awareness and fortifies digital trust.<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Collaboration\u00a0<\/span><span data-contrast=\"auto\">also involves\u00a0<\/span><span data-contrast=\"auto\">serving the global cybersecurity community as well.\u00a0<\/span><span data-contrast=\"auto\">For example, we contributed our Cybersecurity by Design best practices in the recent\u00a0<\/span><a href=\"http:\/\/www3.weforum.org\/docs\/WEF_Cyber_Resilience_in_the_Electricity_Ecosystem.pdf\"><span data-contrast=\"none\">World Economic Forum Report:\u00a0<\/span><span data-contrast=\"none\">Cyber Resilience in the Electricity Ecosystem<\/span><\/a><span data-contrast=\"auto\">, which offers principles and guidance for boards within the electricity industry.\u00a0<\/span><span data-contrast=\"auto\">We also became a member of the\u00a0<\/span><a href=\"https:\/\/www.schneider-electric.com\/ww\/en\/documents\/Press\/2019\/03\/04-release-cybersecurity-coalition-tcm50-463982.pdf\"><span data-contrast=\"none\">Cybersecurity Coalition<\/span><\/a><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">and\u00a0<\/span><span data-contrast=\"none\">a\u00a0<\/span><a href=\"https:\/\/www.schneider-electric.com\/en\/about-us\/press\/news\/corporate-2019\/founding-member-of-isa-global-cybersecurity-alliance.jsp\"><span data-contrast=\"none\">founding member of the ISA Global Cybersecurity Alliance<\/span><\/a><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"auto\">to affirm our role in securing the global digital economy.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #3dcd58\"><b>From blaming<\/b><b>\u00a0<\/b><b>to learning<\/b><b>\u00a0together<\/b>\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In our\u00a0<\/span><span data-contrast=\"none\">shared\u00a0<\/span><span data-contrast=\"none\">cyber reality, f<\/span><span data-contrast=\"none\">ast response<\/span><span data-contrast=\"none\">\u00a0is the name of the game<\/span><span data-contrast=\"none\">. The first step is broadening visibility. For example, partnering with\u00a0<\/span><a href=\"https:\/\/www.schneider-electric.com\/en\/about-us\/press\/news\/2017\/safety-cybersecurity-claroty-partner.jsp\"><span data-contrast=\"none\">Claroty<\/span><\/a><span data-contrast=\"none\">\u00a0to secure our own factories lets us know when to scrutinize anomalous behavior\u00a0<\/span><span data-contrast=\"none\">and\u00a0<\/span><span data-contrast=\"none\">event\u00a0<\/span><span data-contrast=\"none\">signals\u00a0<\/span><span data-contrast=\"none\">along the OT infrastructure.\u00a0<\/span><span data-contrast=\"none\">\u00a0As part of our rapid response strategy, we connect\u00a0<\/span><span data-contrast=\"none\">even more\u00a0<\/span><span data-contrast=\"none\">dots with customers by integrating analysis of the customer voice to detect and address anything related to security issues. We train our customer center agents to be cyber-aware, contacting our Security Operations Center about any raised flags or early signals. Time is of the essence.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">For the greater good of our shared digital economy worldwide, strengthening cyber resiliency by learning together \u2014\u00a0<\/span>instead of\u00a0defensive\u00a0blaming<span data-contrast=\"none\">\u2014 is the best way to improve our security posture continuously.\u00a0<\/span><span data-contrast=\"none\">And communicating risk awareness is\u00a0<\/span><span data-contrast=\"none\">how we all can<\/span><span data-contrast=\"none\">\u00a0navigate obstacles and avoid roadblocks<\/span><span data-contrast=\"none\">\u00a0together<\/span><span data-contrast=\"none\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #3dcd58\"><b>Conclusion: A more secure digital landscape leveraging trust and learning<\/b>\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Digital trust depends on<\/span><span data-contrast=\"none\">\u00a0establishing<\/span><span data-contrast=\"none\">\u00a0an\u00a0<\/span><span data-contrast=\"none\">inherently cyber-aware culture with strong cyber citizens across the landscape. The starting point is risk awareness \u2014 not as an academic exercise but a way to infuse security in the digital DNA of Schneider\u2019s end-to-end digital ecosystem. From there, the digital journey can move full speed ahead, logging the milestones of improved efficiency, increased productivity, long-term sustainability, and strong business growth along the way.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:200,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p> <a href=\"https:\/\/go.schneider-electric.com\/US_201909_Cybersecurity-Strategy-e-guide_EA-LP.html?source=Content&amp;sDetail=Cybersecurity-Strategy-e-guide_US\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-60502\" src=\"https:\/\/blog.se.com\/wp-content\/uploads\/2019\/09\/CTA-Blog_Cybersecurity-eguide-1-2.png\" alt=\"CTA Blog_Cybersecurity eguide (1)\" width=\"560\" height=\"150\" srcset=\"https:\/\/blog.se.com\/wp-content\/uploads\/2019\/09\/CTA-Blog_Cybersecurity-eguide-1-2.png 560w, https:\/\/blog.se.com\/wp-content\/uploads\/2019\/09\/CTA-Blog_Cybersecurity-eguide-1-2-300x80.png 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a> <\/p>\n<p>&nbsp;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/cyber-security\/2019\/09\/26\/creating-a-more-secure-digital-ecosystem-by-connecting-the-dots\/\">Creating a more secure digital ecosystem by connecting the dots<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.se.com\/cyber-security\/2019\/09\/26\/creating-a-more-secure-digital-ecosystem-by-connecting-the-dots\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christophe Blassiau| Date: Thu, 26 Sep 2019 13:33:37 +0000<\/strong><\/p>\n<p>The essence of digital\u00a0is\u00a0accelerating your business. Digital is about\u00a0enabling\u00a0connectivity among people\u00a0and\u00a0processes.\u00a0It\u2019s about being able to capture the business value of data through\u00a0artificial intelligence, digital twin, blockchain, and other emerging technologies&#8230;.  <a href=\"https:\/\/blog.se.com\/cyber-security\/2019\/09\/26\/creating-a-more-secure-digital-ecosystem-by-connecting-the-dots\/\" title=\"ReadCreating a more secure digital ecosystem by connecting the dots\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/cyber-security\/2019\/09\/26\/creating-a-more-secure-digital-ecosystem-by-connecting-the-dots\/\">Creating a more secure digital ecosystem by connecting the dots<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[11113,11526,12608,4500,23065,23062,12540,23064,13722,23066,20750,10495,23067,714],"class_list":["post-16443","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-artificial-intelligence","tag-blockchain","tag-cyber-security","tag-cybersecurity","tag-cybersecurity-coalition","tag-digital-ecosystem","tag-digital-transformation","tag-digital-trust","tag-digital-twin","tag-embedded-cybersecurity-designs","tag-emerging-technologies","tag-iot","tag-secure-digital-ecosystem","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16443"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16443\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}