VOITTAVA KYBERSTRATEGIA Jarno Limnéll
What the Rise of Industrial
Internet Means for
Professor, Cyber Security
Technology is developing faster than security:
Industrial Internet of Threats?
Intellectual challenge to minds and machines
SECURITY ENVIRONMENT –
PHYSICAL AND DIGITAL
– IS MORE UNCERTAIN, DYNAMIC AND
MORE DEMANDING THAN EVER
– one example
There are usually two
wrong premises in
Cybersecurity is enabler – protecting all
the good things that cyber insecurity can
prevent us doing.
But yes – lack of security can be a “show
stopper” to Industrial Internet.
Industrial Internet will rise or fall
because of security.
Security cannot be an after thought
Too strong technological-orientated
approach to cyber security
Cybersecurity is primarily a strategic issue
Biggest security challenge in IIoT:
Succeeding in the IIoT era will depend on
defining and deploying not only the right
cybersecurity technologies, but also the
right policies and operations. And people.
Tietotekniikka, tietoturva, tietosuoja,
“Cyber” appeared 2010
Concepts are unstable
Continuity Management – Anticipation – Perception
Confidentiality – Integrity – Availability
Cyber security = Security of the digital domain.
Megatrend: Digital and physical security more integrated
Framework of Security, connecting
Physical and Cyber Domains
Physical attacks in data
centers or telecom cables
Prevention or changing the
functionalities in control
Key elements of the Industrial Internet
The concept is simple: making industrial machines smarter,
through the adoption of sensors, software and big data analytics.
Why Industrial Internet requires new thinking about
Mainly because of the huge level of data sharing
involved – to address access to and deployment of
this shared data.
Who are the bad guys – and their
Security in Industrial Internet is multi-layered strategy
encompassing people, processes, devices, sensors,
machines, systems and networks.
Complicated manifold – many subcontractors.
All from the same hatch (integration):
Automation, analytics, education, cybersecurity…
To whom you can trust?
Building the defense inside and outside
of the walls.
Even if you have…
Realized that you are a target
Done everything by the book
Had acknowledged that raising awareness of all
IT system users around cyber security is essential.
The cyber security team feel confident that all
systems are protected…
Smart players in the
field are moving from
a traditional framework
of defense to an approach
The importance of educating people.