Snapshot Innovation and what is the point of cybersecurity?

Functional security and cybersecurity are practised as "business as usual", so that the digital added value actually pays off. Because it is only with these important components that precisely the resilient foundation stone for the Smart Factory is laid.

The smart factory is turning production into an adaptive as well as fully connected, flexible and autonomous system! How does this work? With the right digital technologies for the company of course! For example, with industry-capable IIoT sensors that act as the “sensory organs” of the smart factory. Or with the help of industrial robots, which carry out certain workflows autonomously or can even vary the performance of specific tasks, within certain limits, depending on sensor information. And there’s a whole lot more!

So, it’s no wonder that numerous companies are already investing heavily in intelligent factory capabilities and that the financing of these capabilities is on the rise. According to a report by GP Bullhound, of the 1,300 venture capital transactions in 2018, a total of 17.4 billion US dollars was invested in smart manufacturing.

Baseline functional safety and cybersecurity

Functional safety and cybersecurity, meanwhile, are practised as “business as usual” so that the digital added value actually pays off. Because only with these important components can the resilient foundation that a Smart Factory requires be laid.

Incidentally: cybersecurity affects our daily lives in a range of different areas; privately as well as professionally. For instance, these days cybersecurity also dominates the agenda in the automotive industry. It is leading to a new quality dimension for cars in terms of autonomous driving, connected car, electric vehicles as well as shared mobility. The World Forum for Harmonization of Vehicle Regulations, which reports to the United Nations Economic Commission for Europe (United Nations Economic Commission for Europe), is planning to publish new regulations on cybersecurity: ISO/SAE 21434 “Road vehicles – Cybersecurity engineering”; ISO/AWI 24089 “Road vehicles — Software update engineering”. This will establish detailed transposal guidelines with a view towards implementing the requirements in concrete operational practices. Starting from the organisational and procedural requirement for the entire lifecycle of a vehicle through to development or production as well as service with a focus on cybersecurity.

Cybersecurity – Taking responsibility: absolutely vital

First, a brief digression on this topic. Taking responsibility for something means independently making decisions within a defined framework in the interests of the corporate goals. With the right tools and the right attitude this is not a problem. So, responsibility is effectively synonymous with clarity over the responsibility for certain tasks as well as with the associated decision-making freedom for a constructive and solution-oriented collaboration in teams as part of projects.

In connection with cybersecurity, this means that there is no place for intuitive “lax” decisions. Relevant international as well as national regulations, which must be complied with, exist for this purpose. For professional risk management and company resilience it is important that decisions are reached conscientiously. And that they are underpinned by solid and profound decision-making bases. This requires an understanding of the company’s assets, where they occur and, ultimately, the value they provide for the company.

Cybersecurity assessments – Knowledge and control of your own infrastructure

Cybersecurity assessments act as a magnifying glass in this respect and provide valuable, detailed insights into the infrastructure that exists within a company. First, information is collected about the infrastructure and the necessary access for data collection and data analysis is defined. In the data collection phase, the assets are catalogued using appropriate tools, based on questionnaires and interviews with key persons. In addition, inventory data, usage information and licence authorisations as well as information for recommendations, which are generated from the cybersecurity assessment, are collected.

The data analysis phase involves the analysis and validation of all the collected data. This then enables a relatively straightforward appraisal of the current level of maturity of the cybersecurity based on international and national regulations. Finally, the results are compiled – any weaknesses in the complex infrastructure are defined and the impacts of potential threats illustrated. This is followed by recommendations for the next necessary, targeted cybersecurity measures.

It is impossible to eliminate risks entirely

The right decision-making basis, the cybersecurity assessment, makes it possible to minimise and at least control risks. In light of this, it is more important than ever before to take responsibility for cybersecurity.

Minimise risks – Maximise value: with cybersecurity management

Our cybersecurity management will allow you to strengthen the resilience of your company and achieve sustainable value enhancement. Would you like to put your business resilience under the microscope. And pave the way for the use of innovative smart technologies? Then we should start with a Smart Cybersecurity Assessment. The most important aspects that this highlights include physical security, network security, host-based security, access & use control, disaster recovery and organisational security.

Do you have any feedback or questions on the topic? We would be pleased to hear from you!

It is not only for what we do that we are held responsible, but also for what we do not do.
Molière, French playwright and actor. * 15/01/1622, † 17/02/1673

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top