Cybersecurity Lifecycle Management

What is Yokogawa’s lifecycle approach for cybersecurity?

Yokogawa’s cybersecurity services take a lifecycle approach to help customers control the security risks and manage them to achieve the highest business continuity plan throughout the plant’s entire lifecycle. We focus on long-term lifecycle services while understanding customers' challenges and working continuously for improvements in a close partnership. Yokogawa follows one overall objective: to minimize risk and maximize corporate values according to our self-commitment as a lifecycle value partner. We aim to become your #1 trusted partner and achieve long-term, stable, and secure operations.

Yokogawa is seeing customer's plant as important as a human body.

 

Implementing a Security Program

Taking a lifecycle perspective, Yokogawa’s Security Program delivers resilient cybersecurity services and solutions to reduce cyber risks in the customers' ICS environment. The program combines over 100 years of expertise in industrial automation, best practices in cybersecurity architecture design, and plant operations knowledge to ensure safe and secure operation, which is the paramount priority for our customers and Yokogawa.


Security Program

 

Despite the best cyber defenses, human error leads to many cyber incidents, due to a lack of cybersecurity knowledge and awareness.

Adopting a risk-based approach allows you to assess the strengths and weaknesses of security decisions within a complex operational environment. 

Cybersecurity policies and procedures are fundamental to define the security goals of the organization and describe the workflows to achieve these goals.

The important question when developing a business case is: 'How much money should be invested in cybersecurity to achieve an acceptable risk level?' 

A well-designed and hassle-free implementation of security countermeasures is one of the key measures in minimizing the cyber risks and maximizing the plant uptime.

Timely implementation of security updates and continuous monitoring of security performance solve the fundamental challenge of keeping plant security at highest level.

Table of Contents

  1. Customers Challenges
  2. Our Solutions
  3. Customers Benefits

Customers Challenges

A recent FM Global Survey of 200 business leaders at Fortune 500-size organizations found 84% of them categorize a cyber-attack on industrial control systems as a “major concern” for their business. Read FM Global survey


For over a decade, cybersecurity has become a significant factor in the overall risk management for industrial installations, process plants, and other critical assets (i.e. sensors, motors, and other control devices). Among our customers, there is a wide understanding of the potential benefits of the IIoT (Industrial Internet of Things), Cloud, and Industry 4.0 transforming operations bringing industry innovations, better products, smarter services, and higher work efficiency. At the same time, posing cybersecurity risks for safety and business continuity has challenged customers to open a new digitalized world securely.

customer challenge

Our Solutions

Yokogawa always supports our customers to achieve the Cybersecurity Lifecycle Management at the heart of Sustainable Growth Strategy.

IT and OT have converged in today's industrial control system environments and there is an even greater need for a common understanding between all those who support or rely on these systems.
Hence, Yokogawa delivers a complete industrial security program across the customers’ entire organization, from the corporate level to plant sites.

Delivering Services in Security program
Yokogawa’s comprehensive security program provides a portfolio of security services which will support the customer’s security journey to achieve the best working cyber risk management. Please visit each webpage for detailed solutions and services.
The program offers a total of six phases pursuing the Plan-Do-Check-Act cycle continuously.

  1. Awareness & Training
    To keep educating and uphold awareness among employees about cybersecurity knowledge for correct decision making. Read more details
  2. Risk Assessment
    To identify the existing security risks in a prioritized order based on system vulnerabilities and incident impact levels. Read more details
  3. Policies & Procedures
    To define the most practical policies and procedures for avoiding any gap between three main pillars-people, processes, and applied technology at the site. Read more details
  4. Business Cases Development
    To create the investment business case and build a security roadmap plan for the mid to long term considering the budget and achievable goals. Read more details
  5. Design & Implementation phase
    To implement defense-in-depth security countermeasures for keeping the operation availability at the highest level. Read more details
  6. Managed Service phase
    To implement enterprise-wide security managed services for timely monitoring, protection, and response at the first view. Read more details
security program

Customers Benefits

Yokogawa’s Cybersecurity Lifecycle Management is a comprehensive security suite of indispensable solutions for the sustainability and efficiency of your control system.

  • Security Program will align and improve the capabilities of the plant’s key elements-people, process, and technology to reduce the cybersecurity risk. It helps to overcome the great challenge of closing the gap between these three key elements.
  • A developed security roadmap will support companies to create a mid to long term plan on how to carry on the security program for their plant and how to implement countermeasures to achieve the company's goals so that all the stakeholders understand the security journey.
  • As a result, the security program brings more effective organizational team effort involving all employees. It greatly helps to strengthen employees’ higher commitment in their daily security performance as well.
  • This program is run on a global methodology, executed in the same manner, following international security standards IEC 62443, a global standard for the security of Industrial Control Systems. Hence, no matter where the customer site across the world, the global Yokogawa team can reach out and deliver the same result.
     
customer benefit

 

Overview:
  • World's largest control systems and PIMS for securing production over an extended period
  • Fully-automated, alarm-free operation and reduced total cost of ownership
Industries:
Overview:

Saudi Aramco's operations span the globe and the energy industry. The world leader in crude oil production, Saudi Aramco also owns and operates an extensive network of refining and distribution facilities, and is responsible for gas processing and transportation installations that fuel Saudi Arabia's industrial sector. An array of international subsidiaries and joint ventures deliver crude oil and refined products to customers worldwide.

Industries:
Overview:
  • 16,000 FOUNDATION Fieldbus devices
  • Main Automation Contractor (MAC)
  • DCS anywhere concept integration with site SAP system
  • Long term maintenance contract
  • Sustainable development
Overview:

This white paper provides an overview of how Yokogawa believes its customers can best prepare for and position themselves to benefit from IIoT-enabled technology and solutions and digitalization in general to emerge as the successful connected industrial enterprises of the future.

Overview:

yi-MAC stands for YOKOGAWA Innovative Main Automation Contractor:

  • Full control of scope and schedule across packages
  • Realization of customer expectation
  • Single point of responsibility
  • Providing fully integrated solutions
Overview:

The ability to deliver a full scope of project execution capabilities is becoming more important than ever for automation suppliers that wish to compete on a global scale. Process automation suppliers have always had some degree of project execution capabilities, but only recently have suppliers and end users begun to realize the true economic impact that precise and comprehensive execution capabilities can have on the success of an automation project and on plant lifecycle costs.

White Paper
Overview:

The number of incidents involving attempted unauthorised access to computer systems via the internet as reported by CERT (Computer Emergency Response Team) was 137,539 in 2003. Statistics show an exponential increase in the number of reported incidents in the last five years. Although this can be partly explained by the increase in the number of computer systems in the world that are connected to the internet, it is nevertheless an alarming fact.

Overview:

Yokogawa’s industrial automation (IA) product and service offerings, industry domain knowledge, and VigilantPlant approach – which emphasizes safe, secure, and uninterrupted operations -- provide a solid foundation for an Industrial Internet of Things that specifically addresses the requirements of process automation, particularly for the OT side of the equation. To be able to provide an equally solid foundation for the IT side, Yokogawa is partnering with Cisco Systems and other industry leaders.

Overview:

Network and system security is now a necessity in process automation industry. YOKOGAWA provides a service lifecycle solution for cyber security to ensure that the security measures and deployments are continuously enhanced, monitored and inspected.

This white paper explains the details of the security design, implementation, operation and validation solutions from the technical perspective.

Overview:

Initially when control and safety systems moved away from being hardwired and relay-based to computerized systems, vendors and asset owners were more interested in functionality than security. Typically, especially in high risk environments in refineries and off-shore oil installations, the systems were standalone with a dedicated Safety Instrumented System.

Overview:

Over the last ten years more security solutions have available, and more industrial end users have implemented them to protect their businesses. Today nearly all companies use an anti-virus product installed on their industrial control system (ICS), as well as having their ICS segregated from the business network and the Internet by a firewall.

Overview:

Harness the Future of Innovation
Highlights of the 2014 Yokogawa Users Conference and Exhibition
September 9 - 11, 2014, Houston, TX
By the editors of CONTROL Magazine   

Looking for more information on our people, technology and solutions?


Contact Us
Top