Mining 4.0 - How does Australian mining get there

MINING 4.0 HOW DO WE GET THERE?

15

— Risk Reduction Roadmap — Risk Reduction Roadmap The industrial cyber security journey Risk Reduction Roadmap The Industrial Cyber Security Journey Cyber Security Workplace ™

Foundational Security

Security Service

Security Operations

Foundational Security Security Blueprints

Security Service

Event Monitoring

Security Operations

The Industrial Cyber Security Journey

Application Allowlisting

Incident Response

Network Monitoring

Security Blueprints

Security Operations

Maintenance

Cyber Security Workplace ™

Fingerprint

Consultancy

Reference Architecture

Event Monitoring

Backup

Application Allowlisting

Security Updates

Risk Assessment

Incident Response

System Hardening

Network Monitoring

Malware Protection

Training

Security Operations

Maintenance

Asset Inventory

Fingerprint

Consultancy

Reference Architecture

Backup

Security Updates

Risk Assessment

System Hardening

Malware Protection

Training

Assess

Plan

Implement

Maintain Detect

Monitor & Respond

Asset Inventory

1 2

3

4 5 6

Assess

Plan

Implement

Maintain Detect

Monitor & Respond

April 14, 2022

1 2

3

4 5 6

Gogarty notes that while the above is an overview of ABB’s approach, different organisations can be in different phases, and ABB will work with them accordingly. “However if you’re starting out, we recommend you start from the beginning, which is understanding where you are and what improvements you need to put in place.”

in regards to cyber security is the distributed nature of operations.

April 14, 2022

“Mines are spread over large geographical areas and tend to be made up of a number of small systems that are integrated using different connectivity protocols, and this is key to understanding how to keep those systems secure,” he says. “We call it horizontal segregation. Which is essentially ensuring that all field devices are securely connected to each other.”

Furthermore, he recognises that one of the biggest challenges facing mining companies

Top four cyber security controls There are four fundamental controls that ABB’s cyber security expert, Paul Gogarty, recommends mining companies put in place.

• Malware protection / antivirus – frontline defence

“If you do nothing else but apply these four fundamental security controls, you’ll still protect yourself from about 80% of cyber security problems.” “

• Security update / patching system – must be applied to any software running

• Backup solution – in case of ransomware you can restore your system

• System hardening – turns off unwanted software and applies security restrictions to users

Made with FlippingBook interactive PDF creator