MINING 4.0 HOW DO WE GET THERE?
15
— Risk Reduction Roadmap — Risk Reduction Roadmap The industrial cyber security journey Risk Reduction Roadmap The Industrial Cyber Security Journey Cyber Security Workplace ™
Foundational Security
Security Service
Security Operations
Foundational Security Security Blueprints
Security Service
Event Monitoring
Security Operations
The Industrial Cyber Security Journey
Application Allowlisting
Incident Response
Network Monitoring
Security Blueprints
Security Operations
Maintenance
Cyber Security Workplace ™
Fingerprint
Consultancy
Reference Architecture
Event Monitoring
Backup
Application Allowlisting
Security Updates
Risk Assessment
Incident Response
System Hardening
Network Monitoring
Malware Protection
Training
Security Operations
Maintenance
Asset Inventory
Fingerprint
Consultancy
Reference Architecture
Backup
Security Updates
Risk Assessment
System Hardening
Malware Protection
Training
Assess
Plan
Implement
Maintain Detect
Monitor & Respond
Asset Inventory
1 2
3
4 5 6
Assess
Plan
Implement
Maintain Detect
Monitor & Respond
April 14, 2022
1 2
3
4 5 6
Gogarty notes that while the above is an overview of ABB’s approach, different organisations can be in different phases, and ABB will work with them accordingly. “However if you’re starting out, we recommend you start from the beginning, which is understanding where you are and what improvements you need to put in place.”
in regards to cyber security is the distributed nature of operations.
April 14, 2022
“Mines are spread over large geographical areas and tend to be made up of a number of small systems that are integrated using different connectivity protocols, and this is key to understanding how to keep those systems secure,” he says. “We call it horizontal segregation. Which is essentially ensuring that all field devices are securely connected to each other.”
Furthermore, he recognises that one of the biggest challenges facing mining companies
Top four cyber security controls There are four fundamental controls that ABB’s cyber security expert, Paul Gogarty, recommends mining companies put in place.
• Malware protection / antivirus – frontline defence
“If you do nothing else but apply these four fundamental security controls, you’ll still protect yourself from about 80% of cyber security problems.” “
• Security update / patching system – must be applied to any software running
• Backup solution – in case of ransomware you can restore your system
• System hardening – turns off unwanted software and applies security restrictions to users
Made with FlippingBook interactive PDF creator