April 2019 |
[an error occurred while processing this directive] |
Holistic CybersecurityCybersecurity solutions cannot be a self-serving or an isolated approach they need to be part of a holistic solution. |
|
Articles |
Interviews |
Releases |
New Products |
Reviews |
[an error occurred while processing this directive] |
Editorial |
Events |
Sponsors |
Site Search |
Newsletters |
[an error occurred while processing this directive] |
Archives |
Past Issues |
Home |
Editors |
eDucation |
[an error occurred while processing this directive] |
Training |
Links |
Software |
Subscribe |
[an error occurred while processing this directive] |
I have avoided this discussion in the
past because understanding
and highlighting all of the potential security and privacy concerns
could paralyze us. For some 20 years plus we have operated in
a wild west manner mashing our machines with the open internet
achieving amazing things quickly. I do not want to lose this platform
of global innovation and participation.
My concern is that in fencing every risk we will be the ones behind
the
fences immobilized and paralyzed, victims of our own thoughts. I have
grave concerns that the risk of over-regulation could be worse than our
worst cybersecurity concerns.
Yet, our Building Automation Systems are considered not secure. We need
to fix this as we install more and more
sophisticated smart building technologies, many of which involve
IT systems, we have become IT people. We need to think like
IT people, we need to revisit our existing systems security and
clean up our mess.
We gathered the views of several Cybersecurity experts to provide us
with advice on how to proceed without immobilizing
ourselves. I am extremely pleased and amazed at the width and depth of
coverage.
Anto Budiardjo and
Ken Sinclair discuss
the fact that "Our collective success is based on our weakest link."
and why we assemble this collection of industry experts to speak to
Cybersecurity.
James Lee, CEO, Cimetrics, Inc. "Our collective
success is based on our weakest link. Our industry is
inherently collaborative. We seldom work alone on a project, and
partnering is our modus operandi."
The Need for Holistic
BAS Cybersecurity
The first and
most important aspect for all players in the industry is that
cybersecurity is everyone’s business, not just the experts. Yes,
cybersecurity is a complex subject but we are not all going to nerd out
on the intricacies of ciphers, zero-day threats, certificates and so
on.
What every single professional must demand is that our devices,
systems, and buildings are secure from cyber threats. Every proposal,
project meeting and company planning session going forward must discuss
how cybersecurity is being addressed in that instance.
This
leads to my second point: Our collective success is based on our
weakest link. Our industry is inherently collaborative. We seldom work
alone on a project, and partnering is our modus operandi. This means
not only does each player need to deal with cybersecurity in their
work, but it is the task of everyone to ensure others in the value
chain deliver solutions that are secure.
A useful tool
many other industries
use to chart their process of bringing cybersecurity to the forefront
is the National Institute of Standards and Technology (NIST)
Cybersecurity Framework, a comprehensive set of standards, guidelines
and best practices created through a collaborative process by the U.S.
government agency responsible for cybersecurity matters.
Fred
Gordy of Intelligent
Buildings, LLC
provides cybersecurity evaluation of building control systems.
The State of BAS Cybersecurity IB
performs a series of assessments both before the site visit and once on
site. There are several tools and methods we use to complete a holistic
cybersecurity evaluation of building control systems.
In 2018 the
number of assessments we performed increased to more than
double of 2017. This was due in part to the growing awareness of the
need for securing building control systems, but also the real and
present danger of attacks to building control systems. In this article,
I will share the results of assessments and BAS attacks we have
first-hand knowledge of.
Our contributing editor Anto Budiardjo
has been encouraging me to get this discussion to be the theme for
April. I agree.
Facility IT mandates that information flows securely
and easily between all elements of
BAS, FM and IT.
On the
technology front, IoT (Internet of Things) is driving down the
cost of hardware; open source is democratizing software development,
and communication technologies from 5G to WiFi are making connectivity
cheap and ubiquitous. From a social perspective, we are all living
super-connected lives with our smartphones as a must-have tool for both
business and personal use. With that in mind, there is very little
standing in the way of the BAS industry from leveraging this pervasive
connectivity to achieve IT convergence and increase the value of what
it offers.
Marc Petock, Lynxspring, Inc Contributing Editor
The Business Side of
Cyber Security Why it Matters
Summary;
In
today’s data-driven economy and smart based buildings, it is essential
we collect, store and adequately protect data and proprietary secrets.
Failure to do so will significantly damage a company’s brand, have an
adverse effect on operations and directly impact revenue and
profitability.
The
frequency of cyber attacks is only going to accelerate over the coming
years. Therefore it is vital that we have a full understanding of the
inherent business risks and implications. Balancing cyber security
priorities with business flexibility and agility is a tough challenge.
But it’s a challenge every organization faces as it strives to drive
growth, achieve competitive advantage and maximize operational and
performance efficiencies.
Cyber
security is hard and always will be. Attackers will continue to
innovate with new techniques, deception and determination. The
challenge isn’t people, process, or technology; they all exist today
and are available. The big issue is the internal culture at companies
and the understanding of cyber security from a business perspective and
why it matters.
It all
comes to one thing-- risk. How much are you willing to take? We can no
longer take a wait-and-see philosophy or “it’s not going to happen to
us” approach when it comes to prioritizing and aligning cyber
initiatives within our buildings. As we operate in an interconnected
environment, we must look at their entire ecosystem and spread and
share responsibilities, creating security partnerships. Cyber security
is no longer an individual company effort; it is a shared
responsibility among us all.
Kevin T. Smith, CTO, Tridium
It is our goal that smart building owners and operators avoid the harsh
realities of cyberattacks
Towards a Cybersecurity Partnership in
Connected Buildings
Over the past
few months, there has been some well-needed government and media
attention paid to the cybersecurity posture of control systems used in
smart buildings and Operational Technology (OT) networks. Cyber-threat
watchers note that there continues to be a significant number of these
control systems that are configured in an insecure manner and exposed
on the Internet. This is something that must change.
Decades ago,
organizations had to quickly become savvy about protecting their
Information Technology (IT) networks from remote attackers. As IT
networks grew, so did the cybersecurity threats — viruses, malware, and
phishing attacks proliferated, and they continue to do so.
Organizations that experienced early, highly publicized cyberattacks
and data breaches learned painful and costly lessons. In too many of
those cases, proper focus on cybersecurity awareness and best practices
only happened after such an attack. Luckily, we can learn from those
mistakes and lessons from the past and apply them to OT networks
today. It is our goal that smart building owners and operators
avoid the harsh realities of cyberattacks now by taking a proactive
approach towards cybersecurity.
Cybersecurity is a partnership: we all have a role to play.
Therese Sullivan, Tridium, Contributing Editor
Cybersecurity or
Something Better
For decades
now, the vision of intelligent buildings that self-correct when they
are wasting energy and self-adjust when they are providing anything
less than a healthy, comfortable and productivity-enhancing indoor
environment for occupants has been driving the building automation
industry forward. Today, advancements in cloud computing and machine
learning, as well as greater adoption of common standards for network
connectivity and data interoperability, are making the full vision a
reality for some showcase buildings. At the same time, connected
devices are seeping into all types of buildings in less visionary, more
piecemeal ways and sometimes without sufficient IT/OT oversight. Is
this moving us faster toward the intelligent-buildings-for-all future
we expect? Or, is this trend simply creating a larger and more
attractive cyber-threat landscape for attackers, with consequences that
will slow our progress
Jim Butler, CTO, Cimetrics Inc.
BACnet/SC a
Secure Alternative to BACnet/IP
For the past
several years, the members of the BACnet IT working group I chair have
been developing a more secure method of communication for BACnet based
on widely used IT standards. This method exclusively applies to
communication on IP networks, and we are calling it "BACnet/SC" or
“BACnet Secure Connect.” I believe BACnet/SC will become a
popular alternative to BACnet/IP in the future.
I have skipped over many important details of BACnet/SC in this short
article. If you are interested in learning more, I encourage you to
read the white paper "BACnet Secure Connect" written by members of the
BACnet IT working group.
Pook-Ping Yao, CEO, Optigo Network
A Cybersecurity
Framework for the World of BAS
It’s been five
years since the National Institute of Standards and Technology (NIST)
released its cybersecurity framework. A great deal has changed in
technology over those years, but the framework remains absolutely
critical in our world of growing connectivity.
And yet, I
still hear the confusion in the building automation world about what
this framework means for us. Many buildings are slowly marching forward
in that journey to “smart.” Do we really have to worry about
cybersecurity?
Well, in a
word: yes.
Deb Noller, CEO, Switch Automation
How to Safeguard your
CRE portfolio against Cybersecurity Attacks
Noller:
A smart building platform is a powerful cybersecurity tool that
empowers your FM team to easily perform continuous commissioning as
well as regularly assess device connectivity and network integrity.
Cloud-hosted smart building solutions are often the most secure,
updating automatically for protection against the latest malware.
Additionally, a cloud solution tends not to require the regular
dispatch of software engineers for functionality customization and
support. By integrating diverse hardware and software, an effective
smart building solution will support a range of stakeholders, driving
asset visibility and enabling more cost-effective building performance.
To extend the flexibility of your FM team, consider a solution with a
mobile app and empower them to communicate about critical issues
quickly and effectively while on the go.
How secure is
your commercial real estate portfolio? Download this free e-book and
safeguard your portfolio against cybersecurity threats now.
Toby Considine TC9 Inc Contributing Editor
Cybersecurity for Modern Building Services
This
article is a collection of odds and ends, brought out by the
announcement that this month is the Holistic Cybersecurity issue.
Security, including cybersecurity, is making sure the needed
information or action is reliably available at the right time to the
right people.
As noted elsewhere, many of the most useful and exciting changes in how we interact with the world, and the world with us, are in the hidden world of buildings and their services. In May 2008, I named this the Service Oriented Building (SOB) and called for it to be a full-fledged partner with the then emerging Service Oriented Architecture (SOA) for enterprise systems. Since then microservices have become the norm for assembling highly scalable, highly resilient, and highly secure systems.
Service integration treats remote systems as black boxes, and the only remote integration is requesting from or providing services to that black box. Service request does not care about the mechanisms in that black box, only about the service provided. This minimizes communication between systems, already a step forward in cybersecurity. A black box providing a service can be designed so that none but the other components in the box can see or interact with them. Service Oriented systems provide a smaller attack service.
Trust
is the new Gold! Mirko Ross In fact: You need “trusted” data and
“trusted” devices providing data services. As machine learning is
relied on more often for automated decisions, Cybercriminals can try to
attack machine learning algorithms. Influencing the training data is
highly dangerous, with the goal of manipulating the results of the
machine learning algorithm predictive model.
Please ensure you are not our weakest link due to a lack of
understanding and the necessary proactive implementation.
Cybersecurity is everyone’s business, not just the experts. Protect
yourself while helping to secure our industry.
A list of some Communities of Practice for Cybersecurity
NIST
This voluntary Framework consists of standards, guidelines, and best
practices to manage cybersecurity-related risk. The Cybersecurity
Framework’s prioritized, flexible, and cost-effective approach helps to
promote the protection and resilience of critical infrastructure and
other sectors important to the economy and national security. https://www.nist.gov/cyberframework
"BACnet Secure Connect" written by members of the
BACnet IT working group.
Niagara systems integrators
Harden Your Smart Building Against Cyber Threats. Cybersecurity as a
top priority, and we are dedicated to continuously improving the
security posture of our products and providing guidance to Niagara
systems integrators, business partners, and facility managers.
https://www.isasecure.org/en-US/
IEC 62443 Standards and ISASecureŽ Certification: Applicability to
Building Control Systems The ISASecureŽ Certification Program can
accelerate BCS industry cybersecurity initiatives.
https://ics-cert.us-cert.gov/
The Cybersecurity and Infrastructure Security Agency (CISA)
incorporates an Industrial Control Systems (ICS) element that works to
reduce risks within and across all critical infrastructure sectors by
partnering with law enforcement agencies and the intelligence community
and coordinating efforts among Federal, state, local, and tribal
governments and control systems owners, operators, and vendors.
The not-so-definitive
guide to cybersecurity and data privacy laws
US cybersecurity and data privacy laws are, to put it lightly, a
mess. Years of piecemeal legislation, Supreme Court decisions,
and government surveillance crises, along with repeated corporate
failures to protect user data, have created a legal landscape that is,
for the American public and American businesses, confusing,
complicated, and downright annoying.
CRE CYBERSECURITY FORUM June 12 | 8:00 am - 11:45 am | Nashville Music City Center Every company is at a different part of the cybersecurity journey. Most Real Estate organizations begin by focusing on enterprise related issues which can impact operations. Recently, with the increase in cyber-attacks on the built environment, more companies have begun the task of securing the building and all its systems. While some knowledge can be garnered from critical infrastructure experiences, protecting buildings from cyber threats is a relatively new phenomenon. This session will provide insight on what a comprehensive Building Cybersecurity Program might look like. In addition to presenting the foundational plan, some Monday morning advice on ‘where to begin’ will also be provided.
Building a Consensus for Cybersecurity Siemens teamed up with the Munich Security Conference and other governmental and business partners to present the Charter of Trust initiative in February 2018. One of the initiative’s key goals is to develop and implement rules for ensuring cybersecurity throughout the networked environment. The first major successes have already been achieved.https://new.siemens.com/global/en/company/topic-areas/digitalization/cybersecurity.html
https://ebooks.cisco.com/story/anticipating-unknowns Contents, Introduction: See No Evil, Block No Evil Look Back to Move Forward State of the CISO 2019 Findings Dealing with the Unknowns The Cisco Cybersecurity Series
Events where Cybersecurity will be discussed https://www.controlscon.com/
https://www.haystackconnect.org/
https://www.realcomm.com/
[an error occurred while processing this directive]
[Click Banner To Learn More]
[Home Page] [The Automator] [About] [Subscribe ] [Contact Us]