current language
Functional Safety Meets Cybersecurity available in the following languages:
or select your TÜV Rheinland region / country website:

Industrial Security Survey 2020 - Bridging the gap between Functional Safety & Cybersecurity

Operational Technology (OT) and industrial systems become an essential part of our modern life. Many industries have to deal with new challenges due the advancing digitalization, Industry 4.0 and the increasing networking entire production environments. The results of the survey uncover what challenges OT Managers around the world currently see coming for organizations and show once again how important it is to think about operational security holistically.

Recognizing digital challenges today. Securing the industrial future.

The perspective is clear: The number of safety-relevant products and systems in modern industrial and production complexes will increase significantly worldwide. Digital control will be used in all kinds of automated industrial infrastructures in the near future. But industrial legacy systems in particular were not designed with future technologies, security-critical aspects and cybercriminal threats in mind. In terms of their digital components, they still mostly consist of broad, internally and externally connected corporate networks that are affected by considerable security threats due to their partially uncoordinated structure, unsystematic connectivity and open communication channels.

We see clearly: Future Industries requires far better security precautions than in the past, as well as a new way of thinking and acting that recognizes today the potential threats of tomorrow and effectively counters them. Cybersecurity is already an integral part of innovative engineering and an indispensable prerequisite for industrial plant safety.

As a manufacturer, system integrator or end user, you must meet high requirements. Newly established and updated standards for functional safety require you to constantly analyze and re-evaluate threats and to take appropriate defensive measures effectively and in good time. Furthermore, there is the continuing shortage of qualified IT specialists who understand security-relevant standards of today and tomorrow and who can implement and update effective, reliable and future-proof protection mechanisms. Moreover, compliance with statutory security requirements increases the cost of setting up and maintaining protection mechanisms. Are you looking for effective, resilient, compatible solutions that can be called up at any time, and that are comprehensively designed and tailored to your specific needs?

Functional Safety
Cybersecurity
Functional Safety & Cybersecurity
Oil & Gas
Process / Chemical Industry
Manufacturing
Automotive
Power Plants
Energy
Transportation
Oil & Gas

You are or work for:

  • Top Manager or Manager
  • Technical Expert (e.g. engineer, security practitioners)
  • Vendor (e.g. ICS, product vendor)
  • System Integrator
  • Operator or facilities

You are challenged with:

  • Legacy platforms, pipelines or others systems, which were not designed considering security threats
  • 'Big-Data': vast growth of security log data, limitations of deployed technologies, difficulty to monitor IoT devices
  • Missing guidelines for cybersecurity and risk management
  • Lacking visibility & transparency of production infrastructure and potential vulnerabilities
  • Lack of profesional resources (regarding internet connected fields as well as norms and standards)
  • Concerns like reputational damage, significant fines or shareholder disaffection

Energy

You are or work for:

  • Top Manager or Manager
  • Technical Expert (e.g. engineer, security practitioners)
  • Vendor (e.g. ICS, product vendor)
  • System Integrator
  • Operator of facilities

You are challenged with:

  • Increasing risks for major accidents, incidents or shut-downs
  • Legacy systems which were not designed considering security threats
  • Regulatory and compliance demands:
    - Cybersecurity is not yet part of the standard for testing functional safety of components
    - Missing guidelines for cybersecurity and risk management
    - Potential for fines and legal costs
  • Lack of professional resources (regarding internet connected fields as well as norms and standards)
  • Effects of 'Big-Data' like vast growth of security log data and limitations of deployed technologies

Transportation

You are or work for:

  • Top Manager or Manager
  • Technical Expert (e.g. engineer, security practitioners)
  • Rail or maritime supplier
  • Logistics manager
  • System Integrator
  • Operator of facilities (e.g. Airports, Ports)

You are challenged with:

  • Complex and disruptive technologies
  • Increasing risks for major accidents, incidents or shut-downs
  • Disruption or organization based on digital transformation & digitalization
  • Missing guidelines for cybersecurity and risk management
  • Lacking visibility & transparency of production infrastructure and potential vulnerabilities
  • Concerns like reputational damage, significant fines, shareholder disaffection or reduction in share price

Automotive

You are or work for:

  • Top Manager or Manager
  • Technical Expert (e.g. engineer, security practitioners)
  • System Integrator
  • Automotive Supplier
  • Automotive Manufacturer
  • Original Equipment Manufacturer (OEM)

You are challenged with:

  • Effects of 'Big-Data': like vast growth of security log data or limitations of deployed technologies
  • Disruption of organization based on digital transformation & digitalization
  • Increasing risks for major accidents, incidents or shut-downs
  • Lacking qualified resources
    - to understand and implement relavant standards
    - within new and emerging internet connected fields increases complexity and cost to implement
  • Missing guidelines for cybersecurity and risk management

Manufacturing

You are or work for:

  • Top Manager or Manager
  • Technical Expert (e.g. engineer, security practitioners)
  • Vendor (e.g. ICS, product vendor)
  • System Integrator
  • Operator of facilities

You are challenged with:

  • Increase of technological complexity
  • Complexity of manufacturing plants and systems adds challenge to cybersecurity management
  • Legacy systems & manufacturing networks were not designed with appropriate security controls
  • Investment in cyversecurity is lacking due to commercial focus on productivity and efficiency
  • Missing secure connectivity to the enterprise network (controlled internet access is crucial)
  • Missing vulnerability and patch management in manufacturing enviroments although they are already established in the world of office IT

Process / Chemical Industry

You are or work for:

  • Top Manager or Manager
  • Technical Expert (e.g. engineer, security practitioners)
  • Vendor
  • System Integrator
  • Operator of process or chemical industries

You are challenged with:

  • Complex and disruptive Technologies
  • 'Big-Data': vast growth of security log data, limitations of deployed technologies, difficulty to monitor IoT devices
  • Disorder of organization based on digital transformation & digitalization
  • Lacking qualified resources
    - to understand and implement relavant standards within new and emerging internet connected fields increases complexity and cost to implement
    - within new and emerging internet connected fields increases complexity and cost to implement
  • Concerns like significant fines, loss of customers or reputational damage

Power Plants

You are or work for:

  • Top Manager or Manager
  • Technical Expert (e.g. engineer, security practitioners)
  • Vendor
  • System Integrator
  • Operator of facilities

You are challenged with:

  • Increasing risks for major accidents, incidents or shut-downs
  • Legacy systems were not designed considering security threats like malicious actions
  • 'Big-Data': vast growth of security log data, limitations of deployed technologies, difficulty to moitor loT devices
  • Missing guidelines for cybersecurity and risk management
  • Lacking visibility & transparency of production infrastructure and potential vulnerabilities
  • Lack of professional resources (regarding internet connected fields as well as norms and standards)
  • Concerns like reputational damage, significant fines or shareholder disaffection

Rethinking security. Acting decisively.

As a testing services company with nearly 145 years of technological experience, we are aware that the next wave of automation will have an enormous impact on all technical areas and developments in your company. We won‘t leave you alone in this situation. With a unique approach we help you to protect your systems comprehensively, proactively and permanently.

We are one of the few testing service provider to offer product manufacturers, system integrators and operators a broad Functional Safety & Cybersecurity service portfolio. In the course of this we examine all areas of functional safety and cybersecurity of your entire product or system life cycle, from specification to design to operation. We implement system applications, and we train and educate your personnel in all safety-relevant aspects. We rethink security in a completely new way and consider even the smallest detail of your situation and perspective. This way we minimize your risks and ensure greater profitability and sustainability. With our well founded expert knowledge in all areas of industrial technology, the digital age and cybersecurity, we always offer you exactly the right solution for your specific requirements. Furthermore, you benefit from our international network of accredited, recognized IT specialists, who view and test the entire topic of “digital security” not only from a hacker’s point of view but with a holistic approach.

React quickly in times of crisis with a business continuity management system.

React quickly in times of crisis with a business continuity management system

You want to resume productive operations as quickly as possible after disruption or failure of your business processes, particularly those that rely on critical IT systems? Our business continuity management system (BCMS) as per ISO 22301 and ISO 27031 allows you to react quickly and correctly with practical emergency plans, IT emergency concepts and recovery plans.



Securing today, safer tomorrow. Get in touch with our experts.

Securing today, safer tomorrow. Get in touch with our experts.