close
close

OT-Sicherheit in der Lebensmittelindustrie – datensicherheit.de

OT-Sicherheit in der Lebensmittelindustrie – datensicherheit.de

Role of the NIS-2 Directive in the European Union

(datensicherheit.de, 28.08.2024) Herausgeber and chef de cuisine spoke about the role of NIS-2 in the EU and OT safety in the Lebensmittelindustrie datensicherheit.de (ds), Carsten J. Pinnow of Mirco KlossDirector Business Development DACH at TXOne Networks sprinkle. Sein Arbeitgeber hat is gone OT safety Specialization and work with perhaps a few comparable solutions, such as DAX companies in Germany. Mittlerweile is the man who is Mitglied in VDMA.

ds: Mr. Kloss has made an attempt to solve a problem, which is an OT/ICS security in the food industry. What developments are you considering?

Mirco Kloss, Business Development Director DACH at TXOne Networks

Mirco KlossDirector Business Development DACH at TXOne NetworksImage: TXOne Networks

Kloss: The food industry, under the jurisdiction of food and drink, is one of the most important sectors, of the show – together with the automotive and semi-automotive industries. The food industry has undergone significant development in recent years, for all the integration of information and communication technology into the production line. If quality and efficiency have not yet been achieved, it may be that the quality of living standards are increased, the standards and values ​​are broken. This digital transformation brings with it new security requirements. Aggressiveness in the business in the food industry can lead to respectable production requirements, where food security and the care chains can again be secured.

ds: Was the deception of this industry part of the economics of the industry’s life cycle?

Kloss: If you are no longer in your IT system, but also in your OT system – also the technology and the production of your production – intensively have to earn your money. During the automation and optimization of production, production and processing activities, new products are installed, which cyber criminals are carried out. Especially the management government is the risks, the only fear for the livelihood of the contact, the consumer is gefährden. Here the urgent trade and security activities must be carried out, which your production protect – without the operating notices to disturb.

ds: Who wants to use the NIS2 guideline on these developments?

Kloss: The NIS2 guideline brings more certainty, the now also concerns companies, the two not under the strengthening of the regulations different laws, such as the KRITIS law, has fallen. The direction that goes from the production of the production, the representation and the representation of it, was probably that some uninteresting things would happen, such as the strengthening of it. If you are another researcher, who regularly performs risk analyses, come forward and investigate the recovery of your implementation. These investments are souls, the broader state of affairs of the industry life cycle will result in cyber threats.

ds: Are you struggling to solve lifecycle issues when your IT and OT security could be best optimized?

Kloss: One of the major challenges is the Tatsache, which was used in the food industry. This system is often no longer compatible with modern security solutions, it was a swashbuckling power, that is your protection. We have written this theme Whitepaper Securing the Food Supply: Industrial Cybersecurity in the Food and Beverage Sector (txone.com), which undermines this legacy system through fear, which is often offered on the basis of software and hardware can no longer be updated regularly. When the integration takes place, the system can be increasingly purchased with new technologies, which can provide the core networks with a number of external solutions. If you are involved in the delivery, you can get the certainty that the systems are brought to a higher level and the high quality of production and product production are guaranteed.

ds: Who supports TXOne Unternehmen in dieser Situatie concrete?

Kloss: If you have a high degree of specialization, you can keep these redevelopments under control. If the device is used, the end of operation can be reached, which opens part of the operating systems and performs other security functions, or its pursuit. There are problems with troubleshooting the OT network during the segmentation and Cyber-Physical Systems Detection and Response (CPSDR). It is very important, the risks that the Legacy Systems offers are minimized. It is possible to work with the external partner, one of the spezific advantages that you can offer and the biggest problems that you can solve. If you see that it is still like this, the security is to increase, without the production to disturb. If you are in the life cycle industry of a separated company, you can do a huge production expansion. Hardware bypass as a function is separated here, if the machine is expanded, the protection can be disabled. The machine is also unprotected in this short-term time frame, but it is still working. Here the components must remain separated, whether the machine will work this way in the future, or if they are free, the production of the production was possible. If you have developed a central platform with SageOne, all other products can be executed and executed, so that everything you can find and the Legacy system no longer has its own dashboard, often has an uninterested effect.

ds: Thank you for this standard. If you want to look at everything now: Who do you see when you have the OT safety status, especially in the Hinblick on NIS2?

Kloss: The OT security would become increasingly larger over the years and the EU directive NIS2 would become clearer, the security would be high and the developments would be in a good direction. Other people would spend more time thinking and strengthening their needs. It is in Germany that the NIS2 directive is a very structured framework for the security and breakthrough of cyber security practices. If you notice another regular problem and solve the costs of sanctions, the new purchase is no longer carried out. We can be sure that the integration of the security solutions in the production process is no longer integrated – there is a closer cooperation between IT and OT teams. Now that you can assure the companies, you can keep the production system in one of the zunehmend vernetzten welt sicher. The problem is that we can see this: Many people now think of NIS2 as IT security, not OT. This is a problem that is affected and that the production that is being developed is authorized for the Anforderungen der Richtlinie. It may be that the ways of the Legacy system are all crooked, but it is not that the human solves in the right way. If there is a solution in the first line, the real OT security solutions are one of the many IT security solutions that are now being sold in the OT solutions. Letzteres is a trend, while one of the potential restorers of the OT market fails to erase, it is not a single OT expert in the company who makes the cover as soft as possible. An example is the other IPS: If you know the IT security strategy, but we know that it is an OT-IPS, many industrial protocols can be spread. If the IT-IPS computer makes an OT error, then it will probably no longer work. There are only 30 or 40 prototypes implemented that you can use. Because hundreds of soldering protocols have been found here, there is a real OT-IPS master mouse.

ds: Thank you for this insightful insight into the direction in which OT Safety is being developed!

Kloss: Thank you very much!

More information about the theme:

datensicherheit.de16.02.2023
IT and OT security: KRITIS-Anbieter zunehmend im Visier Cyber-Krimineller