Cybersecurity podcast
Episode 1: Cybersecurity becomes law
The increasing digitalization in all areas makes the protection of data a central challenge. The EU Commission has also recognized this and has responded accordingly with the introduction of the NIS 2 Directive and the Cyber Resilience Act (CRA). The implementation of cybersecurity measures is legally binding. The NIS 2 security directive will become mandatory as early as October 18, 2024. The directive makes it obligatory for companies to substantiate their security strategy. In addition, binding requirements for products are defined within the CRA. The new EU Machinery Regulation also considers the aspect of cybersecurity in the context of functional safety.
There is therefore a lot to discuss in our first episode! Our expert, Andreas Fuß, explains the latest challenges, shares valuable tips, and provides a comprehensive assessment of the current schedule, which applies to the implementation of the new directives.
Guest: Andreas Fuß, Product Marketing Network Security
Further information on the new security directives:
Folge 2: A look behind the scenes
Let’s take a look behind the scenes. Phoenix Contact is not only a manufacturer of secure products, but also a user of these. With a holistic security concept, we are working on successfully protecting our networks and systems against cyberattacks and hacker attacks. The international standards IEC 62443 and ISO 27001 play a central role in the implementation because they define the fundamental requirements. But what are the details of the implementation?
Together with our Corporate Product and Solution Security Officer Lutz Jänicke, we will shed light on the various fields of action. Lutz Jänicke provides a detailed insight into his daily tasks, talks about the current challenges, and describes how we as a company implement future security policies.
Guest: Lutz Jänicke, Corporate Product and Solution Security Officer
Episode 3: Become a security expert
Cybersecurity is a dynamic and constantly growing subject area, as the threat landscape is constantly changing and cybercriminals are developing more and more professional methods of attack. It is therefore essential for security experts to stay up to date and be aware of current threats and defense strategies. There are many sources of information for this: specialist journals, social media channels, blogs, conferences, and webinars provide valuable information.
But how can you freshen up your specialist knowledge as effectively as possible? In the third episode of “Mission OT Security”, Hayley Lichtenfels provides an insight into her daily work. She herself works as a solutions architect and is aware of the current challenges.
This episode will be published shortly.
Guest: Hayley Lichtenfels, Solutions Architect – Automation Infrastructure
Further information on our range for industrial security
Our 360° security concept
Good protection against cyberattacks can only be achieved if coordinated technical and organizational measures are intermeshed. We therefore provide 360° security, which simplifies the protection of systems and secures them from all sides:
Secure services
Our trained and expert security specialists provide consultation on how to minimize individual security risks in your plant and will develop a security concept (certified in accordance with IEC 62443-2-4) on request. We can share our knowledge with you in training courses to bring your employees up to speed on cybersecurity.
Secure solutions
Our security concepts protect your critical processes, e.g., with the help of zone concepts, data flow control, and the use of hardened components. Secure processes are also established and documented.
Secure products
Security is rooted in the entire lifecycle of our products. It starts with a development process (certified in accordance with IEC 62443-4-1) and includes the integration of critical security functions and regular updates and security patches.