Welcome to the new Schneider Electric Community

It's your place to connect with experts and peers, get continuous support, and share knowledge.

Close
Important Announcement: WELCOME to the new Schneider Electric Community! Community is now no longer part of Exchange, and is now rebranded under se.com. If you have any bookmarks and links saved, we request you to update them to ensure that you continue accessing our community from this new location. For any issues that you might encounter as part of this change, please reach out to SchneiderCommunity.Support@se.com, and the team will help to get your issues resolved.
Invite a Co-worker
Send a co-worker an invite to the Exchange portal.Just enter their email address and we’ll connect them to register. After joining, they will belong to the same company.
Send Invite Cancel
82377members
349872posts

Cybersecurity - What may be the cybersecurity measures to me to take?

Industry Automation and Control Forum

This forum is addressing industrial automation design & engineering, operations, asset performance, cyber security and digital transformation for Plants & Machines.

LinkedInLive_QA
Lieutenant JG
Lieutenant JG

Cybersecurity - What may be the cybersecurity measures to me to take?

My total power generation, distribution and energy management is within my industry.

You can say it's like island mode..

What may be the cyber security measures to me to take?

Tags (1)
1 Reply 1
christophe_b
Ensign Ensign
Ensign
0 Likes
0
775

Re: Cybersecurity - What may be the cybersecurity measures to me to take?

Air gaped mode from a network perspective but the environment requires updates and configuration change - these must be carefully performed with robust control of temporarily connected assets for the actual configuration or transfer of configuration files or any data that must enter into your air gaped environment. 

 

Today there is no islands from point of view of Cyber Security. There are zones and segmentation, and the power generation and distribution should be treated as a critical one area and protected like this. Independently where it is inside. 

 

 

Christophe BLASSIAU
Digital Security