"Innocent activities can also pose security threat"
Today, it is imperative that plant operators take a holistic approach to Industrial Security, thereby addressing critical requirements from beyond the plant perimeter to process control network. At the recently concluded, 2012 Honeywell User Group symposium in Australia, CXOtoday spoke to Adrian Fielding, Senior Manager – Industrial Security, Honeywell, to find out how an integrated approach in Industrial Security helps protect people, assets and the environment. Excerpts.
Give an overview of Industrial Security? And tell us more on how an integrated approach ensures a safe and secure plant?
The whole philosophy around Industrial Security is having layers of protection integrated together to protect the facility and provide businesses with improved situational awareness. Industrial security helps plant operators to see the happenings in and around the facility 24×7 and also relay the information to the central commanding control, which could be located within the facility or remotely. This information brings with it various aspects of security including beyond the perimeter such as pipeline security or radar video surveillance.
For instance, video surveillance covers everything from activities taking place beyond the fence lines to monitoring your staff in the control room. While, access control provides the benefit of real-time muster reports, evacuations etc. All these layers when brought together ensure the security of the site. The advantage of integration is that it is a far stronger tool. As you have all safety solutions including access control, camera systems, and sensor systems combined, it ensures you don’t miss an alarm. In short integration is a game changer in Industrial Security.
Does the information gathered while integrating various layers of Industrial Security also help other aspects of the plant operations?
Absolutely, for example the pipeline security information could also be used for leak detection and condition based monitoring of the machinery. It can also detect the pig (pipeline inspection gauges) through the pipe. So it can bring three elements of information that is not into interesting to security system but to the process operation. In the video surveillance, a bunch of cameras can be used for process operation and some solely for security. This segregation can be done via policies. Though we don’t want security systems to control things related to operations , however the former has the potential to provide the necessary information and footage to emergency response team in case of an emergency.
Currently south-east Asia is considered to be one of the troubled regions in the World. What kind of trend to do see in this region when it comes to the adoption of Industrial Security solutions?
In this region, it is the terrorist threat that is driving interest amongst businesses towards Industrial Security. The layers of protection are more focused of getting the earliest warning, so as to able to respond quickly. Particularly in the Indian market, we find that the quick reaction team and security forces are generally very large. So in order to have these teams coordinate and respond effectively the security systems need to provide god information. This is where the integration brings in improved situation of awareness, so now know what happened and where and also get the quickest route to that position, so you can deploy your people effectively.
For some time now, Indian companies are also interested in defending innocent activities that can lead to catastrophe. For instance, we use radar video surveillance offshore in the Indian Ocean, where the threat isn’t necessarily from piracy or terror but from local fishermen anchoring theirs boats below oil platforms and cooking their food, which possess risk to the facility.
When it comes to the implementation of Industrial Security, who is the key stake holder or CXO that need to drive this initiate?
The CEO, CTO, CSO, and CISO are all key stakeholders when it comes to the implementation of Industrial Security. However the key driver depends from business to business. For instance when it comes to the technical aspect of Industrial Security it is the CTO and CSO who come into the picture as they are the ones who understand the technical complexities involved in the various systems.
Every CXO would have his own perception of Industrial Security. How do you ensure you get all the CXOs on the same page when implementing such a solution?
The CSO obviously has the understanding of the facility and the requirements for that, so for instance he might want cameras want installed all over the place. But the CTO might disagree, citing reasons such as lack of bandwidth or need to implement a new infrastructure. In such a scenario to come to a compromise, we use the available information to accurately predict bandwidth use and coverage that you will get with the number of cameras allowable. We also understand from the CSO the kind of security required and accordingly decide the kind of cameras and the frame rates each of them need to provide from different locations of the facility. We then go back to CTO and explain the kind of bandwidth and storage requirement that would be needed. This is only an example, but we also do similar work on the other aspects of Industrial Security implementation.
Are there any specific challenges you face while implementing Industrial Security solutions in India?
The major challenge is to change the mindset from implementing individual components to taking an integrated approach. Most of the times businesses work towards implementing cheap solutions, and they end up with individual solutions from multiple vendors. As a result, customer now becomes a system integrator and this is not viable. So if businesses need optimum performance they should take an integrated approach.
- Keep Security At The Heart Of Digital Strategy: Unisys
- Nearly All Firms Are Unprepared For Next-gen Cyber-Attacks: Study
- Supreme Court Website Hacked; Is India Ready To Defend?
- Nine Ways To Ensure Cloud Security In Your Organization
- Poor Visibility, Greatest Challenge To Cloud Adoption
- Why AI Could Be Cybersecurity’s Next Big Thing
- Why IoT Benefits Will Outweigh Its Challenges
- Why IoT Security Needs A Rethink
- Facebook CEO Explains How They Will Fix Data Privacy Issues
- F Secure Is Growing Much Faster Than The Market