2611072020 Nuestro entoque para gestonar ls resgos de elbersegurdad | Eaton
Uesiomg. rim
LA SEGURIDAD CIBERNETICA (IESIEN-GBICOMPANYINEWS INSIGHTSICYBERSECURITY HTML)
Nuestro enfoque para
gestionar los riesgos de
ciberseguridad
Laboratorios certificados
dedicados a reducir los
tiesgos de ciberseguridad
Los dispositivos conectados y los
datos que generan contindan
creciendo exponencialmente, con
pronésticos que exigen mas de 41.600
millones de dispositivos loT
conectados para 2025.1 Pero un
mundo de conectividad ampliada
conlleva un mayor riesgo de ataques
cibernéticos.
Today's customers need cybersecurity
addressed in order to minimise the
threat of operational downtime, data
loss, impacts on life-cycle costs and
brand reputation. And because
cybersecurity incidents can cripple an
organisation in minutes, customers
need suppliers to provide evidence that
tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ana2611072020 Nuestro entoque para gestonar ls resgos de elbersegurdad | Eaton
the products they sell comply with
industry cybersecurity standards.
That's why we are dedicated to
establishing apersecue processes ANd innovating
technsiges that make trusted connections
work.
A connected world needs trusted environments.
We are committed to advancing these new
technologies and innovations, while building trust
and ensuring the highest level of defence against
emerging cybersecurity threats.
Michael Regelski, Senior Vice-President and Chief Technology Officer, Electrical
Sector
htpshwwaasr020 Nuestoenfoav pra gstonaros egos de cbersgurdad| Ean
How we help enable secure environments
Ina hyper-connected worl, trusted environments are a must. Eaton's commitment to defending those environments
comes to life at our Product Cybersecurity Centre of Excellence, where our experts develop new ways to help protect,
products and systoms against cyberattack, provide internal training and help customers deploy and maintain secure
solutions.
In many companies, security is an afterthought, made evident by the number of updates deployed to account for process:
miscues, But at Eaton, cybersecurity is part of our DNA and an integral consideration, with strict protocols placed on
the neon eincesses and iociolosis win our Secure Dovelonmment ieCicle races (SLC), leor-obinarkelsinooapnics.
letieesyersnculy lly dndustialanplcalns-nleoraohi hm) the programme that integrates security protocols at every phase
‘of product creation. SDLC spans from inception through te deployment and maintenance, enforcing cybersecurity best
practices via training, threat modelling, requirements analysis, implementation, verification and ongoing support.
‘Additionally, our cybersecurity best practices extend beyond our own labs to help keep our customers informed about potential
winsrablis /slon-geompan news nsiohsleybersscurtyvunerabliydscosurehiml) and provide industry insights well as tol
ot r-gblcompanyinews insights yi).
ssveatonal cor
tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ana2611072020
Nuestro entoque para gestonar ls resgos de clbersegurdad | Eaton
(doson-ghimarketstnigraphicslsticlesieybersecurily-tllysndustia-appleatonsnvographc nim)
CYBERSECURITY
STARTS WITH THE
RIGHT APPROACH
People, process and technology align.
41.6 billion
connected devices by 2025
‘Training is key to our DNA
ler nn ate ad a cy a ath ed pO
rut in rnc cote ean in remain ars nn hn
‘cig pow Cen cb nt renarrated
LISTICLE
Learn more about our "secure-by-design" approach to cybersecurity
Aseries of industry firsts
tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml
ana2611072020 Nuestro entoque para gestonar ls resgos de elbersegurdad | Eaton
For years, Eaton has maintained strict procedures at every stage of the product development process. This discipline has
paved the way for collaboration with renowned standards leader, UL (Un (ntpsumwul.com), to establish
‘measurable cybersecurity criteria for network-connected power management products and systems,
witers Laborato
fat (eslen gbleompanyinews insgnisinews
colaboraionwth-ul-announces:ninl) approved to participate in UL's Cybersecurity Client Lab Validation programme in Pittsburgh,
Pennsylvania, And in 2078, UL approved a second Eaton lab o(oin the programme es er-qbicompanyinows-insighsinews
{eleas08/201 Beaton sxpends-cybersoury-oqram-o-nlp-safequsrd-crealhtml) — another industry first in Pune, India, These
accredited lab environments provide the global capabilly to test Eaton products with inteligence or embedded logic for key
aspects of the UL 2900-1 1 standard,
‘As Michael Regelski, Senior Vice-President and Chief Technology Officer for Eaton's Electrical Sector explains, “We know
cybersecurity is a global threat and having the capability worldwide to ensure the highest standards are consistently applied to
‘our technology is a key advantage for our customers.
‘There's no need to take chances with connected solutions. With products tested in our specialised labs, our customers can
rest easier, knowing Eaton devices are compliant witn the highest industry cybersecurity requirements before they'e installed
in critical systems,
tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ena2611072020 Nuestro entoque para gestonar ls resgos de elbersegurdad | Eaton
Dual product certification — an industry
In addition, the Eaton first
programme has most
recently been expanded to
include cybersecurity
certifications under the rc
{tnlomationalElecvotechnical Commission)
(tositmiscon 62443-4-2 standard
as well as UL 2900-1 for
Eaton's Gigabit Network
tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ena2611072020 Nuestro entoque para gestonar ls resgos de clbersegurdad | Eaton
Card and Industrial Gateway
Card. This makes Eaton the
first company in our industry
to receive dual product
certifications under IEC and
UL standards.
Eaton cybersecurity lab in Pune, India
tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ma251072020 Nuestro enfoque par gestionarlosresgos de chersegurdad | Eaton
Eaton cybersecurity lab in Pittsburgh, PennsyWvania,
USA
Strengthening cybersecurity education and research
Eaton’s emphasis on cybersecurity extends to partnerships with universities to atract and prepare the next generation of
‘engineers to develop new securty strategies for connacted devices. For example, we've established the Eston Cybersscurty
81738) at the Rochester Insitute of
‘SAFE (Socurty Assossment and Forensle Examination, sdutnawsston
Technology (RIT) to provide students with hands-on experience in solving cybersecurity challenges. Together with RIT, we're
helping to equip the next generation of cybersecurity experts with the training and field experience needed to build secure
products now and into the future.
8 ways Eaton is taking the lead in cybersecurity
View slideshare
(https:/)www.slideshare.net/etn_electrical/8-ways-eaton-
is-taking-the-lead-in-cybersecurity)
Mote security leads to less uncertainty
‘The general requirements for the UL 2900 Standard for Software Cybersecurity for Network-Connectable Products (UL 2900)
Include processes to test devices for security vulnerabilies, software weaknesses and malware. Backed by a testing
‘methodology that aligns with UL requirements throughout the product development life-cycle, we're proud to announce a
‘Sories of tecmolooies that mat these UL cysersecuy standards (es (n-ghlcompanyinews-nsichtsineus rleases/20"8leaton-add-new.
tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ana2611072020 Nuestro entoque para gestonar ls resgos de elbersegurdad | Eaton
(dusfon-gheatalogtow-voltag-power-