Está en la página 1de 13
2611072020 Nuestro entoque para gestonar ls resgos de elbersegurdad | Eaton Uesiomg. rim LA SEGURIDAD CIBERNETICA (IESIEN-GBICOMPANYINEWS INSIGHTSICYBERSECURITY HTML) Nuestro enfoque para gestionar los riesgos de ciberseguridad Laboratorios certificados dedicados a reducir los tiesgos de ciberseguridad Los dispositivos conectados y los datos que generan contindan creciendo exponencialmente, con pronésticos que exigen mas de 41.600 millones de dispositivos loT conectados para 2025.1 Pero un mundo de conectividad ampliada conlleva un mayor riesgo de ataques cibernéticos. Today's customers need cybersecurity addressed in order to minimise the threat of operational downtime, data loss, impacts on life-cycle costs and brand reputation. And because cybersecurity incidents can cripple an organisation in minutes, customers need suppliers to provide evidence that tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ana 2611072020 Nuestro entoque para gestonar ls resgos de elbersegurdad | Eaton the products they sell comply with industry cybersecurity standards. That's why we are dedicated to establishing apersecue processes ANd innovating technsiges that make trusted connections work. A connected world needs trusted environments. We are committed to advancing these new technologies and innovations, while building trust and ensuring the highest level of defence against emerging cybersecurity threats. Michael Regelski, Senior Vice-President and Chief Technology Officer, Electrical Sector htpshwwa asr020 Nuestoenfoav pra gstonaros egos de cbersgurdad| Ean How we help enable secure environments Ina hyper-connected worl, trusted environments are a must. Eaton's commitment to defending those environments comes to life at our Product Cybersecurity Centre of Excellence, where our experts develop new ways to help protect, products and systoms against cyberattack, provide internal training and help customers deploy and maintain secure solutions. In many companies, security is an afterthought, made evident by the number of updates deployed to account for process: miscues, But at Eaton, cybersecurity is part of our DNA and an integral consideration, with strict protocols placed on the neon eincesses and iociolosis win our Secure Dovelonmment ieCicle races (SLC), leor-obinarkelsinooapnics. letieesyersnculy lly dndustialanplcalns-nleoraohi hm) the programme that integrates security protocols at every phase ‘of product creation. SDLC spans from inception through te deployment and maintenance, enforcing cybersecurity best practices via training, threat modelling, requirements analysis, implementation, verification and ongoing support. ‘Additionally, our cybersecurity best practices extend beyond our own labs to help keep our customers informed about potential winsrablis /slon-geompan news nsiohsleybersscurtyvunerabliydscosurehiml) and provide industry insights well as tol ot r-gblcompanyinews insights yi). ssveatonal cor tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ana 2611072020 Nuestro entoque para gestonar ls resgos de clbersegurdad | Eaton (doson-ghimarketstnigraphicslsticlesieybersecurily-tllysndustia-appleatonsnvographc nim) CYBERSECURITY STARTS WITH THE RIGHT APPROACH People, process and technology align. 41.6 billion connected devices by 2025 ‘Training is key to our DNA ler nn ate ad a cy a ath ed pO rut in rnc cote ean in remain ars nn hn ‘cig pow Cen cb nt renarrated LISTICLE Learn more about our "secure-by-design" approach to cybersecurity Aseries of industry firsts tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ana 2611072020 Nuestro entoque para gestonar ls resgos de elbersegurdad | Eaton For years, Eaton has maintained strict procedures at every stage of the product development process. This discipline has paved the way for collaboration with renowned standards leader, UL (Un (ntpsumwul.com), to establish ‘measurable cybersecurity criteria for network-connected power management products and systems, witers Laborato fat (eslen gbleompanyinews insgnisinews colaboraionwth-ul-announces:ninl) approved to participate in UL's Cybersecurity Client Lab Validation programme in Pittsburgh, Pennsylvania, And in 2078, UL approved a second Eaton lab o(oin the programme es er-qbicompanyinows-insighsinews {eleas08/201 Beaton sxpends-cybersoury-oqram-o-nlp-safequsrd-crealhtml) — another industry first in Pune, India, These accredited lab environments provide the global capabilly to test Eaton products with inteligence or embedded logic for key aspects of the UL 2900-1 1 standard, ‘As Michael Regelski, Senior Vice-President and Chief Technology Officer for Eaton's Electrical Sector explains, “We know cybersecurity is a global threat and having the capability worldwide to ensure the highest standards are consistently applied to ‘our technology is a key advantage for our customers. ‘There's no need to take chances with connected solutions. With products tested in our specialised labs, our customers can rest easier, knowing Eaton devices are compliant witn the highest industry cybersecurity requirements before they'e installed in critical systems, tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ena 2611072020 Nuestro entoque para gestonar ls resgos de elbersegurdad | Eaton Dual product certification — an industry In addition, the Eaton first programme has most recently been expanded to include cybersecurity certifications under the rc {tnlomationalElecvotechnical Commission) (tositmiscon 62443-4-2 standard as well as UL 2900-1 for Eaton's Gigabit Network tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ena 2611072020 Nuestro entoque para gestonar ls resgos de clbersegurdad | Eaton Card and Industrial Gateway Card. This makes Eaton the first company in our industry to receive dual product certifications under IEC and UL standards. Eaton cybersecurity lab in Pune, India tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ma 251072020 Nuestro enfoque par gestionarlosresgos de chersegurdad | Eaton Eaton cybersecurity lab in Pittsburgh, PennsyWvania, USA Strengthening cybersecurity education and research Eaton’s emphasis on cybersecurity extends to partnerships with universities to atract and prepare the next generation of ‘engineers to develop new securty strategies for connacted devices. For example, we've established the Eston Cybersscurty 81738) at the Rochester Insitute of ‘SAFE (Socurty Assossment and Forensle Examination, sdutnawsston Technology (RIT) to provide students with hands-on experience in solving cybersecurity challenges. Together with RIT, we're helping to equip the next generation of cybersecurity experts with the training and field experience needed to build secure products now and into the future. 8 ways Eaton is taking the lead in cybersecurity View slideshare (https:/)www.slideshare.net/etn_electrical/8-ways-eaton- is-taking-the-lead-in-cybersecurity) Mote security leads to less uncertainty ‘The general requirements for the UL 2900 Standard for Software Cybersecurity for Network-Connectable Products (UL 2900) Include processes to test devices for security vulnerabilies, software weaknesses and malware. Backed by a testing ‘methodology that aligns with UL requirements throughout the product development life-cycle, we're proud to announce a ‘Sories of tecmolooies that mat these UL cysersecuy standards (es (n-ghlcompanyinews-nsichtsineus rleases/20"8leaton-add-new. tps: eaton.com/eston-gblcompanyinews-insightsicybersecury/our-approach-to-managing-cybersecury-sks ml ana 2611072020 Nuestro entoque para gestonar ls resgos de elbersegurdad | Eaton (dusfon-gheatalogtow-voltag-power-

También podría gustarte