Close
Solo session (30 min)

Architecting Safety Using Cybersecurity Requirements and Assessments

BARCELONA CYBERSECURITY CONGRESS Cyber Threat Intelligence

Tuesday 13, 12:40h - 13:10h | Cybersecurity Congress Room
13-05-2025 12:40 13-05-2025 13:10 Europe/Madrid Architecting Safety Using Cybersecurity Requirements and Assessments Deploying and maintaining safe processes requires planning and applying knowledge from past tests and experiences. Digitized safety equipment—field devices, controllers, servers—communicating via Ethernet or wireless has surged. Vendors are also rapidly deploying cloud-based services directly connected to critical process assets. Considering cybersecurity early in development enhances safety for people, the environment, and operations. This presentation covers cybersecurity in safe operations planning. Attendees will explore the ISA 62443 risk management process and high-level risk assessment data gathering. It outlines requirements for architecting and remotely accessing safety enclaves, including potential cloud assets. Cybersecurity vulnerability assessments will be reviewed to aid planning. By the end, attendees will have a foundation for cybersecurity discussions, enhancing process safety in existing and future environments. Cybersecurity Congress Room

Deploying and maintaining safe processes requires planning and applying knowledge from past tests and experiences. Digitized safety equipment—field devices, controllers, servers—communicating via Ethernet or wireless has surged. Vendors are also rapidly deploying cloud-based services directly connected to critical process assets. Considering cybersecurity early in development enhances safety for people, the environment, and operations.

This presentation covers cybersecurity in safe operations planning. Attendees will explore the ISA 62443 risk management process and high-level risk assessment data gathering. It outlines requirements for architecting and remotely accessing safety enclaves, including potential cloud assets. Cybersecurity vulnerability assessments will be reviewed to aid planning. By the end, attendees will have a foundation for cybersecurity discussions, enhancing process safety in existing and future environments.

Speakers

Pedro Mier

Pedro Mier holds a degree in Telecommunications Engineer ing from the Polytechnic University of Catalonia, MBA from ESADE and PADE from IESE. He is currently President of AMETIC (Association of Electronics, Information Technology and Telecommunications Companies of Spain), Shareholder and Chairman of the Board of Directors of TRYO Aerospace & Electronics, Board Member of the Premo Group and Committee of CTTC. member of Space Angels Network and Member of the Sc ientific Advisory

Close