Do you have a safe? Is that safe opened with the same key as your house? Of course not, that would not be particularly prudent.
Have you identified your most valuable possessions? But then why not put everything that glitters in the safe? Well, everything that glitters is not gold as the old saying goes. Besides, that would not be very cost effective.
In cyber security terms your crown jewels are your business-critical production systems. The OT systems that run the heart of your manufacturing and production plants.
You might be starting to get the picture where this is going.
Malicious attackers are also trying to find out (or have already succeeded in identifying) your crown jewels. These are the targets that can be leveraged to cause the most disruption to a company’s production. Especially if your operations are moving towards IIoT-enabled, inter-connected digital manufacturing and outside Cloud services to gain in agility, flexibility, and efficiency.
You need to identify and protect your crown jewels before someone else finds them and exploits them.
So, if you need help with identifying your crown jewels and ensuring that they are properly guarded against increasingly frequent, costly and damaging cyber-attacks, ABB is here to help.