CyberSecurity is a challenge

Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies.

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s also known as information technology security or electronic information security.

Security and risk management leaders are key enablers of digital business and are accountable for helping the enterprise balance the associated cybersecurity challenges and benefits.

Within the context of IIoTSBOM, the main focus of CyberSecurity will be on the purchase, installation, management and maintenance of industrial internet-connected (IoT) devices and related software and applications or technologies.

For manufacturing environments the IIoTSBOM-project does not intend to focus on the process and organisation of CyberSecurity of the industrial network, potential cybersecurity challenges related to industrial control systems and legacy end point devices, nor on web applications not directly related to internet-connected devices. However, we recognise and will support the need to improve the overall awareness on CyberSecurity for manufacturing, in industrial contexts and to improve CyberSecurity in the Supply Chain.

In collaboration with CyberSecurity experts and manufacturing experts from the partners (LSEC, Flanders Make, KU Leuven and CISA) the IIoTSBOM project will also continuously seek to provide insights and materials to support CyberSecurity in Manufacturing and industrial environments.

Since CyberSecurity is ofcourse not limited to only the industrial sector, and since the industrial sector is relying on other sectors (energy, logistics, transport, agriculture, finance, …) to be able to operate, the IIoTSBOM project will consider discussions throughout the supply chain, and aims to improve the overall value chain.

As CyberSecurity also spans beyond IIoT, more in particular IoT – and other connected devices; the IIoTSBOM activities include topics in relation to the CyberSecurity of IoT and potential vulnerabilities related to the components that make up IIoT.

Overall, while SBOMs (Security Bill of Materials) and IIoTSBOM are there to support CyberSecurity, we will continue to have an open perspective on developments in relation, that either can complement SBOMs – or even replace them. While having a clear focus, IIoTSBOM will not work in a vacuum but aims to connect and to establish relationships in perspective of the bigger good : CyberSecurity of devices and operations that can thrive business and operations with a reasonable understanding of potential risks on business and society as a whole.