GLOBAL OMNIUM INAUGURATES THE FIRST CYBERSOC OF THE WATER SECTOR IN SPAIN
- The Minister of Finance, Vicent Soler, inaugurated this technological innovation on cybersecurity, implemented by Global Omnium
- This CyberSOC, developed jointly with S2 Grupo, is a pioneer in Spain, and specializes in the protection of Operation Technologies (OT)
- Cybersecurity is a strategic key that Global Omnium manages to guarantee the continuity of service to its more than 7 million customers in the event of any contingency
(Valencia, November 27, 2018) The Minister of Finance, Vicent Soler, inaugurated the Cybersoc created by Global Omnium to guarantee the security of all its infrastructures against possible cyber attacks, this being the first in Spain, exclusively specialized in protection of Operation Technologies (OT). This coincides with the celebration of the 'Cybersecurity in the era of digital water' Conference that has allowed Global Omnium and its technological partner in the matter, S2 Grupo, to present its cybersecurity strategy to guarantee continuous service to its more than 7 millions customers. In this sense, to face this challenge of the XXI Century, Global Omnium has made a great technological effort based on 2 key initiatives: a.- Development of "cybersecure" technological solutions b.- Implementation of a novel CyberSOC in Spain specific to OT, to deal with cyber-threats and cyber-incidents that could jeopardize the guarantee of continuity of essential public services, by focusing on the defense and response of IT technologies that allows today, in the era of digital water, the maximization of efficiency in the management of an essential resource for life such as water. As Juan Luis Pozo, Director of Sustainability and CISO of Global Omnium acknowledges, “A simple gesture like opening a tap and having the absolute guarantee that water will come out in sufficient quality and quantity cannot and should not be vulnerable to the actions of hackers and computer pirates". To this end, this company has developed numerous cybersecure technology solutions in the Big Data Platform. Pozo explained that 'our Big Data platform enables the configuration, implementation and administration of application stacks in a flexible and scalable infrastructure environment, and includes all the necessary measures and tools to protect both your data and your analytical processes from attacks, thefts or other malicious activities that could seriously damage them'. The platform presented at the Conference was designed taking into account the highest industry standards in computer security, providing complete security coverage, allowing resources and budgets to be reallocated to other business priorities. In this way, the customer can improve threat detection and response times by using the native security features provided by Platform itself, which includes both data protection, and backup and recovery. For his part, José Rosell, managing partner of S2 Grupo, explained that "This CiberSoc, unique in the sector and located in Valencia, is the result of the Global Omnium cybersecurity strategy developed with the support of S2 Grupo. The center has been designed to manage cyber threats and respond to cyber-incidents that may jeopardize the continuity guarantee of one of the essential public services, such as water supply. Without a doubt, it is a great commitment of this company to invest in the security of citizens by guaranteeing this service. " European demand in cybersecurity The entry into force of the NIS Directive on cybersecurity extends the obligation to protect Critical Infrastructures Information Systems to all Essential Infrastructures. Based on RDL 12/2018, of 7 September, on network security and information systems, a series of security conditions are established for operators of essential services and digital service providers, with a system of penalties for non-compliance. The NIS Directive involves a new culture of information security in all areas and sectors of the EU, especially in Operating technologies which are the essence of digital transformation, and that have the following peculiarities:
- Most industrial operating systems today were not designed with the security of a hypothetical Internet connectionin mind, and a large percentage of these systems at the time security needs were raised were located in an environment, at least in its beginnings, as if it were a DMZ Demilitarized Zone, ending in the typical and erroneous industrial assertion: "our OT is totally isolated".
- However, it is obvious and evident that this initial philosophy of developing Industrial Control Systems in a limited context of connectivity has been modified quickly with the arrival of Industry 4.0, which has generated in many organizations a wide ignorance of the vulnerability and the dangers of the real transformation of the supposed "DMZ" of its Industrial Control Systems.
- The evolution of the traditional industry due to competitiveness and survival to the new environment 4.0 integration of the requirements of a virtual environment with manufacturing, represents a change of economic model, in which cybersecurity is an essential requirement for this business survival strategy to have a future.
More information: prensa@wonderful-jemison.82-223-151-98.plesk.page