HOME CONFERENCE AGENDA SPEAKERS REGISTER

A Customised Pen for each Attendee *T&C apply

Manufacturing companies consistently strive to improve their production efficiency and product quality, despite growing market complexities. They’re on a continuous path to optimize plant operations against all odds, be it rising raw material and labor costs, ever-increasing demands for product customization by customers, reducing order sizes, and shrinking margins, to name a few.

Socioeconomic changes and technology innovations have driven the manufacturing industry towards a new digital world. Companies around the world are leveraging digital technologies to enhance efficiency and optimize production.

Smart metering has become the core of the utility business and meter data is the source for all measurements and analytics. According to IDC, “Utilities are churning out 40% of their earnings using new business models and services.” Digital maturity can help a utility company to have a much higher success rate and save 33% extra in crucial cost items, says another study.

However, digitization brings a host of challenges too. According to a report, the automotive industry was the target of nearly 30 percent of the data breaches in manufacturing last year, closely followed by the chemical manufacturing sector.

The theft of intellectual property is identified as one of the top data breaches in this industry. Without doubt, intellectual property theft costs billions of dollars every year and leads to job losses. The manufacturing industry is more prone to damage from the theft of intellectual property because of counterfeit products and stolen designs.

The sector is not only targeted by hackers and cyber-criminals, but also by competing countries and companies engaged in corporate espionage as their target ranges from money and revenge to competitive advantage and strategic disruption.

Rising Risk with IoT

Progressive CIOs of manufacturing companies can help their organizations by gearing them up for the digital transformation of their processes and systems. IoT is a crucial element in the transformation journey, which can be the bedrock for automating and optimizing manufacturing operations.

With the advent of ‘smart grid’ technology and the Internet of Things, challenges have increased not only on the operational side, but also to IT. IT and OT (operational technology) are becoming more interconnected and combining their unique security challenges widens a utility’s attack surface.

In the current scenario, IT security professionals need to gear up to build IoT security solutions that can add value within the OT environment.

In this connected world, more and more industrial systems are connected to the internet, triggering fears that the malicious software infiltrates weak systems and hardware and then spreads itself to other systems.

In manufacturing, there are several incidents where malicious insiders have stolen a company’s intellectual property or other confidential information for personal profit or revenge.

Printers-A Key Source of Security Breaches?

Any breach in a company’s printer can result in unauthorised use of sensitive or proprietary information. The unsecured printers could be a source of harmful disclosure, stolen or compromised intellectual property and trade secrets.

We often overlook the fact that printers are vulnerable and can lead to major data breaches. Printers are one of the most essential devices in any office and carry a considerable amount of confidential data.

Hackers can intercept data during a printing job. There are many incidents that indicate how printers are the prime source of any data breach related activity.

“Data loss through printing is prevalent, even among organisations that operate a managed print service. Overall, 61% reported at least one data loss in the past year,” says Quocirca.

In August last year, 50,000 printers across university campuses in the US were hacked remotely. Just to recollect one more incident, in November 2015, a laser printer was found to be sending out SSL traffic in a security breach on the network.

Therefore, the need of the hour is to plug the security gaps:

Print encryption: To secure the transmission of data, it is important that companies should enable printers with characteristics of automatic file encryption.

Storage media: Imaging and printing devices store sensitive information on internal drives or hard disks, which can be accessed if not protected.

BIOS and firmware: Firmware that becomes compromised during startup or while running could open a device and the network to attack.

Mobile printing: Employees who print on the go may accidentally expose data, or leave printouts unsecured.

Management: Without adequate monitoring, security blind spots across your fleet may remain undetected and increase costly data risks.

Network: Printing and imaging jobs can be intercepted as they travel over the network to or from a device.

Input tray: Special media for printing checks, prescriptions, and other sensitive documents can be tampered with or stolen from an unsecured tray.

Ports and protocols: Unauthorized users can access the device via unsecured USB or network ports or via unsecured protocols (such as FTP or Telnet).

Control panel: Users can exploit imaging and printing device settings and functions from an unsecured control panel, and even disable the device.

Cloud-based access: Unsecured cloud connectivity may expose data to unauthorized users.

Capture: Multi-function printers can easily capture and route jobs to many destinations, potentially exposing sensitive data.

Key Areas of Discussion

How to authenticate, safeguard, secure your data?

Enhance the security of networked printers and multifunction printers (MFPs) by easily authenticating devices and users.
Provide users with a single authentication solution that supports a wide variety of proximity card protocols.

Reduce IT support costs while enabling 7x24 hour availability.


Support organizational security and privacy policies.




WHO SHOULD ATTEND?

It is a must attend webinar for the IT decision makers and influencers such as CIOs, CTOs, CISOs and Head IT from large enterprises.

AGENDA

PROGRAMME SCHEDULE

The Economic Times Live Webinar on Plugging Security Gaps in Manufacturing

03:00 PM
Welcome & introduction by ET
03:05 PM
CIO Panel Discussion: Plugging Security Gaps in Manufacturing Moderated by
Krishna Mukherjee, Content Producer – ICT, ET-Edge
03:30 PM
Secure Printing Solutions to enhance Productivity & Efficiency
Kalpesh Jani, Security Advisor, HP
04:00 PM
Thank you note followed by attendee feedback
SPEAKER
Vijay Sethi
Vijay Sethi
CIO
Hero MotoCorp
Vineet Bansal
Vineet Bansal
CIO
GreenPly
Sachin Gupta
Sachin Gupta
CIO
Havells
Kalpesh Jani
Kalpesh Jan
Sr. Security Advisor
HP
REGISTER

*T&C apply
  • You should be pre-registered for the webinar
  • You must attend the full webinar
  • You must reply to all poll questions, if any.
  • You must fill and submit the feedback form
  • The gift will be sent to your office address within 30 days after the last webinar of the series
1st floor, Vakratunda Corporate Park, Vishweshwar Nagar, Off Aarey Road, Next to Udipi Vihar, Goregaon East - 400063
Phone: +91 8268002168
Email: info@et-livewebinar.com