On November 2, the International Society for Control Systems Cybersecurity (CS)2AI and KPMG released their annual cybersecurity report, focusing on Industrial Control Systems (ICS) and operational technologies (OT). Notably, the report states that more than 12 percent of ICS security incidents are attributed to state-sponsored hacking groups.
F8650X In recent years, cyber attacks on industrial control and manufacturing enterprises such as power plants in Venezuela, energy and industrial sectors in the Middle East, water facilities in Israel, and Norwegian Aluminum Group have shown that more and more state-level, high-level attacks are targeting the industrial Internet.
In this regard, Zhou Hongyi, chairman and CEO of 360 Group, has said in a number of public occasions that the industrial Internet will become the main battlefield of global digital economy development, and the wind it faces will gradually highlight the new characteristics of “big battlefield, big opponent, big target, big layout, big technique, big harm and big challenge”. Among them, “big opponent” means that national hacker teams and high-level APT organizations will become the main threat to the security of the industrial Internet in the future.
Therefore, Zhou Hongyi also proposed that industrial Internet security can only build a new generation of security capability system to resist the threat of high-level hacker organizations and cope with the new security situation.
F8650X During the National Two sessions this year, Zhou Hongyi proposed industrial Internet security solutions as a member of the CPPCC National Committee. At the 2020 World Industrial Internet Industry Conference held in September, he also innovatively proposed five new security concepts, one is security front, bottom design, and build a security capability system. The second is capacity-oriented, infrastructure first, building security infrastructure, and accumulating security capabilities. The third is global connectivity, full-dimensional data, and the construction of a security big data intelligent computing and analysis center. The fourth is people-oriented, continuous operation, and the construction of a security operation center with a security expert team as the core. The fifth is the actual combat test, the capability closed loop, the establishment of actual combat offensive and defensive drills as the core of the capability test evolution mechanism.
Based on the five new security concepts, since last year, 360’s government and enterprise security business has been comprehensively layout China’s network security market, focusing on industrial Internet security as a key area of “government and enterprise security”. 360 Network security Brain has been launched in Tianjin, Chongqing, Qingdao and other places to carry out in-depth cooperation in the fields of industrial Internet, information security, smart city, and new infrastructure, and continue to provide users with large security protection solutions from top-level design to deployment and implementation, and then to operation and management.