Why TÜV SÜD Says It Is an Industrial Cybersecurity Leader

The international testing firm is positioning itself as a neutral and nimble industrial cybersecurity authority.

Brian Buntz

November 28, 2018

5 Min Read
Industrial security
Getty Images

MUNICH—Some 67 percent of all companies are affected by security incidents each year, said Andy Schweiger, the managing director of cybersecurity services at TÜV SÜD, the international testing, certification and training organization. And the “era of script kiddies is gone,” Schweiger said, referring to the aspiring hacker wannabes who rely on online resources to launch cyberattacks. “[The script kiddies who] were making headlines 10 to 15 years ago are now grown up,” he added. As a result, current cyberattacks tend to be more damaging. State actors have assumed a greater role in launching attacks and developing malware, which occasionally leak as in the case of the EternalBlue exploit, giving underworld hackers the ability to launch exceptionally damaging attacks. And some attackers are leveraging machine learning for subterfuge and identifying vulnerable targets.

To deal with the challenge, TÜV SÜD, like UL in the United States, is increasingly positioning itself as an authority in industrial cybersecurity. There are five reasons TÜV SÜD is up for that task, said Schweiger in a presentation as part of a Siemens cybersecurity press junket here. First, it is knowledgeable about the evolving regulatory requirements, such as GDPR, that relate to cyber. (On a related point, manufacturers mass-producing IoT-connected gadgets find themselves potentially liable for the damages caused by wide-scale cyber-exploits to their products). Second, the organization keeps a close eye on the current threat landscape. Third, it has built up a solid team of cyber experts. Fourth, it is neutral and objective. And finally, it claims to be a proverbial “one-stop shop” for cybersecurity.

[IoT World is the event that takes IIoT from inspiration to implementation, supercharging business and operations. Get your ticket now.]

The organization’s English tagline is: “Add value. Inspire trust.”

TÜV SÜD has worked to quickly build up a team of some 30 plus cyber experts in a six-month time frame. If there is a central goal to its cyber approach, it is to enshrine cyber strategy over tactics. “There are thousands of brands,” said Schweiger, speaking of the cyber vendor landscape. “The promise is: You buy the next appliance, and you will be more secure,” he said. “But that is not necessarily true.”

In fact, an organization that buys dozens of security appliances and has a cybersecurity team of roughly a dozen could find itself less secure. Instead of having a comprehensive cybersecurity strategy, it would likely have a patchwork defense that leaves them vulnerable.

Schweiger said that TÜV SÜD’s status as a provider of cybersecurity services rather than products makes it more nimble than product providers. If a new vulnerability emerges, the company can swiftly adapt to develop strategies to address it.

Its core cybersecurity services fall under four domains, data protection (such as data protection consulting and data destruction), commercial transaction security, industrial cybersecurity (such as AI-based security testing and network anomaly detection) and expert services (such as attack service detection, risk exposure assessment and penetration testing).

In the industrial realm, the company works to help organizations’ OT and IT departments converge rather than flatly declare that each is simply different from the other. “If you attach an OT to IT system, all of the challenges of the IT system come over to the OT system,” Schweiger said. The organization also says it helps to optimize OT and IT efficiency and reuse customer internal processes with shared best practices.  

Related Content

Risk is an equation comprised of an asset, a vulnerability and a threat, said Stefan Laudat, ‎information security manager at TÜV SÜD Sec-IT GmbH. But unlike in traditional IT security, industrial cybersecurity cannot just put data, productivity and system availability at risk but can potentially threaten human lives or cause injuries. An industrial environment that includes potentially vulnerable critical infrastructure can impact surrounding communities. And prominent aerospace companies, for instance, are testing exoskeletons to allow their workers to lift heavy objects. If one of these devices were breached or maliciously configured, it could pose a grave threat to its wearer.

The current cyberthreat level in the industrial space is moderate to high, Laudat said. While current actors are more or less dormant, they are investing substantial money in researching industrial-focused attacks while the cost of launching such exploits is steadily falling. Sites like Shodan make it simple for attackers to do reconnaissance on potential industrial targets.

The scope of vulnerabilities in industrial environments can also be considerable in industrial environments, given typically weak access control systems, the preponderance of proprietary protocols, a limited regulatory framework, complex supplier networks and generally low IT security awareness. In addition, the widely used IoT protocol MQTT is lightweight, resilient and insecure, Laudat said. And the long lifespan of many connected industrial devices can expose them to substantial vulnerabilities over time.

In some cases, the organization advises its industrial clients to avoid digitization and stick with analog technologies when the potential cyber threat is unacceptable.

TÜV SÜD’s cyber approach does not rely on conventional audits, where one or two experts will travel to a company and perform interviews. “The answers come out of the interviews. In the best case, they are biased. In the worst case, they just tell you what they want,” Schweiger said. But the organization’s cyber approach relies on automation to gauge its clients’ cyber risk. “The system doesn’t lie to us,” he added.  


About the Author(s)

Brian Buntz

Brian is a veteran journalist with more than ten years’ experience covering an array of technologies including the Internet of Things, 3-D printing, and cybersecurity. Before coming to Penton and later Informa, he served as the editor-in-chief of UBM’s Qmed where he overhauled the brand’s news coverage and helped to grow the site’s traffic volume dramatically. He had previously held managing editor roles on the company’s medical device technology publications including European Medical Device Technology (EMDT) and Medical Device & Diagnostics Industry (MD+DI), and had served as editor-in-chief of Medical Product Manufacturing News (MPMN).

At UBM, Brian also worked closely with the company’s events group on speaker selection and direction and played an important role in cementing famed futurist Ray Kurzweil as a keynote speaker at the 2016 Medical Design & Manufacturing West event in Anaheim. An article of his was also prominently on kurzweilai.net, a website dedicated to Kurzweil’s ideas.

Multilingual, Brian has an M.A. degree in German from the University of Oklahoma.

Sign Up for the Newsletter
The most up-to-date news and insights into the latest emerging technologies ... delivered right to your inbox!

You May Also Like