
Looking through the  
industrial cyber portal
Every power project has different requirements and components 
that change the prerequisites for cyber security. At the same time, 
cyber security needs to change over the lifetime of a project, making 
it tricky to maintain a holistic overview of projects around the world. 
Siemens Energy has therefore developed an industrial cyber 
security portal that simplies the integration of cyber security into 
each of its projects, with the aim of delivering products and solutions 
that are inherently cyber secure. Junior Isles
denition in alignment with business 
units’ offerings and manufacturing, it 
also enables understandable and opti-
mised implementation of cyber secu-
rity  in  processes,  technology  and 
guidelines.
To address these issues, the company 
recently launched what it calls its In-
dustrial  Cybersecurity  Portal  (ICS 
Portal).
The  portal  is  designed  to  simplify 
security  by  providing  specic  func-
tion modules within a central reposi-
tory.  Tasks  and  outcomes are  stored 
centrally so they can be evaluated and 
documented.  This  will  help  provide 
transparency for the central ICS team 
and the business units themselves. 
Stensletten said: “It is designed to 
serve  as  a  ‘one-stop-shop’  for  ad-
dressing  all  cyber  security needs  of 
any  given  project.  Helping  all  our 
Siemens Energy business units work-
ing with our portfolio, the ICS portal 
provides  transparency,  for  example, 
on relevant security requirements for 
their  assets  as  well  as  guidance  on 
related vulnerabilities and their miti-
gation.  Featuring  automation  capa-
bilities, and the ability to contextual-
ise,  visualise,  and  structure  the 
project data, it has never been easier 
to integrate and maintain cyber secu-
rity in the design of our products and 
solutions.”
The  types  of  risks  that  a  project 
might face could range from  a  vul-
nerability  in  an  individual  compo-
nent  delivered  to  a  customer,  to  a 
solution  from  a  sub-supplier  that 
does  not  meet  the  security  require-
ments of the customer. 
“To remain a trusted partner for our 
customers, our portfolio must become 
secure by design to protect adequately 
against cyber threats, meeting global 
regulatory  requirements  and  stan-
dards.  To  achieve  this  goal  broadly 
and  holistically  can  be  a  huge chal-
lenge.  It  requires a  simplication of 
security  and  the  ability  to  integrate 
cyber security into existing business 
W
hile digitalisation is seen as 
a  key  pillar  of  the  energy 
transition,  the  growth  of 
devices  connected  to  the  industrial 
internet poses a real threat. Certainly, 
it is a major concern for executives. 
According  to  PwC’s  25th  Annual 
Global  CEO  Survey,  44  per  cent  of 
energy, utilities and resources CEOs 
ranked cyber threats as a “top three” 
concern. And of all sectors, energy is 
among the most targeted.
According  to  the  X-Force  Threat 
Intelligence  Index  2022,  the  energy 
sector ranked  as the fourth  most af-
fected  sector  in  2021,  with  8.2  per 
cent  of  all  observed  attacks,  behind 
the manufacturing industry, the nan-
cial sector, and the professional  ser-
vices sector. The war in Ukraine has 
no  doubt  heightened  that  threat.  In 
April,  for  instance,  Ukraine’s  Com-
puter  Emergency  Response  Team 
announced  that  it  had  successfully 
repelled a series of cyber attacks on 
the country’s power grid.
In  the  past,  hacking  energy  infra-
structure would usually require cyber 
criminals to have an on-site deploy-
ment to successfully hack the opera-
tional  technology  needed  to  run  a 
network  or  plant.  With  increasing 
digitalisation,  and  as  information 
technology  (IT)  and  operational 
technology (OT) converge, this is no 
longer the case.
Today, utilities, factories, etc., typi-
cally use IT systems connected to OT 
networks  to  operate  their  digital 
equipment. This makes it easier than 
ever  for  cyber  criminals  –  whether 
nations (cyber warfare) or individuals 
–  to  not  only  inltrate  the  IT  of  a 
company,  but  also  the  attached  OT 
operated  via  those  IT  systems.  To 
keep the critical infrastructure secure, 
providers  of  energy  technology 
equipment nowadays have to provide 
state-of-the-art  cybersecurity  solu-
tions  including  secure  products  that 
meet all legal requirements.
Commenting  on  the  challenges  its 
customers are facing and what it can 
do  as  a company,  Bernhard  Mehlig, 
Industrial  Cybersecurity  Consultant, 
Siemens  Energy,  said:  “Companies 
that provide us with electricity, natu-
ral gas for heating or oil for transport, 
operate  complex  manufacturing  and 
production sites that use digital solu-
tions  to make  their  operations more 
efcient and protable. These are at 
risk  from  various  types  of  hackers. 
The companies that we provide solu-
tions to are becoming more and more 
aware of this. So it is important for us 
to focus on what we can do to ensure 
our customers achieve a secure opera-
tion of the products and solutions we 
provide.”
Rune Stensletten, Head of Industrial 
Cybersecurity  Ofce  (ICS  Ofce), 
Siemens Energy, added: “The indus-
trial  products  and  solutions  we  pro-
vide to our customers cannot be pro-
tected  in  the  same  way  as  IT 
infrastructure. Trying to secure these 
systems is a highly complex task. So 
what we are doing is trying to collect 
and dene best practice and guidance 
centrally and provide it to our internal 
business partners. The purpose of our 
industrial  cyber  security  team  is  to 
support  our  businesses  involved  in 
the  execution  of  customer  projects 
and product development.”
Although each business unit of Sie-
mens  Energy  has  its  own  industrial 
cyber  security  community,  which 
oversees cyber security  for  products 
and solutions coming out of the spe-
cic  business  unit,  the  central  ICS 
Ofce coordinates all the various ef-
forts.  This  includes  cyber  resilience 
of  Siemens  Energy’s  various  manu-
facturing and production sites as well 
as the security of products and solu-
tions provided to its customers.
Such  an  approach  enables  each 
business  unit’s  ICS  community  to 
bring  their  expertise  to  customer 
projects, answering all questions and 
meeting  the  needs  of  the  customer. 
But in an environment that is changing 
quickly there has to be a coordinated 
way of managing this community of 
ICS experts and bringing them up to 
speed with the latest requirements for 
each  product  and  solution.  This  is 
where the central ICS team comes in. 
A good example is the differing and 
evolving  cyber  legislation  in the  re-
gions Siemens Energy is operating in. 
In  the  EU,  the  recently  introduced 
Cyber Resilience Act (CRA) requires 
each project in the energy industry to 
meet  certain criteria.  Cyber  security 
therefore  is  a  business  enabler  and 
market  access  requirement  in  many 
countries, as technology providers are 
not able in some parts of the world to 
conduct business without complying 
with  existing  legislation.  Further, 
customers  themselves  might  have 
specic  requirements  that  can  be  a 
deciding factor in selecting an equip-
ment supplier.
Executing projects worldwide is al-
ready a complex task; and cyber secu-
rity  adds  yet  another  layer  of  com-
plexity  that has  to  be  addressed. As 
Mehlig put it: “There are already a lot 
of moving parts and a lot of resources 
and deliverables have  to  be aligned. 
Cyber  security  adds  to  that.  And  if 
you look at the specic cyber security 
task there is a sequence that has to be 
followed and tasks have to be execut-
ed  iteratively.  You  have  to  have  all 
your ducks in a row.
“This presents challenges for tech-
nology companies, from both a cen-
tral point of view and in a customer 
project context to keep track of risks 
originating  from  cyber  security  is-
sues,  e.g.  non-compliance  to  cyber 
requirements or security vulnerabili-
ties  in products  or  solutions.  Essen-
tially, one needs enough transparency 
when  it  comes  to  cyber  risk  to  act 
appropriately.”
According to Siemens Energy, hav-
ing the tools to keep track throughout 
its cyber community is therefore key. 
Having  this  ability  not  only  drives 
horizontal  cyber  security  portfolio 
Mehlig: “Essentially, one needs enough transparency when it 
comes to cyber risk to act appropriately.”
THE ENERGY INDUSTRY TIMES - FEBRUARY 2023
8
Special Supplement: Cyber security
Stensletten says the portal is designed to serve as a ‘one-stop-
shop’ to address all cyber security needs of any given project