Demonstrators
As a novelty in this edition of the event, a space for IoT (Internet of Things) Demonstrators and SCA (Industrial Control Systems) is covered within the 13ENISE exhibition area.
The projects selected to participate in the space for 13ENISE Demonstrators are the following:
Institution | Demonstrator stand number | Project | Description |
---|---|---|---|
authUSB SL | 1 | authUSB SafeDoor |
authUSB safeDoor is a hardware device that acts as a barrier between USB drives and an organisation’s equipment, identifying threats at three levels:
|
Bidaidea | 2 | Cybersecurity and Comprehensive Security System in Wind turbines |
Wind turbine components are designed to last for 20 years. This means they must withstand more than 120,000 hours of operation, often under extreme weather conditions. The more the digitalisation, the more the security risks. The large wind turbines are equipped with various OT/IoT safety devices and technologies that guarantee safe operation during their useful life (Sensors, Rotor blades, Runaway protection, Aerodynamic brake system, Mechanical brake system, orientation mechanisms, power control, anti-fall devices, etc.) Real time Cybersecurity and Comprehensive Security monitoring system with a connection to CRA/iSOC. |
ElevenPaths - Telefónica Cybersecurity Unit | 3 | Threat detection in IoT solutions and honeypots as sources |
The demo presents the complete deployment of a smart threat detection service for IoT based on:
The demo consists of three steps:
|
Enigmedia | 4 | Enigmedia Mercury |
It is a demonstrator that simulates a utility (power grid or water treatment plant) on which cyber-attacks will be carried out to show its vulnerabilities. Enigmedia's Mercury solution will be applied transparently to this demonstrator and will show its ability to stop and detect these cyber-attacks.. |
Gradiant - Galician Telecommunications Technology Foundation Centre | 5 | ORBIS |
ORBIS is a tool to support the arrival of Industry 4.0 in manufacturing sector companies and therefore improving operational excellence. To do that, ORBIS combines classic methodologies, such as Lean Six Sigma, with the most innovative features at the ICT level, applying Internet of Things technologies for flexible data capture in the plant and the integration of OT/IT networks, Big Data architectures for the efficient management of generated data and advanced data analysis techniques for knowledge extraction and helping decision making. All this done with a modular and highly flexible design that makes it possible to adapt the tool’s features to the needs of the client. |
Inprosec Auto | 6 | SANTI: Security Analysis of network threats in industry |
SANTI consists of an industrial network device that is responsible for:
|
Open Cloud Factory | 7 | Visibility and control of all assets within a process |
It will demonstrate how Adaptive Digital Defense is able to quantify and qualify all assets connected to an OT environment and how it can establish the dependencies that exist between the assets. The organisation is offered a continuous logical view of the environment, as well as a simple static photo. The demonstration will show how organisations can manage assets, assigning specific variables to incorporate the organisational logic. For example, label assets by control levels. That is why an organisation establishes zones and conduits according to IEC IEC6443-3-2. With this information an operational process from the console can be graphically visualised. |
Secure & IT | 8 | Attack simulation and monitoring security events in the industrial environment |
The model is intended to represent type and specific scenarios of industrial environments likely to face malicious or involuntary actions, where the operations may be affected. It is made up of a set of both physical and virtual equipment and systems, in order to carry out different demonstrations and approximations of protection on a case-by-case basis. |
SSHTEAM | 9 | TOTAL SOC |
When the perimeter security is non-existent, insufficient or fails, the combined probe and intrahoneypot solution is the way to detect attacks internally. Adaptable to both IT and OT (industrial) and domestic (IoT) environments. Users will be able to manage, review, program alarms in a centralised way in case of possible internal attacks or strange traffic. |
Tecnalia | 10 | Blockchain IDS for industrial environments |
The demonstrator consists of a Raspberry Pi device pretending to be a RTU (Remote Terminal Unit) type device, with an agent that monitors the status of several files that change when a user logs into the system and sends the hash of those files to a Blockchain. The Smart Contracts of that Blockchain compare the hashes received with the ones it has stored and reports if there has been a modification, which makes it possible to quickly detect intrusions. If the user can access the RTU, a green and red LED lights up in case of unauthorised access. |