Are you an engineer or manager who understands the challenges associated with sharing part and product data from concept to end-of-life, and who wants to explore emerging technologies to alleviate these challenges? If so, you are encouraged to Join DMDII for a technology showcase focused on informing product design with data-driven insights from across a product lifecycle.
Written by Cytellix - an IMEC cybersecurity partner
There has been a lot of recent news and discussion about several malware variants that have been defined as ransomware attacks. There are and have been other damaging malware attacks, but ransomware popularity is currently very well publicized.
Ransomware attacks are not simple but are commonplace in the market today. These attacks typically find their way into an organization through social engineering. To be more specific, the malware is embedded in an attachment as an executable. There are several outcomes from ransomware that we have seen thus far: an individual machine is encrypted and the decryption key is held for ransom by the attacker and a currency request of a “Bitcoin” is requested to decrypt the machine in question. The nastier variants can traverse from machine to machine through the network, creating a systemwide infection. This attack causes severe networkwide shutdowns, causing an organization to recover through more significant ransom payments, or if the company was prepared, backup remediation steps are taken.
By John Remsey, IMEC Senior Technical Specialist
Cybersecurity has become a hot topic within manufacturing over the past months, especially for the Defense supply chain with the federal government increasing their emphasis on addressing threats to the security of information. In December 2015, the U.S. Department of Defense (DOD) released a rule to the Defense Acquisition Federal Regulation Supplement (DAFRS) that requires government contractors to implement the requirements of National Institutes of Standards and Technology (NIST) Special Publication (SP) 800-171 by December 31, 2017. With this deadline fast approaching, conversation, and urgency, to become compliant is increasing.
Every week, articles are published proclaiming 3D Printing is going to radically change the way that the world works, with some going so far as to predict that we’re on the brink of a global manufacturing revolution.
While those of us who work in manufacturing might say that’s going a bit far, I think many of us are rightfully excited about the potential to harness this thirty-year-old technology in new and exciting ways to continue to drive efficiencies, accelerate prototyping timelines and bring customized end products to the market.
The challenge, of course, is the same as exists with the adoption of any new technology -- figuring out when it’s right for your business, how it can best be implemented and what barriers to adoption exist (ideally before you hit them). 3D Printing continues to be an expensive technology when it comes to industrial-grade equipment, making it a sizeable investment for companies who are interested in exploring it.
Like any new initiative, having a clear plan and asking the right questions at the outset can help pave a smoother path forward. Based on my experience in helping companies of all sizes, there are three key things to keep in mind as you evaluate whether 3D Printing is right for your business.
Skokie Smart Manufacturing Summit
November 4, 2015
2:00 p.m. to 5:00 p.m.
Social/Networking/Tours: 5:00 to 6:00 p.m.
Illinois Science + Technology Park (IS + TP)
8045 Lamon Ave.
Skokie, IL 60077
Technology advances are increasingly changing the way products are designed and produced. The Village of Skokie is hosting an informational event on November 4, 2015 to bring together thought leaders and local business owners to discuss ‘smart manufacturing’ technologies and share ideas about collaborating in preparation for the next age of industrial design and production. The goals of the summit are to provide:
- A broad overview of technology trends that impact product design, customization and production
- Practical information regarding software and hardware capabilities and information about how manufacturers are adopting new processes
- Insights into workforce development and training resources
When confronting the serious risks posed by industrial cyberattack, today’s manufacturers need a comprehensive set of capabilities—best-practice standards and compliance as well as workforce training and education.
The International Society of Automation—the worldwide professional association of automation professionals and an IMEC partner—has developed proven industrial automation and control systems (IACS) standards (ISA99/IEC 62443) and a widely recognized compliance and testing program (ISASecure™) to ensure IACS device and equipment conformance to the standards.
Results of a recent survey by the Pew Research Center, canvassing more than 1,600 leading experts on the Internet and computer systems and networks, predicted that a major industrial cyberattack will occur sometime within the next 10 years that will cause widespread harm to America’s security and welfare. “Widespread harm” was defined as significant loss of life or property losses/damage/theft in the tens of billions of dollars.
The International Society of Automation (ISA)—a global leader in industrial automation and control system (IACS) cybersecurity standards and compliance, training and certificate programs; and an official IMEC partner—is working with the US government and leaders throughout industry to increase awareness of growing cyberthreats and to underscore how to best combat them.