Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Siemens USA launches cybersecurity analytics lab to help protect operational technology

cybersecurity
September 17, 2020

Siemens USA announced the launch of its technologically advanced cyber test range housed at its U.S. R&D headquarters in Princeton, New Jersey. The COVID-19 pandemic and the related increase in cyberattacks has highlighted the need for facilities such as this to focus on prevention, detection, and response solutions. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) put out an alert recommending immediate actions to mitigate attacks on operational technology (OT).

The Siemens cyber test range was designed to test emerging cybersecurity technologies against real-world scenarios to help detect and mitigate potential vulnerabilities. The cyber range has set out to become a hub where data scientists, security experts, and others can come together to perform innovative research in the field of cybersecurity and rapidly prototype and validate new research ideas.

Siemens’ new cyber range combines traditional capabilities such as vulnerability research, product security testing, capture the flag exercises, incident response exercises and cyber defense product evaluation with Siemens’ extensive expertise in OT and cybersecurity. Siemens’ expanding collection of operational technology hardware and software components makes the range more useful for a variety of industrial focused security research.

“Cybersecurity is at the center of everything we do at Siemens. This cyber range will help Siemens continue to innovate in the field of critical infrastructure cybersecurity and build industry confidence in secure digitalization of America’s operational technology,” said Kurt John, Siemens USA’s Chief Cybersecurity Officer. “With this cyber range our customers and partners can now join us on our ongoing journey to help mitigate cyberattacks and protect America’s critical infrastructure.”

This facility was designed with flexibility in mind, allowing remote operation and range components to be moved to other locations such as conferences, universities, government research labs, and even customer environments. Siemens has partnered with the Atlantic Council to use this cyber range to enhance students' experience during their Cyber 9/12 Strategy Challenge series through simulation of cyberattacks on critical infrastructures like advanced water treatment and power generation facilities. More on this educational partnership will be announced at a later date.

Siemens’ partnerships with other cybersecurity vendors and researchers also enable the company to bring in energy, manufacturing, building automation, and healthcare technologies from inside and outside the Siemens network for testing. Combined with Siemens’ expertise on security topics concerning these fields, the cyber range is uniquely positioned to perform critical and innovative cybersecurity research.

Today, Siemens and its products are supported by a global organization with more than 1,200 cyber experts. The company’s products and solutions have industrial security functions that are built-in by design and enabled by default. They support the secure operation of factories, systems, machines, and networks by its customers. From water treatment facilities and power plants to manufacturers, Siemens provides an expanding collection of OT hardware and software components to American customers, with security as its top priority.

To protect these systems deployed at customer sites and within Siemens, the company implements – and continuously maintains – a holistic, highly advanced industrial security strategy leveraging Siemens products and solutions as well as leading suppliers in the industry. This multi-layered “defense-in-depth” approach includes real-time monitoring providing operational insights that can support taking joint action with customers to mitigate threats and risks.

This cyber range will be another space for Siemens to hone and master the technology foundational to a Fourth Industrial Revolution. And, most importantly, it is a space for leaders to build trust in connected infrastructure to shape a sustainable, resilient future.

KEYWORDS: cyber resilience cyber security national security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • police crime scene

    Speech Recognition Technology Offers New Ways to Help Protect Officers’ Safety and Well-Being

    See More
  • NIST Releases Cybersecurity Guide for Energy Sector to Improve Operational Technology

    See More
  • The Long and Winding Road to Cyber Recovery

    MIT launches SCRAM, a tool to help enterprise security prioritize investments

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • The Complete Guide to Physical Security

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • September 23, 2025

    From Signal to Action in Seconds: How Nutrien Translates Early Warnings into Operational Confidence

    ON DEMAND: When a threat emerges — how fast can your team respond? The ability to detect, validate and act with confidence can be the difference between a contained incident and a costly crisis.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing