Cybersecurity is of vital importance. Literally, in the case of PALLAS, because that organization is making the new isotope reactor: the PALLAS reactor. This advanced nuclear object is needed, among other things, in the treatment of cardiovascular diseases and cancer. It goes without saying that its security must be excellent. Ruud Koning (manager at PALLAS and responsible for cybersecurity) and Edwin Roijers (design manager cybersecurity for control systems at Croonwolter&dros) will talk about this during the Industrial Cyber Security Event on October 10. We will already give you a sneak preview. 

 

Security of vital importance

The security of the new medical isotope reactor must meet the highest requirements; both national and international organizations monitor this. “The security has a social interest, in the context of health and medicine: the isotopes can only be used for a few days,” Ruud explains. So there is no stock. If the device fails, medical treatments will come under pressure. Ruud: “Ultimately, it is about people's lives.” 

 

PALLAS is the new medical isotope reactor and will replace the outdated High Flux Reactor (HFR) in Petten. That HFR dates from the 1960s and is due for replacement. The arrival of the new PALLAS reactor will enable the Netherlands to continue helping millions of patients for the next fifty years.

 

Security by design

Edwin was called in to provide the PALLAS reactor with the right security. “I am responsible for the entire security package,” he says. That is a nice challenge, given the required security level of the medical isotope generator. Edwin: “There are many OT systems that all cyber secure must be made and sometimes also have relationships with IT systems.” Edwin and his team therefore work on the principle security by design“We think: how do we fill it in, what steps do we need to go through and how do we integrate it?” 

 

Edwin has an I(C)T background. From there he grew into technological installations and was always busy with integral assignments. “The integration of different disciplines and disciplines from an architecture to a technical implementation. That went from the architect to construction, electrical engineering, mechanical engineering, security and quality assurance – and everything in between.” He compares that work with his current position: “Actually, it has a lot in common: I now also work with specialists who give their own interpretation to a certain aspect.”

 

Challenge

According to Edwin, most people are used to 'improving something'. The starting point is known: a current device or a current situation. "But when setting up the security of the PALLAS reactor, we start from scratch. That is more difficult than you might think." At the same time, he also calls it a unique situation: "You are allowed to submit a new design, based on new systems. A different approach than improving a current system." 

 

Security split

The isotope reactor should be ready in 2030. Thinking about future security now is an additional challenge. That requires a modular approach. Edwin explains: “All the right system blocks will be installed, so that we can implement possible adjustments properly later.” 

Edwin: “Sometimes we are in a quandary. Then we have to choose: are we going to do something? cyber secure or do we need to take other measures because of the availability? Safety always comes first. We need to get the most out of it.” 

 

Preview of the presentation

During the Cyber Security Event, the specialists will take you through the security of the advanced isotope reactor. Ruud: “I will talk about PALLAS; what exactly that isotope reactor is and what we make. We are part of the vital sector – which means we have to comply with many measures and requirements – and that means we have to take security to a higher level than an average company. That is interesting for the audience.” 

Edwin elaborates on the design process: “And specifically about security by design. What if you could start all over again? What do you pay attention to? How do you approach that? What steps do you take? How do we do that? How do we guarantee quality? Using examples, I can explain during the presentation: that doesn't happen the way you can read it somewhere in a book." 

 

Would you like to hear more from Ruud Konings and Edwin Roijers and learn more about cybersecurity in the industry? Then register now for the event on October 10 at Congrescentrum 1931 in Den Bosch. 

 

Related companies

FHI, federatie van technologiebranches
nl_NLNederlands