Cyber Security. Protecting the UK water industry
|
|
|
- Bertina Logan
- 9 years ago
- Views:
Transcription
1 Cyber Security Protecting the UK water industry
2 In today s connected world, cyber attacks are a daily occurrence. These attacks can have potentially disastrous consequences for water companies and the millions of customers served by major water treatment assets. 7 MONTHS AVERAGE TIME TAKEN TO DETECT A SUCCESSFUL INTRUSION INTO A COMPANY SYSTEM MANDIANT M AVERAGE COST PER EVENT OF THE MOST DAMAGING ATTACKS BIS, 2014 UP TO1 MILLION CYBER ABUSE ATTACKS IN THE UK EVERY DAY CERT-UK, % OF LARGE BUSINESSES HAVE EXPERIENCED SOME FORM OF CYBER ATTACK BIS, ,000 NUMBER OF INDUSTRIAL CONTROL SYSTEMS (ICS) IN THE WORLD. 80% OF THESE ARE CONNECTED TO THE INTERNET 40% PERCENTAGE OF COMPANIES WITH ICS WITH IDENTIFIED OR SUSPECTED SECURITY BREACHES IN 2014 UP FROM 28% IN 2013 SANS, 2014 SHODAN, 2014
3 The number of targeted attacks on industrial control systems (ICS) has seen a sharp increase with 2014 reporting the highest number to date. In some cases these have resulted in significant physical and environmental damage SCADA SYSTEM SABOTAGED MAROOCHY, AUSTRALIA Disgruntled ex-employee hacks SCADA system to cause raw sewage spill (Abrams & Weiss, 2008) WATER TREATMENT SYSTEM HARRISBURG, PENNSYLVANIA, US Foreign hacker plants malicious software via insider laptop (Tudor & Fabro, 2010) CANAL SYSTEM, WILLOWS, CALIFORNIA, US SCADA system sabotaged (McMillan, 2007). CITY TRAM NETWORK, LODZ, POLAND Teenager causes derailments by using modified TV remote control to change track switches (Leyden, 2008). STUXNET WORM IRAN Nuclear centrifuges damaged (Kushner, 2013) DIGITAL ROAD SIGNS AUSTIN, TEXAS, US Hacker changes multiple signs to read Zombies Ahead (Computer Weekly, 2011). WATER TREATMENT PLANT ILLINOIS, US ICS passwords stolen from vendor database; thousands of homes affected (The Guardian, 2011). STEEL MILL GERMANY Hackers cause significant damage to blast furnace (Zetter, 2015). It is therefore critical that all companies take measures to protect assets from remote access, interference, insider threats, and third party risks. The UK water industry is facing increasing encouragement from the government to ensure it is adequately protected from cyber attacks. ICS typically used by water companies tend to be older, legacy systems designed before internet connectivity was so common. Whilst the technical protections associated with corporate or customer data are relatively mature, the vulnerability of operational technology or ICS has not been widely understood.
4 Make sure your people are not the weak link Dealing with cyber security demands a multi-disciplinary approach with people, process, and technology all working together to form multiple security layers. Whilst there is clearly a need for technological improvements to protect assets, the most significant reduction in risks can be achieved through interventions associated with people and processes. Focussing on human factors in complex and diverse technical environments such as cyber security enables organisations to achieve maximum value from existing assets through a defence in depth approach. Each organisation has a large number of operational staff, maintenance staff, and system administrators, all with different levels of access to the company s critical systems and information. With people routinely moving between departments, joining or leaving the organisation, there needs to be robust controls, access procedures, selective security vetting, and clear behavioural expectations set around cyber security. Cyber security is everyone s responsibility To date, cyber security has typically involved technical specialists using technical language and sophisticated technology, and only a modest amount of general user awareness has been needed. With increasing threats to ICS, organisations need to ensure all employees understand and appreciate the risks involved, and take responsibility for how they behave to keep themselves and their organisation protected from cyber attacks. Third party risks The UK water industry relies heavily on third party contractors and key software vendors, which means potentially large numbers of contractors have access to critical company systems. The majority of these also use their own hardware to connect to company systems, which poses additional risk of infection (deliberate or accidental). Robust controls are needed to manage these third party risks. Asset databases and BIM Data aggregation will increasingly be an area of vulnerability and will require careful management. Strategic advice on detection and response Technology strategy and architecture Security governance and processes Our service offering We believe cyber security should be considered in the context of a broader holistic security framework and requires interface with existing enterprise governance frameworks such as corporate risk management. Our cyber security services integrate six strands: DEEP INDUSTRY KNOWLEDGE Risk and vulnerability assessment Education and awareness Asset management
5 Our approach Arup has extensive experience in integrating people, processes and technology, having delivered a number of projects for clients in the aviation, finance, highways, nuclear, oil and gas, rail, and utilities markets. We understand the issues being faced by the UK water industry including the outcomes from the latest periodic review PR14 and associated financial pressures. As approved UK government security consultants we have clearance for UK water CNI security installations. We are strong supporters of the UK Government National Cyber Security Programme with close links to DEFRA and its cyber security programme. People We believe the key focus areas for the water industry are senior leadership, key practitioners, and employees. Programmes to deliver cultural change are a strong part of Arup s portfolio with our team of behavioural psychologists working closely with technical specialists to design a range of bespoke interventions to influence wide scale behavioural change for our clients. These are characterised by increasing staff awareness, understanding, and care for assets and systems. Process A number of standards, guides, and frameworks exist for cyber security. We help clients by translating these complex technical standards and applying a simple approach to advise on best practice and ensure understanding and compliance. Technology We advise clients on implementing a policy-driven security architecture that is closely integrated with an organisation s enterprise architecture, IT and OT governance framework, and corporate risk management framework. As well as protecting information and systems, an effective security architecture must provide assurance that this information is being protected, and must enforce transparency and accountability for actions. Asset information We are committed to promoting the successful application and implementation of BIM and other Big Data initiatives. We understand both the benefits and impacts on projects, and help our clients to develop riskbased processes to mitigate the emerging threats associated with their adoption. PEOPLE Education and cyber care training for all staff Executive coaching on managing cyber risks Critical National Infrastructure cyber management Leadership development Organisational design Knowledge management Team performance PROCESS Cyber security process review Compliance monitoring for cyber Governance & strategy Security vetting Managing Third Party cyber risks Risk assessment OUR APPROACH TECHNOLOGY Policy-driven security Enterprise security architecture ICS security / vulnerability reviews Technology strategy Identity & access management Asset management Communications security IT = Information technology OT = Operational technology (which includes ICS) Industry standards compliance Procurement support
6 Case studies GILES ROCHOLL PHOTOGRAPHY NATS LLDC GILES ROCHOLL PHOTOGRAPHY Sellafield Classification of documents and personnel security clearance Following the creation of the Infrastructure Strategic Alliance (ISA), we were appointed to provide cyber security consultancy to ensure the secure processing of classified documents in our main project office. Our team provided guidance on personnel security/vetting procedures, physical requirements and operation procedure to the project teams and their support staff. In addition to providing practical advice, we also produced security instructions and supporting documentation. As a result, the project office was accredited by the client. NATS Information security We provided security programme management for NATS enterprise information assurance and cyber security programme. This involved a complete threat and risk assessment, solution design, technical solutions, governance, education and training, and a cultural change programme. We also provided identity and access management services to enable flexible, cost-effective secure access to IT services anytime, anywhere and from any device. This will enable NATS to achieve substantial reductions in IT operating costs and carbon emissions, whilst providing staff with significantly greater flexibility, agility and convenience in their use of information services. Olympic Delivery Authority Secure information exchange We helped define and deliver a secure portal for information exchange classed at RESTRICTED level in the Government Security Classification Scheme. This involved complex stakeholder management and required a holistic approach to integrate people, process, and technology. Our team translated the client s business needs into detailed definitions of requirements; evaluated the options; and used TOGAF to deliver the solution acting as the client s representative. We provided secure remote access services; Electronic Document and Records Management System (EDRMS) packages; locked down and highly secured end-points; advised on technology requirements; developed and implemented robust starters and leavers processes; and developed security training packages. Physical security for UK water companies We are providing physical consultancy for assets including critical national infrastructure, chemical stores and office facilities. Our team has completed audits of existing protective measures to infrastructure, developed strategies for protecting new and refurbished installations, undertaken a CDM Coordinator role, and has completed design, tender and contract administration of installation work. We have produced a design guide to help engineering teams establish baseline security measures using threat and risk assessment techniques, and have also provided fence specifications and audited the installations for compliance. References Abrams, M., Weiss, J., (2008), Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia, [on-line] Maroochy-Water-Services-Case-Study_report.pdf last accessed BIS (2014), Information Security Breaches Survey Technical Report, [on-line] system/uploads/attachment_data/file/307296/bis information-security-breaches-survey-2014-technical-reportrevision1.pdf Computer Weekly (2011), Hacker Movie: Zombies Ahead, [on-line] Kushner, D. (2013), The Real Story of Stuxnet, [on-line] spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet Leyden, J. (2008), Polish teen derails tram after hacking train network, [on-line] Print/2008/01/11/tram_hack/ Mandiant (2014), 2014 Threat Report: Beyond the breach, [on-line] WP_M-Trends2014_ pdf McMillan, R. (2007), Insider charged with hacking California canal system, [on-line] article/ /disaster-recovery/insider-charged-withhacking-california-canal-system.html Rose, A. (2013), The internet of things is set to change security priorities, [on-line] The-internet-of-things-is-set-to-change-security-priorities last accessed SANS (2014), Breaches on the Rise in Control Systems: A SANS Survey [on-line] Shodan (2014), Map of industrial control systems on the internet, [on-line] The Guardian (2011), Cyber-attack claims at US water facility, [on-line] cyber-attack-us-water-utility Tudor, Z., Fabro, M. (2010), What Went Wrong? A Study of Actual Industrial Cyber Security Incidents, The Security Incidents Organization, US Zetter, K. (2015), A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever, [on-line] last accessed
7 About Arup Arup is the creative force at the heart of many of the world s most prominent projects in the built environment and across industry. We offer a broad range of professional services that combine to make a real difference to our clients and the communities in which we work. We are truly global. From 90 offices in 38 countries our 11,000 planners, designers, engineers and consultants deliver innovative projects across the world with creativity and passion. Founded in 1946 with an enduring set of values, our unique trust ownership fosters a distinctive culture and an intellectual independence that encourages collaborative working. This is reflected in everything we do, allowing us to develop meaningful ideas, help shape agendas and deliver results that frequently surpass the expectations of our clients. The people at Arup are driven to find a better way and to deliver better solutions for our clients. For further information please contact: David Essex, Associate Director [email protected] We shape a better world.
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
Business Continuity Management Systems. Protecting for tomorrow by building resilience today
Business Continuity Management Systems Protecting for tomorrow by building resilience today Vital statistics 31% 40% of UK businesses have been affected by bad weather related transport problems, power
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
Cyber security and critical national infrastructure
120 Dr Richard Piggin Manager Defence, Aerospace & Communications Atkins Cyber security and critical national infrastructure Abstract Cyber security is an all-embracing term, meaning different things to
What is Cyber Liability
What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE
Energy Cybersecurity Regulatory Brief
Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Keeping the Lights On
Keeping the Lights On Fundamentals of Industrial Control Risks, Vulnerabilities, Mitigating Controls, and Regulatory Compliance Learning Goals o Understanding definition of industrial controls o Understanding
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
What Risk Managers need to know about ICS Cyber Security
What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] ICSs What are they
New York State Energy Planning Board. Cyber Security and the Energy Infrastructure
New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview
Resilience and Cyber Essentials
Resilience and Cyber Essentials Richard Bach Assistant Director Cyber Security Talk outline Why Cyber Essentials: the Policy context What is Cyber Essentials: Scheme background How the Scheme works: accreditation,
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Building Security into Your Industrial Internet Phillip Allison Tempered Networks Discussion topics Threats to network security TCP/IP
developing your potential Cyber Security Training
developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company
How Secure is Your SCADA System?
How Secure is Your SCADA System? Charles Drobny GlobaLogix, Inc. Houston, TX, USA Our Industry is a Target 40% of cyber attacks on Critical Infrastructure targets are aimed at the Energy Industry The potential
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps
Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually
CYBER SECURITY. Is your Industrial Control System prepared?
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect Operation & Optimization Software Activity Schneider-Electric Challenges What challenges are there
A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager
A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks Alex Leemon, Sr. Manager 1 The New Cyber Battleground: Inside Your Network Over 90% of organizations have been breached
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Chief Information Officer
Security manager Job description Job title Security manager Location Wellington Group Organisation Development Business unit / team IT Solutions Grade and salary range Pay Group 1, Pay Band 6 Reports to
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
A specification for security-minded building information modelling, digital built environments and smart asset management
Introduction to PAS 1192-5:2015 A specification for security-minded building information modelling, digital built environments and smart asset management Introduction PAS 1192-5:2015 is a specification
MANAGE THIRD PARTY RISKS
SECURITY FOR INDUSTRIAL CONTROL SYSTEMS MANAGE THIRD PARTY RISKS A GOOD PRACTICE GUIDE Disclaimer Reference to any specific commercial product, process or service by trade name, trademark, manufacturer,
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
The State of Industrial Control Systems Security and National Critical Infrastructure Protection
The State of Industrial Control Systems Security and National Critical Infrastructure Protection Emerging Threats Tinuade Adesina, Lulea University of Technology Sweden IT Security for the Next Generation
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012
Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012 ATC Nuclear ATC-N serves the commercial nuclear utilities in the US and many foreign
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Audit summary of Security of Infrastructure Control Systems for Water and Transport
V I C T O R I A Victorian Auditor-General Audit summary of Security of Infrastructure Control Systems for Water and Transport Tabled in Parliament 6 October 2010 Background Infrastructure critical to the
Committees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
THE HUMAN COMPONENT OF CYBER SECURITY
cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the
CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE
1 CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE Gavin McLintock P.Eng. CISSP PCIP 2 METCALFE POWER STATION 16 April 2013 Sophisticated physical attack 27 Days outage $15.4 million
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
A GOOD PRACTICE GUIDE FOR EMPLOYERS
MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade
CYBER SECURITY Audit, Test & Compliance
www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit
Asset Management. Enabling effective estates strategies >
Asset Management Enabling effective estates strategies Enabling effective estates strategies In these challenging times, we help our clients deliver strategies that contribute to the overall performance
Designing & Building an Information Security Program. To protect our critical assets
Designing & Building an Information Security Program To protect our critical assets Larry Wilson Version 1.0 March, 2014 Instructor Biography Larry Wilson is responsible for developing, implementing and
AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005
AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT
Cybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
How To Protect Your Data From Theft
Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
Oxford City Council ICT Strategy 2015 2018
Oxford City Council ICT Strategy 2015 2018 1 Contents 2 Overview... 2 3 OCC Business Drivers... 2 4 ICT Principles... 3 4.1 Business Requirements... 3 4.2 Information Management... 3 4.3 Applications...
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Unit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
How To Protect Your Business From A Cyber Attack
Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Security for NG9-1-1 SYSTEMS
The Next Generation of Security for NG9-1-1 SYSTEMS The Challenge of Securing Public Safety Agencies A white paper from L.R. Kimball JANUARY 2010 866.375.6812 www.lrkimball.com/cybersecurity L.R. Kimball
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
Industrial Cyber Security 101. Mike Spear
Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security [email protected] Responsible for the Global Delivery of Honeywell
Information Technology Strategy
Information Technology Strategy ElectraNet Corporate Headquarters 52-55 East Terrace, Adelaide, South Australia 5000 PO Box, 7096, Hutt Street Post Office, Adelaide, South Australia 5000 Tel: (08) 8404
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?
ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? Agenda Threats Risk Assessment Implementation Validation Advanced Security Implementation Strategy
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
Defensible Strategy To. Cyber Incident Response
Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack
Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia
Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Marshall D. Abrams, The MITRE Corporation Joe Weiss, Applied Control Solutions, LLC Annual Computer Security
NNIT Cybersecurity. A new threat landscape requires a new approach
NNIT Cybersecurity A new threat landscape requires a new approach Effective cybersecurity is not about spending more money. It s about aligning your security initiatives with the threats and priorities
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
How To Manage Risk On A Scada System
Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document
Compliance Guide: ASD ISM OVERVIEW
Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework
A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER
A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER 1 Agenda Audits Articles/Examples Classify Your Data IT Control
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
SCADA Security: Challenges and Solutions
SCADA Security: Challenges and Solutions June 2011 / White paper by Metin Ozturk, Philip Aubin Make the most of your energy Summary Executive Summary... p 2 Protecting Critical Infrastructure Includes
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Business Case. for an. Information Security Awareness Program
Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security
Procurement Capability Standards
IPAA PROFESSIONAL CAPABILITIES PROJECT Procurement Capability Standards Definition Professional Role Procurement is the process of acquiring goods and/or services. It can include: identifying a procurement
Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective
Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective Terry Jamieson Vice-President Technical Support Branch Canadian Nuclear Safety Commission August 11, 2015 www.nuclearsafety.gc.ca
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM
IIA South Event 16 th June 2015 Cyber, Social Media and IT Risks 1 st and 2 nd Line Perspective David Canham (BA) Hons, MIRM Agenda This evening we ll cover the following: Who, why and what? Traditional
Protection from cyber threats
52 ABB review 4 12 Protection from cyber threats Can utilities and industries afford a cyber security breach? PATRIK BOO The intensity of cyber attacks on IT systems increases with every passing day. Worryingly,
Who s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
Secure Web Applications. The front line defense
Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security
Cyber Security for audit committees
AUDIT COMMITTEE INSTITUTE Cyber Security for audit committees An introduction kpmg.com/globalaci 2 Audit Committee Institute An introduction to cyber security for audit committees Audit committees have
AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK
1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
A Guide to the Cyber Essentials Scheme
A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: [email protected] Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
Protecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project
Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Introduction This Advice provides an overview of the steps agencies need to take
