P.M.C.Nair, Executive Director, Rashtriya chemicals & Fertilizers Ltd.
|
|
|
- Kerry Smith
- 9 years ago
- Views:
Transcription
1 P.M.C.Nair, Executive Director, Rashtriya chemicals & Fertilizers Ltd.
2 Rashtriya Chemicals and Fertilizers Ltd. Incorporated in 1978 with the re-organisation of erstwhile FCI Authorised Capital Paid Up Capital ` 800 Crore ` Crore ISO , OHSAS & ISO accreditation for Thal & Trombay. Both the units accredited under IMS. MoU signing since Rated Excellent for 9 consecutive years. (Received Award at the hands of Hon ble Prime Minister for best performance in Fertilizer and Agriculture Sector for , , , and ).
3 CAPACITY OF RCF PLANTS (Figures in Lakh MTPA) TROMBAY THAL UREA (Ujjwala) SUPHALA 15:15: SUPHALA 20:20: INDUSTRIAL CHEMICALS Apart from above, RCF Trombay unit also produces 100 % water soluble SUJALA fertilizers (Drip and Foliar), Bio-fertilizer BIOLA, micro nutrients fertilizer MICROLA.
4 RCF Ltd.(Trombay unit)
5 RCF Ltd.(Thal unit)
6 PROCESS PLANTS OF RCF LTD. WITH INSTALLED DCS TROMBAY THAL Ammonia I Plant (350 MTPD) Ammonia Plant (1750 MTPD X 2) Ammonia V Plant (1045 MTPD) Urea Plant (2020 MTPD X 3) Urea Plant (1000 MTPD) Methylamine Plant (15 MTPD X 2) Nitric acid Plant (1100 MTPD) Formic acid Plant (30 MTPD) Suphala Plant (1100 MTPD) DMF (7 MTPD) ANP Plant (1000 MTPD) DMAC Plant (15 MTPD) Sulphuric acid Plant (330 MTPD) Thal Ammonia extension Steam generation Plant (170 MTPH X 3) Steam generation Plant (275 MTPH X 3) Phosphoric acid Plant (100 MTPD) Argon plant (46 MTPD) Methanol Plant (240 MTPD) CO Plant (1200 NM3/HR) Sewage treatment Plant (5 MGPD) PGR Plant (14.5 MTPD)
7 SCENARIO OF INDUSTRIAL CONTROL SYSTEMS (ICS) IN RCF All continuous process plants are equipped with state of the art technology DCS (Digital control system) from reknown vendors. DCS are of i/o capacity ranging from 250 to 10,000. RCF Ltd. also has SAP system which works independently on Factory Intranet. Advanced process controls(statistical process controls) for Ammonia & Methanol plants.
8 RCF Highlights: Industrial control systems (ICS) in all plants of RCF are presently working isolated & independent and are not connected to any commercial MIS through Ethernet. DCS WITH EMBEDDED AVG / FIREWALL PROCESS PLANTS CORPORATE IT & SAP Hence DCS system security depend only on Firewall & Antivirus software embedded in individual system. There is no corporate IT involved in MIS or system security.
9 RELEVANCE OF PLANT SECURITY IN TO DAY S FERTILIZER & CHEMICAL INDUSTRY ENVIRONMENT
10 INDUSTRIAL SECURITY - TODAY S INDUSTRY AWARENESS : Industrial control systems (ICS), commonly encompassing DCS, PLC, SCADA and others are used for process monitoring and control. In future, Process industry would expand to permit access to, MIS for Technical depts., Top Mgt., Directors, Marketing depts., SAP, Intra-plant data viewing However, the vulnerability & consequences of cyber attacks against and infections of ICS can be much more serious and damaging. Safety, environmental impact, business sustainability and other factors are at risk.
11 The problem is that commercial products are common targets for hackers, cyber criminals, and malware, thereby increasing safety, environmental, business, and other risks. But if ICS are connected with these commercial systems then they are at equal threat as to those commercial systems. United States Cyber Command (USCYBERCOM) is America s answer to cyber warfare
12 .
13 All systems are vulnerable when attackers have the needed resources, skills, and sufficient time. ICS are used in almost all forms of manufacturing and include a diverse set of components. ICS, such as DCS and PLC-based applications, include unique devices and software such as sensors, actuators, speed control, switches and a very wide variety of automation software components.
14 Following General-Purpose Security Components Must Be Adapted for ICS Use
15 Firewalls : Antivirus Identity Management Remote Access Security System Monitoring & Management Always deployed at perimeter, also used to create zones, a few ICS specific firewalls are offered. Commonly deployed on all stations in ICS. Must be up to date a challenge for ICS User info tending toward common directories, rights still in applications Many differing strategies, need standardized solutions Infrequently used, likely to be a centralized function, needed for quick response to issues Security Patch Management Few ICS owners have auto-mated patch management, but most have documented processes
16 Firewall: Features Stateful inspection packet filtering Application layer firewall VPN gateway URL filtering, Web proxy and Web publishing Virus scanning and IDS McAfee Application Control has been compatibility-tested Configuration manual available
17 Examples of Cyber Attack: U.S. Cyber Consequences Unit on critical infrastructure vulnerabilities shows a 172-ton generator used in dams. The generator affected by a cyber attack demonstrated in the 2007 Aurora Project, capable of physically destroying generators. (Source: U.S. Cyber Consequences Unit)
18 The difference is that the consequences of a successful attack against infrastructure can be far reaching, potentially impacting a large part of a nation s population. Furthermore, ongoing investment in cyber security is significant and needs to be aligned with reasonable risk. Businesses and other ICS owners have always been concerned over the possibility of targeted attacks on ICS systems, but concerns have been dismissed quickly because of the specialized knowledge required for attacks, making the perceived risk low. In 2010, the most important and certainly the most visible ICS cyber security event was the discovery and analysis of the virus infection Stuxnet on Siemens equipment supplied for Iran. Stuxnet is a computer worm discovered in June It initially spread via Microsoft Windows, and targeted Siemens industrial software and equipment. While it is not the first time that hackers have targeted industrial systems. It is the first discovered malware that spies on and subverts industrial systems, and the first to include a programmable logic controller (PLC) rootkit.
19
20 BREAKING NEWS ON 7 TH April,2012
21 IN ESSENCE, TO SAFEGUARD THE PLANT ASSETS AND ENSURE PROPER ACCESS, SYSTEM SECURITY IS IMPORTANT. SECURITY IS ABOUT ENSURING BUSINESS CONTINUITY AND IT CAN BE ACHIEVED BY DESIGNING SYSTEM WITH STRATEGY AND ARCHITECTURE THAT CAN DEFEND AGAINST POSSIBLE BUSINESS INTERRUPTIONS. IT IS BEST TO CREATE SERIES OF PROTECTION LAYERS DESIGNED TO IMPEDE ATTACKERS A SOUND SECURITY STRATEGY MUST INCLUDE EXTENSIVE POLICIES, PRACTICES AND ENFORCEMENT
22 Ultimate goal : Safe and reliable control of an efficient system Today s reality is that we have a long way to go to understand and sufficiently protect our digital world to ensure continuing safety of the electronically controlled physical world. We are at a crossroads in time that requires us to push harder for resources to fix the problem and ensure that those resources are properly aligned with the most appropriate solutions. Every environment is different but the ultimate goal is the same: safe and reliable control of an efficient system. Now it is our goal individually, our company organically, and our industry collectively, to identify the appropriate path forward a path that will continue our prosperity safely.
23 PROS AND CONS OF OPEN COMMUNICATION AND INCREASED NETWORKING OF TODAY S PRODUCTION PLANT
24 The Pros of Open communication & Networking Integrated into a web accessible interface enables individuals to perform unmanned operation of utilities. Networking with ICS gives real time view of process,raw material and utilities for MIS. Statistical process control with ICS on open communication platform enables optimization of resources and efficiency of plant operation. The Cons of Open communication & Networking Networking open the doorway to potential piracy and invasion of your network to outside sources. The greatest issue with the networks is that of handling Data for information management.
25 Risk analysis of network security in Industrial Control System :
26
27 Methods: Balancing risk against investment is a very complex decision. Where ICS is involved, organizations must find ways to make risk analysis and mitigation a routine and critical process. A method for assessing and rating the risk of a possible vulnerability at a specific facility is needed. The risk is a function of the likelihood (probability) that a defined threat agent (adversary) can exploit a specific vulnerability and create an impact (consequence). Risk = Likelihood X Consequence Likelihood = Threat X Vulnerability The risk induced by any given vulnerability is influenced by a number of related indicators, including: Network and computer architecture and conditions Installed countermeasures Technical difficulty of the attack Probability of detection (e.g., amount of time the adversary can remain in contact with the target system/network without detection) Consequences of the incident Cost of the incident.
28 Potential Impact of a vulnerable network attack :
29 Process Control System Vulnerabilities and IT Threats The introduction of Internet based information technology within the process controls industry has increased vulnerabilities to the industry's computer systems ICS security strategies, components, and processes have a different lifecycle than the control systems themselves. Changing Security threats and new vulnerabilities mean that security processes and components must change to continue to perform their function. The critical national infrastructure industries, can experience risk of impacting large portions of the public. New attacks and vulnerabilities are discovered almost daily, requiring someone within each business to assess risk and develop mitigation strategies. Even the security components must be updated frequently or they become ineffective quickly. Traditionally, ICS have been designed and installed by engineering, but now in large businesses, corporate IT is involved, because of their strong cyber security and system management skills The ISA Security Compliance Institute (ISCI) was formed a few years ago and, in 2010, released its first test specifications. ISCI is now qualifying test laboratories.
30 The major categories of impacts are as follows: Physical Impacts. include personal injury and loss of life. Economic Impacts Social Impacts.
31 Customer/Market Expectations from Automation Vendor regarding security solutions :
32 Customer/Market Expectations Security technologies by themselves cannot guarantee that systems are safe from attack. However, technologies are an essential element for protecting both legacy and new ICS systems. Overall, ICS owner and suppliers have lagged in the use of specific security technologies relative to their corporate IT counterparts, and for good reason. Most security technologies require some adaption to be suitable for ICS. Furthermore, ICS owners must be very cautious about disrupting control systems because of the high cost and high business impact. Each ICS environment requires a security architecture that ensures comprehensive coverage and many security technologies. It is not feasible for ICS suppliers to develop a comprehensive set of security components just for ICS. Some security components such as firewalls and antivirus are common.
33 General-purpose security component suppliers (McAfee, Symantec, Cisco ) cannot justify creating a product just for the ICS industry. Accordingly, the ICS industry must first determine how a general- purpose solution can be adapted for ICS environments. Then, ICS owners must accept the solution. Most ICS owners want to avoid being the first to deploy a new technology and prefer fieldproven solutions. Consequently, this process typically takes time and explains the current situation.
34 Current Scenario of Industrial Security Solutions from different Automation Vendors : There are several security products that are marketed specifically for ICS, while others are general IT security products that are being used with ICS. Encryption : Encryption protects the confidentiality of data by encoding the data to ensure that only the intended recipient can decode it. Firewalls : Firewalls are commonly used to segregate networks to protect and isolate ICS. Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are being deployed on ICS networks and components to detect well-known cyber attacks.
35 Vulnerability and Penetration Testing Tools: There are many tools available for performing network vulnerability assessments and penetration tests for typical IT networks; however, the impacts these tools may have on the operation of an ICS should be carefully considered.
36 Future Outlook :
37 As a prospective user of ICS with embedded security based, technology suppliers need to envisage for the following: While it is widely recognized that the future ICS requires built-in security mechanisms, the functioning of these mechanisms is less clear. In addition, and equally problematic, the adversarial model is not well understood. That is, while the current problems are known, it is not obvious which threats a future open systems must be armed against. However, identifying the adversarial model and anticipating emerging threats is the first step that is necessary to build a secure, future ICS. Only when the community has a solid understanding of the threats that the future ICS might face, appropriate countermeasures can be designed.
38 Thank You!!!
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
ARC WHITE PAPER. Risk Drives Industrial Control System Cyber Security Investment VISION, EXPERIENCE, ANSWERS FOR INDUSTRY MAY 2011
ARC WHITE PAPER By ARC Advisory Group MAY 2011 Risk Drives Industrial Control System Cyber Security Investment Executive Overview... 3 Game Changers for Industrial Control System Cyber Security... 4 Risk
CYBER SECURITY. Is your Industrial Control System prepared?
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect Operation & Optimization Software Activity Schneider-Electric Challenges What challenges are there
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Are you prepared to be next? Invensys Cyber Security
Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber
Security for. Industrial. Automation. Considering the PROFINET Security Guideline
Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
Cybersecurity Training
Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/cybetrn Expert-led training with
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends
Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
The Four-Step Guide to Understanding Cyber Risk
Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated
Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities
Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE
S a f e t y & s e c u r i t y a l i g n m e n t b e n e f i t s f o r h i g h e r o p e r a t i o n a l i n t e g r i t y R A H U L G U P TA
Unraveling the Jargon Between Functional Safety & Cyber Security Related to Industrial Control Systems ( ICS) S a f e t y & s e c u r i t y a l i g n m e n t b e n e f i t s f o r h i g h e r o p e r a
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
HEC Security & Compliance
HEC Security & Compliance SAP Security, Risk & Compliance Office November, 2014 Public Version 2.0 Details Introduction Overview Security Offering Approach Certifications Introduction Dear Customer, Information
Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.
Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD. Your Valuable Data In The Cloud? How To Get The Best Protection! A world safe for exchanging digital information
a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng.
SCADA and CIP Security in a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng. CTO, Byres Security Inc. What is Stuxnet? The Stuxnet Worm July, 2010: Stuxnet worm was
Computer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager
A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks Alex Leemon, Sr. Manager 1 The New Cyber Battleground: Inside Your Network Over 90% of organizations have been breached
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Industrial Cyber Security Risk Industrial Attacks Continue to Increase in Frequency & Sophistication Today, industrial organizations
Using ISA/IEC 62443 Standards to Improve Control System Security
Tofino Security White Paper Version 1.2 Published May 2014 Using ISA/IEC 62443 Standards to Improve Control System Security Contents 1. Executive Summary... 1 2. What s New in this Version... 1 3. Why
STATE OF CYBER SECURITY IN ETHIOPIA
ETIOPIAN TELECOMMUNICATIONS AGENCY STATE OF CYBER SECURITY IN ETHIOPIA By Mr. Balcha Reba Ethiopian Telecommunications Agency Standards and Inspection Department Head, Standards Division email: [email protected]
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
The Electronic Arms Race of Cyber Security 4.2 Lecture 7
The Electronic Arms Race of Cyber Security 4.2 Lecture 7 ISIMA Clermont-Ferrand / 04-February 2011 Copyright 2011 Dr. Juergen Hirte List of Content Why Process Automation Security? Security Awareness Issues
Effective Defense in Depth Strategies
Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Security Services. 30 years of experience in IT business
Security Services 30 years of experience in IT business Table of Contents 1 Security Audit services!...!3 1.1 Audit of processes!...!3 1.1.1 Information security audit...3 1.1.2 Internal audit support...3
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative November 2014 Disclaimer Current SCADA Vulnerability Factors Industrial Control Systems 101 Proposed Countermeasures
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
Defensible Strategy To. Cyber Incident Response
Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack
How Secure is Your SCADA System?
How Secure is Your SCADA System? Charles Drobny GlobaLogix, Inc. Houston, TX, USA Our Industry is a Target 40% of cyber attacks on Critical Infrastructure targets are aimed at the Energy Industry The potential
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Industrial Control Systems Security Guide
Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology NIST SP 800-82, Rev 2 and ICS Cybersecurity Testbed Keith Stouffer Project Leader,
TECHNICAL WHITE PAPER. Symantec pcanywhere Security Recommendations
TECHNICAL WHITE PAPER Symantec pcanywhere Security Recommendations Technical White Paper Symantec pcanywhere Security Recommendations Introduction... 3 pcanywhere Configuration Recommendations... 4 General
GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
1 ISA Security Compliance Institute
1 ISA Security Compliance Institute Internationally Accredited Conformance Scheme ISASecure certification programs are accredited as an ISO/ IEC Guide 65 conformance scheme and ISO/IEC 17025 lab operations
Is your current safety system compliant to today's safety standard?
Is your current safety system compliant to today's safety standard? Abstract It is estimated that about 66% of the Programmable Electronic Systems (PES) running in the process industry were installed before
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Evolutionism of Intrusion Detection
Evolutionism of Intrusion Detection Jackie Lai The network technology changes with each passing day; and the attack technique of hacker also weeds through the old to bring forth the new. Worms such as
IT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN. 1250 Siskiyou Boulevard Ashland OR 97520
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN 1250 Siskiyou Boulevard Ashland OR 97520 Revision History Revision Change Date 1.0 Initial Incident Response Plan 8/28/2013 Official copies
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing. 3203 1346_06_2000_c1_sec3
Securing E-Commerce 1 Agenda The Security Problem IC Security: Key Elements Designing and Implementing 2 The Security Dilemma Internet Business Value Internet Access Corporate Intranet Internet Presence
Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering
Network Security by David G. Messerschmitt Supplementary section for Understanding Networked Applications: A First Course, Morgan Kaufmann, 1999. Copyright notice: Permission is granted to copy and distribute
AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005
AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University
Potential Security Vulnerabilities of a Wireless Network Implementation in a Military Healthcare Environment Jason Meyer East Carolina University Abstract This paper will look into the regulations governing
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
SCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA Cyber Attacks and Security Vulnerabilities: Review Jinan Fiaidhi, Yvette E. Gelogo Department of Computer Science, Lakehead University, Hannam University, Korea [email protected], [email protected]
Cyber Security Seminar KTH 2011-04-14
Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid [email protected] Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon
The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
Application Security 101. A primer on Application Security best practices
Application Security 101 A primer on Application Security best practices Table of Contents Introduction...1 Defining Application Security...1 Managing Risk...2 Weighing AppSec Technology Options...3 Penetration
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
Cyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
Protecting productivity with Plant Security Services
Protecting productivity with Plant Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. siemens.com/plant-security-services
A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications March 2012 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective,
