ICS CP/PE (Cyber-to-Physical or Process Effects) case study paper German Steel Mill Cyber Attack
|
|
|
- Lorin Bishop
- 10 years ago
- Views:
Transcription
1 ICS Defense Use Case (DUC) Dec 30, 2014 Authors: Robert M. Lee Michael J. Assante Tim Conway ICS CP/PE (Cyber-to-Physical or Process Effects) case study paper German Steel Mill Cyber Attack Note: We are providing a summary of the available information and are basing the details of the incident on the publicly available report. Open-source data gathered throughout 2014 regarding incidents can reveal information about the potential identity of the facility in question. However, the identity of the facility was not released and in an effort to protect the privacy of those involved none of the other open-source information will be presented in this report. The identity of the facility and specific process are not important to establishing lessons-learned. Incident Summary In December, 2014 the German government s Bundesamt für Sicherheit in der Informationstechnik (BSI) (translated as Federal Office for Information Security) released their annual findings report. 1 In one case they noted that a malicious actor had infiltrated a steel facility. The adversary used a spear phishing to gain access to the corporate network and then moved into the plant network. According to the report, the adversary showed knowledge in ICS and was able to cause multiple components of the system to fail. This specifically impacted critical process components to become unregulated, which resulted in massive physical damage. To date, the only other public example of a cyber attack causing physical damage to control systems was Stuxnet. As such, the BSI s reporting of this incident generates a useful case-study to extract lessons learned for the community. 1 ichte/lagebericht2014.pdf? blob=publicationfile (See Appendix for Translated Text) SANS ICS
2 Credibility: 4 - The available information and reporting is being evaluated as probably true. So far the BSI is the only source to have reported the incident and the details of the story cannot be corroborated in other publicly available information. However, the BSI is a government agency and has shown accuracy with regards to incident reporting. Simple credibility rating system. 2 Amount of Technical Information Available: 2- The information available provides details of how the intrusion took place into the corporate network. However, the report does not discuss the attack methodology in the plant network nor does it release technical details. Simple descriptive rating system 3 2 Credibility of the information is rated in a scale from [0] Cannot be determined, [1] Improbable, [2] Doubtful, [3] Possibly true, [4] Probably true, [5] Confirmed 3 Amount of technical information available is an analyst s evaluation and description of the details available to deconstruct the attack provided with a rating scale from [0] No specifics, [1] high-level summary only, [2] Some details, [3] Many details, [4] Extensive details, [5] Comprehensive details with supporting evidence SANS ICS
3 Attacker Tactics, Techniques, and Procedures (TTPs) Description The original German report did not provide details about the attacker nor their TTPs, but we should consider their evaluation of the attacker s knowledge regarding ICS. Attacker - There is no definitive evidence attributing the attacker to specific individuals or organizations. The BSI described the incident as an APT 4 -Attack but no discussion of motive has been publicly released. From the information release if we characterize and evaluate one possible profile for the actor as an APT threat actor with a typical focus on intellectual property theft, not intentional process damage. For this reason, we can possibly consider an adversary that utilizes traditional APT tactics and tools, however their ultimate goal is beyond intellectual property theft. Capability - The initial capability used to infiltrate the facility s corporate network was a phishing . The BSI s report described this attack vector as an advanced social engineering attack which multiple attackers used to gain access to the network. The adversaries then worked their way into the production (ICS) networks. From previous analysis of spear-phishing related incidents with ICS facilities it is highly likely that the contained a document such as a PDF that when opened executed malicious code on the computer. This malicious code would have then opened up a network connection for the attacker(s) unbeknownst to the facility s personnel. No information has been presented on how the adversary moved into the production network but analysis of similar case-studies would indicate probable traversal through trusted zones and connections between the corporate and plant network. Details of the target s architecture and services along with attacker techniques would be very valuable to assist in additional defensive learning. Consideration of the steel industry and the massive scale of facilities and operating environments is an important area to evaluate when examining this event. For example, if this was an integrated steel mill with a large number of process environments or if this was a mini-mill environment, or a rolling mill environment, there is a significant difference in the process scale and the corresponding scale of attack vectors (for a basic description of the operational differences see the reference on mini-mills 5 ). The translated report makes note of an impacted furnace, however does not provide further detail on the type (blast furnace, basic oxygen furnace, arc furnace) and therefore does not provide enough information to determine the type of damage that could have been caused by mis-operating the process specifically. 4 Advanced Persistent Threat (APT) is a description that has been used by NIST to describe highly targeted attacks that often have full time staffing and monetary support to pursue operations usually for the purpose of espionage. 5 SANS ICS
4 Opportunity - Corporate networks present a highly valued target for adversaries interested in ICS. Corporate networks often have connections into, or important credentials for, the ICS network that adversaries can exploit. Many of these process networks were built as separate islanded systems that allowed necessary communications from higher level process networks as required for operations or control. Over time business requirements for additional visibility, ordering, scheduling, and remote support have required additional communications from traditional IT networks into the process control networks. Adversary groups have demonstrated capability to pivot from these higher-level networks into the operational networks through these trusted communications channels. In the event that networks are not connected, the data that exists on corporate networks is useful to attackers; this information can include ICS specifications or schematics as well as personnel data such as s and network information that can be used to attempt another attack vector. In this case-study, the adversary exploited target personnel s willingness to open untrusted s to gain access to the network and then the corporate network s connection to the plant network. SANS ICS
5 Motivation No information has been publicly presented on the attacker(s) motivation. Multiple theories can be drawn including industrial sabotage for competing contracts or national interests, environmental extremists, or an individual or group testing out capabilities and tactics whether the physical damage was intended or not. It is unlikely that the attacker was a disgruntled employee or insider threat given the initial attack vector of a phishing . An insider threat would have had more accessible and non-attributable means to cause havoc in the network. However, at this point very few theories can be ruled out. The motivation becomes a very interesting dimension if damaging the operation was actually the attacker s goal. While a number of facilities have undoubtedly experienced an event that caused some level of operational impact, that was the result of equipment failure or human error, and most are recovered from quickly. What is interesting in the report is the wording that the attackers had advanced know how in ICS and knowledge of the process and most importantly were able to achieve massive damage to the process. The description in the BSI report and accompanying knowledge on process incidents leads the authors to believe the process damage was intentional. SANS ICS
6 Attack Surfaces & Paths According to the report the exploitation of the German steel mill took place by targeting on-site personnel in the corporate network. The BSI report also stated that the targeted group were industrial operators. Adversaries targeted the personnel with spear phishing s. Recent ICS-targeted technical threats have included this style of targeting with phishing s as was observed in the HAVEX 6 and BlackEnergy2 7 campaigns. Targeting and delivery techniques have focused on specific individuals, trusted relationships with ICS and industrial suppliers, and the need to download files. The phishing s would have contained a document that hosted malicious code. Once opened the malicious code would have targeted a vulnerability in an application on the target s system. Once the application was exploited the target system would have opened a remote connection point allowing adversaries access to the network. The second stage of the attack would have involved the adversary accessing the network and, as observed in previous cases, establishing a foothold on the network through the compromise of small sets of workstations. Internal reconnaissance by the adversary from these systems would have provided access of credentials or unsecured systems and connections. This type of reconnaissance is typically performed through the use of keyloggers, network scanning, and the compromising of systems such as Active Directory. The second stage of moving into the plant network and final stage of the attack leading to the physical damage is unknown (see Figure 1). To help defenders better visualize an adversary performing these attack steps, and pivoting through a business network please reference a free SANS cyberattack video that was put together for utility control systems, however it is applicable to the steps and approach discussed throughout this defense use case SANS ICS
7 Figure 1: Exploited Vulnerabilities by IT/ICS Component Impacted Systems & Functions The source stated there was: an accumulation of breakdowns of individual components of the control system or of entire facilities. The furnace was then unable to be shut down properly which resulted in unexpected conditions and physical damage to the system. See Figure 2 for a description of Steel Mill operations. Figure 2: Integrated Steel Mill SANS ICS
8 Systems that were known to have been impacted: Individual control system components Furnace (uncertain on type based on translated report) Components that were also possibly impacted given the scenario: Centralized controls based on a Programmable Logic Controller (PLC) Alarm systems Safety Instrumented Systems (SIS) Human Machine Interface (HMI) The individual control system functions could have been one or more: 9 o Burden control o Burden distribution o Mass and energy balances o Kinetic process models o Hot-blast system The combined impact may have resulted in a Loss of Control (LoC) for plant operators and possible malicious control leading to physical destruction. Example Blast Furnace Safety Incident (non-cyber attack related) Figure 3 and Figure 4 show an example blast furnace to assist in visualizing these systems and their individual components. Both images are taken from a report prepared by the United Kingdom s (UK) Health and Safety Executive office regarding the explosion of blast furnace Number 5 that took place at Corus UK Ltd, Port Talbot, UK on November 8 th, The list is generated from lists of known steel plant components related to blast furnaces and not from direct reporting on this specific case-study. SANS ICS
9 Figure 3: Example Column-Supported Blast Furnace 10 This tragic event claimed the lives of two while injuring thirteen others. This incident was not related to a cyber attack but the UK s report highlights the potential impacts of blast furnace explosions and various lessons learned regarding incident response and safety SANS ICS
10 Figure 4: Example Close-Loop Blast Furnace Ibid. SANS ICS
11 Defense Lessons Learned The German steel mill cyber attack is significant because of the physical damage that resulted as well as the German government s willingness to release information regarding the incident. Sharing incident reports is extremely valuable to deriving lessons learned and best-practices for defense and incident response. Even though this example lacks technical details it provides multiple learning points for defender s to consider. Regardless of facility type or sector, the most significant component of this report is the demonstrated capability and willingness of an attacker to attack through traditional APT style methods and then advance to a cyber physical attack with an intent to impact an operational environment. Technical: Architecture The corporate network s connection to the plant network provided the attacker the opportunity to impact the process and physically damage systems. Air gaps have long been discussed in the ICS community but are largely not feasible and are unreliable (at a minimum files often move across these gaps). However, connections that must exist between networks should be heavily regulated through the use of a demilitarized zone (DMZ) with specially tuned firewalls, focused monitoring, and defense systems. Specifically, access points into the network should be documented, controlled, monitored, and limited. The limitation of these access points creates defined points in and out of the network that creates chokepoint type functionality. Network Security Monitoring Proper architecture, such as limited access points or chokepoints, creates opportunities for network security analysts to collect and monitor data traversing networks and network data internal to the ICS IP-network. Network Security Monitoring (NSM) allows for analysts to actively view and understand network communications to identify anomalies and adversary tactics. Attackers that traversed from the corporate network to the plant network could have quickly been identified by NSM tactics. Additionally, the attackers movement inside the plant network, including any scanning to perform network reconnaissance, would have also been identifiable. A very powerful defender s advantage for ICS is to control and monitor all egress traffic from the more trusted network. Another powerful tool is to establish a canary host on the ICS network that has no other purpose then to behave as a tripwire if the machine is accessed or communicated to or from. SANS ICS
12 Incident Response In the scenario, the operations personnel on site presumably realized that a cyber-related incident may have occurred as at some point they made contact with the BSI. This likely reflects great professionalism on the part of both the BSI and the facility s members. Additionally, it is worth noting that there was no indication of harm to human life, which indicates responsible and reliable engineering of physical safety systems. The learning point though is that while this infrastructure may have been critical to the organization it was likely not to be considered critical infrastructure. Yet, adversaries targeted it and caused significant damage. Defenders do not get to choose whether or not they make good targets; only attackers get to decide. It is important to have incident response plans ahead of time including the incorporation of cyber-attack scenarios. These plans pay dividends to ensure the reliability and safety of infrastructure while discerning root causes of incidents to better future defense. People: Security Awareness/Base Knowledge All of cybersecurity efforts begin with people and it is where many cyber incidents also begin. The development of an overall cybersecurity strategy to protect both the corporate network and plant systems begins with system owners and cybersecurity specialists. The susceptibility of deployed technology can lie purely in the technology, but in many cases it can be a combination of how the technology is configured or through actions taken by authorized system users and administrators. Many of the recent ICS-focused technical threats have included targeting and delivery techniques that have focused on human and work practice vulnerabilities. Attackers look for easy paths to gain footholds on trusted networks and place themselves within reach of important data and credentials that can help them achieve a freedom of movement and action. This report states that operators of industrial plants were targeted and highlights the need for both corporate system and plant system users to receive and demonstrate competency in security awareness and base cybersecurity knowledge as it applies to their individual role. There are strong arguments for providing this training based on the type of work being performed and using the language that best aligns to the context of the technology and operation. Developing engineering focused modules allows security program managers to relate common day-today activities to secure and less secure behaviors. i It is important to address issues like remote access procedures, downloading technical data sheets or software/firmware from the Internet, providing publicly available information, etc. SANS ICS
13 Implications / Predictions The incident reported by BSI has profound implications for ICS defenders as the incident points to cyber actors that are knowledgeable of targeting and delivering cyber attacks against ICS as well as possibly effecting controlled equipment. The use of highly successful APT TTPs to move from the corporate network into the plant network validates a primary attack vector into ICS. Attackers will continue to use trusted connections and harvest information and credentials to compromise more trusted networks. Several North American cyber incidents have also pointed to ICS capable and interested attackers compromising corporate networks via spear phishing and waterhole styled attack vectors. More ICS-capable attackers will be coming to light in the coming years as the community becomes more open with sharing incidents. Only a few will seek to physically damage equipment under control but each pose serious threats to impacting the process either intentionally or accidentally. SANS ICS
14 Conclusion The authors thank the BSI for publishing information about this incident and requests consideration to release more detailed information to assist in developing lessons learned. Likewise, organizations across the various ICS industries are asked to find an appropriate way to share incident case-studies and best practices developed. In many industries this can be done safely through the industry specific Information Sharing and Analysis Centers (ISACs). If an appropriate way forward is not identifiable please feel free to contact the authors of this report without including specific or sensitive information; the authors will make points of contact available for assistance. More information will help focus recommendations and lessons that can be relayed to asset owners and operators. ICS-capable and targeted cyber attacks represent a threat that exceeds existing ICS security best practices. Many security controls are static in nature and are much more effective in combating less structured, non-targeted, cyber attacks. ICS defenders will need to enhance their security capabilities moving beyond the perimeter defense model and addressing how people interact with and expose ICS to cyber threats. Follow us on Twitter for additional updates: SANS ICS
15 Appendix: Translated Text from BSI Report i SANS has developed specific training for both cyber security professionals and plant technical staff along with focused Secure The Human (STH) modules for Engineers. Additionally, SANS has introduced ICS410: ICS Security Essentials and the Global Industrial Cybersecurity Professional (GICSP) to provide and test essential ICS cybersecurity knowledge for IT personnel, OT support, and engineering staff. SANS ICS
ICS Cyber Attacks: Fact vs. Fiction and Why it Matters
ICS Cyber Attacks: Fact vs. Fiction and Why it Matters Presenter: Robert M. Lee www.sans.org/ics @RobertMLee @SANSICS Today s Agenda Fiction Fact: ICS Attacks Deconstructed What You Can Do About It Read
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
NCCIC CYBER INCIDENT SCORING SYSTEM OVERVIEW
NCCIC CYBER INCIDENT SCORING SYSTEM OVERVIEW Many incident taxonomies and classification schemes provide excellent guidance within the scope of a single enterprise s security operations center (SOC). However,
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
The Four-Step Guide to Understanding Cyber Risk
Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated
Industrial Control System Cyber Situational Awareness. Robert M. Lee* June 10 th, 2015
Industrial Control System Cyber Situational Awareness Robert M. Lee* June 10 th, 2015 Executive Summary Cyber situational awareness is the concept of understanding and visualizing the networked environment
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015
Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products
Threat Intelligence: The More You Know the Less Damage They Can Do Charles Kolodgy Research VP, Security Products IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Agenda Evolving Threat Environment
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3
GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
TLP: White Analysis of the Cyber Attack on the Ukrainian Power Grid. Defense Use Case
TLP: White Analysis of the Cyber Attack on the Ukrainian Power Grid Defense Use Case March 18, 2016 Table of Contents Preface... iii Summary of Incidents... iv Attacker Tactics Techniques and Procedures
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
ICS-CERT Incident Response Summary Report
ICS-CERT Incident Response Summary Report 20092011 OVERVIEW The Department of Homeland Security (DHS) Control Systems Security Program manages and operates the Industrial Control Systems Cyber Emergency
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Nuclear Security Requires Cyber Security
Nuclear Security Requires Cyber Security A. DAVID MCKINNON, PH.D., MARY SUE HOXIE Cyber Physical Security Team, National Security Directorate Project on Nuclear Issues (PONI) Fall 2015 Conference PNNL-SA-113027
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Building Security into Your Industrial Internet Phillip Allison Tempered Networks Discussion topics Threats to network security TCP/IP
Missing the Obvious: Network Security Monitoring for ICS
Missing the Obvious: Network Security Monitoring for ICS If ICS are so vulnerable, why haven t we seen more attacks? We aren t looking! Two Key Reasons Intent Visibility Intent Why are targeted attacks
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
I N T E L L I G E N C E A S S E S S M E N T
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?
A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
Enterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Cybersecurity Awareness. Part 1
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge
Targeted Intrusion Remediation: Lessons From The Front Lines Jim Aldridge All information is derived from MANDIANT observations in non-classified environments. Information has beensanitized where necessary
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
Vulnerability Analysis of Energy Delivery Control Systems
INL/EXT-10-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy
IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 [email protected]
IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 SECURITY IS A PROCESS, NOT A STATE CARVE SYSTEMS LLC [email protected] Carve s Roots (tl;dr)
SPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
BT Assure Threat Intelligence
BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Technical Testing. Network Testing DATA SHEET
DATA SHEET Technical Testing Network Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance your security posture, reduce
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security
The Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Defense Security Service
Defense Security Service Defense Security Service Cybersecurity Operations Division Counterintelligence UNCLASSIFIED Defense Security Service DSS Mission DSS Supports national security and the warfighter,
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Cyber attack on Twitter, 250,000 accounts hacked
HEADLINES Impact and Cost At least 19 states have introduced or are considering security breach legislation in 2014. Most of the bills would amend existing security breach laws. According to the Ponemon
New York State Energy Planning Board. Cyber Security and the Energy Infrastructure
New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview
Five Steps For Securing The Data Center: Why Traditional Security May Not Work
White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center
Breakthrough Cyber Security Strategies. Introducing Honeywell Risk Manager
Breakthrough Cyber Security Strategies Introducing Honeywell Risk Manager About the Presenter Eric D. Knapp @ericdknapp Global Director of Cyber Security Solutions and Technology for Honeywell Process
Cyber Security for Corporate and Industrial Control Systems
WHITE PAPER Cyber Security for Corporate and Industrial Control Systems Darktrace Industrial Immune System Provides Continuous Threat Monitoring for Oil & Gas, Energy, Utilities, and Manufacturing Plants
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
Next Generation Security Strategies. Marc Sarrias Regional Sales Manager [email protected]
Next Generation Security Strategies Marc Sarrias Regional Sales Manager [email protected] IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst
ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION
LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell Mandiant, a FireEye company [2014 SANS European ICS Summit] About me Currently: Principal Consultant on Mandiant s Industrial
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
NETWORK PENETRATION TESTING
Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes
Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
18th Annual Space & Missile Defense Symposium IAMD Evolution and Integration/Key Topic: Predictive Cyber Threat Analysis Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
White Paper. Five Steps to Firewall Planning and Design
Five Steps to Firewall Planning and Design 1 Table of Contents Executive Summary... 3 Introduction... 3 Firewall Planning and Design Processes... 3 Step 1. Identify Security Requirements for Your Organization...
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats WWW.COMODO.COM
WHITE PAPER Endpoint Security and Advanced Persistent Threats The Invisible Threat They re out there waiting. Sitting at their computers hoping for you to make a mistake. And you will. Because no one is
Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.
Contents Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined. Technical OverView... Error! Bookmark not defined. Network Intrusion Detection
How To Handle A Threat From A Corporate Computer System
Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
FIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
Cyber Security Implications of SIS Integration with Control Networks
Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program
Cybersecurity: An Innovative Approach to Advanced Persistent Threats
Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used
Solution Path: Threats and Vulnerabilities
Solution Path: Threats and Vulnerabilities Published: 24 January 2012 Burton IT1 Research G00226331 Analyst(s): Dan Blum This solution path helps Gartner clients develop a strategy and program for managing
The Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
