Building a SCADA Cyber Security Operations Center - PCN
|
|
|
- Darleen Briggs
- 10 years ago
- Views:
Transcription
1 Building a SCADA Cyber Security Operations Center - PCN Shah H Sheikh Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK [email protected]
2 Security Operations Center Agenda Building a Security Operations Center Information Security in Depth put into practice Understand overall security architecture Identify ingress points of attack vectors Physical and Logical Security Build a SOC around the above and more importantly build it around; People, Process and Technology
3 Cyber Security - Defense In Depth
4 Why is Cyber Security important? Cost Savings Reduced down time and maintenance costs Improved productivity Enhanced business continuity Simplified Regulatory and Standards Compliance FERC / NERC CIP ANSI/ISA-99 IEC NIST Enhanced Security and Safety Improved safety for the plant, employees and community Improved defense against malicious attacks
5 Critical Infrastructure Operations The Emerging Threat
6 ICS Security - Defense-in-Depth
7 Pathways into the Plant Floor Internet Infected Remote Support Office LAN Mis-Configured Firewalls Infected Laptops Unauthorized Connections SIEM NMS Modems Plant Network Control LAN USB Drives Backup / Recovery 3rd Party Issues External Network
8 Automation Systems Security Really Unique? Corporate IT Automation Systems IT Not life threatening Availability important Transactional orientation IBM, SAP, Oracle,.. People ~= Devices PCs and Servers Web services model is dominant MS Windows is dominant OS Many commercial software products installed on each PC Protocol is primarily HTTP/HTTPS over TCP/IP -- widely known Office environment, plus mobile Cross-industry IT jargon Cross-industry regulations (mostly) Safety first Non-interruption is critical Real-time focus ABB, Emerson, GE, Honeywell, Siemens... Few people; Many, many devices Sensors, Controllers, Servers Polled automation control model Vendor-embedded operating systems Purpose-specific devices and application Many industrial protocols, some over TCP/IP vendor and sectorspecific Harsh operating plant environments Industry sector-specific jargon Industry-specific regulations
9
10 Current Challenges
11 Current Challenges
12 The current SOC landscape
13 Outsourced or In-house?!? VS
14 Why build a SOC?
15 Key Objectives for SOC (1) Manages and Coordinates the response to Cyber Threats and Incidents Monitors the Cyber Security posture and reports deficiencies Coordinates with regulatory bodies Performs Threat and Vulnerability Analysis Performs Analysis of Cyber Security Events Maintains an Internal Database of Cyber Security Incidents Provide Alerts and Notifications to General and Specific Threats Provide regular reporting to Management and Cyber Incident Responders
16 Key Objectives for SOC (2) Reduce the response time of security incident from initial findings, to reporting to containment Recovery Time Objective (RTO) in case of security incident materializing Proactive Security Monitoring based on predefined security metrics / KPI Raise Awareness of Information Security across community of leaders and sub-ordinates Ability to correlate system, application, network, server, security logs in a consistent way
17 Key Objectives for SOC (3) Ability to automate the requirement to meet compliance vulnerability assessment and risk management Ensure change control function is integrated into the SOC process Identification for all security attack vectors and classification of incidents Define disaster recovery plans for ICE (in-case of emergency). Build a comprehensive reporting dashboard that is aligned to security metrics Build a local in-house SIRT (security incident response team) that collaborates with national CERT
18 Key Objectives for SOC (4) To build SOC processes that are aligned to existing ISO27001 security policies Build a physical and virtual team of SOC personnel for 24 x 7 monitoring Build forensics capabilities to be able to reconstruct series of events during an incident Proactive monitoring of network and security infrastructure devices
19 Components of a SOC To build the SOC with simple acceptance and execution model Maximize the use of technology. To build security intelligence and visibility that was previously unknown; build effective coordination and response unit and to introduce automation of security process. Develop SOC processes that are inline to industry best practices and accepted standards ISO27001:2013, PCI-DSS3.0 REAL-TIME MONITORING DATA AGGREGATION DATA CORRELATION AGGREGATE LOGS CORDINATE RESPONSE AUTOMATED REMEDIATION REPORTING EXECUTIVE SUMMARY AUDIT AND ASSESSMENT SECURITY METRIC REPORTING KPI COMPLIANCE SLA REPORTING SECURITY INCIDENT MANAGEMENT PRE AND POST INCIDENT ANALYSIS FORENSICS ANALYSIS ROOT CAUSE ANALYSIS INCIDENT HANDLING aecert INTEGRATION
20 Key Success Factors in a SOC The Goal Keep Things Simple
21 SOC Core Components Core Components for a SOC 2.0 OSS Operational Support System SIEM Security Information and Event Management Proactive Monitoring - Network and Security and Server Infrastructure Alert and Notification Security Incident Reporting Events Correlation and Heuristics / Behavioural / Anomaly
22 SOC Core Components Core Components for a SOC 2.0 Information and Network Security $$ Automation $$ To natively build-in compliance and audit functions To manage change control process through integrated ITILv3 CM and SD Configuration Management of Infrastructure Components
23 SOC Core Components Core Components for a SOC 2.0 Alignment of Risk Management with Business Needs Qualified Risk Ranking Risks are ranked based on business impact (BIA) Risk framework is built into the SIEM solution; incident = risk severity = appropriate remediation and isolation action SOC is integrated with Vulnerability and Patch Management
24 SOC Core Components Core Components for a SOC 2.0 IRH Incident Response Handling How effective the SOC is measured by how incidents are managed, handled, administered, remediated and isolated. Continuous cyclic feedback mechanism drives IRH Critical functions include Network Forensics and Surveillance Tech.. Reconstruct the incident. Evidence gathering Effective Investigation Escalation Management know who to communicate during an incident
25 SOC Core Components Proposed Architecture for the SOC REPORTING AND MANAGEMENT LAYER Security Management, Systems Management, Network Management, Reporting, KPI, SLA, Benchmark, Compliance Management DATA COLLABORATION Policy Management Asset Repository Problem Incident Management Security Incident Reporting Change Control Security Automation SECURITY VULNERABILITY Common Vulnerability Exploits CVE Risk Ranking Configuration Audit Security Metric Dashboard EVENT CORRELATION LAYER Event Correlation Engine Analysis and Filtering Event Management Integration with NMS Systems Trouble Ticket Integration Flow Analysis DATA ACQUISITION LAYER SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) (HTTP, SNMP, SMTP, SYSLOG, API, XML, CUSTOM FILE, LOGFILE Internet IPS WAF FW Middleware SMTP Servers WWW SSL VPN DB Active Directory MAINFRAME Perimeter and Boundary Points Network Nodes DMZ / Published Services Applications Internal Resources
26 SOC Core Components Integration of Core SOC Components
27 SOC Technologies So now the technologies SIEM Solutions Event Collector Syslog, Log Files, Application Log Export Flow Collection NetFlow, J-Flow, S-Flow, IPIX Asset Database Event and Flow Correlation Centralized Management Console for Security Dashboard and Reporting Integration with service desk for automated ticket creation Compliance Management and Policy Conformance Configuration Audit ISO27001 / PCI-DSS3.0 Policy Compliance Risk Management Baseline Configuration Violation Monitoring Network Topology Mapping and Visualization Vulnerability Assessment
28 SOC Technologies So now the technology Network and Security Monitoring Network Performance Monitor - SNMP Network Monitoring Link Utilization Availability Monitoring SLA reporting Integration with service desk for automated ticket creation Security Intelligence Network Forensics Situation Awareness Artifacts and Packet Reconstruction Monitor all Internet Activity Record metadata for recursive analysis during incident response Integration with Incident Response Handling (IRH)
29 SOC (before).. < The Silos > Technology Integration the old practice SIEM Vulnerability Assessment Network Monitoring
30 SOC (after). Automation Technology Integration the new WORKFLOW NMS Compliance and Monitoring SIEM 2.0
31 SOC Processes. Look familiar Creating the SOC Processes now that we have discussed technology, lets discuss processes DATA SECURITY AND MONITORING Data Asset Classification Data Collection Data Normalization Data at Rest and In Motion Data Protection Data Distribution
32 SOC Processes Creating the SOC Processes now that we have discussed technology, lets discuss processes EVENT MANAGEMENT Event Correlation Identification Triage Roles Containment Notification Ticketing Recovery Forensics and Situational Awareness
33 SOC Processes Creating the SOC Processes now that we have discussed technology, lets discuss processes INCIDENT RESPONSE PRACTICE Security Incident Reporting Structure Security Incident Monitoring Security Incident Escalation Procedure Forensics and Root Cause Analysis Return to Normal Operations Post-Incident Planning and Monitoring Communication Guidelines SIRT Integration
34 SOC Processes Creating the SOC Processes now that we have discussed technology, lets discuss processes SOC OPERATING GUIDELINES SOC Workflow Personnel Shift Description Shift Reporting Shift Change Information Acquisition SOC Monitoring Suite SOC Reporting Structure Organizational Chart
35 SOC Processes Creating the SOC Processes now that we have discussed technology, lets discuss processes ESCALATION MANAGEMENT Escalation Procedure Pre-Escalation Tasks IT Security Network Operation Center Security Engineering SIRT Integration Law Enforcement 3 rd Party Service Providers and Vendors
36 SOC Processes Creating the SOC Processes now that we have discussed technology, lets discuss processes DATA RECOVERY PROCEDURES Disaster Recovery and BCP Procedure Recovery Time Objective Recovery Point Objective Resiliency and High Availability Facilities Outage Procedure
37 SOC Processes SECURITY INCIDENT PROCEDURES Phishing - Security Incident Virus and Worm Infection Anti-Virus Management Incident NetFlow Abnormal Behavior Incident Network Behaviour Analysis Incident Distributed Denial of Service Incident Host Compromise - Web Application Security Incident Network Compromise Internet Misuse Human Resource - Hiring and Termination Domain Hijack or DNS Cache Poisoning Suspicious User Activity Unauthorized User Access (Employee)
38 SOC Processes Creating the SOC Processes now that we have discussed technology, lets discuss processes VULNERABILITY AND PATCH MANAGEMENT Vulnerability Research Patch Management - Microsoft SCOM Identification Dissemination Compliance Monitoring Network Configuration Baseline Anti-Virus Signature Management Microsoft Updates
39 SOC Processes Creating the SOC Processes now that we have discussed technology, lets discuss processes TOOLS OPERATING MANUAL FOR SOC PERSONNEL Operating Procedure for SIEM Solutions Event Management and Flow Collector/Processor Firewall Security Logs IDS/IPS Security Logs DMZ Jump Server / SSL VPN logs Endpoint Security logs (AV, DLP, HIPS) User Activity / Login Logs Operating Procedure for Policy and Configuration Compliance Operating Procedure for Network Monitoring Systems Operating Procedure for Vulnerability Assessment
40 SOC Processes Creating the SOC Processes now that we have discussed technology, lets discuss processes SECURITY ALARMS AND ALERT CLASSIFICATION Critical Alarms and Alerts with Action Definition Non-Critical and Information Alarms Alarm reporting and SLA to resolve the alarms
41 SOC Processes Creating the SOC Processes now that we have discussed technology, lets discuss processes SECURITY METRIC AND DASHBOARD EXECUTIVE SUMMARY Definition of Security Metrics based on Center of Internet Security standards Security KPI reporting definition Security Balanced Scorecard and Executive Reporting
42 .Know your infrastructure. You can only monitor what you know Environments Location Device Types System Types Security Zones Demarcation Points Ingress Perimeters Data Center Extranet WAN
43 .Know your infrastructure.
44 Industrial Control Systems Security
45 SCADA Network What is the problem?
46 SCADA Network Isolation and Zoning
47 SCADA Network Secured Zones
48 Defense in Depth Strategy
49 . Service Flows Knowledge on how service flow across your infrastructure. BUILD A SECURITY SERVICES CATALOG
50 . Service Flows Understanding the service flows will allow you to VISUALIZE.. HEAT MAP..
51 Build an Asset Repository Build an Asset Database and Integrated into SIEM; Following asset details can be adjusted with Asset Manager: Name Description Weight Operating System Business Owner Business Owner Contact Information Technical Owner Technical Owner Contact Information Location
52 SCADA / ICS ASSET REPOSITORY
53 Develop Threat Cases Now that we have the processes, technology and people what next.. Build contextual threat cases per environment; Extranet Internet Intranet Data Center Active Directory Malware / Virus Infection and Propagation NetFlow Analysis Remote Sites / WAN Remote Access IPSEC VPN / SSL VPN Wireless etc..
54 Sample: Firewall GAP Analysis Report
55 Sample: Firewall GAP Analysis Report
56 Sample: Firewall GAP Analysis Report
57 ADVANCED THREAT CASES - ENVIRONMENT To define threat cases per environment not by system. (silo) CONTEXTUAL SERVICE ORIENTATED USER CENTRIC ID OS.WIN MSIIS MSSQL MSEXC IBMAIX LINUX SOLARIS PRIVACC N/A BUSINT EXTRNT S2SVPN Threat Case Development Microsoft Windows Servers - Threat Case Development Documentation Microsoft Active Directory - Threat Case Development Documentation Microsoft Application - Threat Case Development Documentation IIS MSSQL Exchange UNIX/LINUX/SOLARIS/AIX Threat Case Development Documentation Advanced Threat Cases for Privileged User and Special Account Activity and Monitoring Baseline Security Settings on UNIX/LINUX/SOLARIS/AIX server Business Internet Extranet Site to Site VPN
58 ADVANCED THREAT CASES - ENVIRONMENT To define threat cases per environment. Eventually. Should. Include. All. Environment.. ID Threat Case Development INTOFF International Offices Global MPLS SSLVPN Juniper SSL VPN NATIONAL IPVPN National MPLS IPVPN WIRLESS Wireless Infrastructure VOIPUC Voice over IP VSAT VSAT Satellite DIGPKI PKI and X.509 Digital Certificates (systems threat case) AAA AAA (systems threat case) HIPS HIPS (system threat case and epo integration) EXECACC Executive Account Monitoring SAP SAP Router and SAP Privilege Activity Monitoring COMPLIANCE Compliance and Best Practices Configuration NAC Network Admission Control
59 ADVANCED THREAT CASES - ENVIRONMENT To define threat cases per environment. Eventually. Should. Include. All. Environment.. ID IPS-AV DAM SFT Threat Case Development IPS and AV Management Console Security Business Internet Gateway Database Activity Monitoring (DAM) Secure File Transfer IMPORTANT understand the environment and understand the threats related to those environment..
60 Develop Threat Cases RHEL
61 Develop Threat Cases RHEL
62 Develop Threat Cases Windows Servers Important Note: "OS.WIN.010.Offense: Multiple Logon for Single User from Different Locations" offense is disabled pending application/system accounts names clarifications to be excluded from the rule's logic.
63 *NIX AUTHENTICATION FOLLOW THE PROCESS
64 Sample SCADA/ICS Dashboard
65 Sample SCADA/ICS Dashboard
66 Sample SCADA/ICS Dashboard SUSPICIOUS
67 Offense Management Naming Convention
68 Offense Management Workflow
69 SOC Wiki SOC-Wiki
70 SOC-Wiki - Goals Centralized Knowledge Repository for SOC Collaborate and Share Information with other Team Members Easy of use and Searchable Integrations with other Toolsets
71 SOC Wiki SIEM Integration Current Issues with SIEM Processes, Documentations, Offence Handling, Knowledge Sharing SIEM Integrations into SOC-Wiki SIEM Threat Cases
72 SOC Wiki SIEM Threat Cases Listed above is how Threat Cases are displayed in SOC-Wiki Threat Case Name, Severity, Status Information - Centralized, Detailed and Searchable Information updated by SIEM and SOC Teams
73 Example: SOC Wiki SIEM Threat Cases
74 Security Assurance Level Security Assurance Levels (SALs) in Critical Infrastructure Functional Requirements Security Levels Based on 7 x Functional Requirements a) Access control (AC) b) Use control (UC) c) Data integrity (DI) d) Data confidentiality (DC) e) Restrict data flow (RDF) f) Timely response to an event (TRE) g) Resource availability (RA)
75 Security Assurance Level Security Assurance Levels (SALs) in Critical Infrastructure Functional Requirements Security Levels Based on 4 x Security Levels
76 Security Assurance Level
77 Security Assurance Level Achieved SL vs. Target SL Access control (AC) 4 Resource availability (RA) 3 2 Use control (UC) 1 Timely response to an event (TRE) 0 Data integrity (DI) Achieved Security Level Target Security Level Restrict data flow (RDF) Data confidentiality (DC)
78 Shah H Sheikh Sr. Security Solutions Consultant MEng CISSP CISA CISM CRISC CCSK [email protected]
IT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Effective Defense in Depth Strategies
Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
SIEM Implementation Approach Discussion. April 2012
SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Are you prepared to be next? Invensys Cyber Security
Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber
Intelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
Information & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements
White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements The benefits of QRadar for protective monitoring of government systems as required by the UK Government Connect
Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements with Enterasys SIEM
Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements with Enterasys SIEM The benefits of Enterasys SIEM for protective monitoring of government systems as required by the UK Government
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
Enabling Security Operations with RSA envision. August, 2009
Enabling Security Operations with RSA envision August, 2009 Agenda What is security operations? How does RSA envision help with security operations? How does RSA envision fit with other EMC products? If
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
How To Create Situational Awareness
SIEM: The Integralis Difference January, 2013 Avoid the SIEM Pitfalls Get it right the first time Common SIEM challenges Maintaining staffing levels 24/7 Blended skills set, continuous building of rules
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco
Secure Access into Industrial Automation and Systems Industry Best Practice and Trends Serhii Konovalov Venkat Pothamsetty Cisco Vendor offers a remote firmware update and PLC programming. Contractor asks
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised
ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?
ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? Agenda Threats Risk Assessment Implementation Validation Advanced Security Implementation Strategy
Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities
Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE
Protecting productivity with Plant Security Services
Protecting productivity with Plant Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. siemens.com/plant-security-services
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in
MANAGED SECURITY SERVICES
MANAGED SECURITY SERVICES Security first Safety first! Security is becoming increasingly important for companies, especially for the extension of networking to mission-critical environments, with new intranet
Take Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A
Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A What is NetFlow? Network protocol originally developed by Cisco
Security Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
STEALTHWATCH MANAGEMENT CONSOLE
STEALTHWATCH MANAGEMENT CONSOLE The System by Lancope is a leading solution for network visibility and security intelligence across physical and virtual environments. With the System, network operations
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Operationalizing Information Security: Top 10 SIEM Implementer s Checklist
Operationalizing Information Security: Top 10 SIEM Implementer s Checklist www.accelops.com Table of Contents Executive Summary.................................................................... 3 SIEM
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES
NASA Consolidated Active Directory Overview ( August 20, 2012 ) Les Chafin Infrastructure Engineering HPES Introduction Les Chafin; Infrastructure Engineering Manager» HPES NASA ACES Responsible for:»
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security
SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Automation Suite for. 201 CMR 17.00 Compliance
WHITEPAPER Automation Suite for Assurance with LogRhythm The Massachusetts General Law Chapter 93H regulation 201 CMR 17.00 was enacted on March 1, 2010. The regulation was developed to safeguard personal
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
