ICS-SCADA testing and patching: Recommendations for Europe

Size: px
Start display at page:

Download "ICS-SCADA testing and patching: Recommendations for Europe"

Transcription

1 ICS-SCADA testing and patching: Recommendations for Europe Adrian Pauna European Union Agency for Network and Information Security

2 Agenda ENISA previous works on ICS SCADA security 2013 s projects Recommendations for Harmonized ICS Testing Capability in the EU Window of Exposure a real problem for SCADA systems? Q&A European Union Agency for Network and Information Security 2

3 1. ICS Security Study 2011 Aim/Scope of the Study ICS Security panorama Threats, risks, challenges National and pan-european initiatives Identification of gaps Recommendations Draft Report: ENISA Recommendations on ICS Security Workshop 16 Sep, 2011 ENISA Recommendations National and Pan-European ICS Security Strategies Good Practices Guide for ICS Security ICS Security Plan Templates Awareness and Training Common Test Bed or ICS Security Certification Framework National ICS CERTs Research in ICS Security The needs of research in the area of Patching and updating equipment without disruption of service and tools European Union Agency for Network and Information Security 3

4 2013 s projects in the area of ICS SCADA security Can we learn from SCADA security Incidents? Ex-post incident analysis aims primarily at investigating a security incident. This report attempts to cover some basic ground by providing recommendations towards the implementation of a proactive environment that will facilitate agile and integrated response to incidents and their ex post analysis. Recommendations for Harmonized ICS Testing Capability in the EU (cont.) Window of Exposure a real problem for SCADA systems(cont.) ICS certification(small study) European Union Agency for Network and Information Security 4

5 Recommendations for Harmonized ICS Testing Capability in the EU The objectives of the work (from ENISAs Tender P/26/12/TCD): Assess the need among the Member States for a national ICS-SCADA testing framework. Identify the gaps between different (if any) MSs and the challenges involved in developing ICS-SCADA testing capabilities. Produce guidance for both the development of new and harmonization of current ICS-SCADA test beds frameworks (if any) among Member States. Research and develop good practices on developing a European ICS- SCADA test bed program/framework. Desktop Research Questionnaires answered by experts for easy to analyse data Interviews for deeper understanding Questions categorized by Topics Experts categorised by «Stakeholder Type» and «Sector» Analysis of the results: Final Workshop and Review European Union Agency for Network and Information Security 5

6 Short introduction on the Status, Gaps and Challenges of ICS SCADA testing identified in the Report Key Findings grouped by the following categories : Current status of ICS Testing Objectives for a European ICS Testing Capability Consideration about the model and methodologies Overview of Available Resources Major Constraints, Risks, Threats and Limitations Relationships with other Stakeholders European Union Agency for Network and Information Security 6

7 Current status of ICS Testing Not harmonized situation for ICS Testing No real "ICS Security educational environment" in the EU Low Maturity Level of ICS Security Testing methodologies and initiatives in Europe Interest in a Certification Framework European Union Agency for Network and Information Security 7

8 Objectives for a European ICS Testing Capability Several drivers show the need of a European Testing Capability, being independent is the main one Political Will has been necessary in similar experiences abroad Get aligned with already existent standards is preferred to develop new ones Offer value to all stakeholders considered key for success A systemic or holistic approach is recommended but is more difficult to standardize Debate regarding the adequacy of making testing mandatory Means to enforce vulnerability resolutions to be considered European Union Agency for Network and Information Security 8

9 Consideration about the model and methodologies Need for both Testing facilities and a Certification Framework Debate concerning if Certification and Compliance are adequate for improving security Unclear which should be the subject of certification Stakeholder roles for definition and operation will require common agreement and public leadership "Acceptance of the results" and "Comprehensiveness of tests" are the best measure of success EU complexity makes desirable a "Distributed Model" with an Accreditation Organism on top Segmentation by business is the most recommended European Union Agency for Network and Information Security 9

10 Overview of Available Resources Public Private Partnership as the most accepted Financing Model Strong Initial Public Investment has been needed in similar initiatives abroad Multiple Reasons for Success identified in existing initiatives abroad Not advisable to publish product comparative charts Work in multidisciplinar teams needed Engage expertise from the industry recommended European Union Agency for Network and Information Security 10

11 Major Constraints, Risks, Threats and Limitations Achieve trust is the most challenging Organization Issue Strategies identified to grant trust are related with Test bed Independency Diversity is the biggest technical challenge Difficult agreement for testing methodologies is foreseen Complexity of the Legal environment among biggest challenges Need for an accurate Economic Model for Public Private Partnership European Union Agency for Network and Information Security 11

12 Relationships with other Stakeholders Representative Composition of the Executive Board Fluent communications with CERTs recommended Debate regarding Vulnerability Disclosures Handling Vulnerability Resolution Enforcement recommended by Security Test Lab Experts Involve stakeholders in dissemination activities Testing Environment useful for Educational purposes European Union Agency for Network and Information Security 12

13 Overview: 7 Recommendations European Union Agency for Network and Information Security 13

14 Recommendation 1: The creation of a Testing Capability under Public European ownership and leadership An entity called Supervisor, should foster Public Support for the initiative and involve other public and private organizations to cooperate in the early stages of the initiative. Quick Win 1: The Supervisor for the Testing Capability would become contact relevant Stakeholders and become a clear Point of Contact for any interested entity. European Union Agency for Network and Information Security 14

15 Recommendation 2: The establishment of a trusted and functional Executive Board Then, this stakeholders, by their representatives and always under the lead of the Supervisor, would create a Working Group that would become the Executive Board, able to define the strategy and further steps in the definition of the Testing Capability. Quick Win 2: The Supervisor would state clear participation rules for the Testing Capability. Quick Win 3: Stakeholder representatives would be engaged for the Executive Board working group. Quick Win 4: The Executive Board will define a common strategy for the Testing Capability. European Union Agency for Network and Information Security 15

16 Recommendation 3: On the creation or involvement of working groups for specific activities The Executive Board then would create or engage already existing experts in order to create thematic Working Groups for technical, financial, legal, research, educational or communications issues. Quick Win 5: Current initiatives in ICS Security Testing will be officialy contacted in order to stablish more specific cooperation tasks. Quick Win 6: Working Groups would define the testing methodologies and criteria that are more alligned with the strategy. European Union Agency for Network and Information Security 16

17 Recommendation 4: The definition of a Financial Model realistic with the European situation The working group in charge of the Financial Model, by now called Advisory Financial Board would have to create a realistic business definition able to guarantee both sustainability and independence. Quick Win 7: Involved working groups will identify potential sources of funding and develop a business plan. European Union Agency for Network and Information Security 17

18 Recommendation 5: Making a study of feasibility for a Distributed Model Within the responsibilities of the Technical Board, supported by the Executive Board, it would be the study of feasibility of a distributed model of operation. Test methodologies and standards, and a clear accreditation model designed to engage current test beds and certification institutions would have to be developed. Quick Win 8: ICS Security Testing accreditation criteria will be defined. European Union Agency for Network and Information Security 18

19 Recommendation 6: Establish collaboration agreements with other organisations dealing with ICS security Other entities such as CERTs, other international ICS Security Testing initiatives and, in general, any stakeholder has to have clear communication processed with the Testing Capability. The communications group would have design these protocols and operate them Quick Win 9: Non Disclosure Agreements and other legal requirements will be elaborated. Quick Win 10: Current CERTs would be contacted for specific cooperation, including Vulnerability Disclosures and incident response. European Union Agency for Network and Information Security 19

20 Recommendation 7: Establish a knowledge management programme Knowledge and expertise in ICS security testing is still scarce and has to be fostered by involving professionals from the industry, research and education. This can be addressed altogether under an umbrella of Knowledge Management programmes. Quick Win 11: Experts from the industry would be engaged. Quick Win 12: A base of knowledge with testing cases will be created. European Union Agency for Network and Information Security 20

21 Window of exposure a real problem for SCADA systems? The Window of exposure is considered to be the time between the moment a vulnerability is disclosed and the moment a patch is available. From the perspective of an organization the moment a window of exposure is closed, is considered to be the moment all the affected systems have been patched. DISCOVERY DISCLOSURE Patch Available Patch Installed EXPLOIT Window of exposure Window of exposure (organization level) European Union Agency for Network and Information Security 21

22 Status The need of research in the area of Patching and updating equipment without disruption of service and tools (ENISA s 2011 report on Protecting Industrial Control Systems) In 2011, ICS-CERT saw a 60% failure rate in patches fixing the reported vulnerability in control system products. (Kevin Hemsley ICS-CERT) <50% of the 364 public vulnerabilities recorded at ICS-CERT had patches available at that time. (SCADA Security Scientific Symposium (S4) in January 2012, Sean McBride) A draft of ISA-TR : Patch Management in the IACS Environment was released for review. (ISA 99) European Union Agency for Network and Information Security 22

23 Paradigm EU level Different approaches for the patching analysis. Different patching management strategies/methodologies in place. Existing ICS-SCADA patch management programs used. Different issues which affect the ICS-SCADA patching process and at least one way to mitigate them. Legal issues of patching/non-patching an ICS-SCADA system. European Union Agency for Network and Information Security 23

24 ENISA - Expectations Provide the reader with examples and good practices for key technical aspects; Different patching techniques and standards, relationships between them and gaps; The role of virtualization in the patching process, Key elements of an ICS-SCADA patching management methodology; Good practice on developing a patching management methodology for ICS and SCADA systems; The validation of the results will be based on the feedback taken by the experts who participated in the consultation European Union Agency for Network and Information Security

25 Challenges related to SCADA patching: A. Procedural challenges: Appropriate boundaries for the service agreement Vulnerabilities are rated with the use of the classic IT scoring method CVSS Patch confidentiality Vulnerability discovery B.Technical challanges Transferring and obtaining patches Patch deployment intervals Legacy systems C.Legal challenges : International business - Most SCADA vendors serve a worldwide market Use of open source software (OSS) Vendor warranty Asset management - Asset management is an important part of patch management Procurement and design for patch ability European Union Agency for Network and Information Security

26 Good practices and recommendations A. Compensating controls : Create awareness and understanding in the organizations as to what failure of the SCADA systems could mean Hardening the SCADA systems, hardening the system means removing unnecessary features Firewalls should be configured in a way that only allows connections between trusted machines to trusted ports. Increase defense in depth through network segmentation. Conducting regular risk and security assessments to reduce potential security risks. Application White Listing (AWL) to compensate for malware code injection and execution B. Establishing a patch management program and service contract: Asset owners should establish a patch management program Asset owners should have a well-designed policy in place so to reduce the effort of patch management and the risk of making mistakes Asset owners should also establish a patch management service contract European Union Agency for Network and Information Security

27 Good practices and recommendations (cont.) C. Testing patches : Asset owners should always conduct their own tests. The test environment should closely simulate the operational environment Redundant systems could be used to deploy the patch on D. Distributing patches : Locate the patch management within an enclave that already has open Internet access The patch management system is responsible for downloading and testing patches If required, implement two instances of the patch management system Evaluate patches and updates in a test environment in order to asses the risk of deployment Utilize digital signatures on patches or do hash verification where possible/feasible E. Patch scheduling: Patch scheduling and deployment can be done after a patch has been tested thoroughly Depending on the chosen distribution method the approval of production managers is necessary Preferably the deployment is incorporated into regular maintenance schedules, European Union Agency for Network and Information Security

28 Thank you! Q&A European Union Agency for Network and Information Security 28

29 Thank you for your attention Follow ENISA: European Union Agency for Network and Information Security

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency Norwegian Energy Days 2015, Oslo European Union Agency for Network and

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE Originator Patch Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Recommended by Director

More information

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for

More information

How To Write A Cybersecurity Framework

How To Write A Cybersecurity Framework NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order

More information

NERC CIP VERSION 5 COMPLIANCE

NERC CIP VERSION 5 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining

More information

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information

More information

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?

More information

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014 NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission

More information

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation

More information

Patching & Malicious Software Prevention CIP-007 R3 & R4

Patching & Malicious Software Prevention CIP-007 R3 & R4 Patching & Malicious Software Prevention CIP-007 R3 & R4 Scope Compliance Assessment Summary Introspection & Analysis Program-In Review Maturity Model review Control Design review Process Components of

More information

Achieving Global Cyber Security Through Collaboration

Achieving Global Cyber Security Through Collaboration Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda

More information

Security and privacy standardization for the SME community

Security and privacy standardization for the SME community Security and privacy standardization for the SME community NLO meeting, Athens, March 4th 2015 European Union Agency for Network and Information Security www.enisa.europa.eu PROJECT CONTEXT European Union

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Prof. Udo Helmbrecht

Prof. Udo Helmbrecht Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile

More information

Industrial Control Systems Security Guide

Industrial Control Systems Security Guide Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology NIST SP 800-82, Rev 2 and ICS Cybersecurity Testbed Keith Stouffer Project Leader,

More information

Deep Security Vulnerability Protection Summary

Deep Security Vulnerability Protection Summary Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security

More information

The Value of Vulnerability Management*

The Value of Vulnerability Management* The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

Vulnerability management lifecycle: defining vulnerability management

Vulnerability management lifecycle: defining vulnerability management Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE

More information

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Best Practices in ICS Security for System Operators. A Wurldtech White Paper Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA. [email protected]

Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA. evangelos.ouzounis@enisa.europa.eu Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA [email protected] 5 th German Anti-Spam Summit Koeln, 5 th of Sept. 2007 www.enisa.europa.eu 1 Agenda NIS a Challenge for the

More information

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012 ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was

More information

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)

More information

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

The State of Industrial Control Systems Security and National Critical Infrastructure Protection The State of Industrial Control Systems Security and National Critical Infrastructure Protection Emerging Threats Tinuade Adesina, Lulea University of Technology Sweden IT Security for the Next Generation

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

Which cybersecurity standard is most relevant for a water utility?

Which cybersecurity standard is most relevant for a water utility? Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:

More information

Goals. Understanding security testing

Goals. Understanding security testing Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3

More information

Technology and Cyber Resilience Benchmarking Report 2012. December 2013

Technology and Cyber Resilience Benchmarking Report 2012. December 2013 Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities

More information

Security Patch Management

Security Patch Management The knowledge behind the network. Security Patch Management By Felicia M. Nicastro Senior Network Systems Consultant International Network Services Security Patch Management March 2003 INS Whitepaper 1

More information

Information Security and Risk Management

Information Security and Risk Management Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management

More information

Juniper Networks Secure

Juniper Networks Secure White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3

More information

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Closing the Vulnerability Gap of Third- Party Patching

Closing the Vulnerability Gap of Third- Party Patching SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage

More information

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA 8 th Annual Safeguarding Health Information: Building Assurance through HIPAA Security HHS Office of Civil Rights and National Institute of Standards & Technology Wednesday September 2, 2015 Suzanne B.

More information

Introduction to the ITS Project Management Methodology

Introduction to the ITS Project Management Methodology Introduction to the ITS Project Management Methodology In September 1999 the Joint Legislative Committee on Performance Evaluation and Expenditure Review (PEER) produced a report entitled Major Computer

More information

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Energy Research and Development Division FINAL PROJECT REPORT CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Prepared for: Prepared by: California Energy Commission KEMA, Inc. MAY 2014 CEC

More information

Sustainability & Transferability Plan

Sustainability & Transferability Plan QUALOBSTER SUSTAINABILITY & TRANSFERABILITY PLAN Qualobster Quality Assurance in Learning Organisation in the Banking and Financial Sector in Europe LU/07/LLP-LdV/TOI/156005 Sustainability & Transferability

More information

Sample Vulnerability Management Policy

Sample Vulnerability Management Policy Sample Internal Procedures and Policy Guidelines February 2015 Document Control Title: Document Control Number: 1.0.0 Initial Release: Last Updated: February 2015, Manager IT Security February 2015, Director

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]

More information

Information security due diligence

Information security due diligence web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 [email protected] www.watsonhall.com Identifying information security risk for web applications

More information

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc. Cyber Security :: Insights & Recommendations for Secure Operations N-Dimension Solutions, Inc. Cyber Security Protection for Critical Infrastructure Assets Agenda: Cyber Landscape Cyber Threats to Your

More information

Smart Security. Smart Compliance.

Smart Security. Smart Compliance. Smart Security. Smart Compliance. SRM are dedicated to helping our clients stay safe in the information environment. With a wide range of knowledge and practical experience, our consultants are ready to

More information

Lot 1 Service Specification MANAGED SECURITY SERVICES

Lot 1 Service Specification MANAGED SECURITY SERVICES Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services

More information

Deloitte Cyber Risk Services Providing trust in a digital world

Deloitte Cyber Risk Services Providing trust in a digital world Deloitte Cyber Risk Services Providing trust in a digital world June 2015 Deloitte Cyber Risk Services Providing trust in a digital world Our aim Your organization, whether functioning in the public or

More information

Technical Guideline on Security Measures

Technical Guideline on Security Measures Technical Guideline on Security Measures DRAFT, Version 1.93, April 2013 TLP GREEN (community wide) ii Technical Guideline on Security Measures About ENISA The European Network and Information Security

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Building Security into Your Industrial Internet Phillip Allison Tempered Networks Discussion topics Threats to network security TCP/IP

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: [email protected]

More information

GSN Cloud Contact Centre Partnership Datasheet

GSN Cloud Contact Centre Partnership Datasheet GSN Cloud Contact Centre Partnership Datasheet Commercial in Reference: GSN Partnership Datasheet Version: 1.1 Global Speech Networks Pty Ltd Level 8, 636 St Kilda Road Melbourne, Victoria 3004 +61 3 9015

More information

Manage Release and Deployment

Manage Release and Deployment Manage Release and Deployment Description Once development is complete, new and enhanced services need to be made operational. Effective requires planning, scheduling and controlling the implementation

More information

DOD Medical Device Cybersecurity Considerations

DOD Medical Device Cybersecurity Considerations Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1 DHA Vision A joint,

More information

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn 4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Viewfinity Privilege Management Integration with Microsoft System Center Configuration

More information

N-Dimension Solutions Cyber Security for Utilities

N-Dimension Solutions Cyber Security for Utilities AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential

More information

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures For discussion on 12 June 2000 Legislative Council Panel on Information Technology and Broadcasting Hacking and Virus Activities and Preventive Measures Purpose This paper briefs Members on the common

More information

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is

More information

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management

More information

UoD IT Job Description

UoD IT Job Description UoD IT Job Description Role: Projects Portfolio Manager HERA Grade: 8 Responsible to: Director of IT Accountable for: Day to day leadership of team members and assigned workload Key Relationships: Management

More information

defense through discovery

defense through discovery defense through discovery about krypton krypton is an advisory and consulting services firm, specialized in the domain of information technology (it) and it-related security krypton is a partnership amongst

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

Announcement of a new IAEA Co-ordinated Research Programme (CRP) Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors

Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors www.enisa.europa.eu European Union Agency For Network And Information Security About ENISA The European Union Agency for Network

More information

FAQ to ENISA s report on technologies to improve the resilience of communication networks

FAQ to ENISA s report on technologies to improve the resilience of communication networks FAQs to reports on technologies to improve the resilience of communication networks FAQ to ENISA s report on technologies to improve the resilience of communication networks This FAQ covers the latest

More information

Total Protection for Compliance: Unified IT Policy Auditing

Total Protection for Compliance: Unified IT Policy Auditing Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Seven Strategies to Defend ICSs

Seven Strategies to Defend ICSs INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take

More information

Mapping the Technical Dependencies of Information Assets

Mapping the Technical Dependencies of Information Assets Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital

More information