Cyber Risks Marine & Offshore Energy



Similar documents
Towards a Reference Architecture for the Internet of Things

How Secure is Your SCADA System?

Tohoku University and the Great East Japan Earthquake Our Role, Responsibility and Mission. Susumu SATOMI President, Tohoku University

Volunteering infrastructure in Italy

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

TRANSFER CREDIT FOR SECONDARY SCHOOL EXAMINATIONS

Welcome to INSA Lyon, France

What is Cyber Liability

Job search in Europe. 3 april 2014 Jill Delombaerde Euresadvisor VDAB Kortrijk

connect.munichre Munich Re s exclusive client portal your success is our business

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

First Quarter 2014 Results Presentation

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

EAST MARMARA

Maintenance Training Concepts for the Wind Industry. BZEE Academy GmbH. 26 th of February, 2013, Tokyo

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Development of the Incorporating System of Automatic Contrast Injector and Radiology Information System (RIS) for Contrast-enhanced CT Examination

Looking through the crystal ball: Identifying future security, privacy and social risks in a prospective IoT scenario

Cybercrime: risks, penalties and prevention

Systems Driven Product Development

IP Litigation in Europe and in Germany

Significant Factors Affecting Cross-Border Logistics through the Port of Laredo

How To Protect Your Business From A Cyber Attack

= 注 意 = 更 新 型 番 (RN) 複 数 年 型 番 (F3 F5)も 対 象 に 含 みます 改 訂 日 付 SKU Description No.

IHS Technology. IHS Technology Business Intelligence Enabling market leadership through research, analysis and strategy

Building a Strategic Global Payroll Function for Greater Efficiency and Innovation

FBI AND CYBER SECURITY

Energy Cybersecurity Regulatory Brief

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Data Mining for Risk Management in Hospital Information Systems

What the EU -Japan Centre for Industrial Cooperation can offer to the EU and Japanese Companies? Silviu Jora, General Manager (EU side)

Cybersecurity in the Maritime Domain

TECHNIP AT A GLANCE 2014

My experience of Ruby Education in Taiwan

Cyber Risks and Insurance Solutions Malaysia, November 2013

A Cyber Security Integrator s perspective and approach

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Professor Bertil Andersson President, Nanyang Technological University (NTU), Singapore

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

The Curse of the 33 billion

Oil and Gas Capital Expenditure Outlook, 2012

Introduction of Japan Science and Technology Agency (JST)

Cyber/ Network Security. FINEX Global

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

Cyber security and critical national infrastructure

レッドハット 製 品 プライスリスト Red Hat Enterprise Linux 製 品 (RHEL for HPC) 更 新 :2015 年 4 22

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

RAIM for Ship and Rig Management

Oil & Gas - BI/CBI & the Importance of Risk Engineering

Copyright 2015 NTT corp. All Rights Reserved.

Are you prepared to be next? Invensys Cyber Security

Document and entity information

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Cybersecurity in the maritime and offshore industry

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

BTR200 HD Bluetooth Audio Receiver

ACE European Risk Briefing 2012

Allianz Global Corporate & Specialty Project Cargo

Translating in the EU institutions

Professional Services. for global insurance markets

IMO Rules for gas as ship fuel BLG-15 MSC-88 BLG-16 MSC-89. SOLAS 2010 SOLAS 2014 IGF-Iterim-Guideline (IMO) BMVBS GL-IGF Guideline

CASUALTY CASUALTY INSURANCE SOLUTIONS

THE POWER OF INSIGHT. DNV Nor-Shipping Seminar. 3 June 2013 Radisson Blu Plaza Hotel, Oslo

GLOBAL SERVICES LIFERAFT HIRE SUPPORT SERVICE SAFETY.

Insurance implications for Cyber Threats

LLOYD S IN CANADA Contents

New Insurance Solutions For On- and Offshore Wind Turbines

A Survey of SCADA and Critical Infrastructure Incidents

CYBER/ NETWORK SECURITY

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION

THE RISK OF CYBER-ATTACK TO THE MARITIME SECTOR

Transcription:

Image: used under license from shutterstock.com Cyber Risks Marine & Offshore Energy May 18, 2015 Markus Wähler Consultant Marine Global Marine Partnership

Everything is possible but how probable is it?

Why now? Julian Assange / Edward Snowden Incidents: Night Dragon Hacker Cyber Attack Operation against energy companies in 2010 Shamoon / Disttrack The virus has attacked companies within the Saudi Arabian oil and energy sectors in 2012 Carbanak The great bank robbery, cybergang steals $1bn from 100 financial institutions worldwide Elk Cloner 1 st Computer Boot virus in '85 written by a 15 years old boy! War Games! Stuxnet Computer worm 2007 2010 Duqu Successor of Stuxnet 2011 Espionage program Flame (Worm.Win32. Flame) Allrounder worm spying, copying, etc. 1985 2007 2008 2009 2010 2011 2012 2013 2014 2015 Increased regulatory attention http://ww.spiegel.de/netzwelt/netzpolitik/cyberwar-wurm-shamoon-richtet-sich-offenbargegen-energiesektor-a-850734.html 5/18/2015 3

Accumulation Scenarios Global outage of the Internet Self-producing Computer Viruses Large Cloud Service Provider Scenario Outage of critical infrastructure / i.e. Power grid scenarios 5/18/2015 4

Night Dragon & Shamoon Night Dragon since 2009 (possibly 2005), hackers from SE Asia (?) have successfully infiltrated networks of at least a dozen multinational oil, gas, and petrochemical companies as well as individuals and executives in Kazakhstan, Taiwan, Greece, and the US. Five firms confirmed the attacks. Shamoon detected in 2012 by Israeli security company Seculert. Shamoon is a new Trojan found in the Middle East. It has apparently been used in targeted attacks against specific individuals or companies, including at least one firm in the energy sector Saudi Aramco, Saudi Arabia's state-owned oil-production company. 5/18/2015 5

Cyber in Marine & Offshore Energy Antwerp 5/18/2015 6

Possible scenarios in Marine Every ship has a back door communication lines enavigation! Low probability of a successful attack Image radio man : Bundesarchiv Bild 101I-695-0410-04A, Warschauer Aufstand, Funker" by Bundesarchiv, Bild 101I-695-0410-04A / Falke / CC-BY-SA. Licensed under CC BY-SA 3.0 de via Wikimedia Commons - http://commons.wikimedia.org/wiki/file:bundesarchiv_bild_101i-695-041004a,_warschauer_aufstand, _Funker.jpg#/media/File:Bundesarchiv_Bild_101I-695-041004A,_Warschauer_Aufstand,_Funker.jpg Picture 1-3 MEYER WERFT PAPENBURG Higher probability with enavigation of a successful attack 5/18/2015 7

What is enavigation? enavigation is a Strategy developed by the International Maritime Organization (IMO) to bring about increased safety of navigation in commercial shipping through better organization of data on ships and on shore, and better data exchange and communication between ships and the ship and shore enavigation will improve the safety at sea! But a global overview about the international flow of goods is possible! 5/18/2015 8

Possible scenarios in Offshore Energy Infiltration of the communication network Higher Probability of a Successful Attack Image: Florian Kopp/ imagebroker/ Corbis Image: Omar Torres/ Getty Images Image: dpa Picture Alliance/ AP Image: Mayumi Terao/ istock Image middle: Bundesarchiv Bild 101I-695-0410-04A, Warschauer Aufstand, Funker" by Bundesarchiv, Bild 101I-695-0410-04A / Falke / CC-BY-SA. Licensed under CC BY-SA 3.0 de via Wikimedia Commons - http://commons.wikimedia.org/wiki/file:bundesarchiv_bild_101i-695-041004a,_warschauer_aufstand, _Funker.jpg#/media/File:Bundesarchiv_Bild_101I-695-041004A,_Warschauer_Aufstand,_Funker.jpg 5/18/2015 9

Possible scenarios in Offshore Energy Business Interruption of offshore unit Manipulation / destruction of storage facilities and stored goods Interruption of the supply chain Manipulation of production Destruction of production Oil pollution could happen as a result of the attack LNG interruption of the cooling process (FLNG, LNG Plant, Transportation) Probable! 5/18/2015 10

Effects of cyber attacks to the Marine & Offshore Energy Industry Estimated cost for the oil & gas industry US$ 1.87 Billion* by 2018 40% of all cyber attacks* in the US on critical infrastructure assets in 2012 were directed against the energy sector Image: dpa Picture Alliance/ AP *Source: Willis Energy Market Review 2014 / Image middle: Exval von http://response.restoration.noaa.gov/ photos/exxon/02.html. Lizenziert unter Gemeinfrei über Wikimedia Commons - http://commons.wikimedia.org/wiki/file: Exval.jpeg#/media/File:Exval.jpeg / Image right: "Apdx F2 - Aerial photo after explosion". Licensed under Public Domain via Wikipedia - http://en.wikipedia.org/wiki/file:apdx_f2_-_aerial_photo_after_explosion.jpg#/media/file:apdx_f2 _-_Aerial_photo_after_explosion.jpg 5/18/2015 11

Herzlichen Dank für Ihre Aufmerksamkeit Thank you for your attention Շնորհակալություն ուշադրության համար Mauruuru no to outou whakarongo תודה רבה על אדיבותך ご 清 聴 ありがとうございました 感 謝 您 的 關 注 İlginiz için teşekkürler Gracias por su atención Dziękuję za uwagę Анхаарал тавьсан та бүхэнд баярлалаа உங கள கவனத த ற க நன ற Je vous remercie de votre attention Tibi gratias ago pro studio vestro 귀하의 관심에 감사드립니다 شكرا الهتمامكم ស មអរគ ណច ព ក រយកច ត តទ កដ ក របស អនក Спасибі за Вашу увагу Благодаря ви за вниманието Σας ευχαριστώ για την προσοχή σας Cảm ơn bạn đã quan tâm của bạn Terima kasih atas perhatiannya Anda Salamat sa iyong pansin Ngiyabonga ngokungiphendula დიდი მადლობა ყურადღებისთვის Kiitos huomiota Tack för er uppmärksamhet Dank u voor uw aandacht Tänan tähelepanu eest! Paldies par jūsu uzmanību Dėkojame už Jūsų dėmesį Asante kwa mawazo yako आपल लक ष धन यव द ຂຂອບໃຈສ າລ ບຄວາມສ ນໃຈຂອງທ ານທທ ານ Tänan teid tähelepanu eest Grazzi għall-attenzjoni tiegħek Назар аударғаныңызға рақмет Go raibh maith agat as do aire Diolch i chi am eich sylw Daalụ maka itinye uche gị Grazie per la vostra attenzione 5/18/2015 12

Disclaimer Münchener Rückversicherungs-Gesellschaft (Munich Reinsurance Company) is a reinsurance company organised under the laws of Germany. In some countries, including in the United States, Munich Reinsurance Company holds the status of an unauthorised reinsurer. Policies are underwritten by Munich Reinsurance Company or its affiliated insurance and reinsurance subsidiaries. Certain coverages are not available in all jurisdictions. Any description in this document is for general information purposes only and does not constitute an offer to sell or a solicitation of an offer to buy any product. 5/18/2015 13

2015 Münchener Rückversicherungs-Gesellschaft 2015 Munich Reinsurance Company Image: used under license from Shutterstock.com Thank you very much for your attention. May 18, 2015 Markus Wähler Consultant Marine Global Marine Partnership