Industrial Control Systems Security. Denny Gregianin_Sales Area Manager



Similar documents
SCADA / Smart Grid Security Who is really in control of our Control Systems?

Dall Information Security alla Cyber Security, e ritorno

Sicurezza Data Center 22 giugno Fabio Paravani Regional Account Manager

Alberto Meneghini! Security Leader, IBM Italia! IBM Security IBM Corporation IBM Corporation

IBM Security Services

Source code security testing

Vulnerabilità e Attacchi alle Infrastrutture IT Simone Riccetti. Sr. IT Security Architect

The Hacker's Corner. Privacy e sicurezza.. ..per giornalisti in rete. Igor Falcomatà koba@sikurezza.org

Test di sicurezza in ambienti Smart Grid e SCADA

Client Side Cross Site Scripting

Cyber Risk Management with COBIT 5

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

OPC & Security Agenda

Defensible Strategy To. Cyber Incident Response

Enterprise Risk Management: Strategie e Soluzioni a confronto

The New Luxury World: l identità digitale nel lusso fa la differenza

Practical Steps To Securing Process Control Networks

The New Luxury World: l identità digitale nel lusso fa la differenza

AppGuard. Defeats Malware

Cybersecurity Awareness. Part 1

Using ISA/IEC Standards to Improve Control System Security

Samuele Battistoni (IBM Security Services) Andrea Zapparoli Manzoni (Direttivo Clusit)

The Four-Step Guide to Understanding Cyber Risk

ICS CYBER SECURITY RKNEAL, INC. Protecting Industrial Control Systems: An Integrated Approach. Critical Infrastructure Protection

Titoli delle qualifiche

Cyber Security Metrics Dashboards & Analytics

The Cyber Threat Profiler

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Data Analytics & Information Security

Cyber Watch. Written by Peter Buxbaum

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Data Center security trends

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

L informatica nel mondo industriale

ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things

How To Protect Water Utilities From Cyber Attack

Cyber Risk to Help Shape Industry Trends in 2014

CYBER SECURITY OPERATIONS CENTRE

Le sfide e le opportunità dell internet mobile nelle aziende

WEBINARS. Realtà Aumentata e casi studio rilevanti nel settore industriale. Mauro Rubin. Copyright 2015 by InfoComm International

SCADA Security Training

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Cyber Security for SCADA/ICS Networks

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

Cybersecurity: What CFO s Need to Know

Symantec Managed Security Services The Power To Protect

Protecting critical infrastructure from Cyber-attack

Evolution of Cyber Security and Cyber Threats with focus on Cloud Computing

Into the cybersecurity breach

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

Cloud Services: cosa sono e quali vantaggi portano alle aziende manifatturiere

Patching & Malicious Software Prevention CIP-007 R3 & R4

Cybersecurity. Are you prepared?

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

State of Security Survey GLOBAL FINDINGS

DDL ed SQL Compravendite Immobiliari

Protecting Critical Infrastructure

Stephen Coty Director, Threat Research

The CERT Top 10 List for Winning the Battle Against Insider Threats

<Insert Picture Here> Oracle oggi

Distributed Denial of Service protection

CYBER SECURITY, A GROWING CIO PRIORITY

Security Testing in Critical Systems

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Cyber-Security Risk in the Global Organization:

Technologies and systems for business integration.

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

The Importance of Cybersecurity Monitoring for Utilities

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

CGI Cyber Risk Advisory and Management Services for Insurers

Holistic View of Industrial Control Cyber Security

Transcription:

Industrial Control Systems Security Denny Gregianin_Sales Area Manager

VEM in Numbers 5 29 170 800 495 5000

Dipendenti e Fatturato

Design & Delivery NOC SOC HR & Quality Operations Custom Application Development IT Advisory Sales & Marketing Finance & Admin

Des& Delivery Design & Delivery Solutions Network & Data Center Infrastructure Building Efficiency & Controls Cloud Technologies Security & IT Governance Collaboration

Security & IT Governance Network Security Content Security Cyber Security Assessment IT Governance & Business Continuity

Comprendere le nuove minacce Ransomware on the rise Mobile Malware Social Media Malware & Malvertising Defacement Distributed Denial of Service (DDoS) Nuove forme di pagamento elettronico (i.e. Mobile, Digital Wallets, etc.) ICS e SCADA on the rise

Response Risk Anticipation Detection Prevention Identificare rapidamente i tentativi e gli attacchi informatici che riguardano gli asset del Cliente; Elaborare le procedure di risposta più idonee per contenere l attacco, rimuovere l infezione e ridurre gli impatti sul business; Supportare il Cliente nelle attività di gestione dell incidente riconducendo il problema di sicurezza ad una attività di IT Administration; Ottimizzare i sistemi di sicurezza del Cliente grazie ad una analisi del rischio basata sulle evidenze (Evidence-Based Risk Management);

Data Breach Detection, Investigation & Response Sensors Customer Collectors & Correlator Certego Incident Response Team Service Portal IRT Tools

Certego: la cybersecurity certificata Certego è l'unica azienda italiana ad essere citata come Regional Player per i servizi di Threat Intelligence nel report Competitive Landscape: Threat Intelligence Services, Worldwide, 2015 di Gartner. La qualifica di CERT, rilasciata dal SEI (Software Engineering Institute) della Carnegie Mellon University, ufficializza il nostro impegno nella protezione delle reti connesse ad Internet e ci permette di collaborare con gli altri team CERT internazionali nella gestione degli incidenti di sicurezza informatica.

Industrial Control Systems (ICS) & SCADA Security

ICS: Vulnerabilità rilevate THREAT INTELLIGENCE REPORT Up and to the Right ICS/ SCADA Vulnerabilities by the Numbers Summary Capabilities for attacks on ICS/SCADA 1 systems (collectively referred to as ICS below) are growing. The number of publicly disclosed vulnerabilities and off-the-shelf exploits targeting ICS systems continues to grow over time and well into 2015, even as awareness of dangers for critical infrastructure is improving. Vulnerability patterns are improving for some vendors but not for others. Our assumption is that investments in application and control logic security along with active threat intelligence efforts, are paying dividends for some vendors. Siemens and Schneider, the largest and fourth largest industrial automation vendors 2, account for the largest number of reported vulnerabilities, with close to 50% of the total. Of note, Siemens PLC product was the target of STUXNET, the predominant example of ICS/SCADA attacks. The combination of continued growth in ICS vulnerabilities along with off-the shelf exploits targeting these as well as credentials for critical infrastructure companies being routinely accessible in public forums leaves critical infrastructure open to potentially more aggressive motivations. Historically few cyber attacks on ICS have been observed; STUXNET continues to be the predominant example. Recently we ve seen novel patterns of attacks that are destructive and extortionist in nature such as the Sony attack, bank extortion by the Rex Mundi hacker group, and the more prevalent Cryptolocker strain of malware. Destructive/extortionist attacks on ICS are a potentially logical continuation, if yet observed in the wild. Introduction The capabilities for ICS attacks are growing and actual ICS probes and attacks are growing as well. Dell SecureWorks states in their 2015 Annual Threat Report, In 2014, Dell saw a 2X increase in SCADA attacks compared with 2013. Further, in terms of motivations, Dell states, SCADA attacks tend to be political in nature, since they target operational capabilities within power plants, factories, and refineries, rather than credit card information. DigitalBond introduces some alternative motivations in their blog Monetizing SCADA Attacks. Trend Micro very nicely lays out results of honeypots designed to catch ICS attacks in their report The SCADA That Didn t Cry Wolf. To study risks to ICS infrastructure we analyze a few datasets including the NIST Vulnerability database as well as the Recorded Future Web intelligence holdings, which includes data from the open, deep, and dark Web. The totality of the NIST Vulnerability database at the time of this analysis included over 71,500 vulnerabilities across many types of software systems. We used a series of search criteria to identify a subset of ICS vulnerabilities (such as SCADA, ICS, PLC, as well as a series of key vendor names, but then filtering out non-scada records for example, PLC is an overloaded term and some vendors are in multiple industries). Our result set was about 400 records in size.

Prevenire non è più sufficiente Le tecnologie di tipo Preventivo (Firewall, Antivirus, UTM, etc.) hanno progressivamente perso la capacità di contrastare in modo efficace le nuove minacce.

L evoluzione della security. Non abbiamo più un problema di Malware, abbiamo piuttosto un problema di confronto con un avversario. Shawn Henry, FBI Executive Assistant Director

Certego BDIR for ICS/SCADA SITUATIONAL AWARENESS CONTINOUS CONTROL ACTIONABLE SECURITY Capire cosa sta accadendo Rilevare anomalie Elaborare le procedure di risposta

Certego PanOptikon Architecture CSA + PanOptikon Service Portal Modbus/TCP EtherNet/IP DNP3 SNMP Cliente Incident Response Team