Breakthrough Cyber Security Strategies. Introducing Honeywell Risk Manager



Similar documents
The Four-Step Guide to Understanding Cyber Risk

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Information Security and Risk Management

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

Defending Against Data Beaches: Internal Controls for Cybersecurity

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

Critical Controls for Cyber Security.

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Information Technology Risk Management

UF IT Risk Assessment Standard

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

API Cybersecurity Conference Industrial Control Systems Workshop. Sponsored by Alpine Security

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Cyber Security Metrics Dashboards & Analytics

PUTTING NIST GUIDELINES FOR INFORMATION SECURITY CONTINUOUS MONITORING INTO PRACTICE

Cyber Security for SCADA/ICS Networks

SANS Top 20 Critical Controls for Effective Cyber Defense

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Recommended Practice Case Study: Cross-Site Scripting. February 2007

NIST National Institute of Standards and Technology

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

EC-Council. Certified Ethical Hacker. Program Brochure

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Network and Host-based Vulnerability Assessment

Open an attachment and bring down your network?

Cyber Security Management

Risk Management Guide for Information Technology Systems. NIST SP Overview

Performing Effective Risk Assessments Dos and Don ts

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Incident Response. Six Best Practices for Managing Cyber Breaches.

IBM Managed Security Services Vulnerability Scanning:

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

The Nature of Cyber Security. Eugene H. Spafford

A Case for Managed Security

Redefining SIEM to Real Time Security Intelligence

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

MANAGED SECURITY SERVICES (MSS)

24/7 Visibility into Advanced Malware on Networks and Endpoints

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Data Security Concerns for the Electric Grid

Cyber Adversary Characterization. Know thy enemy!

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

MANAGED SECURITY SERVICES (MSS)

Cisco IPS Tuning Overview

Ovation Security Center Data Sheet

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Vulnerability Analysis of Energy Delivery Control Systems

External Supplier Control Requirements

ISO Information Security Management Systems Foundation

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Things To Do After You ve Been Hacked

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Protecting productivity with Plant Security Services

How To Audit The Mint'S Information Technology

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Cybersecurity Awareness. Part 1

Desktop and Laptop Security Policy

An Analysis of the Capabilities Of Cybersecurity Defense

The Business Case for Security Information Management

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

Incident Response Plan for PCI-DSS Compliance

Understanding Vulnerability Management Life Cycle Functions

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Top five strategies for combating modern threats Is anti-virus dead?

Student Tech Security Training. ITS Security Office

A Systems Engineering Approach to Developing Cyber Security Professionals

The Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy

US-CERT Overview & Cyber Threats

Cyber R &D Research Roundtable

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

FIREMON SECURITY MANAGER

Looking at the SANS 20 Critical Security Controls

This is a preview - click here to buy the full publication

Security and Vulnerability Issues in University Networks

Transcription:

Breakthrough Cyber Security Strategies Introducing Honeywell Risk Manager

About the Presenter Eric D. Knapp @ericdknapp Global Director of Cyber Security Solutions and Technology for Honeywell Process Solutions Over 20 years of experience in Information Technology; Over 10 years dedicated to Industrial Cyber Security Specializing in cyber security for ICS, security analytics, risk, and advanced cyber security controls Patents pending for risk management metrics and methodologies Author of Industrial Network Security and Applied Cyber Security and the Smart Grid 2 2015 Honeywell International All Rights Reserved

What is (cyber security) Risk? the potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization. (ISO) a function of the likelihood of a given threat-source s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization (NIST) 3

What is the Cyber Security Risk Manager? A tool that continuously monitors for indicators of cyber security risk i.e., Threats & vulnerabilities that could impact the ICS 4

Measurements & Methodologies Risk is an indication of Threat, Vulnerability and Impact Many methodologies: ISA-99 / 62443, ISO27005:2011, etc. Likelihood x Impact (R = L x I) Threat x Vulnerability x Consequence (R = T x V x C) Determining what V I and C are is the hard part These can be subjective without standards and precise methodologies! 5

6 Measurements & Methodologies

Quiz Time! Level 4 Business Network Level 3.5 DMZ A B PC A is a print server. It will not impact anything if compromised. Level 3 Advanced Control PC B is an Operators workstation. If compromised it could directly impact production Level 2 Supervisory Control Q: What option would you choose for PC A from the following? Level 1 9

Understanding Consequence Risk Manager understands impact within an ICS 10

Measurements & Methodologies If R = L x I How do we determine Likelihood? L is a function of both Vulnerability and Threat Vulnerability A vulnerability does not cause harm itself (ISO27005:2011) Threat A threat has the potential to harm assets e.g. unauthorized actions, physical damage, technical failures (ISO27005:2011) 11

Measurements & Methodologies If R = L x I How do we determine Likelihood? L is a function of both Vulnerability and Threat Vulnerability Countermeasure Threat (specific) Threat (actor) 12

Assess the Vulnerability of the ICS Vulnerability can be a broad or focused lens: Each asset needs to be assessed The entire system needs to be assessed You need to understand threat to understand vulnerability Example: If HMI software is susceptible to a buffer overflow, this is a very specific vulnerability of a specific software asset. However, if the HMI can be used to directly impact the entire system, it is also a systemic vulnerability This is because malicious control of the HMI is equivalent to having a bad guy at the console, and you can easily gain control of an HMI over the network (understanding the threat) 13

Assess the Vulnerability of the ICS Perform Vulnerability Assessments, but do them carefully Slow scans Redundant pairs Passive methods No exploits!!! Understand the limits Aggressive scans tell you a lot but they aren t safe to use Less-aggressive scans are safer but they tell you less No scan can tell you everything you can t scan for zero-days Enlist assistance from someone qualified and experienced in assessment ICS systems 14

Quiz Time! Level 4 Business Network X Level 3.5 Level 3 DMZ Advanced Control Z PC X and Z are both scanned by a VA scanner and 6 critical vulnerabilities are found on each. PC Z is patched fully, but PC X is left as is. Level 2 Supervisory Control Q: Which of the machines is vulnerable? Level 1 15

Understanding Vulnerabilities Risk Manger looks for indicators of vulnerability Weak system defenses Poor access controls Susceptibility to misuse 16

Identify Threats Against the ICS What are cyber threats? Malware (viruses, trojans, RATs, APTs, etc) Hackers (script kiddies, semi-professionals, disgruntled employees, professionals, hacker-for-hire, cyber crime, nation-state) Accidents (insider / employees, outside / unintentional incidents) 17

Identify Threats Against the ICS You need to understand vulnerability to understand threat wait? Which came first? (just don t hide from the truth) 18

Quiz Time Again! You have some credible threat statistics here Q: What s the biggest threat? 19

Understanding Threats Risk Manager looks for various indicators of active threats Active intrusions Exploits of vulnerabilities Unauthorized activity 20

What Does Risk Manager do with all of this? Risk Manager evaluates indicators of risk using patented algorithms to generate accurate risk scores in line with industrial risk management standards 21

Assess Your Cyber Security Posture How risky is my system from a security perspective? Has something happened that I need to act on? Where do I start? How can I show that we are improving our security posture? Is my control system up to date? Am I following best practices? When something goes wrong, what should I do? 22

23 At-a-glance Indication of Current Risk Levels

24 Quickly Identifies What s Causing Risk

25 Finds the Root Cause, to the Node Level

26 Trend Risk over Time

27 Summary Reports on Risk Posture and Progress

Introducing the Cyber Security Risk Manager See it Live in the Demo Room 28