Cedric Leighton, Colonel, USAF (Ret) Founder & President, Cedric Leighton Associates



Similar documents
Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Cybersecurity: Learn Critical Strategies to Protecting Your Enterprise November 6, :00PM EST

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

How To Protect Your Business From A Cyber Attack

September 20, 2013 Senior IT Examiner Gene Lilienthal

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Who s Doing the Hacking?

Information Protection in Today s Changing Mobile and Cloud Environments

Cyber-security: legal implications for financial institutions. IAPP Europe Data Protection Intensive 2013

Energy Cybersecurity Regulatory Brief

Evolving Uses of Technology: Mobility and Cybersecurity

Digital Evidence and Threat Intelligence

EY Cyber Security Hacktics Center of Excellence

I ve been breached! Now what?

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

The Peak of Chaos Shane D. Shook, PhD 10/31/2012

67% 61% STATE OF CLOUD SECURITY BULLETIN. Information Security in the Energy Sector. Summer 2013 FROM APR SEP 2012

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

Understanding PCI Compliance

Security and Privacy

White Paper on Financial Industry Regulatory Climate

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Internet Safety and Security: Strategies for Building an Internet Safety Wall

What is Cyber Liability

EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS

DENIAL OF SERVICE: HOW BUSINESSES EVALUATE THE THREAT OF DDOS ATTACKS IT SECURITY RISKS SPECIAL REPORT SERIES

Four Steps to Defeat a DDoS Attack

Beyond the Hype: Advanced Persistent Threats

Phone: Fax:

Protecting Organizations from Cyber Attack

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Four Steps to Defeat a DDoS Attack

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

2012 Bit9 Cyber Security Research Report

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Into the cybersecurity breach

Cyber and Mobile Landscape, Challenges, & Best Practices

Five keys to a more secure data environment

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber-Security. FAS Annual Conference September 12, 2014

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Secure Software Development Trends in the Oil & Gas Sectors. How the Microsoft Security Development Lifecycle helps protect critical industries

Insurance implications for Cyber Threats

Cyber and Operational Solutions for a Connected Industrial Era

THE WHITE HOUSE Office of the Press Secretary

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

NATO & Cyber Conflict: Background & Challenges

Practical Steps To Securing Process Control Networks

The SMB Cyber Security Survival Guide

How do we Police Cyber Crime?

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

FINANCIAL SERVICES Cybersecurity 2.0: The Role of Counsel in Addressing Destructive Cyberattacks

Medical Information Breaches: Are Your Records Safe?

How Secure is Your SCADA System?

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Advanced & Persistent Threat Analysis - I

Faculdade de Direito, Lisboa, 02-Jul The Competitive Advantage of Cybersecurity

Cyber Risk to Help Shape Industry Trends in 2014

Perspectives on Cyber Security Strategies & Tactics

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Four Steps to Defeat a DDoS Attack

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Assessing the Effectiveness of a Cybersecurity Program

The Landscape of Cyber, critical infrastructure and how Regulation fits in

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

How To Defend Against A Cyber Attack

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

Cyber Risks and Insurance Solutions Malaysia, November 2013

Oil & Gas Cybersecurity

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Testimony of. Mark Shlanta. Chief Executive Officer. SDN Communications. Confronting the Challenge of Cybersecurity. before the

Information Security Addressing Your Advanced Threats

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

TLP WHITE. Denial of service attacks: what you need to know

Information Security Summit 2005

FBI AND CYBER SECURITY

U. S. Attorney Office Northern District of Texas March 2013

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Why can t I vote online? ONLINE SECURITY AND THE FUTURE OF INTERNET VOTING

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

The Global Cyber Security Market

How To Create An Insight Analysis For Cyber Security

State of Security Survey GLOBAL FINDINGS

THE CURRENT GLOBAL THREATS TO CYBERSPACE SECURITY

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

INVESTIGATIONS REPORT

SMALL BUSINESS PRESENTATION

SCADA Security: Challenges and Solutions

Mobile Security - Mobilidade Bancária e Digital Workers. Américo Alonso, CISSP, CIS LATAM Offering Manager for CyberSecurity

By Daniel E. Frank and Don Borelli

TECH GUYS. Protect Your Practice with a Security Risk Assessment. HCTechGuys.com. HCTechGuys.com TECH GUYS

Cyber Security for audit committees

Research Note Engaging in Cyber Warfare

Are you prepared to be next? Invensys Cyber Security

Transcription:

Cedric Leighton, Colonel, USAF (Ret) Founder & President, Cedric Leighton Associates

What is Cyber Security? The First Cyber Attack The Threat Landscape The Energy Industry as a Target The Legal & Regulatory Landscape Possible Policy Solutions The Paucity of (Real) Technical Solutions Securing the Energy Infrastructure

The effort to secure the Internet from entities that seek to harm it or its users The implementation of standards to protect the Internet and its users A program or programs designed to mitigate the threat posed by hackers against a specific IT network or specific entity using the Internet

Not a rigid, dogmatic set of rules Not a panacea Not something the Government can do by itself Not something Private Industry can do by itself But.

Requires an All-In approach Government & Private Sector Partnerships based on Trust With Flexible, Evolving Rules, and A workable Cyber Security Strategy

When was the First Cyber Attack?

Explosion was 1/7 the size of the Atomic Bombs used in Hiroshima & Nagasaki Could be Seen from Space Utterly Destroyed Large Section of Trans-Siberian Oil Pipeline Soviet Union lost $8 Billion in Annual Oil Revenue

It began with a Defector codenamed Farewell KGB Colonel Vladimir Vetrov Led KGB section that stole Western Technology Hated Soviet life Gave French Intelligence 4,000 page document detailing Soviet Industrial Espionage in the West French President Mitterrand shared with President Reagan

CIA discovered the Soviets wanted Western Computer Technology to run Trans-Siberian Pipeline Automate Pipeline Control Mechanisms Compressors, Valves, Storage Facilities Asked US for Software; Turned Down Bought from Canada, but with Modifications

Canadian software to run Pumps, Valves & Turbines Programmed to Fail Reset Pump Speeds & Valve Settings to Raise Pressure far beyond Tolerances Pressure too great for Welds & Joints Result: Monumental Explosion

In 1982: The Internet hardly existed; negligible Traffic Volume In 1990: 1000 Gigabytes of data travelled via the Internet per month Today s Traffic Volume: 27 Billion Gigabytes per month 5 Billion Different Devices will soon be connected to the Internet And then there s Malware

Hacktivists Cyber Criminals Other Non-State Actors State Actors

Anonymous; Lulzsec Politically Motivated; Anarchic Philosophy Stratfor Hack Ohio Rape Case Visa, MasterCard, PayPal Primary Method: DDoS (Distributed Denial of Service) Attacks Overwhelms Targeted Servers with more Traffic than they can Handle

Motivation: Financial Russian & East European Criminal Gangs Dominate Credit Card Number Theft Value of a Credit Card Number: $2.50 Identity Theft Cyber Ransoms Cyber Underworld = Criminal Underworld

Targeted 30 US Banks Using 100 Botnets Botnets: Computers that are taken over by a third party; used to attack other computers Some people participate willingly; most do not All you need to do is download Malware to become a Botnet Goal: Attack US Banks before they implement Two-Factor Authentication Stole at least $5 Million (and that was before Blitzkrieg really started)

Part of the People s Liberation Army s Intelligence Directorate Targets: US and North America; other English-speaking Countries Mission: Get as much Intellectual Property as possible Map Target Networks Find Vulnerabilities in Critical Infrastructure

Stole Intellectual Property from Nortel Stayed on Nortel Networks for over 10 years Not noticed at first When discovered, lethargic response Nortel lost out to Chinese competitors Nortel is Bankrupt Stole Blueprints for the F-35 Joint Strike Fighter from Northrop Grumman Stole Plans for Wind Turbines Part of a Broader Chinese Strategy

In the US: $500 Billion Annually Globally: $1 Trillion Annually

Target: Saudi Aramco, world s largest Oil Company Secondary Target: RasGas Qatar s 2 nd largest Gas Company Perpetrator: Iran Cyber Weapon: Shamoon Malware Result: 30,000 PC Workstations made useless

Hackers break into SCADA Systems Key Elements of the Nation s Critical Infrastructure are Sabotaged Large Sections of the Country are without Power Social Chaos & Death result

No Comprehensive Cyber Security Legislation Current Legislation not Moving Forward Last Year s Measures Failed Executive Order Designed to Protect Government Cyber Infrastructure NERC and NRC Standards & Rules No Comprehensive National Cyber Security Strategy

Develop a Comprehensive National Cyber Strategy Develop Evolving Minimum Cyber Security Standards & Regulations Pass Comprehensive Cyber Security Legislation to forge Partnership between Government & Private Sector Companies need Liability Protections Cyber Threat Information must be shared in Real- Time Private Partnerships with the Intelligence & Law Enforcement Communities

Many SCADA Systems are Old Security is an Afterthought (at best) Firewalls First line of defense, but can be breached Two-Factor Authentication Ok, but may not be practical for Utilities Encryption Essential, but can it be cracked? The Key: Understanding the Threat & Developing Responses to it

Cannot be done in Isolation Must be a Partnership Federal & State Regulatory Elements Law Enforcement Intelligence Cyber Security Firms Must Incorporate Latest Threat Data in Real- Time We re all on the Front Line now

The Cyber Threat is Real & Growing We must have a Proactive Partnership to Counter it Protecting Infrastructure, Businesses & Consumers is the Goal Businesses and Cooperatives that set the highest Cyber Security Standards will be the Gold Standard

Now it s Your Turn