Cyber Security :: Insights & Recommendations for Secure Operations N-Dimension Solutions, Inc. Cyber Security Protection for Critical Infrastructure Assets
Agenda: Cyber Landscape Cyber Threats to Your Operational Enterprise Defense-In-Depth Q&A Cyber Security Protection for Critical Infrastructure Assets
Cyber Security Protection for Critical Infrastructure Assets Cyber Landscape
The cyber threat is escalating -4-
Remember when -5-
Present day -6-
Energy is the most targeted sector 198 disclosed attacks in 2012 All Others 116 (59%) Energy 82 (41%) Up 52% vs. 2011 Many of these incidents targeted information pertaining to the ICS/SCADA environment, including data that could facilitate remote access and unauthorized operations.. Source: ICS-CERT Incidents by Sector (+Internet-Facing) 198 in total FY 2012-7-
There is no official solution If I had a cyber threat that was revealed to me in a letter tomorrow, there is little I could do the next day to ensure that that threat was mitigated effectively by the utilities that were targeted. Federal Energy Regulatory Commission Chairman Jon Wellinghoff September, 2012 Source: The Hill -8-
Technology Trends Increasing Cyber Security Risks Technology trends increasing cyber security risk Adoption of common technology Connectivity of utility control systems to other systems Increasing automation Creates increased attack surface that can be exploited External Attackers: Hackers conferences are identifying utility systems as valuable target Hackers Tool Kits specific to Utility systems are available for download and use Internal Users (Insiders) can knowingly or unknowingly exploit systems Increasingly advanced and persistent threats to a growing attack surface -9-
Medium sized utilities are at greatest risk HIGHER Cyber-security resources LOWER o Most Vulnerable Smallest Utilities Impact from Attack o Most Impact o Largest IOUs o Other IOUs Public Power & Cooperatives HIGHER -10-
Cyber Threats to Your Operational Enterprise Cyber Security Protection for Critical Infrastructure Assets
Your org chart may be your biggest security gap Accountability gaps between IT and Operations make critical assets vulnerable to attack Functional Role Area of Responsibility Sr. Management Overall Results Point of Attack IT / Asset interconnections Departmental silos Areas of overlap are vague Asset and IT inroads open Information Tech. Operations IT Systems Assets -12-
OT closes security gaps between IT and Operations An independent world of "operational technology" (OT) is developing separately from IT groups. If IT organizations do not engage with OT environments they may be sidelined from major technology decisions - and place OT systems at risk. Source: Sr. Management OT IT Systems Assets -13-
N-Dimension protects critical utility assets N-Dimension Solutions Inc. (NDSI) protects the control centers, substations, generating plants, field control systems, and smart meter networks of critical infrastructure utilities from cyber-attacks by providing a comprehensive, defense-in-depth solution that all utilities can afford. Sr. Management OT IT Systems Assets -14-
Typical Utility Minimal Security Typical Utility -15-
Typical Utility Minimal Security Typical utility risk points Email Web Facebook Basic Internet Security 3 rd Parties Trusted Unpatched Systems Flat Network Dialup Modems Shared or Default Passwords Unprotected Comms -16-
What happens after an attack Disconnect operation(s) systems Fly blind for awhile Engage a team of subject matter experts Locate and isolate Data Analysis loss Utility and member s data Forensics Replace necessary hardware and software Deploy a cyber security solution Public relations Media Members Legal and regulatory issues -17-
Cyber Security Protection for Critical Infrastructure Assets Defense-In-Depth
Built on a Defense-in-Depth strategy Identify Isolate Insulate Electronic security perimeters Monitoring Layered defenses Cyber-resilience Frustrate threat progression Mitigate impact Speed recovery and reconstitution Elements of a Defense in Depth Strategy People Technology Operations NDSI has the OT expertise to go beyond IT measures and achieve true Defense-in-Depth resilience! -19-
N-Dimension Products Technical Overview Dimension Defense-in-Depth Critical Infrastructure with N-Dimension Architecture Control DMZ Encrypted VPN Tunnel n-platform n-central n-client -20-
Seamless integration with SCADA Systems -21-
Benefits of comprehensive cyber-security Reliability Less chance of service interruption Revenue Assurance Attack mitigation for core revenue producing assets Risk Mitigation Complies with indemnification requirements -22-
Questions? -23-
Thank You Mary Jo Nye Alliances Director & Regional Sales Manager N-Dimension Solutions, Inc. 612.859.1821 maryjo.nye@n-dimension.com -24-