Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist
CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies in critical infrastructures Internet-of-Things Cloud Services 23/09/2015 2
23/09/2015 3 VTT s Position in Cyber Security The biggest research group in the topic in Finland, sites in Oulu, Espoo and Tampere. Cyberlab War Room with strong attack and monitoring capability in Oulu. Extensive co-operation in the European and Finnish activities As contract research to companies As the orchestrator and/or the Finnish country coordinator in European joint research projects Member of FISC (Finnish Information Security Cluster) Member of the Board
VTT s solutions for Cyber Security Industrial Control Systems security Network security Device security Security testing, assessment and risk-driven techniquess 23/09/2015 4
Industrial control system security Value proposition: Ensure continuous and safe operation in manufacturing and process industry. Competitive edge: R&D combined with close co-operation with industry and National Emergency Supply Agency (NESA) gives unique capability to analyze and improve security of ICS. Deep understanding of industry and communication and digital systems. IP status: Process for the best practices and tools for network monitoring and intrusion detection. Offering: Approach of four modules to ensure and improve ICS cyber security Architectural analysis Network traffic analysis Security monitoring Holistic security analysis Architecture analysis Security Monitoring Holistic security analysis Network traffic analysis «BACK 23/09/2015 5
23/09/2015 6
23/09/2015 7 VTT Cyber Security War Room What is War Room Includes a mini-internet environment that is completely isolated from all other telecommunications Devices or software can be subjected to highly realistic cyberattacks in a controlled way Wide range of attacks can be tried to test the performance of various systems Personnel with extensive experience and knowhow on cyber security Equipped with cutting edge technologies & devices War room enables Conducting of attacks aimed at seizing systems, implementation of typical hacker attack strategies and botnet attacks Identification of cyber attacks, threats and vulnerabilities Monitoring effective attacks and developing tools for cyber situational awareness In-depth cyber analyses from network traffic log information Security testing of products and services SW security auditing 23/09/2015 7
23/09/2015 8 Competitive Edge of VTT Cyber Security Strong competence in world-class applied research: from research to concrete systems. This position is often unique Strongly trusted partner and close collaboration with customers Multi-disciplinary team: New innovation emerges often from the combination of ideas from researchers from different backgrounds: telecommunications, software development, testing etc. Lab Finland : close collaboration among the Finnish cyber security stakeholders (the most important part of this is FISC)
23/09/2015 9 Current Cyber Security Research Topics at VTT Industrial control system security Network security, SDN Device security and trusted software platforms and architectures Security assurance: security analysis, testing and monitoring Security metrics and adaptive security Risk analysis and risk-driven design Cryptography Cloud service security IAM Privacy
23/09/2015 10 INCREASE MEANINGFULNESS OF SECURITY INFORMATION + 10
DECREASE SECURITY INFORMATION GAPS AND BIASES 11
FISC Finnish Information Security Cluster FISC association Joint initiative by Finnish Information Security Industry 47 member companies and the VTT Technical Research Centre of Finland Targets: Improve international business collaboration Secure the development of the business environment Expedite the implementation of the National Cyber Security Strategy Improve and align innovation programs and academia Cyberlab Ltd A non-profit company owned by FISC Cyberlab mission is to support public sector organizations and enterprises in improving their cyber resiliency Copyright 2015 FISC Confidential
10 Cyber Security Guidelines 1. Collaboration model 2. Situational awareness 3. Continuity of 4. Capacities of preparedness the police 5. Cyber defence 6. Enhanced international co-operation 7. Education and training = knowledge 8. Legislation 9. Tasks, requirements and service models 10. Monitoring the implementation 23.9.2015 www.turvallisuuskomitea.fi 13
TECHNOLOGY FOR BUSINESS