Integrating Physical Protection and Cyber Security Vulnerability Assessments



Similar documents
The Next Generation of Security Leaders

2011 Forrester Research, Inc. Reproduction Prohibited

7 things to ask when upgrading your ERP solution

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Best Practices for Vulnerability Management

Obtaining Enterprise Cybersituational

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

FIVE PRACTICAL STEPS

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development

Cyber Learning Solutions

Fortify. Securing Your Entire Software Portfolio

Regulatory Compliance Management for Energy and Utilities

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Successful Enterprise Architecture. Aligning Business and IT

Risk-Based IT Change Management

Detect, Contain and Control Cyberthreats

Process-Based Business Transformation. Todd Lohr, Practice Director

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Intelligence Driven Security

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Optimizing Network Vulnerability

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Industrial Defender, Inc.: Recipient of the 2008 Global Risk Management Process Control & SCADA Company of the Year Award

PUTTING NIST GUIDELINES FOR INFORMATION SECURITY CONTINUOUS MONITORING INTO PRACTICE

PwC Cybersecurity Briefing

Cutting Through SIEM Vendor Marketing. Make the right technology decision A. Ananth

Unstructured Threat Intelligence Processing using NLP

FREQUENTLY ASKED QUESTIONS

Cybersecurity Risk Assessment in Smart Grids

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Managing the Unpredictable Human Element of Cybersecurity

A Primer on Cyber Threat Intelligence

Modeling and Simulation (M&S) for Homeland Security

SURVEY REPORT SPON. Identifying Critical Gaps in Database Security. Published April An Osterman Research Survey Report.

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division

GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.

Cyber Information-Sharing Models: An Overview

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Cyber Security R&D (NE-1) and (NEET-4)

More on Software Project Management Project and Organizations, Project Portfolio Management, Procurement Management

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Simplify Your Windows Server Migration

WHITE PAPER: THREAT INTELLIGENCE RANKING

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

Executive Brief. Best Practices for Software Selection. Best Practices for Software Selection. July #1 Structured Selection Methodology

Protecting Organizations from Cyber Attack

The ICS Approach to Security-Focused IT Solutions

Neil Hayward Customer Intelligence Solutions Program Manager SAS EMEA Copyright 2003, SAS Institute Inc. All rights reserved.

Defender Networking Services Company (DNSC)

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

KEYWORDS: Risk Assessment, Competitive Intelligence, National Security, Web Security, Defense, Information Security

Risk & Audit Committee California Public Employees Retirement System

CyberSecurity Solutions. Delivering

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

The SIEM Evaluator s Guide

Security. Security consulting and Integration: Definition and Deliverables. Introduction

An ICS Whitepaper Choosing the Right Security Assessment

Managing Vulnerabilities For PCI Compliance

Spreading the Word on Nuclear Cyber Security

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

Enterprise Network Security Classes

2012 Technology Project Proposal Instructions

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY

Logging In: Auditing Cybersecurity in an Unsecure World

New Era in Cyber Security. Technology Development

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

Empower loss prevention with strategic data analytics

MEN'S FASHION UK Items are ranked in order of popularity.

Application Security in the Software Development Lifecycle

Zak Khan Director, Advanced Cyber Defence

Define & Assess Skills - Smart Grid Security Specialists

RSA CYBERSECURITY POVERTY INDEX 2015

Continuous Cyber Situational Awareness

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Cisco Advanced Services for Network Security

IEEE-Northwest Energy Systems Symposium (NWESS)

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

ESTABLISHING A MEASUREMENT PROGRAM

Root Cause Analysis Concepts and Best Practices for IT Problem Managers

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Whitepaper. Continuous Testing of Production Web Applications

Cybersecurity Delivering Confidence in the Cyber Domain

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Best Practices for Threat & Vulnerability Management. Don t let vulnerabilities monopolize your organization.

Contributing an integrated Research and Innovation Agenda for Cybersecurity The role and approach of the market study

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

SCOPE. September 25, 2014, 0930 EDT

Transcription:

Integrating Physical Protection and Cyber Security Vulnerability Assessments Presented by Doug MacDonald Information Release # PNNL-SA-99462

Definition Wikipedia defines Vulnerability Assessments as the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system Where vulnerabilities are defined as the inability to protect an asset or target against a defined threat or reduced system effectiveness resulting from reduced, compromised, or lacking defensive measures

Introduction Historical physical protection systems Evolution over the years Added system vulnerabilities Not properly identifying these vulnerabilities can have catastrophic consequences

Historically Most physical protection vulnerability assessments and cyber security analysis are performed in an independent or stove piped manner, and don t account for system level interactions or interdependencies This provides a segmented or incomplete picture of the overall risk to an asset

Need Need to fully evaluate the physical protection domain and the cyber security domain together to understand the overall performance of the protection measures in place Need to identify and quantify the areas of undetermined risk

Need Need to fully evaluate the physical protection domain and the cyber security domain together to understand the overall performance of the protection measures in place Need to identify and quantify the areas of undetermined risk

Need Need to fully evaluate the physical protection domain and the cyber security domain together to understand the overall performance of the protection measures in place Need to identify and quantify the areas of undetermined risk

Need Need to fully evaluate the physical protection domain and the cyber security domain together to understand the overall performance of the protection measures in place Need to identify and quantify the areas of undetermined risk

Evolution of the Assessment Physical Security VA Cyber Security Assessments The integrated Cyber/Physical VA

Bringing the Domains Together The blended approach used by PNNL to integrate the Cyber and Physical vulnerability assessment process is needed to properly identify and quantify the system level interactions and interdependencies Blended approach development 4 year effort of experienced SMEs Boots on the ground, firsthand knowledge Years of experience with the systems in the field Experts were cross-trained in the process and methodology each domain currently uses for assessments Terminology (a common language) Timely detection methodology Experiences The team modified the capability to evaluate every avenue of approach using both electronic and physical pathways

Assessments and Lessons Learned Real-world assessment Team of 10 SMEs Scope was the entire system Had just completed a comprehensive assessment Several areas of concern based on the cyber/physical interplay New modeling and simulation tools are needed to accurately capture and thoroughly evaluate this blended cyber/physical approach They must provide a comprehensive vulnerability assessment and risk analysis tool Incorporate elements like the ability to capture and quantify system level interdependencies and interactions And provide a backtracking capability

PACRAT PNNL created a new software tool for the blended assessment that can Perform a comprehensive vulnerability assessment and risk analysis with all of the most widely used features of today Plus added elements like the ability to capture and quantify system level interdependencies and interactions And a backtracking capability The Physical and Cyber Risk Analysis Tool (aka PACRAT) is much more than a vulnerability analysis tool, it s an automated discovery and what if analysis solution Evaluating all physical and electronic pathways in a holistic fashion is the only way to increase understanding of the systems in place, and their ability to adequately protect assets

PACRAT Each of these elements are needed to properly assess the overall protection strategy and identify true risk The ability to focus on the objective and tune the tool PACRAT s User Interface (the dashboard ) and the output display (with color coded, statistical pathway analysis)

PACRAT PACRAT is also provisioned for a Value Added Module to assist in prioritizing investment upgrades Automated what if analysis Currently a manual, time consuming process Not intended to eliminate the analyst This automated function will recommend improvements based on the return on investment (ROI) High Low $ $$ $$$

Additional Areas for Improvement Training and awareness Organizational structure Security culture Defining the blended threat Adversarial teams with both cyber and physical expertise Performance values for cyber components Examining the frequency of assessments Quantifying consequences

16 Questions