The Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy



Similar documents
Risk Management in Practice A Guide for the Electric Sector

Update On Smart Grid Cyber Security

Breakthrough Cyber Security Strategies. Introducing Honeywell Risk Manager

Obtaining Enterprise Cybersituational

N-Dimension Solutions Cyber Security for Utilities

SCADA Security Training


Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

What Risk Managers need to know about ICS Cyber Security

Defending Against Data Beaches: Internal Controls for Cybersecurity

Enterprise Security Tactical Plan

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr.

Cyber Security and Privacy - Program 183

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

Cybersecurity Awareness for Executives

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

CYBER SECURITY FOUNDATION - OUTLINE

STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;

Middle Class Economics: Cybersecurity Updated August 7, 2015

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

RSA CYBERSECURITY POVERTY INDEX 2015

Critical Controls for Cyber Security.

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Smart Grid Security: A Look to the Future

An International Perspective on Security and Compliance

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Advanced Endpoint Protection Overview

Information Technology Risk Management

Continuous Network Monitoring

Intelligence Driven Security

Application Intrusion Detection

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Persistence Mechanisms as Indicators of Compromise

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

HP Fortify application security

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

Protecting against cyber threats and security breaches

Facilitated Self-Evaluation v1.0

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

CHASE Survey on 6 Most Important Topics in Hardware Security

Cyber Learning Solutions

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Cybersecurity The role of Internal Audit

Frontiers in Cyber Security: Beyond the OS

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

2012 Application Security Gap Study: A Survey of IT Security & Developers

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Evolution Of Cyber Threats & Defense Approaches

Advanced Threat Protection with Dell SecureWorks Security Services

Cyber Security Management

SCADA/ICS Security in an.

KEEP IT SYNPLE STUPID

OEB Smart Grid Advisory Committee

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

Threat Modeling. Deepak Manohar

Information Security Attack Tree Modeling for Enhancing Student Learning

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

How To Write A National Cybersecurity Act

Cybersecurity: What CFO s Need to Know

IoT & SCADA Cyber Security Services

Security Controls Implementation Plan

Cyber-Security. FAS Annual Conference September 12, 2014

PUBLIC SAFETY CYBER SECURITY

What is Really Needed to Secure the Internet of Things?

future data and infrastructure

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Practical Steps To Securing Process Control Networks

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Cyber Security nei prodotti di automazione

Capabilities for Cybersecurity Resilience

Management (CSM) Capability

CYBER SECURITY INFORMATION SHARING & COLLABORATION

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Transcription:

The Changing Threat Surface in Embedded Computing Riley Repko Vice President, Global Cyber Security Strategy

Embedded Computing History First embedded system was the Apollo Guidance Computer First integrated circuit-based computers First alphanumeric/keypad user interface Designed by Charles Stark Draper at the MIT Instrumentation Laboratory Program was responsible for reducing the price of NAND gate integrated circuits from $1000 each to $3 each Enabled commercialization of embedded computers 2

Embedded Computing History (2) 1970s: First microprocessor (Intel 4004) designed originally for calculators 1980s: First microcontroller (Intel 8742) integrated memory into the same chip to simplify application in embedded systems It became more cost effective to use digital controls (e.g. Intel 4004 buttons) rather than analog controls (e.g. knobs) By 1980s embedded computing had become a mainstream component of consumer electronics Intel 8742 3

Modern Embedded Systems Pacemaker

Thermostat Cutlery Toys Power Grid 4 How is the Threat Surface Changing? Embedded systems are becoming much more complex Moore s law allows systems to be much more capable Allows developers to leverage third party libraries with less concern over meeting real-time

operating system (RTOS) timing constraints Integration of network and graphical user interfaces Opportunities for supply chain attacks and software bugs in more complex systems Internet of Things Internet connection for consumer electronics Lack of security on interfaces Rapid innovation without security standards Vulnerable AND connected to the Internet 5

Threat Model vs. Threat Surface Adversary System Policy Gaps Goals Policies Exploits T T h h r r e e a a

Adversary t t Implementation System Security S M u Capabilities o r Flaws Mechanisms f d a e c l e System Security Adversary Gaps in Detection Vulnerabilities Detection and

Accesses and Remediation Remediation Rate of Change Need to Better Increasing Manage 6

Security Best Practices To date security has focused on achieving security through compliance Most recent/famous example is the SANS Institute top 20 security controls Goal: If you comply with the security controls then your threat surface is manageably small

Problem: does not take into consideration the threat model May be overkill (unnecessarily expensive to implement) May be too little (insufficiently effective against nation-state APTs) 7

Failure of Security Mechanisms 8 Changing Landscape Executive Order 13636 issued in 2013 seeks to secure US critical infrastructure against increasing threat Critical infrastructure relies on a mixture of:

Information Technology (IT): standard computers and networks that can be secured using conventional security tools Operational Technology (OT): embedded and proprietary computers and networks that currently lack tools to effectively secure their operations The NIST Cybersecurity Framework provides a framework in which to consider cybersecurity New emphasis on risk-based approaches to cybersecurity Compliance-based approaches using best practices should provide an 80% solution but need to be customized based on the threat model Measure indicators of cybersecurity risk to assess whether security is getting better or worse 9

10 How is the Threat Model Changing? Industrial Control Systems (ICS) is increasingly targeted Why? New frontier for hackers as modern operating systems make hacking traditional IT targets more

difficult and less interesting More devices are connected to the Internet increasing opportunity Interest from nation-state actors and hactivists in being able to cause infrastructure outage No expectation of immediate use of vulnerabilities other than to demonstrate capabilities to adversaries Arms race for vulnerability development against ICS Combination of increased hacker interest and increased vulnerability leads to significant increase in risk 11

Embedded System Risk Pacemakers Automotive UAV Hijacking Smart Meters Appliances 12

Bad Actors Ellyne Phneah, China main source of cyberespionage attacks in 2012, ZDNet, April 2013 13

What Do We Do? 1. Hybrid strategy of compliance (best practices) and risk-based metrics to assess whether security is getting better or worse 5. Update security policies and 2. Integration of existing IT defensive countermeasures security tools and OT security based on threats to ensure (yet to be developed in most closed-loop process cases) tools to protect networks 4. Formulation of new approaches to attack response

3. Integration of traditional IDS and digital forensics to cope monitoring and new IDS-like with threats in ICS tools relevant to OT networks environments Need environment-relevant IT security tools Need new OT tools for Protect/Detect/Respond Need new environment-relevant approaches to risk management 14

ISA-99 Standards for Control Systems 15 Chemring Focusing on products and services to address the OT security gap, integrating across the entire NIST

CSF Partnering with companies to mature technologies for addressing OT security gaps in protection, detection, and response Partnering with companies to provide threat identification and recovery services Contact Riley Repko VP Global Cybersecurity Strategy rrepko@chemringgroup.com 16