HOW TO PROTECT AIR TRAFFIC MANAGEMENT AGAINST CYBER ATTACKS?



Similar documents
CYBERSECURITY. Global cybersecurity capabilities for a digital transformation with confidence. Delivering Transformation. Together.

Logging In: Auditing Cybersecurity in an Unsecure World

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring

Advanced Threats: The New World Order

Address C-level Cybersecurity issues to enable and secure Digital transformation

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

CESG Certification of Cyber Security Training Courses

National Cyber Security Policy -2013

Protecting critical infrastructure from Cyber-attack

Cybersecurity The role of Internal Audit

Unit 3 Cyber security

InfoSec Academy Application & Secure Code Track

Incident Response. Six Best Practices for Managing Cyber Breaches.

Are you prepared to be next? Invensys Cyber Security

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Evolving Threat Landscape

CYBER SECURITY TRAINING SAFE AND SECURE

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Advanced Threat Protection with Dell SecureWorks Security Services

Security Information & Event Management (SIEM)

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

CONSULTING IMAGE PLACEHOLDER

ISO27032 Guidelines for Cyber Security

Cyber security Building confidence in your digital future

Presented by Evan Sylvester, CISSP

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

Solutions and IT services for Oil-Gas & Energy markets

Enterprise Cybersecurity: Building an Effective Defense

TLP WHITE. Denial of service attacks: what you need to know

IBM Security Strategy

Defending Against Data Beaches: Internal Controls for Cybersecurity

BT Assure Rethink the Risk

Cybersecurity and internal audit. August 15, 2014

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Identifying Cyber Risks and How they Impact Your Business

Into the cybersecurity breach

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Cybersecurity: What CFO s Need to Know

KEY STEPS FOLLOWING A DATA BREACH

Effective Methods to Detect Current Security Threats

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Critical Controls for Cyber Security.

Security strategies to stay off the Børsen front page

Security Intelligence Services.

Cybersecurity Strategic Consulting

Compliance and Unified Communication

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Information Security Basic Concepts

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

What Data? I m A Trucking Company!

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Developing National Frameworks & Engaging the Private Sector

IT Security Strategy and Priorities. Stefan Lager CTO Services

Executive Cyber Security Training. One Day Training Course

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

September 20, 2013 Senior IT Examiner Gene Lilienthal

integrating cutting-edge security technologies the case for SIEM & PAM

Effective Methods to Detect Current Security Threats

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Caretower s SIEM Managed Security Services

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

IT Security. Muscat 15+ ABOUT US IN A GLANCE

An enterprise grade information security & forensic technical team

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

CYBER SECURITY INFORMATION SHARING & COLLABORATION

After the Attack. The Transformation of EMC Security Operations

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Enterprise Cybersecurity: Building an Effective Defense

Cyber/ Network Security. FINEX Global

CYBERSECURITY HOT TOPICS

SIEM is only as good as the data it consumes

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

A Decision Maker s Guide to Securing an IT Infrastructure

TCS Managed Security Services

Domain 1 The Process of Auditing Information Systems

We Prevent Breaches (and surprises) Intelligent Prevention

CFIR - Finance IT 2015 Cyber security September 2015

Cyber Security Metrics Dashboards & Analytics

Endpoint Threat Detection without the Pain

Payment Card Industry Data Security Standard

Uncover security risks on your enterprise network

Transcription:

SOPRA STERIA Fabien LECOQ, CTO - Strategy and Innovation Director I2S BU Cybersecurity FREQUENTIS Maximilian RIEDL, Safety & Security Specialist Safety Management Department HOW TO PROTECT AIR TRAFFIC MANAGEMENT AGAINST CYBER ATTACKS? 1 Delivering Transformation. Together.

WHY A CO-PRESENTATION REGARDING THE ATM CYBERTHREATS? Turnover: 3,1bn +20 Countries 35 000 People Cyber Security 600 Experts 360 Services Innovation 215.7 Mio +120 Countries 1.250 People Cyber Safety 100+ Experts Safety Process according SAM In order to protect Aircraft Traffic Management against cyberthreats Combine strengths of ATM actors ATM Products Cybersecurity services 2

INTRODUCTION Aircraft Traffic Management Is there a real threat? Mature approach to safety but what about Cybersecurity? What about ATM Digital transformation impact? Frequentis market vision Identified cyberthreat - a serious game! Cybersecurity embedded into Frequentis solution Why set-up a partnership with a global cyber-security provider? Sopra Steria cyber-security responses Threats and Darkmarket overview Cyber-attack evolution overview Sopra Steria Cybersecurity industrial approach 3 Next Steps

CYBER SAFETY & SECURITY FREQUENTIS TESTIMONY

Safety & Security Security protection against attacks Safety freedom of risk & harm System Attack (Threats) Operators Technical System Environment (Hazards) Procedures Strong connection of System Safety & System Security regarding the availability of functions for authorized parties 5

Cyber Safety & Security Non-physical security events in cyberspace may have real implications Example: Denial of Service (non-physical) Disruption of safety-related ATM procedures (reality) Security Threat Environment System compromises compromises compromises Technical System induce Hazards induce Operators Procedures Effects Sara Sadvandi, Nicolas Chapon, Ludovic Piètre-Cambacédès, Safety and Security Interdependencies in Complex Systems and SoS: Challenges and Perspectives 6

We enable safe innovation FREQUENTIS is a key partner for ATM Cyber Safety in the future ATM-grade end-to-end IP communication solution provider Certified components for secure/non-secure voice communication (CC EAL4+) Proven by software safety assurance (e.g. ED-153) Next generation 4k screen & VoIP recording solution at the glass Secured encrypted export of ATM data Central authorization control for remote systems Safety & Security is the basis for all our solutions Fail-safe and highly redundant systems Security by Design Software Safety Assurance 7

For a safe and secure world Prepared for the future FREQUENTIS Computer Security Incident Response Team (CSIRT) Security Notification & Event Response Security Policy, Guidelines & Assessments Awareness & Trainings Urgency in ATM for Trusted Partnerships between Industry & ANSPs and Authorities Establishment of Cyber Security Operation Centers Extended Monitoring & Logging Cyber Security Culture & Awareness Cyber Safety & Security Risk Assessments FREQUENTIS combines Safety & Security activities and trusted partnerships to assess the overall risk of threats and hazards within ATM infrastructure Partnership on Cyber-security with Sopra Steria on European projects 8

RIGHTSECURITY SERVICES TRUSTED CYBER-SECURITY PROVIDER The Right Balance Business Focused Your Information - Protected Your Reputation Preserved

APT PRESENTATION CYBERSECURITY IN THE NEWS Threats progression and acceleration since three years 2012 EADS Airbus Cyber-attack 2013 APT1 report - Penetration delay : 356 days in average (4 years and 10 months for the longest one) - A data theft estimated to 6,5 terabits of data gathered for one company, in 10 months 2013 FBI Aviation APT Alert 2003 - Titan Rain - First APT known - Massive information theft against from US organisations, including the army, during 3 years 2010 STUXNET 2012 ARAMCO 30 000 laptops including 2000 servers destroyed in one day 2013/2015 SONY 10

Data leakage Ransomware Data Destruction APT Group Advanced Cyber-terrorism DARKNET INTRODUCTION Threats Overview Advanced hacking Isolated Cyber-terrorism Intermediate hacking 11 Beginner hacking Scipt kiddies

ADVANCED PERSISTENT THREAT APT IS THE MOST DANGEROUS CYBER-THREAT Sophisticated and targeted attack affecting companies and governments Organized Cybercriminals have the ability to evade detection and the capability to gain and maintain access to well protected networks in order to ex-filtrate sensitive company information APT impact Imoact: : Data leakage & Massive data destruction Reconnaissa nce APT Process Maintain persistence Data Ex- Filtration Intrusion Establish Backdoor Install utilities Obtain credentials 12

Ideal matured market Hidden Darkweb 1st & 2nd Market Training A market resources which is operational now! Rent a hacker! Online training Amazon like platform Zero day Exploit services 1btc=272 Currency 13 DARK MARKET Insurance

NEW GENERATION OF CYBER-SECURITY SERVICES New Generation of Cyber-security Centers Industrialization 360 services 14

SOPRA STERIA CYBERSECURITY KNOW-HOW A GLOBAL SERVICE OFFERING Cyber monitoring - SIEM / SOC - APT Détection - NGIPS / HIPS - Security Watch/ CERT - Forensic - Crisis management Data Security Data Security - Classification - Encryption - DLP Strategy, Risks & Governance - Strategy/ ISMS - Risks Analysis - IS Security policy - CISO support - IT Business continuity plan Audits & Compliance - Regulatory Compliance - IS Compliance - organizational audits - Penetration testing - Vulnerabilities management Digital identities - IAM / PKI - Electronic signature - Access management and privilege - CMS / Biometric / eid GLOBAL CYBERSECURITY CAPABILITIES FOR A DIGITAL TRANSFORMATION IN CONFIDENCE 15

RIGHTSECURITY (RSS) SERVICES OFFER PORTFOLIO CYBER THREATS WILL ALWAYS GET AHEAD OF DEFENCES, WHICH IS WHY ORGANISATIONS NEED A STRATEGIC APPROACH (GARTNER) Extended Enterprise Security Identity & Access Management Application Security Web Application Security Infrastructure Security Workplace Security Cloud Security Security products New technologies Cyber-security Center Sopra Steria Vision Classical vision Sopra Steria Global Service Catalogue 16

RIGHTSECURITY SERVICES OFFER THE RSS OFFERING : A SEAMLESS SERVICE MODEL A right delivery model, flexible and scalable, combining proximity and industrialisation - Adapted to clients demands and maturity - Supporting our model s clients transformation Our Cyber Security Centers - 24/7 Coverage - Comprehensive approach based on a specific methodology from management by the risks: IPPCoR - «As a service» security A continuous innovative approach - An Innovation Lab - Box@PME - An R&D partnership with CEA Tech 17

FRONT OFFICE/BACK OFFICE MODEL STRATEGIC WORLDWIDE CYBERCENTRE EXPANSION BO FO activated Short term FO PKI solution (Microsoft) Security technology center Security products Middle term FO 1 Long term FO Strong focus on business development UK & SG cyber anticipation Data classification Security infrastructure Defence projects Biometry/access control Secure messaging 1 Identity and access management PKI Crisis management Electronic ID Governance/consulting Architecture/operation Crisis management Audit SAP security audit /SSO Dematerialisation and secure storage Secured electronic administration Risk management 2 18

CYBERSECURITY CENTRE OUR CENTRE IN A FEW FIGURES Our Toulouse CyberSecurity Centre features: Some 140 security professionals, including: 30 consultants 73 experts, specialists or architects 30 solutions experts or administrators 7 Non IT profiles: legal experts, mathematician, statisticians Toulouse (FR) A Centre with Experts proud of of the best Certifications: ISO 27005 Risk Manager, Hemel Hempstead (UK) ISO 27001 Lead Implementer and Lead auditor, McAfee EPO and VirusScan, MCSE Windows, CCISP, EBIOS V2, ITIL, CISA, CISM CERT referencement since 2014, ANSSI certification in progress Our CyberSecurity Centres in in a few a few figures over over 2012: 2014: 2000 security catalogue requests handled IT devices under management by our team/services: 150 000 work stations (laptops, desktops..) 20 000 servers, 6 000 applications, 2 500 databases 400 000 user accounts 12 Tb (tera) of SIEM log live (before archiving) 12 newsletters edited and delivered/ more than 2000 security incident treated 19

ATM CYBERTHREAT ARE REAL AND HAVE TO BE ADDRESSED ATM IS A KEY SECTOR WITH HUGE IMPACT Enablers Solution Needs Goals Sponsor ATM Stakeholders ATM Cyber-security Protection Collaboration, BEST RESPONSE! Operational Realism Launch Cyber-security program Cybersecurity trusted relationships 20

NEXT STEPS PROPOSAL A pragmatic Approach to protect the ATM Environment Three service levels: 1 Access and enable cyber-security services 2 Develop an innovative ATM Cyber-security Program 3 Cybersecurity General Auditing - CxO /Senior Management Governance Security product SOC Compliance Develop innovation program Create Dediacted ATM Cyebrsecurity Program Freqentis/Sopra Steria Cyber-threats analysis including Risks, Logs audit, Pen-test 5 months of analysis Executive + Technical report 21

THANK YOU! 22

QUESTIONS 23