SlideShare a Scribd company logo
1 of 29
CyberDefenses
Information Assurance
CyberDefenses, Inc.
• Californian by birth (Got to Texas as soon as I could)
• Oceanographer by degree from US Naval Academy
• Nuclear Engineer by Adm Rickover
• Submarine Officer by US Navy
• Disaster Relief Coordinator by ADRN
• CSO for Cyber Defenses by career
Vern Williams
2
Proprietary and Confidential 2013 CyberDefenses, Inc. ©
Industrial Control System (ICS) Security:
3
• Unique impact on both physical and cyber worlds
• Consequences can be more severe than in IT
• Lifecycles of 5-30 years
• Designed to operate in a bubble
• So what is the threat to ICSs?
• How can we defend them from the evil in the world?
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
How bad is it really?
3
"An Italian security researcher, Luigi Auriemma, has disclosed a
laundry list of unpatched vulnerabilities and detailed proof-of-
concept exploits that allow hackers to completely compromise
major industrial control systems. The attacks work against six
SCADA systems, including one manufactured by U.S. giant
Rockwell Automation. The researcher published step-by-step
exploits that allowed attackers to execute full remote
compromises and denial of service attacks. Auriemma
appeared unrepentant for the disclosures in a post on his
website.“
Slashdot: mask.of.sanity
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
History of attacks on water plants
3
• SALT River Project SCADA Hack
• Maroochy Shire Sewage Spill
• Trojan/Key logger on Ontario Water SCADA System
• Viruses Found on Auzzie SCADA Laptops
• Software Flaw makes MA Water undrinkable
• Audit/Blaster Causes Water SCADA Crash
• DoS Attack on Water System via Korean Telecom
• Penetration of California Irrigation District Wastewater Treatment
Plant
• SCADA Breach in Harrisburg, PA by an external hacker
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
What do the Execs think?
3
• Close to 30% of respondents believe their company was
not prepared for a cyberattack, and more than 40%
expect a major cyberattack within the next
year, according to a survey of 200 IT security executives
from electricity infrastructure enterprises in 14
countries conducted by Vanson Bourne for McAfee and
CSIS.
By Infosecurity, 27 April 2011
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
The Patria Group
3
This was the result of an instrument failure. What can “they” do to us when they intend harm?
3
And the really bad news? Stuxnet and variants!
Stuxnet infects Windows systems in its search for industrial control
systems which consist of Programmable Logic Controllers
(PLCs), and contain special code that controls the automation of
industrial processes—for instance, to control machinery in a plant
or a factory. Stuxnet has the ability to take advantage of the
programming software to also upload its own code to the PLC in an
industrial control system that is typically monitored by SCADA
systems. In addition, Stuxnet then hides these code blocks, so when
a programmer using an infected machine tries to view all of the
code blocks on a PLC, they will not see the code injected by Stuxnet.
Thus, Stuxnet isn’t just a rootkit that hides itself on Windows, but is
the first publicly known rootkit that is able to hide injected code
located on a PLC.
Stuxnet Introduces the First Known Rootkit for Industrial Control Systems, from Symantec Blog
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
What does DHS say?
3
DHS Warns ICS, SCADA Owners About Increase in
Malicious Activity
• Be proactive in auditing the
security, particularly, authentication controls of their
systems.
• Alert is in response to a growing concern over the
number of exploit tools available online targeting ICS
and SCADA systems.
• Growing interest from hacktivists using special search
engines to find ICS accessible online.
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Who is affected?
3
Exploit kits were made publicly available that
target programmable logic controllers for industrial
control systems
• Affects: GE, Rockwell Automation, Schneider Electric
and Koyo
• Another exploit was built for the Ethernet/IP protocol
used by a number of PLC vendors
• Added to report of a backdoor in CoDeSys ladder logic
system used by 261 PLC manufacturers to execute
ladder logic.
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
What else do we have to worry about?
3
• Kaspersky Labs believes four other malwares, which
they call Duqu, Flame, Gauss, and MiniFlame, were
developed by the same US “cyber-weapons factory”.
• 2012 ICS CERT tracked 171 unique vulnerabilities
• Shodan used to identify 20K Internet accessible and
vulnerable ICS
• Shamoon destroyed 30K of Saudi Aramco computers
(seems to be a lone perpetrator)
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Can we continue like this?
3
The status quo is broken. (we need to fix it)
Doing the same things we are now, is doomed to
failure.
Working together with IT and Corporate
Security, we can make the bad guys day harder!
The one thing worse than the operator not
having control, is “them” having control.
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
What can we do?
3
• Practice Defense in Depth by Policy
• Avoid any attempt to bypass controls
• Establish accountability for actions
• Ask the hard questions:
– How good was Identity Proofing when “Joe” was
hired?
– If the contract requires me to be
vulnerable, maybe it is time to get a new
contractor or provider.
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Security Goals
• Develop / review the security policy for your ICS
environment
• Architect a robust ICS environment
• Build security concerns into your contracts
• Require your provider to “Build Security In”
• Train your staff and Educate your users
• Require accountability
• Develop and Train a ICS Incident Response Team
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Incident Response
3
Current State of the Art Response
• Emergency Operations Management
• Cyber Incident Response
– US-CERT
– CERT, CMU
• ICS CERT
– Control Systems Security Program (CSSP) DHS
– New but taking advantage of experience from both
– http://www.us-cert.gov/control_systems/index.html
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Phases of Incident Response
3
• Planning
• Incident Prevention
• Incident Management
– Detection
– Containment
– Remediation
– Recovery
• Post Incident Analysis
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Incident Response Key Elements
3
Recommended Practice: Developing an Industrial Control Systems Cybersecurity
Incident Response Capability October 2009
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Where to start?
3
So where do we start to achieve this capability?
We have existing resources that can be brought
to bear, but we first have to have the will of
management and funding.
In developing an Incident Response Plan, you
have to engage all of the stakeholders and they
each have to have ownership of the results.
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Key Response and Monitoring
3
Emergency Management
Physical Security, Loss Prevention, Fire Protection, EOC Staff
Respond to physical effects
Cyber Incident Response
IT Help Desk, Anti-Virus, USB management, Network and System
Security Controls, Forensics, Change Management
Deals well with traditional IT systems and networks
ICS Operations
Change Management, Typically Strong Physical Access Weak
Encryption and Identity Management, Long Lifecycles
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Obstacles to overcome?
3
• Distrust between InfoSec, IT and ICS staff
• Tools that do not support ICS protocols
• Response Time vs Encryption
• Robust IdM vs Easy Operator Access
• “Starting” a new industry in ICS Security
The one thing worse than the operator not
having control, is “them” having control.
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Lets get started!
3
• Get buy in from the TOP
• Form the team (provide incentive)
• Develop an ICS Incident Response Plan
Plagiarism is the quickest way
• Train your staff, get the tools needed
• Develop outsourcing and comms channels
• Exercise, Feedback, Exercise, etc.
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Team Members
3
• ICS-CERT Team Manager
• Process or Control System Engineer
• Network and System Admins
• Plant Manager / CIO / Chief Engineer
• Security and Legal SMEs
• PR and HR Specialists
• Vendor Support Engineers and others
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Build and Exercise the Plan
3
• Get started and work out the bugs
• Basic plan should provide guides for phases
• Build check lists and forms to standardize actions
• Develop outside contacts with LEO, Fire etc.
• Establish communications methods
• Some ONE has to be in charge
• Use realistic scenarios to exercise your plan, use actual
incidents if available
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
What else can we do?
3
• Assess your vulnerabilities (cross discipline)
• Mitigate where possible
• Architect with Security in mind
• Encryption is the best defense against
compromise and delays can be minimal
• Identity is key. If you do not know who, you do
not know much.
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Key SCADA Questions For your CEO
Here are five questions chief executives should ask about cyber risks:
1) How is our executive leadership informed about the current level and
business impact of cyber risks to our company?
2) What is the current level and business impact of cyber risks to our
company? What is our plan to address identified risks?
3) How does our cyber security program apply industry standards and best
practices?
4) How many and what types of cyber incidents do we detect in a normal
week? What is the threshold for notifying our executive leadership?
5) How comprehensive is our cyber incident response plan? How often is it
tested?
CyberDefenses, Inc.
Posted by Greg Hale on Feb 28 2013, This is an excerpt from ISSSource
Axioms:
3
• “You will do 85% or worse in competition
than your best in practice.” Karl Rehn
• Train the way you expect to “fight”.
• Learn to “fight” wounded.
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
References:
3
• Guide to Industrial Control Systems (ICS) Security, NIST 800-82, May 2013
– http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r1.pdf
• Recommended Practice: Developing an Industrial Control Systems
Cybersecurity Incident Response Capability, October 2009, DHS
– http://ics-cert.us-cert.gov/content/recommended-practices
• In the Dark; Crucial Industries Confront Cyberattacks
– http://www.mcafee.com/us/resources/reports/rp-critical-infrastructure-protection.pdf
• CERT Resources:
– http://www.us-cert.gov/resources.html
• Control Systems Security Program (CSSP)
– http://www.us-cert.gov/control_systems/ics-cert/
• ICS Information Sharing and Analysis Center (ISAC)
– http://www.ics-isac.org
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
Vern Williams, CSO, Cyber Defenses, Inc.
CISSP, CSSLP, ISSEP, ISAM, CCSK, CBCP
ISSA Distinguished Fellow
Senior Member, IEEE (Institute of Electrical and Electronics
Engineers)
Member ISA and CSA
ISSA International Honor Roll, 2007
ISSA 2005 Security Practitioner of the Year
512.297.8798 (mobile)
1205 Sam Bass Road, Suite 300, Round Rock, TX 78681
Vern.Williams@CyberDefenses.com
Vern.Williams@IEEE.org
Proprietary and Confidential 2013
CyberDefenses, Inc. ©
CyberDefenses
Information Assurance
CyberDefenses, Inc.

More Related Content

What's hot

Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
James Nesbitt
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 
Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOC
Fuad Khan
 

What's hot (20)

Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
Scada security presentation by Stephen Miller
Scada security presentation by Stephen MillerScada security presentation by Stephen Miller
Scada security presentation by Stephen Miller
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
For Critical Infrastructure Protection
For Critical Infrastructure ProtectionFor Critical Infrastructure Protection
For Critical Infrastructure Protection
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing Keynote
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOC
 

Similar to SCADA Security Webinar

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
christiandean12115
 

Similar to SCADA Security Webinar (20)

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart building
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 

More from AVEVA

More from AVEVA (20)

What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAWhat's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4
 
Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5
 
What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3
 
Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3
 
Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2
 
What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
 
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
 
What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1
 
Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
 
Graphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web StudioGraphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web Studio
 
What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1
 
Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1
 
What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
 
Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

SCADA Security Webinar

  • 2. • Californian by birth (Got to Texas as soon as I could) • Oceanographer by degree from US Naval Academy • Nuclear Engineer by Adm Rickover • Submarine Officer by US Navy • Disaster Relief Coordinator by ADRN • CSO for Cyber Defenses by career Vern Williams 2 Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 3. Industrial Control System (ICS) Security: 3 • Unique impact on both physical and cyber worlds • Consequences can be more severe than in IT • Lifecycles of 5-30 years • Designed to operate in a bubble • So what is the threat to ICSs? • How can we defend them from the evil in the world? Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 4. How bad is it really? 3 "An Italian security researcher, Luigi Auriemma, has disclosed a laundry list of unpatched vulnerabilities and detailed proof-of- concept exploits that allow hackers to completely compromise major industrial control systems. The attacks work against six SCADA systems, including one manufactured by U.S. giant Rockwell Automation. The researcher published step-by-step exploits that allowed attackers to execute full remote compromises and denial of service attacks. Auriemma appeared unrepentant for the disclosures in a post on his website.“ Slashdot: mask.of.sanity Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 5. History of attacks on water plants 3 • SALT River Project SCADA Hack • Maroochy Shire Sewage Spill • Trojan/Key logger on Ontario Water SCADA System • Viruses Found on Auzzie SCADA Laptops • Software Flaw makes MA Water undrinkable • Audit/Blaster Causes Water SCADA Crash • DoS Attack on Water System via Korean Telecom • Penetration of California Irrigation District Wastewater Treatment Plant • SCADA Breach in Harrisburg, PA by an external hacker Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 6. What do the Execs think? 3 • Close to 30% of respondents believe their company was not prepared for a cyberattack, and more than 40% expect a major cyberattack within the next year, according to a survey of 200 IT security executives from electricity infrastructure enterprises in 14 countries conducted by Vanson Bourne for McAfee and CSIS. By Infosecurity, 27 April 2011 Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 7. The Patria Group 3 This was the result of an instrument failure. What can “they” do to us when they intend harm?
  • 8. 3 And the really bad news? Stuxnet and variants! Stuxnet infects Windows systems in its search for industrial control systems which consist of Programmable Logic Controllers (PLCs), and contain special code that controls the automation of industrial processes—for instance, to control machinery in a plant or a factory. Stuxnet has the ability to take advantage of the programming software to also upload its own code to the PLC in an industrial control system that is typically monitored by SCADA systems. In addition, Stuxnet then hides these code blocks, so when a programmer using an infected machine tries to view all of the code blocks on a PLC, they will not see the code injected by Stuxnet. Thus, Stuxnet isn’t just a rootkit that hides itself on Windows, but is the first publicly known rootkit that is able to hide injected code located on a PLC. Stuxnet Introduces the First Known Rootkit for Industrial Control Systems, from Symantec Blog Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 9. What does DHS say? 3 DHS Warns ICS, SCADA Owners About Increase in Malicious Activity • Be proactive in auditing the security, particularly, authentication controls of their systems. • Alert is in response to a growing concern over the number of exploit tools available online targeting ICS and SCADA systems. • Growing interest from hacktivists using special search engines to find ICS accessible online. Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 10. Who is affected? 3 Exploit kits were made publicly available that target programmable logic controllers for industrial control systems • Affects: GE, Rockwell Automation, Schneider Electric and Koyo • Another exploit was built for the Ethernet/IP protocol used by a number of PLC vendors • Added to report of a backdoor in CoDeSys ladder logic system used by 261 PLC manufacturers to execute ladder logic. Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 11. What else do we have to worry about? 3 • Kaspersky Labs believes four other malwares, which they call Duqu, Flame, Gauss, and MiniFlame, were developed by the same US “cyber-weapons factory”. • 2012 ICS CERT tracked 171 unique vulnerabilities • Shodan used to identify 20K Internet accessible and vulnerable ICS • Shamoon destroyed 30K of Saudi Aramco computers (seems to be a lone perpetrator) Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 12. Can we continue like this? 3 The status quo is broken. (we need to fix it) Doing the same things we are now, is doomed to failure. Working together with IT and Corporate Security, we can make the bad guys day harder! The one thing worse than the operator not having control, is “them” having control. Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 13. What can we do? 3 • Practice Defense in Depth by Policy • Avoid any attempt to bypass controls • Establish accountability for actions • Ask the hard questions: – How good was Identity Proofing when “Joe” was hired? – If the contract requires me to be vulnerable, maybe it is time to get a new contractor or provider. Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 14. Security Goals • Develop / review the security policy for your ICS environment • Architect a robust ICS environment • Build security concerns into your contracts • Require your provider to “Build Security In” • Train your staff and Educate your users • Require accountability • Develop and Train a ICS Incident Response Team Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 15. Incident Response 3 Current State of the Art Response • Emergency Operations Management • Cyber Incident Response – US-CERT – CERT, CMU • ICS CERT – Control Systems Security Program (CSSP) DHS – New but taking advantage of experience from both – http://www.us-cert.gov/control_systems/index.html Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 16. Phases of Incident Response 3 • Planning • Incident Prevention • Incident Management – Detection – Containment – Remediation – Recovery • Post Incident Analysis Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 17. Incident Response Key Elements 3 Recommended Practice: Developing an Industrial Control Systems Cybersecurity Incident Response Capability October 2009 Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 18. Where to start? 3 So where do we start to achieve this capability? We have existing resources that can be brought to bear, but we first have to have the will of management and funding. In developing an Incident Response Plan, you have to engage all of the stakeholders and they each have to have ownership of the results. Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 19. Key Response and Monitoring 3 Emergency Management Physical Security, Loss Prevention, Fire Protection, EOC Staff Respond to physical effects Cyber Incident Response IT Help Desk, Anti-Virus, USB management, Network and System Security Controls, Forensics, Change Management Deals well with traditional IT systems and networks ICS Operations Change Management, Typically Strong Physical Access Weak Encryption and Identity Management, Long Lifecycles Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 20. Obstacles to overcome? 3 • Distrust between InfoSec, IT and ICS staff • Tools that do not support ICS protocols • Response Time vs Encryption • Robust IdM vs Easy Operator Access • “Starting” a new industry in ICS Security The one thing worse than the operator not having control, is “them” having control. Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 21. Lets get started! 3 • Get buy in from the TOP • Form the team (provide incentive) • Develop an ICS Incident Response Plan Plagiarism is the quickest way • Train your staff, get the tools needed • Develop outsourcing and comms channels • Exercise, Feedback, Exercise, etc. Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 22. Team Members 3 • ICS-CERT Team Manager • Process or Control System Engineer • Network and System Admins • Plant Manager / CIO / Chief Engineer • Security and Legal SMEs • PR and HR Specialists • Vendor Support Engineers and others Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 23. Build and Exercise the Plan 3 • Get started and work out the bugs • Basic plan should provide guides for phases • Build check lists and forms to standardize actions • Develop outside contacts with LEO, Fire etc. • Establish communications methods • Some ONE has to be in charge • Use realistic scenarios to exercise your plan, use actual incidents if available Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 24. What else can we do? 3 • Assess your vulnerabilities (cross discipline) • Mitigate where possible • Architect with Security in mind • Encryption is the best defense against compromise and delays can be minimal • Identity is key. If you do not know who, you do not know much. Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 25. Key SCADA Questions For your CEO Here are five questions chief executives should ask about cyber risks: 1) How is our executive leadership informed about the current level and business impact of cyber risks to our company? 2) What is the current level and business impact of cyber risks to our company? What is our plan to address identified risks? 3) How does our cyber security program apply industry standards and best practices? 4) How many and what types of cyber incidents do we detect in a normal week? What is the threshold for notifying our executive leadership? 5) How comprehensive is our cyber incident response plan? How often is it tested? CyberDefenses, Inc. Posted by Greg Hale on Feb 28 2013, This is an excerpt from ISSSource
  • 26. Axioms: 3 • “You will do 85% or worse in competition than your best in practice.” Karl Rehn • Train the way you expect to “fight”. • Learn to “fight” wounded. Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 27. References: 3 • Guide to Industrial Control Systems (ICS) Security, NIST 800-82, May 2013 – http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r1.pdf • Recommended Practice: Developing an Industrial Control Systems Cybersecurity Incident Response Capability, October 2009, DHS – http://ics-cert.us-cert.gov/content/recommended-practices • In the Dark; Crucial Industries Confront Cyberattacks – http://www.mcafee.com/us/resources/reports/rp-critical-infrastructure-protection.pdf • CERT Resources: – http://www.us-cert.gov/resources.html • Control Systems Security Program (CSSP) – http://www.us-cert.gov/control_systems/ics-cert/ • ICS Information Sharing and Analysis Center (ISAC) – http://www.ics-isac.org Proprietary and Confidential 2013 CyberDefenses, Inc. ©
  • 28. Vern Williams, CSO, Cyber Defenses, Inc. CISSP, CSSLP, ISSEP, ISAM, CCSK, CBCP ISSA Distinguished Fellow Senior Member, IEEE (Institute of Electrical and Electronics Engineers) Member ISA and CSA ISSA International Honor Roll, 2007 ISSA 2005 Security Practitioner of the Year 512.297.8798 (mobile) 1205 Sam Bass Road, Suite 300, Round Rock, TX 78681 Vern.Williams@CyberDefenses.com Vern.Williams@IEEE.org Proprietary and Confidential 2013 CyberDefenses, Inc. ©

Editor's Notes

  1. .
  2. .
  3. .
  4. .
  5. .
  6. .
  7. .