K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
Prepared: October, Ann Garrett, State Chief Information Security Officer Statewide Security Update October 25, 2005 Information Technology Advisory.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
TERRORISM / POLITICAL VIOLENCE SOLUTIONS FAIR International Insurance Conference on "Political Violence" April 2010 – Karachi Daniel O’Connell
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
SEC835 Database and Web application security Information Security Architecture.
ELECTRICAL CRITICAL INFRASTRUCTURE SECURITY Charles Hookham, P.E., M.ASCE, VP, Utility Projects HDR Engineering 1.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Lessons Learned in Smart Grid Cyber Security
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
© Cyber SECurity Consultingwww.cybersecconsulting.com 2318 Monkton Rd. Monkton MD USA Proprietary & Confidential Automation and Security.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Role for Electric Sector in Critical Infrastructure Protection R&D Presented to NERC CIPC Washington D.C. June 9, 2005 Bill Muston Public Release.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Developing a Security Program. Exercise Plan Develop/Update Plan Review/Revisit Plan.
NERC and ESISAC Electricity Sector Information Sharing and Analysis Center Update March 2006 CIPC Confidentiality: Public Release.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Copyright © EWA IIT, Inc. June 17, 2002 © 2002  IIT, Inc. EWA Information & Infrastructure Technologies, Inc. 3 FOR OFFICIAL USE ONLY June 17, 2002 ©
COMPANY INTERNAL — CONFIDENTIAL Unauthorized Use and Disclosure Prohibited Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. COMPANY INTERNAL.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
ACEC National Energy and Environment Challenges in Asset Management? Brian Long Transmission Line Performance Xcel Energy August 15, 2015.
Taking your Business Technology Further. First Communications: At A Glance Technology Provider since 1998, serving thousands of Businesses throughout.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
Securing Information Systems
Securing Information Systems
Information Security Program
Iowa Communications Alliance
CompTIA Security+ SY0-401 Real Exam Question Answer
Agenda Control systems defined
and Security Management: ISO 28000
Lecture 14: Business Information Systems - ICT Security
CCNET Managed Services
Securing Information Systems
I have many checklists: how do I get started with cyber security?
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Role for Electric Sector in Critical Infrastructure Protection R&D
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Securing the Threats of Tomorrow, Today.
NERC Cyber Security Standard
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Presentation transcript:

K E M A, I N C. Current Status of Cyber Security Issues 2004 Keynote Address Joe Weiss January 20, 2004

K E M A, I N C. 2 Agenda n Control systems defined n Control systems cyber security threats are real n Address the issue: It makes good business sense  Productivity improvements  Response to security threats  Reliability  Regulatory compliance  Liability

K E M A, I N C. 3 What’s a Control System? n SCADA/EMS n DCS n PLCs n RTUs/IEDs n Meters n Enterprise applications for utility operations

K E M A, I N C. 4 Successful Attacks With Damage n Electric Utility  100 – 150 hits/day on control network  17 Intrusions  2 Denial of Service (DOS) Events  3 Loss of Control Events  Switchgear controller  Boiler Deaerator controls n Wastewater Utility  Wireless hack by disgruntled ex- SCADA supplier employee  Release of millions of liters of sewage

K E M A, I N C. 5 Hackers Starting to Look at SCADA n - Brumcon Report “It was a detailed breakdown of the RF systems used by water management authorities in the UK and how these systems can be abused, interfered with and generally messed. The live demonstration included how to monitor the un-encrypted water management systems and create a DOS attack. It was clear that additional communication channels using dial up connections would kick in automatically in the event of an attack.”

K E M A, I N C. 6 Business Drivers n Need for productivity improvements  Customer service  Financial impact n Response to security threats n Reliability: High visibility n Regulatory compliance n Liability

K E M A, I N C. 7 Need for productivity improvements n Technology Advances Enabling  On-line maintenance (RCM)  System optimization  Wide access to system data  Centralized data analysis n Security solution  Standards organizations: Lack of coordination  Policies  Procedures  Control systems architecture  Develop security policies  ISO not adequate

K E M A, I N C. 8 Productivity Improvement: Examples n Major Oil/Gas Company  ~90% of control systems world-wide are networked n IED Supplier  Systems require dial-up access n PLC Supplier  Systems have default passwords hardcoded into firmware

K E M A, I N C. 9 Response to security threats n Current responses  NERC  Presidential decision directive  DHS/DOE  National Plan to secure cyber space  Industry/standards organizations n Solution  Conduct vulnerability and risk assessment  Develop recovery plans  Address IT/Operations gap  Provide training programs

K E M A, I N C. 10 SCADA Cyber Assessment n Test conducted following factory acceptance test n Most secure possible case  Vendor knew we were coming  All patches installed  No outside connections n Penetration complete within 2 working days

K E M A, I N C. 11 Misidentification n Penetration test performed by organization without significant control system expertise  Identified unauthorized access of plant DCS Engineer’s Workstation n Control system assessment  Confirmed identified workstation was not DCS Engineer’s Workstation  Additional walkdown identified vulnerabilities not found by traditional penetration testing  Non-IP vulnerabilities

K E M A, I N C. 12 Reliability: High Visibility n Cyber security/reliability connection  Cyber events have impacted reliability of utility control systems  Fixes to improve reliability can impact cyber security  Control systems role in preventing and/or mitigating future blackouts n Solution  Include cyber security in reliability upgrades

K E M A, I N C. 13 Example: Substation Automation/EMS Upgrade n Includes cyber security considerations  Industry proven specifications  Remote access  Data communications/protocols  Vendor access  Training

K E M A, I N C. 14 Regulatory compliance n Current compliance issues  NERC  Presidential decision directive  AGA  EPA n Solution  Vulnerability and risk assessment  Policies and procedures  IT strategy and plan

K E M A, I N C. 15 NERC n Urgent Action Standard 1200  Control Center Only  Substantial compliance by March 2004  16 tasks  Some require additional work n SAR  In ballot process  Includes power plant controls and substation equipment

K E M A, I N C. 16 Homeland Security Presidential Directive 7  DHS Lead Agency  DOE responsible for Energy  Require a strategy to identify, prioritize, and coordinate protection of critical infrastructure  By July 2004, develop plans for protecting critical infrastructure § National goal: Protect critical infrastructure from physical and cyber attacks HSPD-7 December 17, 2003

K E M A, I N C. 17 Liability n Why liability is an issue  This is not an unforeseen event  Insurance will have exclusions for cyber  Insurance may not cover company executives  SEC may require status of cyber in filings n Solution  Perform due diligence  Move toward industry accepted program

K E M A, I N C. 18 National SCADA Test Bed n Developing new tools n Determine vulnerabilities n Large scale assessments n Testing and validating n Industry products n Safe and secure test bed n Full scale testing n Computer controls n Communications n Field Systems n Substations and RTU’s

K E M A, I N C. 19 Conclusion n Cyber security threats are real n Cyber security is not just a regulatory or national infrastructure issue; it makes good business sense n Technology will continue to evolve to meet demands for productivity and reliability improvements n Security requirements need to keep pace with technology advancements n There are workable near-term solutions n We need to work toward  Addressing the gap between IT and operations  Long-term technology changes