Dubai Cyber Security ICS-SCADA Cyber Security Solutions & Challenges

Views:
 
     
 

Presentation Description

ICS-SCADA Cyber Security Solutions & Challenges

Comments

Presentation Transcript

ICS/SCADA:

ICS/SCADA Cyber Security Solutions & Challenges Ahmed M. Al Enizy IT Security Manager International Systems Engineering

Example of a Hacktivist/APT:

10/4/2012 2 Example of a Hacktivist /APT Wait for the video, it will automatically play

Bottom Line:

10/4/2012 3 ICS and SCADA systems are important for our petroleum business and for our national economic growth because they automate and monitor the production processes. ICS and SCADA systems are no longer isolated from corporate and internet network. Most ICS and SCADA protocols, Designs, and Implementations were done without security in mind. This made them even more exposed to threats and vulnerabilities, and it made challenges even tougher. Bottom Line

Presentation Map:

10/4/2012 4 Presentation Map 1) How everything is connected? 2) Who will think about hacking us? 3) What are the threats? 4) Cyber Attack Example 5) Which solution/service is the right one? 6 ) What solutions are there? 7) From where should we start? 8) What challenges will we face?

Agenda:

Concept Abstraction Solution Concept Abstraction The Right Solution F or You Cyber Security Services & Solutions Catalog Suggested Roadmap Challenges 10/4/2012 5 Agenda

Concept Abstraction:

Economic Growth GDC Internet Logical Protection External Threat 10/4/2012 6 Concept Abstraction Someone Somewhere with Motivation, Means, and Opportunity Wants to Spy / Harm IT Physical Protection Production Business Petroleum $ Unmanaged & Unsecured Access Threat ICS / SCADA Operations StuxNet Shamoon Conventional Hacking 1) How everything is connected? Internal Threat Poor Governance – Design – Security Advanced Persistent Threat Report Monitor Control 3rd Party Contractors - Partners - Support 2) Who will think about hacking us? 3) What are the threats? 4) Cyber Attack Example Remote Local

Who is Protecting Us?:

10/4/2012 7 Who is Protecting Us?

Security Concept Abstraction:

Governance, Risk, and Compliance Assurance Physical Security Logical Security 10/4/2012 8 Security Concept Abstraction Someone Somewhere with Motivation, Means, and Opportunity Wants to Spy / Harm Internet Remote Local 3rd Party Contractors - Partners - Support IT Production Business Petroleum $ ICS / SCADA Operations Report Monitor & Control Economic Growth 5 ) What solutions are there?

The Right Solution For You:

It is not a menu that you choose from or an advice from a very reliable source, you have to do your homework in assessing your risks. Solutions can be Administrative, e.g. GRC, policy, and process. Technical Safeguards prevents the threat from happening, e.g. firewall. Counter measures, e.g. antivirus, remediation and recovery procedures. Physical, i.e. gates, doors, barriers… etc. The right solution for you should help mitigate identified risks and save you some money. 10/4/2012 9 The Right Solution For You 5) Which solution/service is the right one?

Cyber Security Services & Solutions Catalog:

10/4/2012 10 Cyber Security Services & Solutions Catalog MSS SOC Penetration Testing Threat Management Forensics Awareness Security Programs Network Security Firewall / UTM IDS / IPS Traffic Encryption NAP/NAC Web and Email Security IT Security Vulnerability and Patch Management Crisis Management Business Continuity and Disaster Recovery Intelligence and reports Consultation End Point Protection Access Control and Identity Management Encryption and Data Protection Data Leakage Prevention Host and Application Security Risk and Compliance Fraud and Identity Protection Wireless Security Traffic Monitoring 6) What solutions are there? Security Assessment and Health Check

Suggested Roadmap:

10/4/2012 11 Suggested Roadmap 7) From where should we start? Consultation ICS/SCADA Risk Assessment Consultation Security Controls Effectiveness Assessment Consultation Crisis Management, Business Continuity and Disaster Recovery Readiness Assessment Consultation Security Roadmap and Continues Improvement Plan Development Consultation Security Program and Policy Review and Amendment

Challenges:

Remote sites … In the middle of the desert. Connectivity. Local support. Remote support. Log collection. Incident response and handling. Security solutions not compatible with ICS/SCADA software and communication protocols. Cyber Security standards for ICS/SCADA. Centralized Cyber Security for monitoring, control, and response. 10/4/2012 12 Challenges 8) What challenges will we face?

Conclusions:

Directly or indirectly connected to the internet or to any 3rd party or you allow data transfer or exchange electronically, then you are facing Cyber Threats. It is never too late to start fixing because you are going to be targeted once again. Cyber Security same as any complicated problem can be concurred if simplified, abstracted, and divided into smaller logical groups. There is no 100% security and guarantee even if everybody is saying so. keep doing your best in assessing, discovering risks and fortifying your security. Make sure that you are ready to survive the crisis and restore your business in very short time. 10/4/2012 13 Conclusions

Thank you:

10/4/2012 14 Thank you Q / A http://sa.linkedin.com/in/ahmadalanazy @ SaudiSecurity amalanazy@gmail.com a.alenizy@ise.sa

authorStream Live Help