SlideShare a Scribd company logo
1 of 25
deceptionGUARD:
Deception Technology
for OT Cybersecurity
| GRAYMATTER | GRAYMATTERSYSTEMS.COM
Who is GrayMatter?
CONSULTING
We help your people
and your industrial
assets become
smarter and more
visible.
IMPLEMENTATIO
N
We’re a services-first
company that starts with
your problem and works
backwards to help you
fix it.
TECH CURATION
We focus on co-
innovation & curating the
best process and
technologies to drive
industrial, digital
transformations.
Industrial Intelligence
INDUSTRIAL
CYBERSECURITY
CONNECTIVITY
BRILLIANT
OPERATIONS
ADVANCED INDUSTRIAL
ANALYTICS
deceptionGUARD
Deploying
Deception
Industrial specific
decoys and sirens
That automatically
trap attackers before
they hit critical assets.
Guarding
Experienced
cybersecurity team
that specializes in
operational technology
at industrial
organizations.
Vision Statement
GrayMatter knows Industrial Intelligence.
We help your people and industrial assets
become smarter and more visible, securely.
Our Core Values
ACCOUNTABILITY
INTEGRITY
RESPECT
INNOVATION
TEAMWORK
END TO END VISIBILITY - SECURELY
Lorem ipsum dolor sit amet adipiscing. Donec risus dolor, porta
venenatis nequepharetra luctus felis vel tellus nec felis.
Brilliant Operations
Motion Control
Sensors +
Networking
Industrial PLC
Machine Safety
Industrial
Connectivity
Automation
+ Control
Performance
Management
Historians
Batching Systems
Reimagining UX/UI
ISA 101
MES
Downtime/OEE
Quality
Dashboarding,
Reporting
Machine Learning
Predictive Analytics
Cloud Strategies
Advanced
Industrial
Analytics
Industrial Cybersecurity Protection
emPOWERGUARD deceptionGUARD
Risk Assessment
Internet Zone Cloud
IoT
Zone
Enterprise Zone
Enterprise Network
Site Business Planning & Logistics
Level 5
Level 4
Demilitarized Zone (DMZ)
FIREWALL
FIREWALL
Manufacturing Zone
Cell/Area Zone
Area Supervisory Control
Basic Control
Process
Site Manufacturing Operation/Control Level 3
Level 2
Level 1
Level 0
Safety Zone Safety Control
Emerging Market Drivers:
Deception Tech
⬡ COVID-19 is driving a higher need for remote
connectivity into operational environments
⬡ Countries where cybersecurity threats commonly
originate require security that’s easily geo-
targeted
⬡ Deception is the primary tool of ransomware &
other increasingly common types of attacks
Legacy Market Drivers:
Deception Tech
⬡ Aging ICS equipment at risk as more vulnerabilities
are disclosed
⬡ Modernization efforts such as digital transformation,
Industry 4.0 require more connectivity bringing new
risks into the OT environment
⬡ Traditional security offerings lack industrial know-
how, defense-in-depth & ability to learn from
attempted attacks
CUSTOMER ISSUES
LIMITED SECURITY
RESOURCES
Organizations
focus on protecting
the enterprise or its
infrastructure, with
few resources dedicated to
the OT or process
infrastructure
REACTIVE
APPROACH
With a focus on
AIC (availability, integrity.
confidentiality) priority
paradigm, companies
make changes only after
an incident occurs
INDUSTRIAL
KNOWLEDGE
Knowledge of ICS
networks & how they
are targeted is not
reflected in most
security options
PERIMETER
DEFENSE
Many OT networks
have little to no
perimeter, making it
difficult to harden &
protect critical assets
LACK OF SECURITY
& NETWORK
AWARENESS
Many production networks
lack an understanding of
connections, asset
behavior, threat vectors
Solution
Overview
deceptionGUARD
by GrayMatter
deploys low-impact targets,
luring attackers to a trap,
allowing companies to develop
counterintelligence strategies
that prevent
critical assets from exposure.
ENTERPRISE
NETWORK
INTERNET FIREWAL
L
deceptionGUARD
OT NETWORK
New Approach
Deception as a strategy puts operational
technology on offense, not defense.
New Approach
deceptionGUARD diverts threats away
from a company’s revenue-generating
assets, rather than “inviting threats in.”
New Approach
Protection is at the network perimeter,
preventing breaches from occurring.
Technical Advantage
By deploying as a transparent bridge on both sides of
a perimeter firewall deceptionGUARD can:
● Detect traffic source by region or Global Network
(Google, YouTube, Facebook etc.)
● Track user data flow: what ports are open, source and
destination data, attempts to connect etc.
● Control data type allowed (email, smtp, port, etc.)
● Throttle or block communications
● Determine how traffic flows in case of failure
● Prevent data extraction or insertion
Technology Differentiators
Vendor Agnostic
We build sirens &
decoys using customer
traffic
and create deceptive
assets from networked
OT
devices
Passive or Active
deceptionGUARD can
deploy in mirror mode,
as a network span, or
inline, as a transparent
bridge, allowing for
passive detection or
active prevention
Protection
Designed for both
Enterprise
& Operational
networks, solution
effectively supports
stand-alone
OT security or IT/OT
converged security
operations
Designed
With industrial
environments
in mind
Sirens
⬡ Virtual Fake Assets
⬡ Replicate ICS devices such as
PLCs, VFDs, HMIs etc.
⬡ Mimic device communication to
entice reconnaissance scan
⬡ Mirror customers’ actual assets
⬡ No limit to number of devices
(needle in a haystack)
⬡ Appear as OEM to network analysis
tools (CyberX, Tenable, GrassMarlin
etc.)
GEO & GNL Fencing
As we track source and
destination we can compare
to GES and Global network
addressing and can block
based on:
● Region, Country
● Global Network
● Traffic Type
Use Case: Commercial
Water Operator
OVERVIEW
A client manages water,
wastewater, natural gas,
and electricity distribution
systems and supports traffic
signals and street lights in
multiple Canadian
provinces & U.S. states.
PROBLEM
Operating in many
jurisdictions and with a
limited OT cybersecurity
team, the client struggled to
protect OT assets
from threats.
SOLUTION
The OT Security Director
uses multi-site perimeter
in which he deploys a
deceptionGUARD unit at
each of 11 sites with OT
environments. Each
deceptionGUARD creates a
perimeter between the IT & the
OT infrastructure along with a
deceptive sub-network of fake
controllers & other ICS devices.
Use Case: Food & Beverage
Manufacturing
OVERVIEW
A major food & bev
manufacturer endured
the high cost of rebuilding
its systems because of a
ransomware attack.
PROBLEM
The company invested
in enterprise-level
cybersecurity, but found
that it was inadequate on
the OT side.
SOLUTION
Client is working GrayMatter
to establish
a hardened OT network
perimeter and mitigate
concerns about ICS
connectivity after a
modernization (Industry 4.0)
initiative ended reliance on
“air gap” approach.
Additional Features
Siren Library
Library allows customers to
select from a drop-
down menu of devices
and deploy quickly.
Reporting
Compliance
& audit reporting
Integration
Integrates with SIEM
tools and IDS
& firewall technologies
OT Operator
Coordination
Provides alerting data
on HMIs along with
security alerting
New Approach
Offense
Other technologies report
on assets under attack.
deceptionGUARD uses a
no-risk decoy to lure
attackers away from
valuable assets.
Defense
Strategic enforcement
begins before real
attacks take place, so
attackers are blocked
from network
resources.
GrayMatter is
transforming
operations &
empowering
people.
THANK YOU
Slides Credit: SlidesCarnival Aliena
| GRAYMATTER | GRAYMATTERSYSTEMS.COM

More Related Content

What's hot

Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
karsof systems publication
karsof systems publicationkarsof systems publication
karsof systems publicationColin Valencia
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020Dharmesh Thakker
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
karsof systems brochure
karsof systems brochurekarsof systems brochure
karsof systems brochureColin Valencia
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskCristian Garcia G.
 
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustRoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustTalea Consulting Srl
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...TI Safe
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problemsscoopnewsgroup
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCristian Garcia G.
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...natjordan6
 
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014. Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014. ebuc
 

What's hot (20)

Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
karsof systems publication
karsof systems publicationkarsof systems publication
karsof systems publication
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
karsof systems brochure
karsof systems brochurekarsof systems brochure
karsof systems brochure
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital risk
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrustRoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
RoundTable: da Industria 4.0 a GDPR #ICTSecurity #ZeroTrust
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Silicon Valley top 20
Silicon Valley top 20Silicon Valley top 20
Silicon Valley top 20
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
 
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014. Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
Dancing pigs are real. Aigars Jaundālders. DPA Konference 2014.
 

Similar to deceptionGUARD by GrayMatter

Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecuritySatyaKVivek
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperMestizo Enterprises
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story BookSmart Defend UK
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrZYMR, INC.
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity Zymr Cloud
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE코리아
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRockwell Automation
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptxRachatrinTongrungroj1
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...TI Safe
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed SecurityDarryl Santa
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity TrendsIRJET Journal
 

Similar to deceptionGUARD by GrayMatter (20)

Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I start
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptx
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 

Recently uploaded

Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubaihf8803863
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...Florian Roscheck
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxFurkanTasci3
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...ThinkInnovation
 

Recently uploaded (20)

Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls DubaiDubai Call Girls Wifey O52&786472 Call Girls Dubai
Dubai Call Girls Wifey O52&786472 Call Girls Dubai
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...From idea to production in a day – Leveraging Azure ML and Streamlit to build...
From idea to production in a day – Leveraging Azure ML and Streamlit to build...
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
Data Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptxData Science Jobs and Salaries Analysis.pptx
Data Science Jobs and Salaries Analysis.pptx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
 

deceptionGUARD by GrayMatter

  • 1. deceptionGUARD: Deception Technology for OT Cybersecurity | GRAYMATTER | GRAYMATTERSYSTEMS.COM
  • 2. Who is GrayMatter? CONSULTING We help your people and your industrial assets become smarter and more visible. IMPLEMENTATIO N We’re a services-first company that starts with your problem and works backwards to help you fix it. TECH CURATION We focus on co- innovation & curating the best process and technologies to drive industrial, digital transformations.
  • 4. deceptionGUARD Deploying Deception Industrial specific decoys and sirens That automatically trap attackers before they hit critical assets. Guarding Experienced cybersecurity team that specializes in operational technology at industrial organizations.
  • 5. Vision Statement GrayMatter knows Industrial Intelligence. We help your people and industrial assets become smarter and more visible, securely.
  • 7. END TO END VISIBILITY - SECURELY Lorem ipsum dolor sit amet adipiscing. Donec risus dolor, porta venenatis nequepharetra luctus felis vel tellus nec felis. Brilliant Operations Motion Control Sensors + Networking Industrial PLC Machine Safety Industrial Connectivity Automation + Control Performance Management Historians Batching Systems Reimagining UX/UI ISA 101 MES Downtime/OEE Quality Dashboarding, Reporting Machine Learning Predictive Analytics Cloud Strategies Advanced Industrial Analytics Industrial Cybersecurity Protection emPOWERGUARD deceptionGUARD Risk Assessment
  • 8. Internet Zone Cloud IoT Zone Enterprise Zone Enterprise Network Site Business Planning & Logistics Level 5 Level 4 Demilitarized Zone (DMZ) FIREWALL FIREWALL Manufacturing Zone Cell/Area Zone Area Supervisory Control Basic Control Process Site Manufacturing Operation/Control Level 3 Level 2 Level 1 Level 0 Safety Zone Safety Control
  • 9. Emerging Market Drivers: Deception Tech ⬡ COVID-19 is driving a higher need for remote connectivity into operational environments ⬡ Countries where cybersecurity threats commonly originate require security that’s easily geo- targeted ⬡ Deception is the primary tool of ransomware & other increasingly common types of attacks
  • 10. Legacy Market Drivers: Deception Tech ⬡ Aging ICS equipment at risk as more vulnerabilities are disclosed ⬡ Modernization efforts such as digital transformation, Industry 4.0 require more connectivity bringing new risks into the OT environment ⬡ Traditional security offerings lack industrial know- how, defense-in-depth & ability to learn from attempted attacks
  • 11. CUSTOMER ISSUES LIMITED SECURITY RESOURCES Organizations focus on protecting the enterprise or its infrastructure, with few resources dedicated to the OT or process infrastructure REACTIVE APPROACH With a focus on AIC (availability, integrity. confidentiality) priority paradigm, companies make changes only after an incident occurs INDUSTRIAL KNOWLEDGE Knowledge of ICS networks & how they are targeted is not reflected in most security options PERIMETER DEFENSE Many OT networks have little to no perimeter, making it difficult to harden & protect critical assets LACK OF SECURITY & NETWORK AWARENESS Many production networks lack an understanding of connections, asset behavior, threat vectors
  • 12. Solution Overview deceptionGUARD by GrayMatter deploys low-impact targets, luring attackers to a trap, allowing companies to develop counterintelligence strategies that prevent critical assets from exposure. ENTERPRISE NETWORK INTERNET FIREWAL L deceptionGUARD OT NETWORK
  • 13. New Approach Deception as a strategy puts operational technology on offense, not defense.
  • 14. New Approach deceptionGUARD diverts threats away from a company’s revenue-generating assets, rather than “inviting threats in.”
  • 15. New Approach Protection is at the network perimeter, preventing breaches from occurring.
  • 16. Technical Advantage By deploying as a transparent bridge on both sides of a perimeter firewall deceptionGUARD can: ● Detect traffic source by region or Global Network (Google, YouTube, Facebook etc.) ● Track user data flow: what ports are open, source and destination data, attempts to connect etc. ● Control data type allowed (email, smtp, port, etc.) ● Throttle or block communications ● Determine how traffic flows in case of failure ● Prevent data extraction or insertion
  • 17. Technology Differentiators Vendor Agnostic We build sirens & decoys using customer traffic and create deceptive assets from networked OT devices Passive or Active deceptionGUARD can deploy in mirror mode, as a network span, or inline, as a transparent bridge, allowing for passive detection or active prevention Protection Designed for both Enterprise & Operational networks, solution effectively supports stand-alone OT security or IT/OT converged security operations Designed With industrial environments in mind
  • 18. Sirens ⬡ Virtual Fake Assets ⬡ Replicate ICS devices such as PLCs, VFDs, HMIs etc. ⬡ Mimic device communication to entice reconnaissance scan ⬡ Mirror customers’ actual assets ⬡ No limit to number of devices (needle in a haystack) ⬡ Appear as OEM to network analysis tools (CyberX, Tenable, GrassMarlin etc.)
  • 19. GEO & GNL Fencing As we track source and destination we can compare to GES and Global network addressing and can block based on: ● Region, Country ● Global Network ● Traffic Type
  • 20. Use Case: Commercial Water Operator OVERVIEW A client manages water, wastewater, natural gas, and electricity distribution systems and supports traffic signals and street lights in multiple Canadian provinces & U.S. states. PROBLEM Operating in many jurisdictions and with a limited OT cybersecurity team, the client struggled to protect OT assets from threats. SOLUTION The OT Security Director uses multi-site perimeter in which he deploys a deceptionGUARD unit at each of 11 sites with OT environments. Each deceptionGUARD creates a perimeter between the IT & the OT infrastructure along with a deceptive sub-network of fake controllers & other ICS devices.
  • 21. Use Case: Food & Beverage Manufacturing OVERVIEW A major food & bev manufacturer endured the high cost of rebuilding its systems because of a ransomware attack. PROBLEM The company invested in enterprise-level cybersecurity, but found that it was inadequate on the OT side. SOLUTION Client is working GrayMatter to establish a hardened OT network perimeter and mitigate concerns about ICS connectivity after a modernization (Industry 4.0) initiative ended reliance on “air gap” approach.
  • 22. Additional Features Siren Library Library allows customers to select from a drop- down menu of devices and deploy quickly. Reporting Compliance & audit reporting Integration Integrates with SIEM tools and IDS & firewall technologies OT Operator Coordination Provides alerting data on HMIs along with security alerting
  • 23. New Approach Offense Other technologies report on assets under attack. deceptionGUARD uses a no-risk decoy to lure attackers away from valuable assets. Defense Strategic enforcement begins before real attacks take place, so attackers are blocked from network resources.
  • 25. THANK YOU Slides Credit: SlidesCarnival Aliena | GRAYMATTER | GRAYMATTERSYSTEMS.COM

Editor's Notes

  1. Ask the Gartner analyst(s) which topics they are most interested in right off the top and tailor the presentation based on that.
  2. Mention deception tech competitors here: Forcepoint, Rapid7 and FireEye. Many competitors, like Rapid7 and FireEye, require clients to buy their core technology first.