SlideShare a Scribd company logo
1 of 42
Download to read offline
Cyber Consequences,
Operational Dependencies,
and Full-Scope Security
Joe Slowik / @jfslowik / pylos.co
Paralus LLC / paralus.co
1
WHOAMI
2
Inspiration
3
Abqaiq and the Saudi Oil Industry
4
Wait…
5
Also in Saudi Arabia:
6
Take-Away
7
Attackers Desire to
Cause Disruption
Complex Systems
Require Identification
of Specific Pain-Points
Attackers are Learning
where these Weak
Points Exist – and are
Trying to Exploit Them
Agenda
8
❑ Process and Operational Dependencies
❑ Targeted, Disruptive Attacks
❑ Implications and Risk
❑ Defense and Recovery
❑ Future Expectations
Process Complexity
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 9
https://www.researchgate.net/profile/Vancho_Adjiski/publication/322790292/figure/fig6/AS:588412562206721@1517299895472/Design-of-the-truck-haulage-model-in-the-Arena-
software.png
Process Dependencies
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 10
https://upload.wikimedia.org/wikipedia/commons/c/cd/SimpleAONwDrag3.png
Functional Weaknesses
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 11
Complex Operations & Processes Feature Multiple
Dependencies
Operational Disruption is Simplified by Targeting a
Critical Dependency
Need to Understand the Operation – but Once
Achieved, Attacks Become more Focused,
Economical
Modern Operations Introduce Weakness
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 12
https://www.manufacturingtomorrow.com/images/upload/images/image3%20(1).jpg
https://www.researchgate.net/profile/Daniel_Kozma2/publication/333067777/figure/fig5/AS:760326521884672@15582873
77138/Extended-Supply-Chain-Management-with-the-Arrowhead-Framework.ppm
Digitization Extends Dependencies to Cyber
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 13
https://www.houseofbots.com/images/news/12086/cover.png
https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-d-Rendering-Cloud-Computing-
267217441_1024X684.jpg
Attack Examples
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 14
2014 Ukraine
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 15
2014 Ukraine – Media Dependency
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 16
Compromise
legitimate resources
for election results
Attempt to post
fraudulent results to
create disruption,
confusion
Amplify fraudulent
results via other
media platforms to
increase impact
2015 Ukraine
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 17
2015 Ukraine: Targeting Recovery
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 18
Disrupt Electric
Distribution
Inhibit Control
through Serial-to-
Ethernet Converter
Firmware Update
Eliminate Control
Center UPS
Wipe Operator
Workstations with
KillDisk
2016 Ukraine
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 19
2016 Ukraine: Targeting Protection
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 20
Induce
Transmission
Outage
• Cause disruptive event
• Anticipate rush to
restoration
Remove
Operator View
of Environment
• Deploy wiper malware,
knowing operators will
manually recover
• Wiper becomes a “loss of
view” condition
Remove Relay
Protection via
DoS
• DoS on Protective Relays
to remove line protection
• Sets stage for destructive
conditions on
reconnection
2017 Saudi Arabia
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 21
2017 Saudi Arabia: Targeting Safety
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 22
Compromise Safety System
Install rootkit on safety
controller
Enable undetected,
arbitrary modification
of safety settings
Compromise Plant DCS
Use access to
compromise production
environment
Enable modification of
production settings to
create unsafe
conditions
Stage Destructive Attack
Paired safety and DCS
modifications enable
destructive attack to
propagate beyond
typical safeguards
2018 United States
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 23
2018 United States: System Dependencies
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 24
ERP enables pipeline transfer operations through
resource tracking and billing
Disabling or modifying ERP reduces operational
effectiveness, system integrity
Results in disruption to physical operations while
diagnosing problem, recovering due to critical
path dependency
2019 United States
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 25
Pipeline operations
require “just in time”,
continuous operations to
fulfill needs
Removal or disruption of
logical view and control
inhibits operator control
Cyber attack on pipeline-
adjacent systems
removes operational
view and control,
resulting in inability to
operate in a safe,
controlled manner
2019 United States: Impacting JIT Supply
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 26
Consequences for Defenders
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 27
Defenders are Comfortable
Protecting Networks
But - Network Defense is
Frequently Process Agnostic
Adversaries attack Networks
to Disrupt Processes
The Attacker Mindset
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 28
Adversaries have
Goals
Nature and
Purpose of Goal
Determines Type
of Attack
Cyber-Focused
Attacks are a
Means to the Goal
Identifying Routes
to Goals Guides
Attacker Behavior
How a Goal is
Achieved is Often
Immaterial
Attackers
Ultimately Judged
on Results
Result
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 29
“Network Defense” must
Adapt to Become “Value
Defense” for the Organization
Full-Scope Defense
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 30
First Step in
Defense:
Understand the
Organization
Map Defense to
Process &
Organizational
Dependencies
Build Out
Detections,
Resilience, and
Recovery to Match
Possibilities
First Step: Identify Value
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 31
• Simple: How does the organization make (or not lose) money?
• Where are the sources of value generation and their
dependents?
Monetary
• What processes does the organization rely on to produce value?
• What are the critical path nodes necessary for process
functionality?
Functional
• What type of disruption can an organization withstand?
• Are there “acceptable losses” that can be sustained?Reputation
Next: Identify Cyber Overlap
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 32
What information systems map to critical value sources?
What IT capabilities are necessary to maintain and sustain
value generation?
Does defensive capability & IT visibility overlap with critical
assets?
Defense Includes Resilience, Recovery
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 33
Purely preventative
defense is insufficient
Organizations must
plan for disruption and
interference
Network defenders
must build in recovery
and resilience to
minimize value loss,
down-time
Testing Defenses and Refining Plans
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 34
Blue vs. Red
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 35
Defensive
Measures &
Recovery Plans
Comprehensive
Attack
Scenarios
Blue vs. Red
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 36
Defensive
Measures &
Recovery Plans
Comprehensive
Attack
Scenarios
Identify Gaps,
Missed Vectors!
Attackers are Getting
Smarter, Bolder
Intrusions are
Becoming More
Targeted with Greater
Potential for Disruption
(or Damage)
Organizational Defense
Must Evolve with
Adversaries to Meet
these Challenges
Future Expectations - Attackers
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 37
Future Expectations - Defenders
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 38
Cyber Defense is More Than Just the Network!
Requirement to Understand how Information
Systems Control, Impact, or Enable Organizational
Value Creation
Wider-Scope Necessary to Implement and
Maintain Necessary Level of Defense
Future Expectations - Incidents
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 39
https://media.npr.org/assets/img/2019/11/28/rtx7asjh_custom-
e8d1c868d8844db6bf4fbeb9e424473db6c1c954.jpg
https://boingboing.net/wp-content/uploads/2020/01/democrats-america-
vote-box.jpg
https://www.stockinvestor.com/wp-content/uploads/2019/01/Down-market-
1280x720.jpg
Conclusion
DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 40
Organization Defense
is More than Cyber
However – Cyber is
Increasingly
Connected to Multiple
Sources of Value
Understanding Links
and Dependencies is
Key to Achieving
Defense
Adversaries
Understand these
Weaknesses, and are
Attacking Them
Defense Must Evolve,
and Cyber become
More Contextually
Aware
References
41
• Analysis of the Cyber Attack on the Ukrainian Power Grid – SANS and E-ISAC (https://ics.sans.org/media/E-
ISAC_SANS_Ukraine_DUC_5.pdf)
• WIN32/Industroyer: A New Threat for Industrial Control Systems – Anton Cherepanov, ESET
(https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf)
• CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack – Joe Slowik,
Dragos (https://www.dragos.com/wp-content/uploads/CRASHOVERRIDE.pdf)
• TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping – FireEye
(https://www.fireeye.com/blog/threat-research/2019/04/triton-actor-ttp-profile-custom-attack-tools-
detections.html)
• Stuxnet to CRASHOVERRIDE to TRISIS: Evaluating the History and Future of Integrity-Based Attacks on Industrial
Environments – Joe Slowik, Dragos (https://www.dragos.com/wp-content/uploads/Past-and-Future-of-Integrity-
Based-ICS-Attacks.pdf)
• Attack on Natural Gas Network Shows Rising Cyberthreat – E&E News
(https://www.eenews.net/stories/1060078327)
• Cyberattack Impacts MTSA Facility Operations – US Coast Guard
(https://www.dco.uscg.mil/Portals/9/DCO%20Documents/5p/MSIB/2019/MSIB_10_19.pdf)
• Ransomware Impacting Pipeline Operations – CISA (https://us-cert.cisa.gov/ncas/alerts/aa20-049a)
• Kicked While Down: Critical Infrastructure Amplification and Messaging Attacks – Joe Slowik
(https://pylos.co/2019/08/13/kicked-while-down-critical-infrastructure-amplification-and-messaging-attacks/)
• Cyber and Information Operations – Joe Slowik (https://pylos.co/2019/07/31/cyber-and-information-operations/)
Questions?
42
Joe Slowik | @jfslowik | joe@paralus.co
Paralus.co | Pylos.co

More Related Content

What's hot

Software Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationSoftware Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationBruce Hafner
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Phil Agcaoili
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)MHumaamAl
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecurityThomas Malmberg
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...DevOps Indonesia
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsDominique Dessy
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsBSides Delhi
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityEnclaveSecurity
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンスchomchana trevai
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...Cam Fulton
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationExigent Technologies LLC
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) Priyanka Aash
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyEnclaveSecurity
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...Risk Analysis Consultants, s.r.o.
 

What's hot (20)

Software Vulnerabilities Risk Remediation
Software Vulnerabilities Risk RemediationSoftware Vulnerabilities Risk Remediation
Software Vulnerabilities Risk Remediation
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring Security
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device security
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス
 
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 

Similar to Cyber consequences, operational dependencies, and full scope security

2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation finalAlgoSec
 
The Next Normal: CTEK's New Services to Support Adapting in 2020 & Beyond
The Next Normal: CTEK's New Services to Support Adapting in 2020 & BeyondThe Next Normal: CTEK's New Services to Support Adapting in 2020 & Beyond
The Next Normal: CTEK's New Services to Support Adapting in 2020 & BeyondSophiaPalmira
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Cohesive Networks
 
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdfFour Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdfEnterprise Insider
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
 
Adaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven ApproachAdaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven ApproachAlgoSec
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security PractitionerAdrian Sanabria
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a ProductVMware Tanzu
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...SolarWinds
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital SecurityShawn Wells
 

Similar to Cyber consequences, operational dependencies, and full scope security (20)

Cs cmaster
Cs cmasterCs cmaster
Cs cmaster
 
Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final
 
The Next Normal: CTEK's New Services to Support Adapting in 2020 & Beyond
The Next Normal: CTEK's New Services to Support Adapting in 2020 & BeyondThe Next Normal: CTEK's New Services to Support Adapting in 2020 & Beyond
The Next Normal: CTEK's New Services to Support Adapting in 2020 & Beyond
 
Lead Through Disruption Guide PDF
Lead Through Disruption Guide PDFLead Through Disruption Guide PDF
Lead Through Disruption Guide PDF
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdfFour Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Adaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven ApproachAdaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven Approach
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
Security engineering
Security engineeringSecurity engineering
Security engineering
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 

More from Joe Slowik

Understanding Indicators
Understanding IndicatorsUnderstanding Indicators
Understanding IndicatorsJoe Slowik
 
Burrowing Through The Network - Contextualizing The Vulkan Leaks
Burrowing Through The Network - Contextualizing The Vulkan LeaksBurrowing Through The Network - Contextualizing The Vulkan Leaks
Burrowing Through The Network - Contextualizing The Vulkan LeaksJoe Slowik
 
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...Joe Slowik
 
Thrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In ReviewThrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In ReviewJoe Slowik
 
Mission kill process targeting in ics attacks
Mission kill process targeting in ics attacksMission kill process targeting in ics attacks
Mission kill process targeting in ics attacksJoe Slowik
 
Full-Spectrum Information Operations for Critical Infrastructure Attacks
Full-Spectrum Information Operations for Critical Infrastructure AttacksFull-Spectrum Information Operations for Critical Infrastructure Attacks
Full-Spectrum Information Operations for Critical Infrastructure AttacksJoe Slowik
 
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity GroupsAligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity GroupsJoe Slowik
 
EASE spectre meltdown_support
EASE spectre meltdown_supportEASE spectre meltdown_support
EASE spectre meltdown_supportJoe Slowik
 
SANS DFIR Prague: PowerShell & WMI
SANS DFIR Prague: PowerShell & WMISANS DFIR Prague: PowerShell & WMI
SANS DFIR Prague: PowerShell & WMIJoe Slowik
 

More from Joe Slowik (9)

Understanding Indicators
Understanding IndicatorsUnderstanding Indicators
Understanding Indicators
 
Burrowing Through The Network - Contextualizing The Vulkan Leaks
Burrowing Through The Network - Contextualizing The Vulkan LeaksBurrowing Through The Network - Contextualizing The Vulkan Leaks
Burrowing Through The Network - Contextualizing The Vulkan Leaks
 
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
Assessing the Balance Between Visibility & Confidentiality in ICS Network Tra...
 
Thrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In ReviewThrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In Review
 
Mission kill process targeting in ics attacks
Mission kill process targeting in ics attacksMission kill process targeting in ics attacks
Mission kill process targeting in ics attacks
 
Full-Spectrum Information Operations for Critical Infrastructure Attacks
Full-Spectrum Information Operations for Critical Infrastructure AttacksFull-Spectrum Information Operations for Critical Infrastructure Attacks
Full-Spectrum Information Operations for Critical Infrastructure Attacks
 
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity GroupsAligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
 
EASE spectre meltdown_support
EASE spectre meltdown_supportEASE spectre meltdown_support
EASE spectre meltdown_support
 
SANS DFIR Prague: PowerShell & WMI
SANS DFIR Prague: PowerShell & WMISANS DFIR Prague: PowerShell & WMI
SANS DFIR Prague: PowerShell & WMI
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Cyber consequences, operational dependencies, and full scope security

  • 1. Cyber Consequences, Operational Dependencies, and Full-Scope Security Joe Slowik / @jfslowik / pylos.co Paralus LLC / paralus.co 1
  • 4. Abqaiq and the Saudi Oil Industry 4
  • 6. Also in Saudi Arabia: 6
  • 7. Take-Away 7 Attackers Desire to Cause Disruption Complex Systems Require Identification of Specific Pain-Points Attackers are Learning where these Weak Points Exist – and are Trying to Exploit Them
  • 8. Agenda 8 ❑ Process and Operational Dependencies ❑ Targeted, Disruptive Attacks ❑ Implications and Risk ❑ Defense and Recovery ❑ Future Expectations
  • 9. Process Complexity DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 9 https://www.researchgate.net/profile/Vancho_Adjiski/publication/322790292/figure/fig6/AS:588412562206721@1517299895472/Design-of-the-truck-haulage-model-in-the-Arena- software.png
  • 10. Process Dependencies DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 10 https://upload.wikimedia.org/wikipedia/commons/c/cd/SimpleAONwDrag3.png
  • 11. Functional Weaknesses DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 11 Complex Operations & Processes Feature Multiple Dependencies Operational Disruption is Simplified by Targeting a Critical Dependency Need to Understand the Operation – but Once Achieved, Attacks Become more Focused, Economical
  • 12. Modern Operations Introduce Weakness DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 12 https://www.manufacturingtomorrow.com/images/upload/images/image3%20(1).jpg https://www.researchgate.net/profile/Daniel_Kozma2/publication/333067777/figure/fig5/AS:760326521884672@15582873 77138/Extended-Supply-Chain-Management-with-the-Arrowhead-Framework.ppm
  • 13. Digitization Extends Dependencies to Cyber DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 13 https://www.houseofbots.com/images/news/12086/cover.png https://innovationatwork.ieee.org/wp-content/uploads/2019/09/bigstock-d-Rendering-Cloud-Computing- 267217441_1024X684.jpg
  • 14. Attack Examples DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 14
  • 15. 2014 Ukraine DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 15
  • 16. 2014 Ukraine – Media Dependency DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 16 Compromise legitimate resources for election results Attempt to post fraudulent results to create disruption, confusion Amplify fraudulent results via other media platforms to increase impact
  • 17. 2015 Ukraine DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 17
  • 18. 2015 Ukraine: Targeting Recovery DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 18 Disrupt Electric Distribution Inhibit Control through Serial-to- Ethernet Converter Firmware Update Eliminate Control Center UPS Wipe Operator Workstations with KillDisk
  • 19. 2016 Ukraine DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 19
  • 20. 2016 Ukraine: Targeting Protection DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 20 Induce Transmission Outage • Cause disruptive event • Anticipate rush to restoration Remove Operator View of Environment • Deploy wiper malware, knowing operators will manually recover • Wiper becomes a “loss of view” condition Remove Relay Protection via DoS • DoS on Protective Relays to remove line protection • Sets stage for destructive conditions on reconnection
  • 21. 2017 Saudi Arabia DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 21
  • 22. 2017 Saudi Arabia: Targeting Safety DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 22 Compromise Safety System Install rootkit on safety controller Enable undetected, arbitrary modification of safety settings Compromise Plant DCS Use access to compromise production environment Enable modification of production settings to create unsafe conditions Stage Destructive Attack Paired safety and DCS modifications enable destructive attack to propagate beyond typical safeguards
  • 23. 2018 United States DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 23
  • 24. 2018 United States: System Dependencies DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 24 ERP enables pipeline transfer operations through resource tracking and billing Disabling or modifying ERP reduces operational effectiveness, system integrity Results in disruption to physical operations while diagnosing problem, recovering due to critical path dependency
  • 25. 2019 United States DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 25
  • 26. Pipeline operations require “just in time”, continuous operations to fulfill needs Removal or disruption of logical view and control inhibits operator control Cyber attack on pipeline- adjacent systems removes operational view and control, resulting in inability to operate in a safe, controlled manner 2019 United States: Impacting JIT Supply DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 26
  • 27. Consequences for Defenders DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 27 Defenders are Comfortable Protecting Networks But - Network Defense is Frequently Process Agnostic Adversaries attack Networks to Disrupt Processes
  • 28. The Attacker Mindset DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 28 Adversaries have Goals Nature and Purpose of Goal Determines Type of Attack Cyber-Focused Attacks are a Means to the Goal Identifying Routes to Goals Guides Attacker Behavior How a Goal is Achieved is Often Immaterial Attackers Ultimately Judged on Results
  • 29. Result DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 29 “Network Defense” must Adapt to Become “Value Defense” for the Organization
  • 30. Full-Scope Defense DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 30 First Step in Defense: Understand the Organization Map Defense to Process & Organizational Dependencies Build Out Detections, Resilience, and Recovery to Match Possibilities
  • 31. First Step: Identify Value DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 31 • Simple: How does the organization make (or not lose) money? • Where are the sources of value generation and their dependents? Monetary • What processes does the organization rely on to produce value? • What are the critical path nodes necessary for process functionality? Functional • What type of disruption can an organization withstand? • Are there “acceptable losses” that can be sustained?Reputation
  • 32. Next: Identify Cyber Overlap DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 32 What information systems map to critical value sources? What IT capabilities are necessary to maintain and sustain value generation? Does defensive capability & IT visibility overlap with critical assets?
  • 33. Defense Includes Resilience, Recovery DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 33 Purely preventative defense is insufficient Organizations must plan for disruption and interference Network defenders must build in recovery and resilience to minimize value loss, down-time
  • 34. Testing Defenses and Refining Plans DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 34
  • 35. Blue vs. Red DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 35 Defensive Measures & Recovery Plans Comprehensive Attack Scenarios
  • 36. Blue vs. Red DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 36 Defensive Measures & Recovery Plans Comprehensive Attack Scenarios Identify Gaps, Missed Vectors!
  • 37. Attackers are Getting Smarter, Bolder Intrusions are Becoming More Targeted with Greater Potential for Disruption (or Damage) Organizational Defense Must Evolve with Adversaries to Meet these Challenges Future Expectations - Attackers DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 37
  • 38. Future Expectations - Defenders DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 38 Cyber Defense is More Than Just the Network! Requirement to Understand how Information Systems Control, Impact, or Enable Organizational Value Creation Wider-Scope Necessary to Implement and Maintain Necessary Level of Defense
  • 39. Future Expectations - Incidents DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 39 https://media.npr.org/assets/img/2019/11/28/rtx7asjh_custom- e8d1c868d8844db6bf4fbeb9e424473db6c1c954.jpg https://boingboing.net/wp-content/uploads/2020/01/democrats-america- vote-box.jpg https://www.stockinvestor.com/wp-content/uploads/2019/01/Down-market- 1280x720.jpg
  • 40. Conclusion DEPENDENCIES ATTACKS IMPLICATIONS DEFENSE FUTURE 40 Organization Defense is More than Cyber However – Cyber is Increasingly Connected to Multiple Sources of Value Understanding Links and Dependencies is Key to Achieving Defense Adversaries Understand these Weaknesses, and are Attacking Them Defense Must Evolve, and Cyber become More Contextually Aware
  • 41. References 41 • Analysis of the Cyber Attack on the Ukrainian Power Grid – SANS and E-ISAC (https://ics.sans.org/media/E- ISAC_SANS_Ukraine_DUC_5.pdf) • WIN32/Industroyer: A New Threat for Industrial Control Systems – Anton Cherepanov, ESET (https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf) • CRASHOVERRIDE: Reassessing the 2016 Ukraine Electric Power Event as a Protection-Focused Attack – Joe Slowik, Dragos (https://www.dragos.com/wp-content/uploads/CRASHOVERRIDE.pdf) • TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping – FireEye (https://www.fireeye.com/blog/threat-research/2019/04/triton-actor-ttp-profile-custom-attack-tools- detections.html) • Stuxnet to CRASHOVERRIDE to TRISIS: Evaluating the History and Future of Integrity-Based Attacks on Industrial Environments – Joe Slowik, Dragos (https://www.dragos.com/wp-content/uploads/Past-and-Future-of-Integrity- Based-ICS-Attacks.pdf) • Attack on Natural Gas Network Shows Rising Cyberthreat – E&E News (https://www.eenews.net/stories/1060078327) • Cyberattack Impacts MTSA Facility Operations – US Coast Guard (https://www.dco.uscg.mil/Portals/9/DCO%20Documents/5p/MSIB/2019/MSIB_10_19.pdf) • Ransomware Impacting Pipeline Operations – CISA (https://us-cert.cisa.gov/ncas/alerts/aa20-049a) • Kicked While Down: Critical Infrastructure Amplification and Messaging Attacks – Joe Slowik (https://pylos.co/2019/08/13/kicked-while-down-critical-infrastructure-amplification-and-messaging-attacks/) • Cyber and Information Operations – Joe Slowik (https://pylos.co/2019/07/31/cyber-and-information-operations/)
  • 42. Questions? 42 Joe Slowik | @jfslowik | joe@paralus.co Paralus.co | Pylos.co