SlideShare a Scribd company logo
How We Stopped Being Just Antivirus ─ And
Became A Unique Industrial Infrastructure
Defender
Most Tested. Most Awarded. Kaspersky Lab Protection.*
0%
20%
40%
60%
80%
100%
20 40 60 80 100
No of independent tests/reviews
Bitdefender
Sophos
G DATA
Symantec
F-Secure
Intel Security (McAfee)
Trend Micro
Avira Avast
AVG
ESET
In 2017 Kaspersky Lab products participated in 86
independent tests and reviews. Our products were
awarded 72 firsts and achieved 78 top-three finishes. Kaspersky Lab
1st
places – 72.
Participation in 86
tests/reviews.
TOP 3 = 91%
* Notes:
• According to summary results of independent tests in 2017 for
corporate, consumer and mobile products.
• Summary includes independent tests conducted by : AV-Comparatives,
VirusBulletin, ICSA Labs, SELabs, MRG Effitas, AV-Test.
• Tests performed in these programs assess all protection technologies
against known, unknown and advanced threats.
• The size of the bubble reflects the number of 1st places achieved.
ScoreofTOP3places
www.kaspersky.com/top3
Our Major Discoveries
2011
2010
2012
Stuxnet
Duqu
Gauss
Flame
miniFlame
2013 2014 2015 2016 2017
NetTraveler
Miniduke
RedOctober
Icefog
Winnti
Kimsuky
TeamSpy
CosmicDuke
Darkhotel
Regin
Careto / The
Mask
Epic Turla
Energetic Bear /
Crouching Yeti
Wild
Neutron
Blue
Termite
Spring
Dragon
Desert
Falcons
Carbanak
Equation
Animal
Farm
Darkhotel
- part 2
MsnMM
Campaigns
Satellite
Turla
Hellsing
Sofacy
Naikon
Duqu 2.0
ProjectSauron
Saguaro
StrongPity
Lazarus
Lurk
Adwind
Metel
Ghoul
Fruity Armor
ScarCruft
Poseidon
GCMan
Danti
Dropping
Elephant
Moonlight
Maze
ATMitch
ShadowPad
BlackOasis
WhiteBear
Silence
WannaCry
Shamoon 2.0
ExPetr/NotPetya
BlueNoroff
StoneDrill
https://apt.securelist.com
Anti Targeted Attack
Comprehensive multi-vector discovery and risk mitigation of advanced
threats and targeted attacks
Endpoint Security
The leading multi-layered endpoint protection platform, based on true
cybersecurity technologies
Cloud Security
Borderless security engineered for your hybrid cloud
Cybersecurity Services
Leveraging Threat Intelligence, Security Training, Incident Response
and Assessment from the world leader
Security Operations Center
Empowering your SOC with the tools and information to efficiently detect
and remediate threats
Fraud Prevention
Proactive detection of cross-channel fraud in Real Time
Financial Services Cybersecurity
Providing Financial Services with the tools to raise security levels,
prevent and predict cyber-incidents and respond efficiently
Telecom Cybersecurity
Efficient protection for telecoms infrastructure and information systems
against the most advanced cyberthreats
Healthcare Cybersecurity
Protecting healthcare infrastructures and sensitive clinical data
in a ruthless cyberthreat landscape
Data Center Security
Empowering your data center to detect and respond to the most
advanced cyberthreats
Government Cybersecurity
Security controls and services geared to the demands of government
organizations and related public bodies
Industrial Cybersecurity
Specialized protection for industrial control systems
Technological By Industries
Kaspersky Enterprise Security Solutions
Kaspersky Industrial CyberSecurity Expertise and Technologies
Kaspersky Lab ICS CERT structure
Vulnerability Researchers
Security auditors
Developers
Security analysts
Industrial engineers
2016
CVE Numbering
Authority
Kaspersky ICS CERT: ICS/IIOT Vulnerability Research
More than 170+ ICS / IIoT vulnerabilities have been found since 2016
Kaspersky ICS CERT: ICS/IIOT Vulnerability Research
Some of the ICS Vendors we helped
https://ics-cert.us-cert.gov/advisories
…This Gemalto solution is used in products by other
software vendors, including such companies as ABB,
General Electric, HP, Cadac Group, Zemax and many
other organizations, the number of which, according to
some estimates, reaches 40 thousand.
…Many products that use the OPC UA technology by
the OPC Foundation may include that server, making
them vulnerable to the XXE attack. This makes this
vulnerability much more valuable from an attacker’s
viewpoint...
Vulnerabilities in Common Components
Industrial Cybersecurity Assesments
https://www.securityweek.com/ics-security-experts-share-interesting-stories
TANK
Control Valve
Level Meter
Malicious overrides
of process setpoints
Tank overfill / fraud
Malicious changes
of PID parameters
Equipment overstress/disruption
Pump
Malicious changes of
measurement values
Tank overfill / fraud
Malicious changes of
process control logic
hydraulic surge, equipment
damage, emergency shutdown
Malicious STOP command
Process out of control
PLC
SCADA
OIL REFINERY POWER GRID
CHEMICALMANUFACTURING
Kaspersky ICS Security Assessment: Impact Analysis
Threat Intelligence
Web crawlers
BotFarm
Spam trap
Sensors
APT research team
Partners
OSINT
Honeypots
Kaspersky Lab
Statistics
Kaspersky Lab
Expert Systems
Kaspersky Lab
Analysis
Data Feeds Customer
3
1
4
Whitelisting
Kaspersky
Global Users
5
2
►Threat data sources
►Kaspersky Security Network (KSN)
►Kaspersky Industrial CyberSecurity service projects
►Surveys
►Public sources
► ICS Computers protected by Kaspersky Lab products
►supervisory control and data acquisition (SCADA) servers;
►data storage servers (Historian);
►data gateways (OPC);
►stationary workstations of engineers and operators;
►mobile workstations of engineers and operators;
►Human Machine Interface (HMI).
►ICS Supply Chain participants
Kaspersky ICS CERT: Threat landscape for ICS
►Main findings
►Random malware attacks in ICS
►Cryptominers in ICS
►Ransomware in ICS
►Remote administration tools (RATs)
►Mass-targeting campaigns
►Main sources of malware as always
►Web
►Removable devices
►Mail
Geographical distribution of attacks on industrial automation systems,
H1 2018, percentage of ICS computers attacked in each country
https://ics-cert.kaspersky.com/reports/2018/09/06/threat-landscape-for-industrial-automation-systems-h1-2018/
Kaspersky ICS CERT: Malware in ICS
Contribution to the global ICS/IIoT Security standardization
Contribution to the global ICS/IIoT Security standardization
Some of the released studies we contributed to
State of ICS Security Surveys
https://ics.kaspersky.com/media/2018-Kaspersky-ICS-Whitepaper.pdf
Kaspersky ICS Security trainings
Advanced Industrial CyberSecurity in Practice
• 2 DAYS, 10-20 specialists
ICS Penetration Testing for Professionals
• 5 DAYS, up to 10 professionals
ICS Digital Forensics for Professionals
• 4 DAYS, up to 10 professionals
Kaspersky ICS CERT: University Cooperation
KIPS is an exercise that places business decision makers IT
security teams from corporations and government
departments into a simulated business environment facing a
series of unexpected cyber threats, while trying to maximize
profit and maintain confidence.
Industrial scenarios:
• Oil & Gas
• Power station
• Water plant
• Transportation
References: Government agencies, BASF,
CERN, Mitsubishi, Yokogawa, RusHydro,
Panasonic, ISA, SANS,...
https://media.kaspersky.com/en/business-security/enterprise/KL_SA_KIPS_overview_A4_Eng_web.pdf
Kaspersky Interactive Protection Simulation (KIPS)
Kaspersky Lab ICS/IIOT Capture the Flag
Сapture the flag (CTF) contest is a competition for cybersecurity experts organized in the form of a game,
in which the participants solve computer security problems. They must either capture (attack/bring down)
or defend computer systems in a CTF environment.
https://ctf.kaspersky.com
Kaspersky Industrial Cybersecurity Conference
https://ics.kaspersky.com/conference/
SAS is an annual event that attracts high-
caliber anti-malware researchers, global law
enforcement agencies and CERTs and senior
executives from financial services, technology,
healthcare, academia and government
agencies.
►Nation state cyber-espionage and advanced threat actors
►Internet of Things
►Government surveillance issues and privacy rights
►Threats against banks, financial institutions
►Mobile Malware
►Critical infrastructure protection (SCADA/ICS)
►Law-enforcement coordination and information sharing
►Vulnerability discovery and responsible disclosure
Singapore
April 8-11, 2019
https://sas.kaspersky.com
Kaspersky Security Analyst Summit
Kaspersky Industrial CyberSecurity Products
KICS for Nodes – Industrial Endpoint Protection
Protection for Industrial Endpoints
• SCADA Servers
• SCADA Clients
• Human Machine Interfaces (HMI)
• Engineering Workstations
• Historians
• OPC Gateways
Security capabilities
• Application whitelisting
• Antimalware protection
• Ransomware protection
• Removable device control
• File Integrity Monitoring
• Exploit Prevention
• Wireless access control
• Log Inspection
• PLC integrity checker
Industrial Specifics
• Easy to deploy
• Local Signature Updates
• Less resource consuming than other EPP
• Legacy OS support
• Tested by ICS/SCADA vendors
KICS for Networks – Industrial Network Anomaly and Breach Detection
• Network Activity Monitoring
• Safe Non-Invasive Mode
• Asset Discovery
• Commands and Telemetry Analysis
• Anomaly Detection
• Cyber Attack Detection
• Remote Access Detection
• Malware Spreading Detection
• Network Visualization
• Event Correlation
• SOC/SIEM Integration
Some of the supported devices & protocols
KICS for Networks – Industrial Network Anomaly and Breach Detection
KICS for Networks powered by Machine Learning for Anomaly Detection
• Detect independently of reason:
• cyber attack,
• human factor,
• equipment faults,…
• Anomaly Interpretation
• Predictive maintenance
• State-of-the-art ML technology
• No need to manually create rules
Case Studies:
Secure Water Treatment System (SWaT)
SUTD, Singapore
Crude & Vacuum distillation units,
at Oil Refining Plant
Chemical plant:
Tennessee Eastman Process (TEP)
Kaspersky Lab is cited in 4 categories for its
dedicated OT security portfolio, KICS:
 OT Endpoint security
 OT Network Monitoring and Visibility
 Anomaly Detection, Incident Response, Reporting
 OT Security Services
Competitive Landscape: Operational Technology Security, Ruggero Contu, 29 October 2018.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.
Comprehensive approach to Operational Technology Security
https://ics.kaspersky.com/KICS-cited-in-Gartner-competitive-landscape-OT-security
Get a complimentary copy of this Gartner report:
Kaspersky Industrial CyberSecurity Experience
• German Glass Manufacturer
• Challenge:
• Needs to prevent delays in production and
a complete breakdown of the production
lines due to cyber attacks, that can not
only incur cancellation fees, but in many
cases expensive contractual penalty
charges, too.
• Solution:
• KICS for Nodes System
• KICS for Networks System
• Case Study Link
• Czech Brewery
• Challenge:
• Needs to make sure the production lines
and all OT related software and hardware
of brewing part and bottling lines,
including in total 2 brew houses and CCT
areas and 8 packaging lines in Pilsen
plant were resistant to cyber attacks, and
that the company was ready to implement
a holistic industrial cybersecurity strategy
• Solution:
• Industrial Cyber Security Assessment
Service
• Case Study Link
• Danish ICS Security Service Company
• Challenge:
• Needs of additional qualifications to
conduct pentesting in the industrial area,
and enhancing ICS knowledge in a prompt
and efficient manner.
• Solution:
• Industrial Penetration Testing Training
• Case Study Link
• Russian Steel Producer
• Challenge:
• Improve protection of modern automation
infrastructure combining the computing
resources of industrial control systems
(ICS) in several territorially distributed
data centers and reduce maintenance
costs
• Solution:
• KICS for Nodes System
• KICS for Networks System
• Case Study Link
►Kaspersky OS (KOS)
►key feature is a sophisticated approach that makes possible to control inter-
process communications in accordance with specified security policies
►Kaspersky Security System (KSS) for Linux
►a security policy verdict computation engine. It works in conjunction with
KasperskyOS (or can be embedded into Linux-based firmware) that
enforces KSS verdicts.
►Kaspersky Secure Hypervisor (KSH)
►a Type 2 hypervisor that runs on the KasperskyOS microkernel with
Kaspersky Security System, that can run multiple untrusted guest operating
environments on a single HW platform and avoid their unwanted influence to
each other as well as to the host operating system
https://os.kaspersky.com
Kaspersky OS: Family
►Telecom equipment
►Trusted Layer 3 Routing Switch by Craftway
►Trusted Network Equipment by Eltex
►Connected cars
►Vehicle Secure Communication Unit by AVL
►Internet of Things
►Kaspersky IoT Secure Gateway by Kaspersky Lab
►Industrial equipment
► CODESYS protection by BE.services’s Security Shield (ESS)
Kaspersky OS: Implementation
Customer data
storage and processing
Software
assembly
Opening
Transparency center
Independent
supervision and review
by third-party organization
Switzerland
For Europe, with the U.S., Canada,
Singapore, Australia, Japan and South Korea,
as well as other countries, to follow later
For compiling software before
distribution to customers worldwide
For trusted partners to review the
source code and software updates
Global Transparency Initiative (GTI): Kaspersky Lab
moves core infrastructure to Switzerland
Let’s talk!
ICS-CERT.kaspersky.com
ICS.kaspersky.com
OS.kaspersky.com
@KasperskyICS

More Related Content

What's hot

Максим Никандров. Мультишина 10G цифровой ​подстанции — потенциальные ​пробле...
Максим Никандров. Мультишина 10G цифровой ​подстанции — потенциальные ​пробле...Максим Никандров. Мультишина 10G цифровой ​подстанции — потенциальные ​пробле...
Максим Никандров. Мультишина 10G цифровой ​подстанции — потенциальные ​пробле...
Kaspersky
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
Derek Harp
 
How to use mtr 2
How to use mtr 2How to use mtr 2
How to use mtr 2
Eduardo Narvaez
 
Trusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsTrusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tips
Kaspersky
 
A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in Ukraine
Kaspersky
 
Kaspersky Lab Transparency Principles
Kaspersky Lab Transparency PrinciplesKaspersky Lab Transparency Principles
Kaspersky Lab Transparency Principles
Kaspersky
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
TI Safe
 
Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06
Tiago Oliveira
 
Detecting ICS Attacks Using Recurrent Neural Networks
Detecting ICS Attacks Using Recurrent Neural NetworksDetecting ICS Attacks Using Recurrent Neural Networks
Detecting ICS Attacks Using Recurrent Neural Networks
Kaspersky
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
TI Safe
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
TI Safe
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
promediakw
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
Data Unit
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
BGA Cyber Security
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
TI Safe
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Onward Security
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
 
Ecosystem
EcosystemEcosystem
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
TI Safe
 

What's hot (20)

Максим Никандров. Мультишина 10G цифровой ​подстанции — потенциальные ​пробле...
Максим Никандров. Мультишина 10G цифровой ​подстанции — потенциальные ​пробле...Максим Никандров. Мультишина 10G цифровой ​подстанции — потенциальные ​пробле...
Максим Никандров. Мультишина 10G цифровой ​подстанции — потенциальные ​пробле...
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
How to use mtr 2
How to use mtr 2How to use mtr 2
How to use mtr 2
 
Trusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tipsTrusted Environment. Blockchain for business: best practices, experience, tips
Trusted Environment. Blockchain for business: best practices, experience, tips
 
A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in Ukraine
 
Kaspersky Lab Transparency Principles
Kaspersky Lab Transparency PrinciplesKaspersky Lab Transparency Principles
Kaspersky Lab Transparency Principles
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
 
Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06Opc e book_2021_3rd_edition_lay06
Opc e book_2021_3rd_edition_lay06
 
Detecting ICS Attacks Using Recurrent Neural Networks
Detecting ICS Attacks Using Recurrent Neural NetworksDetecting ICS Attacks Using Recurrent Neural Networks
Detecting ICS Attacks Using Recurrent Neural Networks
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 

Similar to How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastructure Defender

The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypse
Christiaan Beek
 
I Vi Z Profile
I Vi Z ProfileI Vi Z Profile
I Vi Z Profile
khushboo
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
Ben Rothke
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP
 
iViZ Profile
iViZ ProfileiViZ Profile
iViZ Profile
iViZ Security
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
LabSharegroup
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
Ambuj Sharma
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Draup3
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
Electric Imp
 
iViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration Testing
iViZ Techno Solutions
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
Case IQ
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist Attacks
BGA Cyber Security
 
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier CiscoIsday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
Inforsud Diffusion
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018
Jack Shaffer
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
Kaspersky
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
pbink
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
hearme limited company
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
Cisco Russia
 

Similar to How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastructure Defender (20)

The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypse
 
I Vi Z Profile
I Vi Z ProfileI Vi Z Profile
I Vi Z Profile
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
iViZ Profile
iViZ ProfileiViZ Profile
iViZ Profile
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
iViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration TestingiViZ Security : On Demand Penetration Testing
iViZ Security : On Demand Penetration Testing
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist Attacks
 
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier CiscoIsday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 

More from Kaspersky

The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
Kaspersky
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
Kaspersky
 
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Kaspersky
 
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктурыМаксим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Kaspersky
 
Кирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИКирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИ
Kaspersky
 
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Kaspersky
 
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Kaspersky
 
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Kaspersky
 
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Kaspersky
 
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Kaspersky
 
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтраИгорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Kaspersky
 
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Kaspersky
 
Марина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных системМарина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных систем
Kaspersky
 
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Kaspersky
 
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Kaspersky
 
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Kaspersky
 
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Kaspersky
 
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугрозОлег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Kaspersky
 
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
Kaspersky
 
Константин Родин. Обеспечение доверенной среды удаленной работы в рамках ​про...
Константин Родин. Обеспечение доверенной среды удаленной работы в рамках ​про...Константин Родин. Обеспечение доверенной среды удаленной работы в рамках ​про...
Константин Родин. Обеспечение доверенной среды удаленной работы в рамках ​про...
Kaspersky
 

More from Kaspersky (20)

The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
 
The Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secureThe Log4Shell Vulnerability – explained: how to stay secure
The Log4Shell Vulnerability – explained: how to stay secure
 
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
Алексей Гуревич. Кибербезопасность систем управления современных объектов эле...
 
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктурыМаксим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
Максим Бородько. Спуфинг GNSS — новая угроза для критической инфраструктуры
 
Кирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИКирилл Набойщиков. Системный подход к защите КИИ
Кирилл Набойщиков. Системный подход к защите КИИ
 
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
Вениамин Левцов. Cтратегия трансформации решений Лаборатории Касперского для ...
 
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
Мария Гарнаева. Целевые атаки на промышленные компании в 2020/2021
 
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
Дмитрий Правиков. Концепция информационной безопасности «роя» киберфизических...
 
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
Андрей Суворов, Максим Карпухин. Сенсация под микроскопом. Вивисекция первого...
 
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
Глеб Дьяконов. ИИ-видеоаналитика как инструмент корпоративного риск-менеджмен...
 
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтраИгорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
Игорь Рыжов. Проекты по защите АСУ ТП вчера, сегодня, завтра
 
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
Александр Карпенко. Уровни зрелости АСУ ТП как объектов защиты и подходы к ун...
 
Марина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных системМарина Сорокина. Криптография для промышленных систем
Марина Сорокина. Криптография для промышленных систем
 
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
Александр Лифанов. Платформа граничных вычислений Siemens Industrial Edge: пе...
 
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
Александр Волошин. Киберполигон "Цифровая энергетика". Исследования и разрабо...
 
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
Евгений Дружинин. Как не сломать: что важно учесть перед, в ходе и после реал...
 
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
Алексей Иванов. Реализация проектов АСУ ТП электрических подстанций ​в соотве...
 
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугрозОлег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
Олег Шакиров. Дипломатия и защита критической инфраструктуры от киберугроз
 
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
Василий Шауро. Развитие кибербезопасности АСУТП ​в условиях цифровизации пред...
 
Константин Родин. Обеспечение доверенной среды удаленной работы в рамках ​про...
Константин Родин. Обеспечение доверенной среды удаленной работы в рамках ​про...Константин Родин. Обеспечение доверенной среды удаленной работы в рамках ​про...
Константин Родин. Обеспечение доверенной среды удаленной работы в рамках ​про...
 

Recently uploaded

A Complete Guide of Dubai Freelance Visa and Permit in 2024
A Complete Guide of Dubai Freelance Visa and Permit in 2024A Complete Guide of Dubai Freelance Visa and Permit in 2024
A Complete Guide of Dubai Freelance Visa and Permit in 2024
Dubiz
 
Path to the next normal collection McKinsey
Path to the next normal collection McKinseyPath to the next normal collection McKinsey
Path to the next normal collection McKinsey
MajIman2
 
upGrad_Case_Study_by_Himanshu_Singh.pptx
upGrad_Case_Study_by_Himanshu_Singh.pptxupGrad_Case_Study_by_Himanshu_Singh.pptx
upGrad_Case_Study_by_Himanshu_Singh.pptx
himanshubclubofgsv
 
AI at Work​ The demystification of AI and real-world stories on how to apply ...
AI at Work​ The demystification of AI and real-world stories on how to apply ...AI at Work​ The demystification of AI and real-world stories on how to apply ...
AI at Work​ The demystification of AI and real-world stories on how to apply ...
Auxis Consulting & Outsourcing
 
New Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 in...
New Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 in...New Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 in...
New Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 in...
44annissa
 
Standard Operating Procedure for Digital Marketing
Standard Operating Procedure for Digital MarketingStandard Operating Procedure for Digital Marketing
Standard Operating Procedure for Digital Marketing
Dipendra Prasad Poudel
 
EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdfEN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
ivanparu86
 
ハワイ大学留学プログラム最終プレゼン「ハワイ大学マノア校におけるシェアリングモビリティの提案」
ハワイ大学留学プログラム最終プレゼン「ハワイ大学マノア校におけるシェアリングモビリティの提案」ハワイ大学留学プログラム最終プレゼン「ハワイ大学マノア校におけるシェアリングモビリティの提案」
ハワイ大学留学プログラム最終プレゼン「ハワイ大学マノア校におけるシェアリングモビリティの提案」
Katsuya Shiratori
 
Chief Compliance Officer Leadership Vision 2024 Report
Chief Compliance Officer Leadership Vision 2024 ReportChief Compliance Officer Leadership Vision 2024 Report
Chief Compliance Officer Leadership Vision 2024 Report
Compliance Vision
 
84th Marketing Club (OTC Marketing) Dr.Mahmoud Hamed 23rd Cairo.pdf
84th Marketing Club (OTC Marketing) Dr.Mahmoud Hamed 23rd Cairo.pdf84th Marketing Club (OTC Marketing) Dr.Mahmoud Hamed 23rd Cairo.pdf
84th Marketing Club (OTC Marketing) Dr.Mahmoud Hamed 23rd Cairo.pdf
ahmed614380
 
United Kingdom's Real Estate Mogul: Newman George Leech's Impact on the Swiss...
United Kingdom's Real Estate Mogul: Newman George Leech's Impact on the Swiss...United Kingdom's Real Estate Mogul: Newman George Leech's Impact on the Swiss...
United Kingdom's Real Estate Mogul: Newman George Leech's Impact on the Swiss...
Newman George Leech
 
ShotOniPhone campaign by Vancy macwan.pptx
ShotOniPhone campaign by Vancy macwan.pptxShotOniPhone campaign by Vancy macwan.pptx
ShotOniPhone campaign by Vancy macwan.pptx
macwanvancy
 
Girls Call Andheri West 9910780858 Provide Best And Top Girl Service And No1 ...
Girls Call Andheri West 9910780858 Provide Best And Top Girl Service And No1 ...Girls Call Andheri West 9910780858 Provide Best And Top Girl Service And No1 ...
Girls Call Andheri West 9910780858 Provide Best And Top Girl Service And No1 ...
margaretblush
 
Benefits of Hiring Gen X Compared to Gen Z and Millennials.pptx
Benefits of Hiring Gen X Compared to Gen Z and Millennials.pptxBenefits of Hiring Gen X Compared to Gen Z and Millennials.pptx
Benefits of Hiring Gen X Compared to Gen Z and Millennials.pptx
Brian Frerichs
 
Zodiac Signs and Fashion: Dressing to Suit Your Astrological Style
Zodiac Signs and Fashion: Dressing to Suit Your Astrological StyleZodiac Signs and Fashion: Dressing to Suit Your Astrological Style
Zodiac Signs and Fashion: Dressing to Suit Your Astrological Style
my Pandit
 
Qatar Airways Kuwait Office.pdf.........
Qatar Airways Kuwait Office.pdf.........Qatar Airways Kuwait Office.pdf.........
Qatar Airways Kuwait Office.pdf.........
anissageorge9890
 
STRATEGY TO OVERCOME CURRENT PROBLEMS AT MTC.pptx
STRATEGY TO OVERCOME CURRENT PROBLEMS AT MTC.pptxSTRATEGY TO OVERCOME CURRENT PROBLEMS AT MTC.pptx
STRATEGY TO OVERCOME CURRENT PROBLEMS AT MTC.pptx
ImranTabish1
 
How Do Flange Adapters Work and Why Are They Essential?
How Do Flange Adapters Work and Why Are They Essential?How Do Flange Adapters Work and Why Are They Essential?
How Do Flange Adapters Work and Why Are They Essential?
Texas Flange
 
Maximise your Business Potential: Annual Planning Workshop
Maximise your Business Potential: Annual Planning WorkshopMaximise your Business Potential: Annual Planning Workshop
Maximise your Business Potential: Annual Planning Workshop
chris908327
 
Girls Call Kharghar 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Kharghar 9910780858 Provide Best And Top Girl Service And No1 in CityGirls Call Kharghar 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Kharghar 9910780858 Provide Best And Top Girl Service And No1 in City
maigasapphire
 

Recently uploaded (20)

A Complete Guide of Dubai Freelance Visa and Permit in 2024
A Complete Guide of Dubai Freelance Visa and Permit in 2024A Complete Guide of Dubai Freelance Visa and Permit in 2024
A Complete Guide of Dubai Freelance Visa and Permit in 2024
 
Path to the next normal collection McKinsey
Path to the next normal collection McKinseyPath to the next normal collection McKinsey
Path to the next normal collection McKinsey
 
upGrad_Case_Study_by_Himanshu_Singh.pptx
upGrad_Case_Study_by_Himanshu_Singh.pptxupGrad_Case_Study_by_Himanshu_Singh.pptx
upGrad_Case_Study_by_Himanshu_Singh.pptx
 
AI at Work​ The demystification of AI and real-world stories on how to apply ...
AI at Work​ The demystification of AI and real-world stories on how to apply ...AI at Work​ The demystification of AI and real-world stories on how to apply ...
AI at Work​ The demystification of AI and real-world stories on how to apply ...
 
New Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 in...
New Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 in...New Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 in...
New Girls Call Mumbai 9910780858 Provide Best And Top Girl Service And No1 in...
 
Standard Operating Procedure for Digital Marketing
Standard Operating Procedure for Digital MarketingStandard Operating Procedure for Digital Marketing
Standard Operating Procedure for Digital Marketing
 
EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdfEN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
EN_Chinese-Automotive-in-SEA-Vero-White-Paper_2023.pdf
 
ハワイ大学留学プログラム最終プレゼン「ハワイ大学マノア校におけるシェアリングモビリティの提案」
ハワイ大学留学プログラム最終プレゼン「ハワイ大学マノア校におけるシェアリングモビリティの提案」ハワイ大学留学プログラム最終プレゼン「ハワイ大学マノア校におけるシェアリングモビリティの提案」
ハワイ大学留学プログラム最終プレゼン「ハワイ大学マノア校におけるシェアリングモビリティの提案」
 
Chief Compliance Officer Leadership Vision 2024 Report
Chief Compliance Officer Leadership Vision 2024 ReportChief Compliance Officer Leadership Vision 2024 Report
Chief Compliance Officer Leadership Vision 2024 Report
 
84th Marketing Club (OTC Marketing) Dr.Mahmoud Hamed 23rd Cairo.pdf
84th Marketing Club (OTC Marketing) Dr.Mahmoud Hamed 23rd Cairo.pdf84th Marketing Club (OTC Marketing) Dr.Mahmoud Hamed 23rd Cairo.pdf
84th Marketing Club (OTC Marketing) Dr.Mahmoud Hamed 23rd Cairo.pdf
 
United Kingdom's Real Estate Mogul: Newman George Leech's Impact on the Swiss...
United Kingdom's Real Estate Mogul: Newman George Leech's Impact on the Swiss...United Kingdom's Real Estate Mogul: Newman George Leech's Impact on the Swiss...
United Kingdom's Real Estate Mogul: Newman George Leech's Impact on the Swiss...
 
ShotOniPhone campaign by Vancy macwan.pptx
ShotOniPhone campaign by Vancy macwan.pptxShotOniPhone campaign by Vancy macwan.pptx
ShotOniPhone campaign by Vancy macwan.pptx
 
Girls Call Andheri West 9910780858 Provide Best And Top Girl Service And No1 ...
Girls Call Andheri West 9910780858 Provide Best And Top Girl Service And No1 ...Girls Call Andheri West 9910780858 Provide Best And Top Girl Service And No1 ...
Girls Call Andheri West 9910780858 Provide Best And Top Girl Service And No1 ...
 
Benefits of Hiring Gen X Compared to Gen Z and Millennials.pptx
Benefits of Hiring Gen X Compared to Gen Z and Millennials.pptxBenefits of Hiring Gen X Compared to Gen Z and Millennials.pptx
Benefits of Hiring Gen X Compared to Gen Z and Millennials.pptx
 
Zodiac Signs and Fashion: Dressing to Suit Your Astrological Style
Zodiac Signs and Fashion: Dressing to Suit Your Astrological StyleZodiac Signs and Fashion: Dressing to Suit Your Astrological Style
Zodiac Signs and Fashion: Dressing to Suit Your Astrological Style
 
Qatar Airways Kuwait Office.pdf.........
Qatar Airways Kuwait Office.pdf.........Qatar Airways Kuwait Office.pdf.........
Qatar Airways Kuwait Office.pdf.........
 
STRATEGY TO OVERCOME CURRENT PROBLEMS AT MTC.pptx
STRATEGY TO OVERCOME CURRENT PROBLEMS AT MTC.pptxSTRATEGY TO OVERCOME CURRENT PROBLEMS AT MTC.pptx
STRATEGY TO OVERCOME CURRENT PROBLEMS AT MTC.pptx
 
How Do Flange Adapters Work and Why Are They Essential?
How Do Flange Adapters Work and Why Are They Essential?How Do Flange Adapters Work and Why Are They Essential?
How Do Flange Adapters Work and Why Are They Essential?
 
Maximise your Business Potential: Annual Planning Workshop
Maximise your Business Potential: Annual Planning WorkshopMaximise your Business Potential: Annual Planning Workshop
Maximise your Business Potential: Annual Planning Workshop
 
Girls Call Kharghar 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Kharghar 9910780858 Provide Best And Top Girl Service And No1 in CityGirls Call Kharghar 9910780858 Provide Best And Top Girl Service And No1 in City
Girls Call Kharghar 9910780858 Provide Best And Top Girl Service And No1 in City
 

How We Stopped Being Just Antivirus and Became a Unique Industrial Infrastructure Defender

  • 1. How We Stopped Being Just Antivirus ─ And Became A Unique Industrial Infrastructure Defender
  • 2. Most Tested. Most Awarded. Kaspersky Lab Protection.* 0% 20% 40% 60% 80% 100% 20 40 60 80 100 No of independent tests/reviews Bitdefender Sophos G DATA Symantec F-Secure Intel Security (McAfee) Trend Micro Avira Avast AVG ESET In 2017 Kaspersky Lab products participated in 86 independent tests and reviews. Our products were awarded 72 firsts and achieved 78 top-three finishes. Kaspersky Lab 1st places – 72. Participation in 86 tests/reviews. TOP 3 = 91% * Notes: • According to summary results of independent tests in 2017 for corporate, consumer and mobile products. • Summary includes independent tests conducted by : AV-Comparatives, VirusBulletin, ICSA Labs, SELabs, MRG Effitas, AV-Test. • Tests performed in these programs assess all protection technologies against known, unknown and advanced threats. • The size of the bubble reflects the number of 1st places achieved. ScoreofTOP3places www.kaspersky.com/top3
  • 3. Our Major Discoveries 2011 2010 2012 Stuxnet Duqu Gauss Flame miniFlame 2013 2014 2015 2016 2017 NetTraveler Miniduke RedOctober Icefog Winnti Kimsuky TeamSpy CosmicDuke Darkhotel Regin Careto / The Mask Epic Turla Energetic Bear / Crouching Yeti Wild Neutron Blue Termite Spring Dragon Desert Falcons Carbanak Equation Animal Farm Darkhotel - part 2 MsnMM Campaigns Satellite Turla Hellsing Sofacy Naikon Duqu 2.0 ProjectSauron Saguaro StrongPity Lazarus Lurk Adwind Metel Ghoul Fruity Armor ScarCruft Poseidon GCMan Danti Dropping Elephant Moonlight Maze ATMitch ShadowPad BlackOasis WhiteBear Silence WannaCry Shamoon 2.0 ExPetr/NotPetya BlueNoroff StoneDrill https://apt.securelist.com
  • 4. Anti Targeted Attack Comprehensive multi-vector discovery and risk mitigation of advanced threats and targeted attacks Endpoint Security The leading multi-layered endpoint protection platform, based on true cybersecurity technologies Cloud Security Borderless security engineered for your hybrid cloud Cybersecurity Services Leveraging Threat Intelligence, Security Training, Incident Response and Assessment from the world leader Security Operations Center Empowering your SOC with the tools and information to efficiently detect and remediate threats Fraud Prevention Proactive detection of cross-channel fraud in Real Time Financial Services Cybersecurity Providing Financial Services with the tools to raise security levels, prevent and predict cyber-incidents and respond efficiently Telecom Cybersecurity Efficient protection for telecoms infrastructure and information systems against the most advanced cyberthreats Healthcare Cybersecurity Protecting healthcare infrastructures and sensitive clinical data in a ruthless cyberthreat landscape Data Center Security Empowering your data center to detect and respond to the most advanced cyberthreats Government Cybersecurity Security controls and services geared to the demands of government organizations and related public bodies Industrial Cybersecurity Specialized protection for industrial control systems Technological By Industries Kaspersky Enterprise Security Solutions
  • 5. Kaspersky Industrial CyberSecurity Expertise and Technologies
  • 6. Kaspersky Lab ICS CERT structure Vulnerability Researchers Security auditors Developers Security analysts Industrial engineers 2016 CVE Numbering Authority
  • 7. Kaspersky ICS CERT: ICS/IIOT Vulnerability Research More than 170+ ICS / IIoT vulnerabilities have been found since 2016
  • 8. Kaspersky ICS CERT: ICS/IIOT Vulnerability Research Some of the ICS Vendors we helped https://ics-cert.us-cert.gov/advisories
  • 9. …This Gemalto solution is used in products by other software vendors, including such companies as ABB, General Electric, HP, Cadac Group, Zemax and many other organizations, the number of which, according to some estimates, reaches 40 thousand. …Many products that use the OPC UA technology by the OPC Foundation may include that server, making them vulnerable to the XXE attack. This makes this vulnerability much more valuable from an attacker’s viewpoint... Vulnerabilities in Common Components
  • 11. TANK Control Valve Level Meter Malicious overrides of process setpoints Tank overfill / fraud Malicious changes of PID parameters Equipment overstress/disruption Pump Malicious changes of measurement values Tank overfill / fraud Malicious changes of process control logic hydraulic surge, equipment damage, emergency shutdown Malicious STOP command Process out of control PLC SCADA OIL REFINERY POWER GRID CHEMICALMANUFACTURING Kaspersky ICS Security Assessment: Impact Analysis
  • 12. Threat Intelligence Web crawlers BotFarm Spam trap Sensors APT research team Partners OSINT Honeypots Kaspersky Lab Statistics Kaspersky Lab Expert Systems Kaspersky Lab Analysis Data Feeds Customer 3 1 4 Whitelisting Kaspersky Global Users 5 2
  • 13. ►Threat data sources ►Kaspersky Security Network (KSN) ►Kaspersky Industrial CyberSecurity service projects ►Surveys ►Public sources ► ICS Computers protected by Kaspersky Lab products ►supervisory control and data acquisition (SCADA) servers; ►data storage servers (Historian); ►data gateways (OPC); ►stationary workstations of engineers and operators; ►mobile workstations of engineers and operators; ►Human Machine Interface (HMI). ►ICS Supply Chain participants Kaspersky ICS CERT: Threat landscape for ICS
  • 14. ►Main findings ►Random malware attacks in ICS ►Cryptominers in ICS ►Ransomware in ICS ►Remote administration tools (RATs) ►Mass-targeting campaigns ►Main sources of malware as always ►Web ►Removable devices ►Mail Geographical distribution of attacks on industrial automation systems, H1 2018, percentage of ICS computers attacked in each country https://ics-cert.kaspersky.com/reports/2018/09/06/threat-landscape-for-industrial-automation-systems-h1-2018/ Kaspersky ICS CERT: Malware in ICS
  • 15. Contribution to the global ICS/IIoT Security standardization
  • 16. Contribution to the global ICS/IIoT Security standardization Some of the released studies we contributed to
  • 17. State of ICS Security Surveys https://ics.kaspersky.com/media/2018-Kaspersky-ICS-Whitepaper.pdf
  • 18. Kaspersky ICS Security trainings Advanced Industrial CyberSecurity in Practice • 2 DAYS, 10-20 specialists ICS Penetration Testing for Professionals • 5 DAYS, up to 10 professionals ICS Digital Forensics for Professionals • 4 DAYS, up to 10 professionals
  • 19. Kaspersky ICS CERT: University Cooperation
  • 20. KIPS is an exercise that places business decision makers IT security teams from corporations and government departments into a simulated business environment facing a series of unexpected cyber threats, while trying to maximize profit and maintain confidence. Industrial scenarios: • Oil & Gas • Power station • Water plant • Transportation References: Government agencies, BASF, CERN, Mitsubishi, Yokogawa, RusHydro, Panasonic, ISA, SANS,... https://media.kaspersky.com/en/business-security/enterprise/KL_SA_KIPS_overview_A4_Eng_web.pdf Kaspersky Interactive Protection Simulation (KIPS)
  • 21. Kaspersky Lab ICS/IIOT Capture the Flag Сapture the flag (CTF) contest is a competition for cybersecurity experts organized in the form of a game, in which the participants solve computer security problems. They must either capture (attack/bring down) or defend computer systems in a CTF environment. https://ctf.kaspersky.com
  • 22. Kaspersky Industrial Cybersecurity Conference https://ics.kaspersky.com/conference/
  • 23. SAS is an annual event that attracts high- caliber anti-malware researchers, global law enforcement agencies and CERTs and senior executives from financial services, technology, healthcare, academia and government agencies. ►Nation state cyber-espionage and advanced threat actors ►Internet of Things ►Government surveillance issues and privacy rights ►Threats against banks, financial institutions ►Mobile Malware ►Critical infrastructure protection (SCADA/ICS) ►Law-enforcement coordination and information sharing ►Vulnerability discovery and responsible disclosure Singapore April 8-11, 2019 https://sas.kaspersky.com Kaspersky Security Analyst Summit
  • 25. KICS for Nodes – Industrial Endpoint Protection Protection for Industrial Endpoints • SCADA Servers • SCADA Clients • Human Machine Interfaces (HMI) • Engineering Workstations • Historians • OPC Gateways Security capabilities • Application whitelisting • Antimalware protection • Ransomware protection • Removable device control • File Integrity Monitoring • Exploit Prevention • Wireless access control • Log Inspection • PLC integrity checker Industrial Specifics • Easy to deploy • Local Signature Updates • Less resource consuming than other EPP • Legacy OS support • Tested by ICS/SCADA vendors
  • 26. KICS for Networks – Industrial Network Anomaly and Breach Detection • Network Activity Monitoring • Safe Non-Invasive Mode • Asset Discovery • Commands and Telemetry Analysis • Anomaly Detection • Cyber Attack Detection • Remote Access Detection • Malware Spreading Detection • Network Visualization • Event Correlation • SOC/SIEM Integration Some of the supported devices & protocols
  • 27. KICS for Networks – Industrial Network Anomaly and Breach Detection
  • 28. KICS for Networks powered by Machine Learning for Anomaly Detection • Detect independently of reason: • cyber attack, • human factor, • equipment faults,… • Anomaly Interpretation • Predictive maintenance • State-of-the-art ML technology • No need to manually create rules Case Studies: Secure Water Treatment System (SWaT) SUTD, Singapore Crude & Vacuum distillation units, at Oil Refining Plant Chemical plant: Tennessee Eastman Process (TEP)
  • 29. Kaspersky Lab is cited in 4 categories for its dedicated OT security portfolio, KICS:  OT Endpoint security  OT Network Monitoring and Visibility  Anomaly Detection, Incident Response, Reporting  OT Security Services Competitive Landscape: Operational Technology Security, Ruggero Contu, 29 October 2018. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved. Comprehensive approach to Operational Technology Security https://ics.kaspersky.com/KICS-cited-in-Gartner-competitive-landscape-OT-security Get a complimentary copy of this Gartner report:
  • 30. Kaspersky Industrial CyberSecurity Experience • German Glass Manufacturer • Challenge: • Needs to prevent delays in production and a complete breakdown of the production lines due to cyber attacks, that can not only incur cancellation fees, but in many cases expensive contractual penalty charges, too. • Solution: • KICS for Nodes System • KICS for Networks System • Case Study Link • Czech Brewery • Challenge: • Needs to make sure the production lines and all OT related software and hardware of brewing part and bottling lines, including in total 2 brew houses and CCT areas and 8 packaging lines in Pilsen plant were resistant to cyber attacks, and that the company was ready to implement a holistic industrial cybersecurity strategy • Solution: • Industrial Cyber Security Assessment Service • Case Study Link • Danish ICS Security Service Company • Challenge: • Needs of additional qualifications to conduct pentesting in the industrial area, and enhancing ICS knowledge in a prompt and efficient manner. • Solution: • Industrial Penetration Testing Training • Case Study Link • Russian Steel Producer • Challenge: • Improve protection of modern automation infrastructure combining the computing resources of industrial control systems (ICS) in several territorially distributed data centers and reduce maintenance costs • Solution: • KICS for Nodes System • KICS for Networks System • Case Study Link
  • 31. ►Kaspersky OS (KOS) ►key feature is a sophisticated approach that makes possible to control inter- process communications in accordance with specified security policies ►Kaspersky Security System (KSS) for Linux ►a security policy verdict computation engine. It works in conjunction with KasperskyOS (or can be embedded into Linux-based firmware) that enforces KSS verdicts. ►Kaspersky Secure Hypervisor (KSH) ►a Type 2 hypervisor that runs on the KasperskyOS microkernel with Kaspersky Security System, that can run multiple untrusted guest operating environments on a single HW platform and avoid their unwanted influence to each other as well as to the host operating system https://os.kaspersky.com Kaspersky OS: Family
  • 32. ►Telecom equipment ►Trusted Layer 3 Routing Switch by Craftway ►Trusted Network Equipment by Eltex ►Connected cars ►Vehicle Secure Communication Unit by AVL ►Internet of Things ►Kaspersky IoT Secure Gateway by Kaspersky Lab ►Industrial equipment ► CODESYS protection by BE.services’s Security Shield (ESS) Kaspersky OS: Implementation
  • 33. Customer data storage and processing Software assembly Opening Transparency center Independent supervision and review by third-party organization Switzerland For Europe, with the U.S., Canada, Singapore, Australia, Japan and South Korea, as well as other countries, to follow later For compiling software before distribution to customers worldwide For trusted partners to review the source code and software updates Global Transparency Initiative (GTI): Kaspersky Lab moves core infrastructure to Switzerland