Cyber Security in Real-Time Systems
CSIRS
David Spinks
CSIRS
Cyber Security in Real-Time Systems
Advanced Attacks and Role...
70% of all breaches are discovered by external 3rd parties!
Why me?
Worked in process control and ICS environments for about 24 years then moved
into Information Security Risk Manage...
Sizewell B Software Emergency
Shut Down code validation
Why me?
UKAEA thenAEATechnology plc 10 years
Safety Risk Managemen...
Cyber Security in Real Time Systems?
LinkedinCSIRS:http://www.linkedin.com/groups/Cyber-Security-in-RealTime-Systems-36234...
https://www.cert.org/insider-threat/
http://www.cpni.gov.uk/advice/Personnel-security1/Insider-threats/
Best Practice Rese...
Types of InsiderThreat
Unauthorised disclosure
of sensitive information
Process corruption
Facilitation of third party
acc...
Motive
Cert Cases
Who is a possible Insider Threat?
Disgruntled employees Passed over for salary increase or
promotion
Former employees - fi...
Top 3 InsiderThreat Mitigation Steps
Role Based Access Controls – Segregated Access
You will be caught deterrent
Physical access logs Phone access logs Email and InternetAccess
We are monitoring and make su...
Embedding Security within Corporate Culture
Care, Compassion and Consideration
Primary defence
social engineering
Finally what is certain
Threats
Losses
Sophistication
Final thought
CSIRS
Cyber Security in Real-Time Systems
david.spinks@hp.com
Cyber response to insider threats 3.1
Upcoming SlideShare
Loading in …5
×

Cyber response to insider threats 3.1

280 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
280
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber response to insider threats 3.1

  1. 1. Cyber Security in Real-Time Systems CSIRS David Spinks CSIRS Cyber Security in Real-Time Systems Advanced Attacks and Role of Insiders
  2. 2. 70% of all breaches are discovered by external 3rd parties!
  3. 3. Why me? Worked in process control and ICS environments for about 24 years then moved into Information Security Risk Management for last 20 years. My first job in 1970 Glaxo (now GSK) –Animal Rights 10 years
  4. 4. Sizewell B Software Emergency Shut Down code validation Why me? UKAEA thenAEATechnology plc 10 years Safety Risk Management SRD
  5. 5. Cyber Security in Real Time Systems? LinkedinCSIRS:http://www.linkedin.com/groups/Cyber-Security-in-RealTime-Systems-3623430  Safety Critical and Safety Related Systems  Mission and Business Critical systems  Critical National Infrastructure (CNI)  Systems in Energy, Oil and Gas  Regulated systems in Financial Industry such as E-banking and Point-of-Sale (POS)  SCADA and PLC in large-scale manufacturing  Systems supporting Defence and Law Enforcement  Health and Pharmaceutical Systems  Aviation and Transport Systems
  6. 6. https://www.cert.org/insider-threat/ http://www.cpni.gov.uk/advice/Personnel-security1/Insider-threats/ Best Practice Research US DoD UK MoD
  7. 7. Types of InsiderThreat Unauthorised disclosure of sensitive information Process corruption Facilitation of third party access to assets Physical, Logical and Sabotage APT Social Engineering Malware
  8. 8. Motive
  9. 9. Cert Cases
  10. 10. Who is a possible Insider Threat? Disgruntled employees Passed over for salary increase or promotion Former employees - fired from the company, holds animosity to company or personnel Addictions – Drugs,Alcohol or Gambling Gullible to Social engineers or Coercion or Blackmail
  11. 11. Top 3 InsiderThreat Mitigation Steps
  12. 12. Role Based Access Controls – Segregated Access
  13. 13. You will be caught deterrent Physical access logs Phone access logs Email and InternetAccess We are monitoring and make sure all staff know reports are examined and action will be taken
  14. 14. Embedding Security within Corporate Culture Care, Compassion and Consideration Primary defence social engineering
  15. 15. Finally what is certain Threats Losses Sophistication
  16. 16. Final thought
  17. 17. CSIRS Cyber Security in Real-Time Systems david.spinks@hp.com

×