SlideShare a Scribd company logo
www.ria.ee
FOR OFFICIAL USE ONLY
Estonian
Overview of practical CIIP
activities in EE
Aare Reintam
ISKE area manager
CIIP unit
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Outline of my talk
• What is the aim of protecting CII?
• Community building
• Activities - security assessments and port
scanning
• Legislation, regulations, ICS/SCADA guidelines
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
When talking about CII protection
• We mean vital services that depend on IT
systems
• Electricity supply (production, transmission,
distribution)
• Data communications
• Water supply and sewerage
• Air navigation service
• …
• 43 vital services in total
www.ria.ee
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
CII Incidents and impact on economy
• Some examples from this year CII incidents in Europe
Sector Time Impact Reason
Energy Sept 2013 2,5 hours the hole
county electricity
distribution was
interrupted
Software error
Railway
transport
March
2013
3 hours long
Interruption of train
service between two
main cities in Europe
Optical cable breakage.
Trains leading dispatcher
was unable to carry out
work and had to stop the
traffic
Air
transport
August
2013
3 hours interruption in
X city air travel service.
No planes could land.
Flight control software
error.
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Community building
• CIIP lead (expert / mid-management level)
• SCADA workgroup
• CII protection council
• Annual CIIP conference
• CERT-EE lead (expert level)
• Government system administrators
• ISP & hosting abuse handlers
• CERT + CIIP joint events
• 0ct0b3rf3st
• EISA management lead:
• Quarterly reports to high government officials
• Seminars for management
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
How to keep communities
running?
• Regular meetings on interesting topics
• Share information
• State sponsored training, seminars,
conferences etc.
• 5 day advanced SCADA security
• Netflow, IDS, logging
• Managing small office networks (SOHO)
• …
• Social events
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Security assessment projects
• Find out what is the “real” security level of
vital service provider
• Based on attack scenarios
• Verifying them with penetration testing
• State sponsored
• We are using 3rd party consultants
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Sample security assessment task
list
• Information gathering from public sources
• Corporate LAN security assessment
(Windows domain, servers, workstations, Wi-
Fi etc.)
• Network perimeter testing (from corporate
<-> SCADA <-> control network)
• Assessment of SCADA servers, operator
workstation etc.
• Remote access to networks (VPN)
• Physical security
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Finding CII equipment from the
Internet
• Locating possibly vulnerable devices before
the “bad guys”
• Notifying the owner and explaining the risk
• Using shodanhq.com and other tools
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Legislation & guidelines
• We are giving input to Ministry of justice to
amend appropriate legislation.
• Security measure regulation is established:
• Security responsibilities have to be in place when
providing vital services
• Implement security standard (ISO 27001, our
own local standard “ISKE” or industry specific)
• ICS/SCADA security guidelines
• 25 security controls
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
To sum up
• Incidents happen on daily basis
• Only legislation is not enough
• There has to be balanced responsibility
between state and service providers
• People are important
Thank You!
www.ria.ee
Aare Reintam
Aare.reintam@ria.ee

More Related Content

What's hot

Civilian Infrastructure Monitoring System Generic
Civilian Infrastructure Monitoring System GenericCivilian Infrastructure Monitoring System Generic
Civilian Infrastructure Monitoring System Generic
Agincourt Business Services
 
Setting up network in an office
Setting up network in an officeSetting up network in an office
Setting up network in an office
Md. Tashnim
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
IoT in ITS: Network Impacts
IoT in ITS: Network ImpactsIoT in ITS: Network Impacts
IoT in ITS: Network Impacts
Alcatel-Lucent Enterprise
 
CIR Conferences - Arrowhead
CIR Conferences - ArrowheadCIR Conferences - Arrowhead
CIR Conferences - Arrowhead
Justin Hayward
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-world
Arpan Pal
 
Presentation IndiciaTech.nl - Preventing is Protecting
Presentation IndiciaTech.nl - Preventing is ProtectingPresentation IndiciaTech.nl - Preventing is Protecting
Presentation IndiciaTech.nl - Preventing is Protecting
Antonio Chan
 
2019 punter data voor slimme systemen dvc 17okt-pdf
2019 punter data voor slimme systemen dvc 17okt-pdf2019 punter data voor slimme systemen dvc 17okt-pdf
2019 punter data voor slimme systemen dvc 17okt-pdf
DVCSI
 
Innovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantageInnovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantage
Thibault Cantegrel
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
ST_World
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
 International Journal of Network Security & Its Applications (IJNSA) International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA) International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
 International Journal of Network Security & Its Applications (IJNSA) International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
IJNSA Journal
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's Universities
Alcatel-Lucent Enterprise
 

What's hot (20)

Civilian Infrastructure Monitoring System Generic
Civilian Infrastructure Monitoring System GenericCivilian Infrastructure Monitoring System Generic
Civilian Infrastructure Monitoring System Generic
 
Setting up network in an office
Setting up network in an officeSetting up network in an office
Setting up network in an office
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
IoT in ITS: Network Impacts
IoT in ITS: Network ImpactsIoT in ITS: Network Impacts
IoT in ITS: Network Impacts
 
CIR Conferences - Arrowhead
CIR Conferences - ArrowheadCIR Conferences - Arrowhead
CIR Conferences - Arrowhead
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-world
 
Presentation IndiciaTech.nl - Preventing is Protecting
Presentation IndiciaTech.nl - Preventing is ProtectingPresentation IndiciaTech.nl - Preventing is Protecting
Presentation IndiciaTech.nl - Preventing is Protecting
 
2019 punter data voor slimme systemen dvc 17okt-pdf
2019 punter data voor slimme systemen dvc 17okt-pdf2019 punter data voor slimme systemen dvc 17okt-pdf
2019 punter data voor slimme systemen dvc 17okt-pdf
 
Innovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantageInnovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantage
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
International Journal of Network Security & Its Applications (IJNSA)
 International Journal of Network Security & Its Applications (IJNSA) International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA) International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
 International Journal of Network Security & Its Applications (IJNSA) International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's Universities
 

Viewers also liked

Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
pr0jectk
 
Final production piece v2
Final production piece v2Final production piece v2
Final production piece v2
PJG123
 
9 ways to improve your sales team
9 ways to improve your sales team9 ways to improve your sales team
9 ways to improve your sales team
InsynQ-inc
 
Defining an audience copy
Defining an audience   copyDefining an audience   copy
Defining an audience copy
PJG123
 
02408b
02408b02408b
Video Wagner
Video   WagnerVideo   Wagner
Video Wagnerwagneragp
 
01824d
01824d01824d
WSO2Con US 2013 - Connected Business - making it happen
WSO2Con US 2013 - Connected Business - making it happenWSO2Con US 2013 - Connected Business - making it happen
WSO2Con US 2013 - Connected Business - making it happen
WSO2
 
Smart room home automation
Smart room  home automationSmart room  home automation
Smart room home automation
lynn li
 
WSO2Con US 2013 - APIs Everywhere
WSO2Con US 2013 - APIs EverywhereWSO2Con US 2013 - APIs Everywhere
WSO2Con US 2013 - APIs Everywhere
WSO2
 
Julia Didenko - Donetsk Institute of Information
Julia Didenko - Donetsk Institute of InformationJulia Didenko - Donetsk Institute of Information
Julia Didenko - Donetsk Institute of Information
GazetaWyborcza
 
Andrew Haggard - #PutinAtWar
Andrew Haggard - #PutinAtWarAndrew Haggard - #PutinAtWar
Andrew Haggard - #PutinAtWar
GazetaWyborcza
 
How We Use GitHub
How We Use GitHubHow We Use GitHub
How We Use GitHub
NYC DevShop
 
NODEjs Lesson1
NODEjs Lesson1NODEjs Lesson1
NODEjs Lesson13dmodeldiy
 
The thrilling potential of sixth sense technology
The thrilling potential of sixth sense technologyThe thrilling potential of sixth sense technology
The thrilling potential of sixth sense technology
3dmodeldiy
 
Киберпреступность отступает?
Киберпреступность отступает?Киберпреступность отступает?
Киберпреступность отступает?
S.E. CTS CERT-GOV-MD
 
Prezentare compartiment securitatea (2)
Prezentare compartiment securitatea (2)Prezentare compartiment securitatea (2)
Prezentare compartiment securitatea (2)
S.E. CTS CERT-GOV-MD
 
Paweł Ławiński - Jedna opowieść, cztery różne platformy
Paweł Ławiński - Jedna opowieść, cztery różne platformyPaweł Ławiński - Jedna opowieść, cztery różne platformy
Paweł Ławiński - Jedna opowieść, cztery różne platformy
GazetaWyborcza
 
Moldova cyber security 02.10.2013 rr
Moldova cyber security 02.10.2013 rrMoldova cyber security 02.10.2013 rr
Moldova cyber security 02.10.2013 rr
S.E. CTS CERT-GOV-MD
 

Viewers also liked (20)

Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
 
Final production piece v2
Final production piece v2Final production piece v2
Final production piece v2
 
9 ways to improve your sales team
9 ways to improve your sales team9 ways to improve your sales team
9 ways to improve your sales team
 
Defining an audience copy
Defining an audience   copyDefining an audience   copy
Defining an audience copy
 
02408b
02408b02408b
02408b
 
Video Wagner
Video   WagnerVideo   Wagner
Video Wagner
 
01824d
01824d01824d
01824d
 
WSO2Con US 2013 - Connected Business - making it happen
WSO2Con US 2013 - Connected Business - making it happenWSO2Con US 2013 - Connected Business - making it happen
WSO2Con US 2013 - Connected Business - making it happen
 
Smart room home automation
Smart room  home automationSmart room  home automation
Smart room home automation
 
WSO2Con US 2013 - APIs Everywhere
WSO2Con US 2013 - APIs EverywhereWSO2Con US 2013 - APIs Everywhere
WSO2Con US 2013 - APIs Everywhere
 
Julia Didenko - Donetsk Institute of Information
Julia Didenko - Donetsk Institute of InformationJulia Didenko - Donetsk Institute of Information
Julia Didenko - Donetsk Institute of Information
 
Andrew Haggard - #PutinAtWar
Andrew Haggard - #PutinAtWarAndrew Haggard - #PutinAtWar
Andrew Haggard - #PutinAtWar
 
How We Use GitHub
How We Use GitHubHow We Use GitHub
How We Use GitHub
 
NODEjs Lesson1
NODEjs Lesson1NODEjs Lesson1
NODEjs Lesson1
 
The thrilling potential of sixth sense technology
The thrilling potential of sixth sense technologyThe thrilling potential of sixth sense technology
The thrilling potential of sixth sense technology
 
Киберпреступность отступает?
Киберпреступность отступает?Киберпреступность отступает?
Киберпреступность отступает?
 
Symantec (2)
Symantec (2)Symantec (2)
Symantec (2)
 
Prezentare compartiment securitatea (2)
Prezentare compartiment securitatea (2)Prezentare compartiment securitatea (2)
Prezentare compartiment securitatea (2)
 
Paweł Ławiński - Jedna opowieść, cztery różne platformy
Paweł Ławiński - Jedna opowieść, cztery różne platformyPaweł Ławiński - Jedna opowieść, cztery różne platformy
Paweł Ławiński - Jedna opowieść, cztery różne platformy
 
Moldova cyber security 02.10.2013 rr
Moldova cyber security 02.10.2013 rrMoldova cyber security 02.10.2013 rr
Moldova cyber security 02.10.2013 rr
 

Similar to Aare reintam estonia_ciip_activites

Automotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADAAutomotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADA
Gilad Bandel
 
European Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challengesEuropean Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challenges
European Union Agency for Network and Information Security (ENISA)
 
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTConnectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
Solace
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
TI Safe
 
CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2
John Rooksby
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
TheAnfieldGroup
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
stacybre
 
Driving Efficiency with Splunk Cloud at Gatwick Airport
Driving Efficiency with Splunk Cloud at Gatwick AirportDriving Efficiency with Splunk Cloud at Gatwick Airport
Driving Efficiency with Splunk Cloud at Gatwick Airport
Splunk
 
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in SplunkGet Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Precisely
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
CAS
 
Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
brigel529
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdf
ZoyaAli844417
 
Cyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillanCyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillan
TWCA
 
High speed electric sky pods for passenger and cargo presentation by link vue
High speed electric sky pods for passenger and cargo presentation by link vueHigh speed electric sky pods for passenger and cargo presentation by link vue
High speed electric sky pods for passenger and cargo presentation by link vue
Mahesh Chandra Manav
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
Priyanka Aash
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
ssuserb7947f
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and Security
Can Demirel
 
DEVNET-1145 How APIs are Driving City Digitization
DEVNET-1145	How APIs are Driving City DigitizationDEVNET-1145	How APIs are Driving City Digitization
DEVNET-1145 How APIs are Driving City Digitization
Cisco DevNet
 

Similar to Aare reintam estonia_ciip_activites (20)

Automotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADAAutomotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADA
 
European Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challengesEuropean Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challenges
 
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTConnectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Driving Efficiency with Splunk Cloud at Gatwick Airport
Driving Efficiency with Splunk Cloud at Gatwick AirportDriving Efficiency with Splunk Cloud at Gatwick Airport
Driving Efficiency with Splunk Cloud at Gatwick Airport
 
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in SplunkGet Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdf
 
Cyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillanCyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillan
 
High speed electric sky pods for passenger and cargo presentation by link vue
High speed electric sky pods for passenger and cargo presentation by link vueHigh speed electric sky pods for passenger and cargo presentation by link vue
High speed electric sky pods for passenger and cargo presentation by link vue
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and Security
 
DEVNET-1145 How APIs are Driving City Digitization
DEVNET-1145	How APIs are Driving City DigitizationDEVNET-1145	How APIs are Driving City Digitization
DEVNET-1145 How APIs are Driving City Digitization
 

More from S.E. CTS CERT-GOV-MD

System of security controls
System of security controlsSystem of security controls
System of security controls
S.E. CTS CERT-GOV-MD
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
S.E. CTS CERT-GOV-MD
 
Criminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legiiCriminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legii
S.E. CTS CERT-GOV-MD
 
SIS PREZENTARE CTS
SIS PREZENTARE CTSSIS PREZENTARE CTS
SIS PREZENTARE CTS
S.E. CTS CERT-GOV-MD
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
 
CLOUD COMPUTING Security Risks or Opportunities
CLOUD COMPUTING Security Risks or  OpportunitiesCLOUD COMPUTING Security Risks or  Opportunities
CLOUD COMPUTING Security Risks or Opportunities
S.E. CTS CERT-GOV-MD
 
Operarea md cert în reţea naţională de
Operarea md cert în reţea naţională deOperarea md cert în reţea naţională de
Operarea md cert în reţea naţională de
S.E. CTS CERT-GOV-MD
 
GESTIONAREA RISCURILOR DE SECURITATE A INFORMAȚIEI
GESTIONAREA RISCURILOR DE  SECURITATE A INFORMAȚIEIGESTIONAREA RISCURILOR DE  SECURITATE A INFORMAȚIEI
GESTIONAREA RISCURILOR DE SECURITATE A INFORMAȚIEI
S.E. CTS CERT-GOV-MD
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
 
Cisco Secure X
Cisco Secure XCisco Secure X
Cisco Secure X
S.E. CTS CERT-GOV-MD
 
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesCERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
S.E. CTS CERT-GOV-MD
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
S.E. CTS CERT-GOV-MD
 
Symantec
SymantecSymantec

More from S.E. CTS CERT-GOV-MD (14)

System of security controls
System of security controlsSystem of security controls
System of security controls
 
Symantec (3)
Symantec (3)Symantec (3)
Symantec (3)
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
Criminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legiiCriminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legii
 
SIS PREZENTARE CTS
SIS PREZENTARE CTSSIS PREZENTARE CTS
SIS PREZENTARE CTS
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
CLOUD COMPUTING Security Risks or Opportunities
CLOUD COMPUTING Security Risks or  OpportunitiesCLOUD COMPUTING Security Risks or  Opportunities
CLOUD COMPUTING Security Risks or Opportunities
 
Operarea md cert în reţea naţională de
Operarea md cert în reţea naţională deOperarea md cert în reţea naţională de
Operarea md cert în reţea naţională de
 
GESTIONAREA RISCURILOR DE SECURITATE A INFORMAȚIEI
GESTIONAREA RISCURILOR DE  SECURITATE A INFORMAȚIEIGESTIONAREA RISCURILOR DE  SECURITATE A INFORMAȚIEI
GESTIONAREA RISCURILOR DE SECURITATE A INFORMAȚIEI
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Cisco Secure X
Cisco Secure XCisco Secure X
Cisco Secure X
 
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesCERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Symantec
SymantecSymantec
Symantec
 

Recently uploaded

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 

Recently uploaded (20)

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 

Aare reintam estonia_ciip_activites

  • 1. www.ria.ee FOR OFFICIAL USE ONLY Estonian Overview of practical CIIP activities in EE Aare Reintam ISKE area manager CIIP unit
  • 2. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Outline of my talk • What is the aim of protecting CII? • Community building • Activities - security assessments and port scanning • Legislation, regulations, ICS/SCADA guidelines
  • 3. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY When talking about CII protection • We mean vital services that depend on IT systems • Electricity supply (production, transmission, distribution) • Data communications • Water supply and sewerage • Air navigation service • … • 43 vital services in total
  • 5. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY CII Incidents and impact on economy • Some examples from this year CII incidents in Europe Sector Time Impact Reason Energy Sept 2013 2,5 hours the hole county electricity distribution was interrupted Software error Railway transport March 2013 3 hours long Interruption of train service between two main cities in Europe Optical cable breakage. Trains leading dispatcher was unable to carry out work and had to stop the traffic Air transport August 2013 3 hours interruption in X city air travel service. No planes could land. Flight control software error.
  • 6. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Community building • CIIP lead (expert / mid-management level) • SCADA workgroup • CII protection council • Annual CIIP conference • CERT-EE lead (expert level) • Government system administrators • ISP & hosting abuse handlers • CERT + CIIP joint events • 0ct0b3rf3st • EISA management lead: • Quarterly reports to high government officials • Seminars for management
  • 7. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY How to keep communities running? • Regular meetings on interesting topics • Share information • State sponsored training, seminars, conferences etc. • 5 day advanced SCADA security • Netflow, IDS, logging • Managing small office networks (SOHO) • … • Social events
  • 8. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Security assessment projects • Find out what is the “real” security level of vital service provider • Based on attack scenarios • Verifying them with penetration testing • State sponsored • We are using 3rd party consultants
  • 9. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Sample security assessment task list • Information gathering from public sources • Corporate LAN security assessment (Windows domain, servers, workstations, Wi- Fi etc.) • Network perimeter testing (from corporate <-> SCADA <-> control network) • Assessment of SCADA servers, operator workstation etc. • Remote access to networks (VPN) • Physical security
  • 10. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Finding CII equipment from the Internet • Locating possibly vulnerable devices before the “bad guys” • Notifying the owner and explaining the risk • Using shodanhq.com and other tools
  • 11. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Legislation & guidelines • We are giving input to Ministry of justice to amend appropriate legislation. • Security measure regulation is established: • Security responsibilities have to be in place when providing vital services • Implement security standard (ISO 27001, our own local standard “ISKE” or industry specific) • ICS/SCADA security guidelines • 25 security controls
  • 12. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY To sum up • Incidents happen on daily basis • Only legislation is not enough • There has to be balanced responsibility between state and service providers • People are important