SlideShare a Scribd company logo
1 of 33
Copyright © 2015 ardantic - All rights reserved
Continuity and Resilience (CORE)
ISO 22301 BCM Consulting Firm
Presentations by our partners and
extended team of industry experts
Our Contact Details:
INDIA UAE
Continuity and Resilience
Level 15,Eros Corporate Tower
Nehru Place ,New Delhi-110019
Tel: +91 11 41055534/ +91 11 41613033
Fax: ++91 11 41055535
Email: neha@continuityandresilience.com
Continuity and Resilience
P. O. Box 127557
Abu Dhabi, United Arab Emirates
Mobile:+971 50 8460530
Tel: +971 2 8152831
Fax: +971 2 8152888
Email: info@continuityandresilience.com
Copyright © 2015 ardantic - All rights reserved
BCM for national critical
resources
BCM Summit Middle East 2015
Henri Haenni – MBCI / ISO 22301 LI / ISO 27001 LI /
ISO 20000 LA / BCS Green IT
2
Copyright © 2015 ardantic - All rights reserved
Agenda
• Introduction
• What are national critical infrastructures ?
• Which are the threats ?
• Who are the potential attackers ?
• Which are their targets ?
• Are our national critical infrastructures vulnerable ?
• How can we get prepared ?
3
Copyright © 2015 ardantic - All rights reserved
Introduction
4
Stuxnet (2009)
DuQu (2010)
Flame(r) (2012)
SkyWiper
Copyright © 2015 ardantic - All rights reserved
Introduction
5
Extremely
advanced
Zero-day
vulnera-
bilities
Unprece-
dented
capabilities
TargetedWide spread
Stealth
Anonymous
« … unparallaled number
of functionalities… »
Sources : Kaspersky, Lexsi, Symantec
Detected in
Saudi Arabia
Egypt
Iran
Israel
Lebanon
Sudan
Syria
Russia
Austria
Hong Kong
UAE
Several
thousands of
« victims »
Individuals
Enterprises
Public admin
…
Copyright © 2015 ardantic - All rights reserved
Introduction
6Source : Kaspersky
Geography of the
targets
Complexity
« No doubts that it
was sponsored by a
state »
« … a group of
specialists, financed
and managed… » « New phase
in cyberwar »
Evgueni
Kaspersky
Copyright © 2015 ardantic - All rights reserved
Introduction
7Source : Kaspersky
« … Cyber
weapons
directed to any
countries… »
« The most developed
countries are the most
vulnerable »
Copyright © 2015 ardantic - All rights reserved
Introduction
8Source : Cylance OpCleaver, Kaspersky
Retaliation
« Global critical infrastructure
organizations need to take this threat
seriously »
M. Weatherford
Former Deputy Under Secretary for Cyber Security at
the US Dept of Homeland Security
« Shamoon »
malware, similar to
« Flame »
>30’000 affected
endpoints
Countless hours of
recovery
Huge downtime
financial
consequences
2014 :
Ababil
Saffron Rose
Cleaver
…
Copyright © 2015 ardantic - All rights reserved
Introduction
9Source : Cylance OpCleaver
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
10
“These war games are about the real effects of a cyberwar ...
about causing chaos in our streets at home due to sudden
crashes in our critical infrastructure through manipulation
of our banking, transportation, utilities, communications,
and other critical infrastructure industries.
These are all real scenarios.”
Tom Patterson CSO at MagTek & US Air For Senior Advisor, 2010
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
11
Anything that contributes to the safety, wellness, wealth,
integrity, health and stability of a collectivity of people and the
infrastructures and organizations that supports it.
« Critical infrastructure is the backbone of our nation's economy, security and
health. We know it as the power we use in our homes, the water we drink, the
transportation that moves us, and the communication systems we rely on to stay
in touch with friends and family. »
« Critical infrastructure are the assets, systems, and networks, whether physical
or virtual, so vital to the United States that their incapacitation or destruction
would have a debilitating effect on security, national economic security,
national public health or safety, or any combination thereof. »
Copyright © 2015 ardantic - All rights reserved 12
« an asset, system or part thereof located in member states
which is essential for the maintenance of vital societal
functions, health, safety, security, economic or social
well-being of people, and the disruption or destruction of
which would have a significant impact in a member state as a
result of the failure to maintain those functions »
What are national critical
infrastructures ?
Copyright © 2015 ardantic - All rights reserved 13
What are national critical
infrastructures ?
« We safeguard critical infrastructure to
assure social and economic stability
within Abu Dhabi and beyond using
integrated security strategies and the
sharing of best practices through public-
private partnerships. »
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
14
They are like the « chakras » or vital points of the nations
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
15
Energies
Agriculture
Emergencies
Energies transport &
processing
Chemicals Healthcare
Manufacturing
Water supply
Transports
Gov’t services
Financials
Telecoms
IT
Defence
Copyright © 2015 ardantic - All rights reserved 16
What are national critical
infrastructures ?
Domino effect
Copyright © 2015 ardantic - All rights reserved
17
What are national critical
infrastructures ?
Critical
infratructures
ICT &
network
Financials
Gov’t facilities
& services
Healthcare
Manufac-
tures
Agriculture &
food network
Emergen-
cies
Transport
network
Natural
resources
Chemicals
Water/Dams
Oil/Rigs
Ore/Mines
Machines
Metal
Electr.
Pharma
Fertilizers
Basics
Fire
Medics
Law enforc.
Railw
Airports
Roads
Ports
Defence
Energies
& grid
Nuclear
Refineries
Pipelines
Smart gridCivil prot.
Copyright © 2015 ardantic - All rights reserved
18
What are national critical
infrastructures ?
Critical
infratructures
ICT &
network
Financials
Gov’t facilities
& services
Healthcare
Manufac-
tures
Agriculture &
food network
Emergen-
cies
Transport
network
Natural
resources
Chemicals
Water/Dams
Oil/Rigs
Ore/Mines
Machines
Metal
Electr.
Pharma
Fertilizers
Basics
Fire
Medics
Law enforc.
Railw
Airports
Roads
Ports
Defence
Energies
& grid
Nuclear
Refineries
Pipelines
Smart gridCivil prot.
Copyright © 2015 ardantic - All rights reserved
Critical
infrastructure
Air Traffic Control Financial systems Power grid
Involves
Passengers, airports, air
navigation authorities,
regulators, aeronautics
industry
Individuals, enterprises,
banks, insurances, funds,
regulators, market
infrastructure
Consumers, power plants,
substations, distribution
grid, regulating authorities
Security
requirements
Security, extreme
performance, reliability,
massive interoperability
Availability, confidentiality,
integrity, authentication,
access control, non
repudiation
Reliability, interoperability,
performance, resilience
Vulnerabilities
Unencrypted data links,
capabilities to temper radar
rendering, remote control
of aircraft
Use of mobile apps,
human factor, susceptibility
to phishing,
unpreparedness
SCADA obsolescence,
hyper interconnectivity,
market deregulation, smart
metering
19
What are national critical
infrastructures ?
Sources : H. Teso. Aircraft hacking (2013), Critical Infrastructure protection
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
20
Mass injuries or
casualties
Large scale
environmental
damages
Important loss of
services
Loss of
confidence, civil
unrest
Copyright © 2015 ardantic - All rights reserved
What are national critical
infrastructures ?
21
Interdepen-
dencies
Physical
Information
systems
Geographical
Logical
Source : Critical Infrastructure protection 2014
Copyright © 2015 ardantic - All rights reserved
Which are the threats ?
22
Can take « real, large scale » actions !!!
Copyright © 2015 ardantic - All rights reserved
Who are the potential attackers?
23
Who
Smart
hacker
Competitor Hacktivist
Organized
crime
Terrorist
groups
Countries,
nations
Resources
Almost
none
Money, time,
limited skills
Limited but
organized
and skilled
Very large : money, time,
skills
Infinite
Motivations
Ego, self
esteem
To sabotage
competitors
image
Campaign
based.
ideological
Money,
power,
blackmail
Ideological,
political,
nothing to
lose
Geostrategy,
economical,
political,
espionage
Capabilities
Very
limited
Limited Extensive Very important Unlimited
Damages
Most of the
time, none
Focused,
material only
Serious,
purpose-
bound
Regional
High profile
incidents,
spectacular
Nation level,
massive
Source : Critical Infrastructure protection 2014
Copyright © 2015 ardantic - All rights reserved
Which are their targets ?
• Combination of cyber & physical attacks to destroy or
invalidate critical supplies
• Disruption of international communications backbones
preventing any financial transactions
• Cyber attacks on the control systems of a major
power/smart grid leading to large areas blackout
 DDoS, routing attacks, malwares, protocol attacks, insider
 Control can be taken and left dormant for further coordinated attacks
• Coordinated cyber attacks on the rail grid, air control and
traffic control systems to generate massive congestions
24
Copyright © 2015 ardantic - All rights reserved
What are the vulnerabilities ?
25
Vulnerability chain
Infrastructure, SCADA, network Applications Users
Brute force Human errors
Source : Critical Infrastructure protection 2014
Copyright © 2015 ardantic - All rights reserved
What are the vulnerabilities ?
• Use of standard communication protocols
• Increased use of commercialy available HW or SW components
• Absence of any authentication/authorization protocols
• Increased number of internet-facing SCADA appliances
SCADA
• Interconnectivity
• Critical infrastrutures are going mainstream
• More and more connected to corporate networks
• Use of poorly protected wireless protocols
Network
• Distributed architectures on different platforms
• Vulnerability to compromised sensorsApplication
• The most vulnerable components of allHuman factor
26
Copyright © 2015 ardantic - All rights reserved
What are the vulnerabilities ?
27
Massive
interconnectivity
Reliability
Availability
Efficiency
Resilience
Vulnerability
Obsolesence
Copyright © 2015 ardantic - All rights reserved
How can we get prepared ?
28
Robust
critical
infrastructure
Impacts
analysis
Vulnerability &
risks
assessment
Prevention
security
measures
Contingency
measures
Resilience to
disasters
Community /
social
resilience
Awareness
Crisis
management
structure
Copyright © 2015 ardantic - All rights reserved
How can we get prepared ?
At national, regional or local level
29
National
level
Regional
level
Local /
Private
level
Organization
National crisis
management
agency
Regional
coordination
entities
Local or cities
authorities
Private CI
owners/operators
Preparedness
• Defines security standards
• Provide BC/DR methods /
templates / training
• Monitors preparedness state via
regional and local reporting
• Monitors CI usage
• Participates in exercises and
awareness campaigns
• Acquire and develop expertise on
regional specifics in relation with
CI
• Report to national level
• Participates in local exercises and
awareness campaigns
• Implement security standards
• Monitors local preparedness
• Report to regional
Incident
• CI owner leads recovery and
restoration of CI service
• Assess local level or CI impact
and damages, report
• Activates restoration plans for CI
• Activates crisis mgmt and
response procedures
• Assesses impacts, damages at
national level
• Identifies options for recovery
• Provides SMEs to assist CI
owners/operators
• Activates recovery and restoration
plans at regional level
• Assesses impacts, damages at
regional level, report
• Coordinates local level recovery
actions
• Liaise with CI owners/operators
Copyright © 2015 ardantic - All rights reserved
How can we get prepared ?
At critical infrastructure level
30
Context analysis and modeling
Identify
scenarios
Define impact
scales
Identify and
model CI
components
Identify
stakeholders
Identify
possible
threats
Identify
possible
attackers
Security requirements
Determine
security
requirements
Perform gap /
maturity
analysis
Risk analysis
Assess
impacts of
attacks
Assess
risks
Assess
likelihood of
attacks
Design & implement security measures (prevention)
Design + impl
security
architecture
Design + impl
critical infras.
modifications
Design + plan
security tests
Design + plan
compliance
assessment
Design + impl
monitoring
programme
Identify
existing vul-
nerabilities
Design & implement crisis management & recovery planning
Setup crisis
mgmt org &
procedures
Setup local
continuity
solutions
Develop fast
recovery local
solutions
Setup
exercising
programme
Review for
changes
Copyright © 2015 ardantic - All rights reserved
How can we get prepared ?
Key success factors
• Government led infrastructure and organizational resilience
directives (national infrastructures department)
• Government assisted (cyber) security standards definition,
threats and vulnerabilities identification and impact
assessment (sector based)
• Government supported communities awareness campaigns
• Government representatives supervised exercises on major
CIs
• Sustainable public/private partnerships with CI owners or
operators (regulatory)
• Government and CI level surveillance structure (national
intelligence agency)
31
Copyright © 2015 ardantic - All rights reserved 32
Questions ?
Copyright © 2015 ardantic - All rights reserved 33
Thank you for your Attention
‫اهتمامكم‬ ‫على‬ ‫لكم‬ ‫شكرا‬

More Related Content

Similar to ISO 22301 BCM Consulting Firm Presents on BCM for Critical National Resources

Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUMohit Rampal
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareCyren, Inc
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCandice Tang
 
IOT and Big Data - The Perfect Marriage
IOT and Big Data - The Perfect MarriageIOT and Big Data - The Perfect Marriage
IOT and Big Data - The Perfect MarriageDr. Mazlan Abbas
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptxSolarwinds N-able
 
Internet of Things - Connecting and Aggregating the Innovative Minds
Internet of Things - Connecting and Aggregating the Innovative MindsInternet of Things - Connecting and Aggregating the Innovative Minds
Internet of Things - Connecting and Aggregating the Innovative MindsDr. Mazlan Abbas
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceGareth Niblett
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Mark Skilton
 
An Introduction to The New Crisis Communications
An Introduction to The New Crisis CommunicationsAn Introduction to The New Crisis Communications
An Introduction to The New Crisis CommunicationsCharlie Pownall
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)IoT613
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 

Similar to ISO 22301 BCM Consulting Firm Presents on BCM for Critical National Resources (20)

Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Webinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for HealthcareWebinar: CYREN WebSecurity for Healthcare
Webinar: CYREN WebSecurity for Healthcare
 
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressedCto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
Cto ciip-gaborone workshop-presentation-final-18-mar-2015.compressed
 
IOT and Big Data - The Perfect Marriage
IOT and Big Data - The Perfect MarriageIOT and Big Data - The Perfect Marriage
IOT and Big Data - The Perfect Marriage
 
How secure are your customers.pptx
How secure are your customers.pptxHow secure are your customers.pptx
How secure are your customers.pptx
 
Internet of Things - Connecting and Aggregating the Innovative Minds
Internet of Things - Connecting and Aggregating the Innovative MindsInternet of Things - Connecting and Aggregating the Innovative Minds
Internet of Things - Connecting and Aggregating the Innovative Minds
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber Defence
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
 
An Introduction to The New Crisis Communications
An Introduction to The New Crisis CommunicationsAn Introduction to The New Crisis Communications
An Introduction to The New Crisis Communications
 
Hacker House August Proposal
Hacker House August ProposalHacker House August Proposal
Hacker House August Proposal
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
 
Smart & Safer Cities by Richard Knight
Smart & Safer Cities by Richard KnightSmart & Safer Cities by Richard Knight
Smart & Safer Cities by Richard Knight
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
Brochure
BrochureBrochure
Brochure
 
Brochure
BrochureBrochure
Brochure
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 

More from Continuity and Resilience

The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaThe Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaContinuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayThe Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayContinuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh -  Paul GantThe Business Continuity Conference, 25th October 2023 in Riyadh -  Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul GantContinuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...Continuity and Resilience
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...Continuity and Resilience
 
Advancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceAdvancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceContinuity and Resilience
 
Value of Work Place Services in the Middle East
Value of Work Place Services in the Middle EastValue of Work Place Services in the Middle East
Value of Work Place Services in the Middle EastContinuity and Resilience
 
Social Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesSocial Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesContinuity and Resilience
 
Cyber Resilience Tips and Techniques For Protection & Response
Cyber ResilienceTips and Techniques For Protection & Response Cyber ResilienceTips and Techniques For Protection & Response
Cyber Resilience Tips and Techniques For Protection & Response Continuity and Resilience
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Continuity and Resilience
 
Crisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorCrisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorContinuity and Resilience
 
Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Continuity and Resilience
 

More from Continuity and Resilience (20)

The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq BajwaThe Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
The Business Continuity Conference, 25th October 2023 in Riyadh - Mr. Atiq Bajwa
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha EltinayThe Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
The Business Continuity Conference, 25th October 2023 in Riyadh - Nuha Eltinay
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh -  Paul GantThe Business Continuity Conference, 25th October 2023 in Riyadh -  Paul Gant
The Business Continuity Conference, 25th October 2023 in Riyadh - Paul Gant
 
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
The Business Continuity Conference, 25th October 2023 in Riyadh - David Boll...
 
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
The Business Continuity Conference, 25th October 2023 in Riyadh - Abdulrahma...
 
DEFLUFFING RESILIENCE
DEFLUFFING RESILIENCEDEFLUFFING RESILIENCE
DEFLUFFING RESILIENCE
 
CREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAMCREATING AND MAINTAINING A BCM PROGRAM
CREATING AND MAINTAINING A BCM PROGRAM
 
BCM Challenges and Compliance
BCM Challenges and Compliance BCM Challenges and Compliance
BCM Challenges and Compliance
 
Thriving in the Crisis Situation
Thriving in the Crisis SituationThriving in the Crisis Situation
Thriving in the Crisis Situation
 
Cyber Security & IT Resilience
Cyber Security & IT Resilience Cyber Security & IT Resilience
Cyber Security & IT Resilience
 
Enterprise Resilience
Enterprise ResilienceEnterprise Resilience
Enterprise Resilience
 
Advancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise ResilienceAdvancing the Enterprise Towards Enterprise Resilience
Advancing the Enterprise Towards Enterprise Resilience
 
Bcm is all about people!
Bcm   is all about people!Bcm   is all about people!
Bcm is all about people!
 
SAMA BCM Framework
SAMA BCM Framework SAMA BCM Framework
SAMA BCM Framework
 
Value of Work Place Services in the Middle East
Value of Work Place Services in the Middle EastValue of Work Place Services in the Middle East
Value of Work Place Services in the Middle East
 
Social Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case StudiesSocial Media Influence in the field of Crisis Management– Case Studies
Social Media Influence in the field of Crisis Management– Case Studies
 
Cyber Resilience Tips and Techniques For Protection & Response
Cyber ResilienceTips and Techniques For Protection & Response Cyber ResilienceTips and Techniques For Protection & Response
Cyber Resilience Tips and Techniques For Protection & Response
 
Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!Business Continuity and Information Security- An Excellent Fit!
Business Continuity and Information Security- An Excellent Fit!
 
Crisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation SectorCrisis Communication & BCM in Aviation Sector
Crisis Communication & BCM in Aviation Sector
 
Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.Effectiveness of Disaster Management Ground Reality and Potential.
Effectiveness of Disaster Management Ground Reality and Potential.
 

Recently uploaded

Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...aakahthapa70
 
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...aakahthapa70
 
KAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CKAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CNiteshKumar82226
 
SURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL GSURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL GNiteshKumar82226
 
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaDelhi Escorts Service
 
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝thapagita
 
Call Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near MeCall Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near MeIfra Zohaib
 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...aakahthapa70
 
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.riyadelhic riyadelhic
 
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Sheetaleventcompany
 
JABALPUR CALL GIRL 92628/71154 JABALPUR K
JABALPUR CALL GIRL 92628/71154 JABALPUR KJABALPUR CALL GIRL 92628/71154 JABALPUR K
JABALPUR CALL GIRL 92628/71154 JABALPUR KNiteshKumar82226
 
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝thapagita
 
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...aakahthapa70
 
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579diyaspanoida
 
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.riyadelhic riyadelhic
 
RAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CALRAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CALNiteshKumar82226
 
Call Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts ServiceCall Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts ServiceLipikasharma29
 
NASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNiteshKumar82226
 

Recently uploaded (20)

Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
 
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
 
KAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CKAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA C
 
SURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL GSURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL G
 
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
 
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
 
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
 
Call Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near MeCall Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near Me
 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
 
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
 
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
 
JABALPUR CALL GIRL 92628/71154 JABALPUR K
JABALPUR CALL GIRL 92628/71154 JABALPUR KJABALPUR CALL GIRL 92628/71154 JABALPUR K
JABALPUR CALL GIRL 92628/71154 JABALPUR K
 
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
 
Goa Call Girls 🥰 +91 9540619990 📍Service Girls In Goa
Goa Call Girls 🥰 +91 9540619990 📍Service Girls In GoaGoa Call Girls 🥰 +91 9540619990 📍Service Girls In Goa
Goa Call Girls 🥰 +91 9540619990 📍Service Girls In Goa
 
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
 
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
 
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
Call Now ☎9870417354|| Call Girls in Dwarka Escort Service Delhi N.C.R.
 
RAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CALRAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
RAJKOT CALL GIRLS 92628/71154 RAJKOT CAL
 
Call Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts ServiceCall Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts Service
 
NASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALL
 

ISO 22301 BCM Consulting Firm Presents on BCM for Critical National Resources

  • 1. Copyright © 2015 ardantic - All rights reserved Continuity and Resilience (CORE) ISO 22301 BCM Consulting Firm Presentations by our partners and extended team of industry experts Our Contact Details: INDIA UAE Continuity and Resilience Level 15,Eros Corporate Tower Nehru Place ,New Delhi-110019 Tel: +91 11 41055534/ +91 11 41613033 Fax: ++91 11 41055535 Email: neha@continuityandresilience.com Continuity and Resilience P. O. Box 127557 Abu Dhabi, United Arab Emirates Mobile:+971 50 8460530 Tel: +971 2 8152831 Fax: +971 2 8152888 Email: info@continuityandresilience.com
  • 2. Copyright © 2015 ardantic - All rights reserved BCM for national critical resources BCM Summit Middle East 2015 Henri Haenni – MBCI / ISO 22301 LI / ISO 27001 LI / ISO 20000 LA / BCS Green IT 2
  • 3. Copyright © 2015 ardantic - All rights reserved Agenda • Introduction • What are national critical infrastructures ? • Which are the threats ? • Who are the potential attackers ? • Which are their targets ? • Are our national critical infrastructures vulnerable ? • How can we get prepared ? 3
  • 4. Copyright © 2015 ardantic - All rights reserved Introduction 4 Stuxnet (2009) DuQu (2010) Flame(r) (2012) SkyWiper
  • 5. Copyright © 2015 ardantic - All rights reserved Introduction 5 Extremely advanced Zero-day vulnera- bilities Unprece- dented capabilities TargetedWide spread Stealth Anonymous « … unparallaled number of functionalities… » Sources : Kaspersky, Lexsi, Symantec Detected in Saudi Arabia Egypt Iran Israel Lebanon Sudan Syria Russia Austria Hong Kong UAE Several thousands of « victims » Individuals Enterprises Public admin …
  • 6. Copyright © 2015 ardantic - All rights reserved Introduction 6Source : Kaspersky Geography of the targets Complexity « No doubts that it was sponsored by a state » « … a group of specialists, financed and managed… » « New phase in cyberwar » Evgueni Kaspersky
  • 7. Copyright © 2015 ardantic - All rights reserved Introduction 7Source : Kaspersky « … Cyber weapons directed to any countries… » « The most developed countries are the most vulnerable »
  • 8. Copyright © 2015 ardantic - All rights reserved Introduction 8Source : Cylance OpCleaver, Kaspersky Retaliation « Global critical infrastructure organizations need to take this threat seriously » M. Weatherford Former Deputy Under Secretary for Cyber Security at the US Dept of Homeland Security « Shamoon » malware, similar to « Flame » >30’000 affected endpoints Countless hours of recovery Huge downtime financial consequences 2014 : Ababil Saffron Rose Cleaver …
  • 9. Copyright © 2015 ardantic - All rights reserved Introduction 9Source : Cylance OpCleaver
  • 10. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 10 “These war games are about the real effects of a cyberwar ... about causing chaos in our streets at home due to sudden crashes in our critical infrastructure through manipulation of our banking, transportation, utilities, communications, and other critical infrastructure industries. These are all real scenarios.” Tom Patterson CSO at MagTek & US Air For Senior Advisor, 2010
  • 11. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 11 Anything that contributes to the safety, wellness, wealth, integrity, health and stability of a collectivity of people and the infrastructures and organizations that supports it. « Critical infrastructure is the backbone of our nation's economy, security and health. We know it as the power we use in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. » « Critical infrastructure are the assets, systems, and networks, whether physical or virtual, so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. »
  • 12. Copyright © 2015 ardantic - All rights reserved 12 « an asset, system or part thereof located in member states which is essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact in a member state as a result of the failure to maintain those functions » What are national critical infrastructures ?
  • 13. Copyright © 2015 ardantic - All rights reserved 13 What are national critical infrastructures ? « We safeguard critical infrastructure to assure social and economic stability within Abu Dhabi and beyond using integrated security strategies and the sharing of best practices through public- private partnerships. »
  • 14. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 14 They are like the « chakras » or vital points of the nations
  • 15. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 15 Energies Agriculture Emergencies Energies transport & processing Chemicals Healthcare Manufacturing Water supply Transports Gov’t services Financials Telecoms IT Defence
  • 16. Copyright © 2015 ardantic - All rights reserved 16 What are national critical infrastructures ? Domino effect
  • 17. Copyright © 2015 ardantic - All rights reserved 17 What are national critical infrastructures ? Critical infratructures ICT & network Financials Gov’t facilities & services Healthcare Manufac- tures Agriculture & food network Emergen- cies Transport network Natural resources Chemicals Water/Dams Oil/Rigs Ore/Mines Machines Metal Electr. Pharma Fertilizers Basics Fire Medics Law enforc. Railw Airports Roads Ports Defence Energies & grid Nuclear Refineries Pipelines Smart gridCivil prot.
  • 18. Copyright © 2015 ardantic - All rights reserved 18 What are national critical infrastructures ? Critical infratructures ICT & network Financials Gov’t facilities & services Healthcare Manufac- tures Agriculture & food network Emergen- cies Transport network Natural resources Chemicals Water/Dams Oil/Rigs Ore/Mines Machines Metal Electr. Pharma Fertilizers Basics Fire Medics Law enforc. Railw Airports Roads Ports Defence Energies & grid Nuclear Refineries Pipelines Smart gridCivil prot.
  • 19. Copyright © 2015 ardantic - All rights reserved Critical infrastructure Air Traffic Control Financial systems Power grid Involves Passengers, airports, air navigation authorities, regulators, aeronautics industry Individuals, enterprises, banks, insurances, funds, regulators, market infrastructure Consumers, power plants, substations, distribution grid, regulating authorities Security requirements Security, extreme performance, reliability, massive interoperability Availability, confidentiality, integrity, authentication, access control, non repudiation Reliability, interoperability, performance, resilience Vulnerabilities Unencrypted data links, capabilities to temper radar rendering, remote control of aircraft Use of mobile apps, human factor, susceptibility to phishing, unpreparedness SCADA obsolescence, hyper interconnectivity, market deregulation, smart metering 19 What are national critical infrastructures ? Sources : H. Teso. Aircraft hacking (2013), Critical Infrastructure protection
  • 20. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 20 Mass injuries or casualties Large scale environmental damages Important loss of services Loss of confidence, civil unrest
  • 21. Copyright © 2015 ardantic - All rights reserved What are national critical infrastructures ? 21 Interdepen- dencies Physical Information systems Geographical Logical Source : Critical Infrastructure protection 2014
  • 22. Copyright © 2015 ardantic - All rights reserved Which are the threats ? 22 Can take « real, large scale » actions !!!
  • 23. Copyright © 2015 ardantic - All rights reserved Who are the potential attackers? 23 Who Smart hacker Competitor Hacktivist Organized crime Terrorist groups Countries, nations Resources Almost none Money, time, limited skills Limited but organized and skilled Very large : money, time, skills Infinite Motivations Ego, self esteem To sabotage competitors image Campaign based. ideological Money, power, blackmail Ideological, political, nothing to lose Geostrategy, economical, political, espionage Capabilities Very limited Limited Extensive Very important Unlimited Damages Most of the time, none Focused, material only Serious, purpose- bound Regional High profile incidents, spectacular Nation level, massive Source : Critical Infrastructure protection 2014
  • 24. Copyright © 2015 ardantic - All rights reserved Which are their targets ? • Combination of cyber & physical attacks to destroy or invalidate critical supplies • Disruption of international communications backbones preventing any financial transactions • Cyber attacks on the control systems of a major power/smart grid leading to large areas blackout  DDoS, routing attacks, malwares, protocol attacks, insider  Control can be taken and left dormant for further coordinated attacks • Coordinated cyber attacks on the rail grid, air control and traffic control systems to generate massive congestions 24
  • 25. Copyright © 2015 ardantic - All rights reserved What are the vulnerabilities ? 25 Vulnerability chain Infrastructure, SCADA, network Applications Users Brute force Human errors Source : Critical Infrastructure protection 2014
  • 26. Copyright © 2015 ardantic - All rights reserved What are the vulnerabilities ? • Use of standard communication protocols • Increased use of commercialy available HW or SW components • Absence of any authentication/authorization protocols • Increased number of internet-facing SCADA appliances SCADA • Interconnectivity • Critical infrastrutures are going mainstream • More and more connected to corporate networks • Use of poorly protected wireless protocols Network • Distributed architectures on different platforms • Vulnerability to compromised sensorsApplication • The most vulnerable components of allHuman factor 26
  • 27. Copyright © 2015 ardantic - All rights reserved What are the vulnerabilities ? 27 Massive interconnectivity Reliability Availability Efficiency Resilience Vulnerability Obsolesence
  • 28. Copyright © 2015 ardantic - All rights reserved How can we get prepared ? 28 Robust critical infrastructure Impacts analysis Vulnerability & risks assessment Prevention security measures Contingency measures Resilience to disasters Community / social resilience Awareness Crisis management structure
  • 29. Copyright © 2015 ardantic - All rights reserved How can we get prepared ? At national, regional or local level 29 National level Regional level Local / Private level Organization National crisis management agency Regional coordination entities Local or cities authorities Private CI owners/operators Preparedness • Defines security standards • Provide BC/DR methods / templates / training • Monitors preparedness state via regional and local reporting • Monitors CI usage • Participates in exercises and awareness campaigns • Acquire and develop expertise on regional specifics in relation with CI • Report to national level • Participates in local exercises and awareness campaigns • Implement security standards • Monitors local preparedness • Report to regional Incident • CI owner leads recovery and restoration of CI service • Assess local level or CI impact and damages, report • Activates restoration plans for CI • Activates crisis mgmt and response procedures • Assesses impacts, damages at national level • Identifies options for recovery • Provides SMEs to assist CI owners/operators • Activates recovery and restoration plans at regional level • Assesses impacts, damages at regional level, report • Coordinates local level recovery actions • Liaise with CI owners/operators
  • 30. Copyright © 2015 ardantic - All rights reserved How can we get prepared ? At critical infrastructure level 30 Context analysis and modeling Identify scenarios Define impact scales Identify and model CI components Identify stakeholders Identify possible threats Identify possible attackers Security requirements Determine security requirements Perform gap / maturity analysis Risk analysis Assess impacts of attacks Assess risks Assess likelihood of attacks Design & implement security measures (prevention) Design + impl security architecture Design + impl critical infras. modifications Design + plan security tests Design + plan compliance assessment Design + impl monitoring programme Identify existing vul- nerabilities Design & implement crisis management & recovery planning Setup crisis mgmt org & procedures Setup local continuity solutions Develop fast recovery local solutions Setup exercising programme Review for changes
  • 31. Copyright © 2015 ardantic - All rights reserved How can we get prepared ? Key success factors • Government led infrastructure and organizational resilience directives (national infrastructures department) • Government assisted (cyber) security standards definition, threats and vulnerabilities identification and impact assessment (sector based) • Government supported communities awareness campaigns • Government representatives supervised exercises on major CIs • Sustainable public/private partnerships with CI owners or operators (regulatory) • Government and CI level surveillance structure (national intelligence agency) 31
  • 32. Copyright © 2015 ardantic - All rights reserved 32 Questions ?
  • 33. Copyright © 2015 ardantic - All rights reserved 33 Thank you for your Attention ‫اهتمامكم‬ ‫على‬ ‫لكم‬ ‫شكرا‬