SlideShare a Scribd company logo
CRITICAL
INFRASTRUCTURE
AND CYBER THREAT
SAFER CITIES. THRIVING COMMUNITIES.
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
Critical Infrastructure sectors
have become prime targets
for cyber criminals due to
their vitality to a nation’s
security and stability.
16 CRITICAL
INFRASTRUCTURE SECTORS
Department of Homeland Security classified the top 16 sectors at risk to cyber attacks
Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
16 CRITICAL
INFRASTRUCTURE SECTORS
Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors
1. CHEMICAL
2. COMMERCIAL FACILITIES
3. COMMUNICATIONS SECTOR
4. CRITICAL MANUFACTURING
5. DAMS
6. DEFENSE INDUSTRIAL BASE
7. EMERGENCY SERVICES
8. ENERGY
9. FINANCIAL SERVICES
10. FOOD AND AGRICULTURE
11. GOVERNMENT FACILITIES
12. HEALTHCARE AND PUBLIC HEALTH
13. INFORMATION TECHNOLOGY
14. NUCLEAR REACTORS, MATERIALS, AND WASTE
15. TRANSPORTATION SYSTEMS
16. WATER AND WASTEWATER
DEPARTMENT OF HOMELAND SECURITY CLASSIFIED THE TOP 16 SECTORS AT
RISK TO CYBER ATTACKS
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
INTERCONNECTED
SYSTEMS
• The continued increase of
interconnected systems and
devices provide cyber criminals
limitless attack vectors. 25 billion
networked devices are projected
by 2020.
Source: ITU’s Trends in Telecommunication Reform 2015,
http://www.itu.int/en/publications/Documents/Trends2015-short-version_pass-e374681.pdf
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
MALWARE OUTBREAK
• 1 million new malware instances released every day
• Ransomware attacks soared 113% in prior year
• Increasing number of zero day attacks
Sources: Verizon's 2015 Data Breach Investigations Report, http://www.verizonenterprise.com/DBIR/2015/
2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp
UNAUTHORIZED CONNECTIONS
CRITICAL INFRASTRUCTURE SECTORS TOP THE LIST
Sources: 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp
PWC 2014 US State of Cybercrime, http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf
*Risk Ratio of Spear-Phishing Attacks by Industry
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
INDUSTRY RISK RATIO* INDUSTRY RISK RATIO”
Mining
Wholesale
Manufacturing
Transportation,
Communications,
Electric, Gas &
Sanitary Services
Public Administration
(Government)
Finance, Insurance
& Real Estate
44%
34%
33%
29%
21%
21%
1 in 3.41 in 2.3
1 in 2.9
1 in 3.0
1 in 3.4
1 in 4.8
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
SOURCE:, InformationWeek's 2013 enterprise security survey,
http:/reports.informationweek.com/abstract/21/10696/Security/Research:-2013-Strategic-
Security-Survey.html
BRING YOUR
OWN DEVICE
(BYOD)
• 45% of organizations have had
a mobile device containing
enterprise data reported missing
• 11% have experienced a data
breach requiring public disclosure
SOURCE: Network World, http://www.networkworld.com/article/2844283/microsoft-
subnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html
IHS Technology, https://technology.ihs.com/532501/245-million-video-surveillance-cameras-
installed-globally-in-2014
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
FIXED CAMERA
• More than 210 million CCTV
cameras worldwide
• 73,011 locations with unsecured
cameras in 256 countries
INSIDER THREAT
• 55% of threats come from insider abuse or misuse
• 32% of organizations report insider crimes are more
costly or damaging than incidents caused by outsiders
SOURCE: PWC The Global State of Information Security® Survey 2015, http://www.dol.gov/ebsa/pdf/erisaadvisorycouncil2015security3.pdf
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
Motorola Solutions has in depth experience, expertise and
robust capability to assist with today's cyber risk challenges.
We take a comprehensive approach to help customers
• Evaluate Environment
• Assess Threats
• Manage Risk
Unique to each customer's operational setting.
Visit us at motorolasolutions.com/cybersecurity
CRITICAL INFRASTRUCTURE
AND CYBER THREAT
THANK YOU!

More Related Content

What's hot

Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
Leandro Bennaton
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
SandeshUprety4
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOC
Boni Yeamin
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
Kumar Gaurav
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
Ramin Farajpour Cami
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
North Texas Chapter of the ISSA
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
Neha Agarwal
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
Priyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
Vijilan IT Security solutions
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Marlabs
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 

What's hot (20)

Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOC
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 

Viewers also liked

Good Rules for Bad Apps - Shem magnezi
Good Rules for Bad Apps - Shem magnezi Good Rules for Bad Apps - Shem magnezi
Good Rules for Bad Apps - Shem magnezi
DroidConTLV
 
Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Advantec Distribution
 
Motorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer CitiesMotorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetJuniper Networks
 
The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...
The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...
The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...
HR Network marcus evans
 
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
Unisys Corporation
 
Innovation In The Workplace Andrew James
Innovation In The Workplace   Andrew JamesInnovation In The Workplace   Andrew James
Innovation In The Workplace Andrew James
Konica Minolta
 
Perceptive Software Scope
Perceptive Software ScopePerceptive Software Scope
Perceptive Software Scope
Perceptive Software Pty Ltd
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private CloudVertical Solutions
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Technology
 
Top 10 Business Continuity Disasters
Top 10 Business Continuity DisastersTop 10 Business Continuity Disasters
Top 10 Business Continuity Disasters
Rentsys Recovery Services
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITSymplified
 
TXT Next Presentation
TXT Next Presentation TXT Next Presentation
TXT Next Presentation
TXT e-solutions
 
Getting started with performance testing
Getting started with performance testingGetting started with performance testing
Getting started with performance testing
Testplant
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenter
Tegile Systems
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
NSFOCUS
 

Viewers also liked (17)

Good Rules for Bad Apps - Shem magnezi
Good Rules for Bad Apps - Shem magnezi Good Rules for Bad Apps - Shem magnezi
Good Rules for Bad Apps - Shem magnezi
 
Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2Motorola enterprise wlan design guide version 1.2
Motorola enterprise wlan design guide version 1.2
 
Motorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer CitiesMotorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer Cities
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
 
The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...
The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...
The Business Impact of Learning and Development to the Bottom-Line-Heidi Hatt...
 
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
Innovation In The Workplace Andrew James
Innovation In The Workplace   Andrew JamesInnovation In The Workplace   Andrew James
Innovation In The Workplace Andrew James
 
Perceptive Software Scope
Perceptive Software ScopePerceptive Software Scope
Perceptive Software Scope
 
Running SagePFW in a Private Cloud
Running SagePFW in a Private CloudRunning SagePFW in a Private Cloud
Running SagePFW in a Private Cloud
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visuales
 
Top 10 Business Continuity Disasters
Top 10 Business Continuity DisastersTop 10 Business Continuity Disasters
Top 10 Business Continuity Disasters
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
 
TXT Next Presentation
TXT Next Presentation TXT Next Presentation
TXT Next Presentation
 
Getting started with performance testing
Getting started with performance testingGetting started with performance testing
Getting started with performance testing
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenter
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
 

Similar to Critical Infrastructure and Cyber Threat

2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
Sylvain Martinez
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Ekonomikas ministrija
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
ssuserc1c354
 
Security and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsSecurity and Privacy in Pegulated Environments
Security and Privacy in Pegulated Environments
Francis Amaning
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
IJRTEMJOURNAL
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
journal ijrtem
 
P04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdfP04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdf
ShyampratapSingh13
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
SG Analytics
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
itnewsafrica
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industryNumaan Huq
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
Krishna N
 
original.pdf
original.pdforiginal.pdf
original.pdf
BeHappy284922
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
William McBorrough
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
CR Group
 
introduction to cyber patriot and cyber security
introduction to cyber patriot and cyber securityintroduction to cyber patriot and cyber security
introduction to cyber patriot and cyber security
Erdo Deshiant Garnaby
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
Fas (Feisal) Mosleh
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings
 

Similar to Critical Infrastructure and Cyber Threat (20)

2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
Security and Privacy in Pegulated Environments
Security and Privacy in Pegulated EnvironmentsSecurity and Privacy in Pegulated Environments
Security and Privacy in Pegulated Environments
 
Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
P04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdfP04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdf
 
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
Proliferation of Smartphones and Rising Incidents of Cyberattacks are resulti...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
introduction to cyber patriot and cyber security
introduction to cyber patriot and cyber securityintroduction to cyber patriot and cyber security
introduction to cyber patriot and cyber security
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 

More from Motorola Solutions

RESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITYRESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITY
Motorola Solutions
 
Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillMotorola Solutions
 
Motorola APX Accessory Audio Demo
Motorola APX Accessory Audio DemoMotorola APX Accessory Audio Demo
Motorola APX Accessory Audio Demo
Motorola Solutions
 
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaCase Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaMotorola Solutions
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
Motorola Solutions
 

More from Motorola Solutions (6)

RESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITYRESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITY
 
Manage the Complexity
Manage the ComplexityManage the Complexity
Manage the Complexity
 
Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands Still
 
Motorola APX Accessory Audio Demo
Motorola APX Accessory Audio DemoMotorola APX Accessory Audio Demo
Motorola APX Accessory Audio Demo
 
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaCase Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova Scotia
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Critical Infrastructure and Cyber Threat

  • 1. CRITICAL INFRASTRUCTURE AND CYBER THREAT SAFER CITIES. THRIVING COMMUNITIES.
  • 2. CRITICAL INFRASTRUCTURE AND CYBER THREAT Critical Infrastructure sectors have become prime targets for cyber criminals due to their vitality to a nation’s security and stability.
  • 3. 16 CRITICAL INFRASTRUCTURE SECTORS Department of Homeland Security classified the top 16 sectors at risk to cyber attacks Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors CRITICAL INFRASTRUCTURE AND CYBER THREAT 16 CRITICAL INFRASTRUCTURE SECTORS Source: Department of Homeland Security, http://www.dhs.gov/critical-infrastructure-sectors 1. CHEMICAL 2. COMMERCIAL FACILITIES 3. COMMUNICATIONS SECTOR 4. CRITICAL MANUFACTURING 5. DAMS 6. DEFENSE INDUSTRIAL BASE 7. EMERGENCY SERVICES 8. ENERGY 9. FINANCIAL SERVICES 10. FOOD AND AGRICULTURE 11. GOVERNMENT FACILITIES 12. HEALTHCARE AND PUBLIC HEALTH 13. INFORMATION TECHNOLOGY 14. NUCLEAR REACTORS, MATERIALS, AND WASTE 15. TRANSPORTATION SYSTEMS 16. WATER AND WASTEWATER DEPARTMENT OF HOMELAND SECURITY CLASSIFIED THE TOP 16 SECTORS AT RISK TO CYBER ATTACKS
  • 4. CRITICAL INFRASTRUCTURE AND CYBER THREAT INTERCONNECTED SYSTEMS • The continued increase of interconnected systems and devices provide cyber criminals limitless attack vectors. 25 billion networked devices are projected by 2020. Source: ITU’s Trends in Telecommunication Reform 2015, http://www.itu.int/en/publications/Documents/Trends2015-short-version_pass-e374681.pdf
  • 5. CRITICAL INFRASTRUCTURE AND CYBER THREAT MALWARE OUTBREAK • 1 million new malware instances released every day • Ransomware attacks soared 113% in prior year • Increasing number of zero day attacks Sources: Verizon's 2015 Data Breach Investigations Report, http://www.verizonenterprise.com/DBIR/2015/ 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp
  • 6. UNAUTHORIZED CONNECTIONS CRITICAL INFRASTRUCTURE SECTORS TOP THE LIST Sources: 2015 Internet Security Threat Report, http://www.symantec.com/security_response/publications/threatreport.jsp PWC 2014 US State of Cybercrime, http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf *Risk Ratio of Spear-Phishing Attacks by Industry CRITICAL INFRASTRUCTURE AND CYBER THREAT INDUSTRY RISK RATIO* INDUSTRY RISK RATIO” Mining Wholesale Manufacturing Transportation, Communications, Electric, Gas & Sanitary Services Public Administration (Government) Finance, Insurance & Real Estate 44% 34% 33% 29% 21% 21% 1 in 3.41 in 2.3 1 in 2.9 1 in 3.0 1 in 3.4 1 in 4.8
  • 7. CRITICAL INFRASTRUCTURE AND CYBER THREAT SOURCE:, InformationWeek's 2013 enterprise security survey, http:/reports.informationweek.com/abstract/21/10696/Security/Research:-2013-Strategic- Security-Survey.html BRING YOUR OWN DEVICE (BYOD) • 45% of organizations have had a mobile device containing enterprise data reported missing • 11% have experienced a data breach requiring public disclosure
  • 8. SOURCE: Network World, http://www.networkworld.com/article/2844283/microsoft- subnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-passwords.html IHS Technology, https://technology.ihs.com/532501/245-million-video-surveillance-cameras- installed-globally-in-2014 CRITICAL INFRASTRUCTURE AND CYBER THREAT FIXED CAMERA • More than 210 million CCTV cameras worldwide • 73,011 locations with unsecured cameras in 256 countries
  • 9. INSIDER THREAT • 55% of threats come from insider abuse or misuse • 32% of organizations report insider crimes are more costly or damaging than incidents caused by outsiders SOURCE: PWC The Global State of Information Security® Survey 2015, http://www.dol.gov/ebsa/pdf/erisaadvisorycouncil2015security3.pdf CRITICAL INFRASTRUCTURE AND CYBER THREAT
  • 10. Motorola Solutions has in depth experience, expertise and robust capability to assist with today's cyber risk challenges. We take a comprehensive approach to help customers • Evaluate Environment • Assess Threats • Manage Risk Unique to each customer's operational setting. Visit us at motorolasolutions.com/cybersecurity CRITICAL INFRASTRUCTURE AND CYBER THREAT