SlideShare a Scribd company logo
Cyber resilience – What’s in a number?
The real threat to industrial control systems today
Confidential Property of Schneider Electric
Jay Abdallah | CISSP, CISM, CISA
Director – EMEA Cyber Security Services
Page 2Confidential Property of Schneider Electric |
1 The current threat landscape
2 Statistics
3
Schneider Electric’s commitment
to security
4
Train-ride surprise – the importance of
security awareness
Agenda
The current threat landscape
Page 3Confidential Property of Schneider Electric |
Page 4Confidential Property of Schneider Electric |
The danger of malware
390,000 new infections per day
AV-Test.org Jan 2016
0
20 000 000
40 000 000
60 000 000
80 000 000
100 000 000
120 000 000
140 000 000
160 000 000
2012 2013 2014 2015 2016*
Page 5Confidential Property of Schneider Electric |
Recent industrial cyber incidents
German steel millUkraine power gridUSA water dam
Statistics
Page 6Confidential Property of Schneider Electric |
Page 7Confidential Property of Schneider Electric |
Attacks targeted towards
German industrial systems
• 1 in every 7 registered security attacks in Q4, 2015, came from Germany
• Germany ranked #2 globally in critical infrastructure targets
• Critical infrastructure infections from Germany have doubled every year since 2012
• 78% of malicious software installation attempts from Germany in 2015 were successful
Page 8Confidential Property of Schneider Electric |
German cyber attack sequence
Source: TFOT 2015
56,3%
Cyber crime
20%
Hacktivism
16,1%
Cyber espionage
7,6%
Cyber war
Page 9Confidential Property of Schneider Electric |
• With so many statistics, which ones matter
the most? Are one set more important
than another?
• How reliable is our source TFOT?
Data reliability
• The previous slides about Germany
contained false statistics from a fake source
• Did you notice?
Page 10Confidential Property of Schneider Electric |
How do we identify and manage our
biggest vulnerabilities?
Where is the weak link?
Schneider Electric’s commitment to security
Page 11Confidential Property of Schneider Electric |
More than just IT security
Critical infrastructure systems require high reliability and uptime:
• Need 99.999% or greater uptime
• Critical performance
• Fast reaction time
Page 12Confidential Property of Schneider Electric |
Confidentiality
Integrity
Availability
Availability
Integrity
Confidentiality
IT security OT security
OTPRIORITIES
CONTROL SYSTEMS
SECURITY / OT
IT SECURITY
PHYSICAL
SECURITY
Page 13Confidential Property of Schneider Electric |
Cyber security at Schneider Electric
Defense in depth
POLICIES, PROCEDURES & AWARENESS
PERIMETER
INTERNAL NETWORK
HOST
APPLICATION
DATA
PHYSICAL SECURITY
Page 14Confidential Property of Schneider Electric |
Cyber security at Schneider Electric
Specialized industrial security services – our offers
• Cyber security training
• Cyber security control design & implementation
• Cyber security consulting
• Cyber security maintenance services
Train ride surprise – the importance of security awareness
London, United Kingdom
Page 15Confidential Property of Schneider Electric |
Page 17Confidential Property of Schneider Electric |
Train ride surprise
• On a phone call, with no line disturbance
• Perfectly clear, normal conversation:
• “Enjoy the train ride along the
English countryside”
• “Are you coming home tonight?”
• “Be sure to order a nice hot cup of tea”
• “I’m sure it’s much colder there than it is here”
• Begins acting strangely after five minutes
– seems incoherent.
• When I ask the her what she is doing, she
doesn’t answer and instead says one of the
above statements randomly
• Answers yes or no questions flawlessly
• Responds to other questions with one of the
above random statements
Page 20Confidential Property of Schneider Electric |
What happened?
• Technical malfunction causing me to hear
recorded sayings?
• What about coherent responses?
• Why is my conversation being recorded?
• Scrambler device?
• Not sophisticated enough for real-time responses
• 212 area code is in Manhattan, New York.
When called, I get a strange error.
• Recorded sentences used as fillers or common
talk to encourage me to lead the discussion
(and possibly say something incriminating)
• Stealth listening
• Similar to behavior of advanced malware,
spyware, and Trojans
Page 21Confidential Property of Schneider Electric |
Who is behind this?
• MI6 (UK)
• Unknown body
It is likely, however, we do not and will
not ever know who is really behind most
cyber attacks.
• CIA and NSA (USA)
• FSB (Russia)
Page 22Confidential Property of Schneider Electric |
Moral of the story
• Appreciation of privacy and confidentiality
• Importance of security awareness
• Always be alert, Big Brother is always
listening
• It is unsettling the first time it happens to
you …
• … but it is likely not to be the first time, it’s
just the first time you have noticed
Page 23Confidential Property of Schneider Electric |
Cyber Security resilience - what's in a number? The real threat to industrial controls systems today

More Related Content

What's hot

Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?
Schneider Electric
 
IT Consulting and Integration Services brochure
IT Consulting and Integration Services brochureIT Consulting and Integration Services brochure
IT Consulting and Integration Services brochure
Schneider Electric
 
Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration
davranetworks
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?
Schneider Electric
 
Maximize your business and machine performance
Maximize your business and machine performanceMaximize your business and machine performance
Maximize your business and machine performance
Schneider Electric
 
Cisco Energy Management-tech-intro-for-paris-hackathon
Cisco Energy Management-tech-intro-for-paris-hackathonCisco Energy Management-tech-intro-for-paris-hackathon
Cisco Energy Management-tech-intro-for-paris-hackathon
Cisco DevNet
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service Providers
Schneider Electric
 
Industrial sawmill solution Wood Mizer
Industrial sawmill solution Wood MizerIndustrial sawmill solution Wood Mizer
Industrial sawmill solution Wood Mizer
Schneider Electric
 
DTN ProphetX® - At a Glance
DTN ProphetX® - At a GlanceDTN ProphetX® - At a Glance
DTN ProphetX® - At a Glance
Schneider Electric
 
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...Mining Intelligence Tools: How to Consolidate Information and Drive Business ...
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...
Schneider Electric
 
Basic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control SystemBasic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control System
Schneider Electric
 
Aged Data Center Infrastructure.pptx
Aged Data Center Infrastructure.pptxAged Data Center Infrastructure.pptx
Aged Data Center Infrastructure.pptx
Schneider Electric
 
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Schneider Electric
 
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...
Schneider Electric
 
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Schneider Electric
 
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Schneider Electric
 
Safety for life: Bringing new Life to Process Safety
Safety for life:  Bringing new Life to Process SafetySafety for life:  Bringing new Life to Process Safety
Safety for life: Bringing new Life to Process Safety
Schneider Electric
 
[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network
[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network
[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network
Schneider Electric
 
The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas
Ghazi Wadi, PMP
 

What's hot (20)

Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?
 
IT Consulting and Integration Services brochure
IT Consulting and Integration Services brochureIT Consulting and Integration Services brochure
IT Consulting and Integration Services brochure
 
Smart Energy Systems of Future
Smart Energy Systems of FutureSmart Energy Systems of Future
Smart Energy Systems of Future
 
Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?
 
Maximize your business and machine performance
Maximize your business and machine performanceMaximize your business and machine performance
Maximize your business and machine performance
 
Cisco Energy Management-tech-intro-for-paris-hackathon
Cisco Energy Management-tech-intro-for-paris-hackathonCisco Energy Management-tech-intro-for-paris-hackathon
Cisco Energy Management-tech-intro-for-paris-hackathon
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service Providers
 
Industrial sawmill solution Wood Mizer
Industrial sawmill solution Wood MizerIndustrial sawmill solution Wood Mizer
Industrial sawmill solution Wood Mizer
 
DTN ProphetX® - At a Glance
DTN ProphetX® - At a GlanceDTN ProphetX® - At a Glance
DTN ProphetX® - At a Glance
 
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...Mining Intelligence Tools: How to Consolidate Information and Drive Business ...
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...
 
Basic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control SystemBasic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control System
 
Aged Data Center Infrastructure.pptx
Aged Data Center Infrastructure.pptxAged Data Center Infrastructure.pptx
Aged Data Center Infrastructure.pptx
 
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
 
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...
 
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
 
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
 
Safety for life: Bringing new Life to Process Safety
Safety for life:  Bringing new Life to Process SafetySafety for life:  Bringing new Life to Process Safety
Safety for life: Bringing new Life to Process Safety
 
[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network
[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network
[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network
 
The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas
 

Viewers also liked

How IIoT and Intelligent Pumping can contribute to solving the Global Water C...
How IIoT and Intelligent Pumping can contribute to solving the Global Water C...How IIoT and Intelligent Pumping can contribute to solving the Global Water C...
How IIoT and Intelligent Pumping can contribute to solving the Global Water C...
Schneider Electric
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
Joan Figueras Tugas
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
Schneider Electric Services_Modernization and Upgrade Solutions.pptx
Schneider Electric Services_Modernization and Upgrade Solutions.pptxSchneider Electric Services_Modernization and Upgrade Solutions.pptx
Schneider Electric Services_Modernization and Upgrade Solutions.pptx
Schneider Electric
 
How Row-based Data Center Cooling Works
How Row-based Data Center Cooling WorksHow Row-based Data Center Cooling Works
How Row-based Data Center Cooling Works
Schneider Electric
 
Accelerate Mining Operations Excellence
Accelerate Mining Operations ExcellenceAccelerate Mining Operations Excellence
Accelerate Mining Operations Excellence
Schneider Electric
 
Arc Flash Considerations for Data Center IT Space
Arc Flash Considerations for Data Center IT SpaceArc Flash Considerations for Data Center IT Space
Arc Flash Considerations for Data Center IT Space
Schneider Electric
 
Water solution delivers an affordable upgrade and future-proof control
Water solution delivers an affordable upgrade and future-proof controlWater solution delivers an affordable upgrade and future-proof control
Water solution delivers an affordable upgrade and future-proof control
Schneider Electric
 
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...
Schneider Electric
 
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...
guest3e1229f
 
CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014
Barry Shteiman
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
Pöyry
 
How Data Center Infrastructure Management Software Improves Planning and Cuts...
How Data Center Infrastructure Management Software Improves Planning and Cuts...How Data Center Infrastructure Management Software Improves Planning and Cuts...
How Data Center Infrastructure Management Software Improves Planning and Cuts...
Schneider Electric
 
Nigeria's blueprint for a brighter tomorrow
Nigeria's blueprint for a brighter tomorrowNigeria's blueprint for a brighter tomorrow
Nigeria's blueprint for a brighter tomorrow
Schneider Electric
 
Trends in Distribution Automation
Trends in Distribution AutomationTrends in Distribution Automation
Trends in Distribution Automation
Schneider Electric
 
The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypse
Christiaan Beek
 
Augmenting engagement value through communities - Schneider Electric - APQC K...
Augmenting engagement value through communities - Schneider Electric - APQC K...Augmenting engagement value through communities - Schneider Electric - APQC K...
Augmenting engagement value through communities - Schneider Electric - APQC K...
Louis-Pierre Guillaume
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS Security
Chris Sistrunk
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseSplunk
 
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Schneider Electric
 

Viewers also liked (20)

How IIoT and Intelligent Pumping can contribute to solving the Global Water C...
How IIoT and Intelligent Pumping can contribute to solving the Global Water C...How IIoT and Intelligent Pumping can contribute to solving the Global Water C...
How IIoT and Intelligent Pumping can contribute to solving the Global Water C...
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Schneider Electric Services_Modernization and Upgrade Solutions.pptx
Schneider Electric Services_Modernization and Upgrade Solutions.pptxSchneider Electric Services_Modernization and Upgrade Solutions.pptx
Schneider Electric Services_Modernization and Upgrade Solutions.pptx
 
How Row-based Data Center Cooling Works
How Row-based Data Center Cooling WorksHow Row-based Data Center Cooling Works
How Row-based Data Center Cooling Works
 
Accelerate Mining Operations Excellence
Accelerate Mining Operations ExcellenceAccelerate Mining Operations Excellence
Accelerate Mining Operations Excellence
 
Arc Flash Considerations for Data Center IT Space
Arc Flash Considerations for Data Center IT SpaceArc Flash Considerations for Data Center IT Space
Arc Flash Considerations for Data Center IT Space
 
Water solution delivers an affordable upgrade and future-proof control
Water solution delivers an affordable upgrade and future-proof controlWater solution delivers an affordable upgrade and future-proof control
Water solution delivers an affordable upgrade and future-proof control
 
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...
 
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...
 
CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
How Data Center Infrastructure Management Software Improves Planning and Cuts...
How Data Center Infrastructure Management Software Improves Planning and Cuts...How Data Center Infrastructure Management Software Improves Planning and Cuts...
How Data Center Infrastructure Management Software Improves Planning and Cuts...
 
Nigeria's blueprint for a brighter tomorrow
Nigeria's blueprint for a brighter tomorrowNigeria's blueprint for a brighter tomorrow
Nigeria's blueprint for a brighter tomorrow
 
Trends in Distribution Automation
Trends in Distribution AutomationTrends in Distribution Automation
Trends in Distribution Automation
 
The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypse
 
Augmenting engagement value through communities - Schneider Electric - APQC K...
Augmenting engagement value through communities - Schneider Electric - APQC K...Augmenting engagement value through communities - Schneider Electric - APQC K...
Augmenting engagement value through communities - Schneider Electric - APQC K...
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS Security
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
 
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
 

Similar to Cyber Security resilience - what's in a number? The real threat to industrial controls systems today

Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
Certrec
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUMohit Rampal
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
Shah Sheikh
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Shah Sheikh
 
The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015
Ollie Whitehouse
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
360mnbsu
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Kyle Lai
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
African Cyber Security Summit
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
TI Safe
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
ThreatConnect
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
EnergySec
 
Network security
Network securityNetwork security
Network security
Akhilesh Jain
 
Network security
Network securityNetwork security
Network securityNikhil Vyas
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
centralohioissa
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Cyren, Inc
 

Similar to Cyber Security resilience - what's in a number? The real threat to industrial controls systems today (20)

Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 

More from Schneider Electric

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design Considerations
Schneider Electric
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting Investors
Schneider Electric
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing
Schneider Electric
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation Trends
Schneider Electric
 
Magelis Basic HMI Briefing
Magelis Basic HMI Briefing Magelis Basic HMI Briefing
Magelis Basic HMI Briefing
Schneider Electric
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay Briefing
Schneider Electric
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Schneider Electric
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR Briefing
Schneider Electric
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software Briefing
Schneider Electric
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive Industries
Schneider Electric
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017
Schneider Electric
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
Schneider Electric
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580
Schneider Electric
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
Schneider Electric
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoT
Schneider Electric
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories Briefing
Schneider Electric
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors Briefing
Schneider Electric
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches Briefing
Schneider Electric
 
Telemecanique Pressure Switches Briefing
Telemecanique Pressure Switches BriefingTelemecanique Pressure Switches Briefing
Telemecanique Pressure Switches Briefing
Schneider Electric
 
Proximity Switches Briefing
Proximity Switches BriefingProximity Switches Briefing
Proximity Switches Briefing
Schneider Electric
 

More from Schneider Electric (20)

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design Considerations
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting Investors
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation Trends
 
Magelis Basic HMI Briefing
Magelis Basic HMI Briefing Magelis Basic HMI Briefing
Magelis Basic HMI Briefing
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay Briefing
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR Briefing
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software Briefing
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive Industries
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoT
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories Briefing
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors Briefing
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches Briefing
 
Telemecanique Pressure Switches Briefing
Telemecanique Pressure Switches BriefingTelemecanique Pressure Switches Briefing
Telemecanique Pressure Switches Briefing
 
Proximity Switches Briefing
Proximity Switches BriefingProximity Switches Briefing
Proximity Switches Briefing
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

Cyber Security resilience - what's in a number? The real threat to industrial controls systems today

  • 1. Cyber resilience – What’s in a number? The real threat to industrial control systems today Confidential Property of Schneider Electric Jay Abdallah | CISSP, CISM, CISA Director – EMEA Cyber Security Services
  • 2. Page 2Confidential Property of Schneider Electric | 1 The current threat landscape 2 Statistics 3 Schneider Electric’s commitment to security 4 Train-ride surprise – the importance of security awareness Agenda
  • 3. The current threat landscape Page 3Confidential Property of Schneider Electric |
  • 4. Page 4Confidential Property of Schneider Electric | The danger of malware 390,000 new infections per day AV-Test.org Jan 2016 0 20 000 000 40 000 000 60 000 000 80 000 000 100 000 000 120 000 000 140 000 000 160 000 000 2012 2013 2014 2015 2016*
  • 5. Page 5Confidential Property of Schneider Electric | Recent industrial cyber incidents German steel millUkraine power gridUSA water dam
  • 6. Statistics Page 6Confidential Property of Schneider Electric |
  • 7. Page 7Confidential Property of Schneider Electric | Attacks targeted towards German industrial systems • 1 in every 7 registered security attacks in Q4, 2015, came from Germany • Germany ranked #2 globally in critical infrastructure targets • Critical infrastructure infections from Germany have doubled every year since 2012 • 78% of malicious software installation attempts from Germany in 2015 were successful
  • 8. Page 8Confidential Property of Schneider Electric | German cyber attack sequence Source: TFOT 2015 56,3% Cyber crime 20% Hacktivism 16,1% Cyber espionage 7,6% Cyber war
  • 9. Page 9Confidential Property of Schneider Electric | • With so many statistics, which ones matter the most? Are one set more important than another? • How reliable is our source TFOT? Data reliability • The previous slides about Germany contained false statistics from a fake source • Did you notice?
  • 10. Page 10Confidential Property of Schneider Electric | How do we identify and manage our biggest vulnerabilities? Where is the weak link?
  • 11. Schneider Electric’s commitment to security Page 11Confidential Property of Schneider Electric |
  • 12. More than just IT security Critical infrastructure systems require high reliability and uptime: • Need 99.999% or greater uptime • Critical performance • Fast reaction time Page 12Confidential Property of Schneider Electric | Confidentiality Integrity Availability Availability Integrity Confidentiality IT security OT security OTPRIORITIES CONTROL SYSTEMS SECURITY / OT IT SECURITY PHYSICAL SECURITY
  • 13. Page 13Confidential Property of Schneider Electric | Cyber security at Schneider Electric Defense in depth POLICIES, PROCEDURES & AWARENESS PERIMETER INTERNAL NETWORK HOST APPLICATION DATA PHYSICAL SECURITY
  • 14. Page 14Confidential Property of Schneider Electric | Cyber security at Schneider Electric Specialized industrial security services – our offers • Cyber security training • Cyber security control design & implementation • Cyber security consulting • Cyber security maintenance services
  • 15. Train ride surprise – the importance of security awareness London, United Kingdom Page 15Confidential Property of Schneider Electric |
  • 16.
  • 17. Page 17Confidential Property of Schneider Electric | Train ride surprise • On a phone call, with no line disturbance • Perfectly clear, normal conversation: • “Enjoy the train ride along the English countryside” • “Are you coming home tonight?” • “Be sure to order a nice hot cup of tea” • “I’m sure it’s much colder there than it is here” • Begins acting strangely after five minutes – seems incoherent. • When I ask the her what she is doing, she doesn’t answer and instead says one of the above statements randomly • Answers yes or no questions flawlessly • Responds to other questions with one of the above random statements
  • 18.
  • 19.
  • 20. Page 20Confidential Property of Schneider Electric | What happened? • Technical malfunction causing me to hear recorded sayings? • What about coherent responses? • Why is my conversation being recorded? • Scrambler device? • Not sophisticated enough for real-time responses • 212 area code is in Manhattan, New York. When called, I get a strange error. • Recorded sentences used as fillers or common talk to encourage me to lead the discussion (and possibly say something incriminating) • Stealth listening • Similar to behavior of advanced malware, spyware, and Trojans
  • 21. Page 21Confidential Property of Schneider Electric | Who is behind this? • MI6 (UK) • Unknown body It is likely, however, we do not and will not ever know who is really behind most cyber attacks. • CIA and NSA (USA) • FSB (Russia)
  • 22. Page 22Confidential Property of Schneider Electric | Moral of the story • Appreciation of privacy and confidentiality • Importance of security awareness • Always be alert, Big Brother is always listening • It is unsettling the first time it happens to you … • … but it is likely not to be the first time, it’s just the first time you have noticed
  • 23. Page 23Confidential Property of Schneider Electric |