SlideShare a Scribd company logo
1 of 15
Cyber Security:
Critical Infrastructure Threats and Examples
1
Fas Mosleh
October 2022
Certrec
Alliances, Strategic Marketing
Software, cybersecurity, systems executive
Helped develop HP’s Information security business
Mission:
Helping generators be more reliable and secure for a better, safer grid
How:
SaaS apps and technology to reduce risk of non-compliance for GO/GOPs
Agenda
• Types of Threats
• Critical Infrastructure Attack Examples
• Conclusions and Action Steps to Take
Types of Threats
4
• Physical
‒ Physical Access
‒ Physical Damage
• Digital (IT)
‒ Malware
‒ Remote Access
‒ Business Server Compromises
• Digital (T)
‒ Physical Access
‒ Remote Control Access Compromises
‒ Viruses
‒ Business Server Compromises
‒ Release of Sensitive Information
Critical
Infrastructure
Attack Examples
Infrastructure Attacks: Solar Winds
6
1. 18000
2. 100
3. 320,000
4. 499/500
• Hackers compromised SolarWinds' Orion software build via an already-compromised Microsoft Office 365 account.
• Backdoors distributed into user networks once tainted Orion updates were installed.
• Russians compromised ~100 companies inc. Microsoft, Intel and Cisco.
• Plus a dozen government agencies: US Treasury, Justice and Energy departments and the Pentagon.
Infrastructure Attacks: Colonial Pipeline
7
1. 5500
2. 5M
3. 100
Attackers got into the Colonial Pipeline network through an exposed
password for a VPN account, which used the same password for the VPN
in another location (whose password was compromised in a prior breach).
Infrastructure Attacks: Ukraine
8
During the outage, threat actors flooded customer services
phone lines with calls to prevent customers from reporting the
incident.
https://www.bbc.com/news/technology-61085480
On December 23, 2015, the power grid of Ukraine was hacked,
which resulted in power outages for roughly 230,000
consumers in Ukraine for 1-6 hours
Infrastructure Attacks: Ukraine
Sandworm hackers deployed Industroyer2 malware
against high-voltage electrical sub-stations in Ukraine
+ other destructive malware like CaddyWiper.
Which is being spread around Ukraine, deletes data on
infected computer systems.
9
Actions Steps
to Take
Actions: What did we learn?
11
Trends
Important
Cyberattacks are on the rise
Nation threat actors are capable and motivated
Ransomware is data kidnapping
Basic Cybersecurity practices and being prepared can thwart attackers
It’s not a matter of if but when
Actions: Solutions to Consider
12
Review the cybersecurity risk plan
The first step is to learn and understand what can go wrong, followed by
taking precautionary actions and finally, learning how to respond
effectively to a real operational threat or attack.
Make cybersecurity awareness, prevention, and security best practices
a part of your culture.
PHYSICAL
DATA
OT
Conclusions
13
Prevent damage to your facility, compromise of the bulk
electric system, by reducing the chances of a breach
Be informed and implement/recommend some simple measures
Expect the unexpected and plan aggressively
Actions: Resources
14
• Video: Why Big Tech Wants You To Ditch Your Password
• Why MFA?
• How to address cybersecurity in the energy sector (McKinsey)
• Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
Certrec®
THANK YOU!
817-738-7661
650-999-1573
support@certrec.com
www.certrec.com
Be a NERC guru with daily compliance updates at www.RegSource.us
Get immediate NERC compliance help, on-demand at www.CertrecSaaS.com
How well is your critical infrastructure doing? Go to NERC CIP Healthcheck

More Related Content

Similar to Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation by Certrec

The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 

Similar to Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation by Certrec (20)

Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Scot Secure 2015
Scot Secure 2015Scot Secure 2015
Scot Secure 2015
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Web Attack Survival Guide
Web Attack Survival GuideWeb Attack Survival Guide
Web Attack Survival Guide
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Cybersecurity Critical Infrastructure Threats and Examples 2022- Presentation by Certrec

  • 1. Cyber Security: Critical Infrastructure Threats and Examples 1 Fas Mosleh October 2022 Certrec Alliances, Strategic Marketing Software, cybersecurity, systems executive Helped develop HP’s Information security business
  • 2. Mission: Helping generators be more reliable and secure for a better, safer grid How: SaaS apps and technology to reduce risk of non-compliance for GO/GOPs
  • 3. Agenda • Types of Threats • Critical Infrastructure Attack Examples • Conclusions and Action Steps to Take
  • 4. Types of Threats 4 • Physical ‒ Physical Access ‒ Physical Damage • Digital (IT) ‒ Malware ‒ Remote Access ‒ Business Server Compromises • Digital (T) ‒ Physical Access ‒ Remote Control Access Compromises ‒ Viruses ‒ Business Server Compromises ‒ Release of Sensitive Information
  • 6. Infrastructure Attacks: Solar Winds 6 1. 18000 2. 100 3. 320,000 4. 499/500 • Hackers compromised SolarWinds' Orion software build via an already-compromised Microsoft Office 365 account. • Backdoors distributed into user networks once tainted Orion updates were installed. • Russians compromised ~100 companies inc. Microsoft, Intel and Cisco. • Plus a dozen government agencies: US Treasury, Justice and Energy departments and the Pentagon.
  • 7. Infrastructure Attacks: Colonial Pipeline 7 1. 5500 2. 5M 3. 100 Attackers got into the Colonial Pipeline network through an exposed password for a VPN account, which used the same password for the VPN in another location (whose password was compromised in a prior breach).
  • 8. Infrastructure Attacks: Ukraine 8 During the outage, threat actors flooded customer services phone lines with calls to prevent customers from reporting the incident. https://www.bbc.com/news/technology-61085480 On December 23, 2015, the power grid of Ukraine was hacked, which resulted in power outages for roughly 230,000 consumers in Ukraine for 1-6 hours
  • 9. Infrastructure Attacks: Ukraine Sandworm hackers deployed Industroyer2 malware against high-voltage electrical sub-stations in Ukraine + other destructive malware like CaddyWiper. Which is being spread around Ukraine, deletes data on infected computer systems. 9
  • 11. Actions: What did we learn? 11 Trends Important Cyberattacks are on the rise Nation threat actors are capable and motivated Ransomware is data kidnapping Basic Cybersecurity practices and being prepared can thwart attackers It’s not a matter of if but when
  • 12. Actions: Solutions to Consider 12 Review the cybersecurity risk plan The first step is to learn and understand what can go wrong, followed by taking precautionary actions and finally, learning how to respond effectively to a real operational threat or attack. Make cybersecurity awareness, prevention, and security best practices a part of your culture. PHYSICAL DATA OT
  • 13. Conclusions 13 Prevent damage to your facility, compromise of the bulk electric system, by reducing the chances of a breach Be informed and implement/recommend some simple measures Expect the unexpected and plan aggressively
  • 14. Actions: Resources 14 • Video: Why Big Tech Wants You To Ditch Your Password • Why MFA? • How to address cybersecurity in the energy sector (McKinsey) • Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
  • 15. Certrec® THANK YOU! 817-738-7661 650-999-1573 support@certrec.com www.certrec.com Be a NERC guru with daily compliance updates at www.RegSource.us Get immediate NERC compliance help, on-demand at www.CertrecSaaS.com How well is your critical infrastructure doing? Go to NERC CIP Healthcheck