SlideShare a Scribd company logo
1 of 14
Cyber Security Solutions & Challenges
                              Ahmed M. Al Enizy
                             IT Security Manager
              International Systems Engineering
2
10/3/2012
   ICS and SCADA systems are important for our petroleum
         business and for our national economic growth because
         they automate and monitor the production processes.
        ICS and SCADA systems are no longer isolated from
         corporate and internet network.
        Most ICS and SCADA protocols, Designs, and
         Implementations were done without security in mind.
        This made them even more exposed to threats and
         vulnerabilities, and it made challenges even tougher.

3   10/3/2012
4   10/3/2012
   Concept Abstraction
       Solution Concept Abstraction
       The Right Solution For You
       Cyber Security Services & Solutions Catalog
       Suggested Roadmap
       Challenges




5   10/3/2012
Someone Somewhere with Motivation, Means, and
                      Opportunity
         Advanced  Wants to Spy / Harm
                                                      Conventional
         Persistent
                           External Threat              Hacking
          Threat




                                                                                Remote
                                                           Internet




                                                                                        Contractors - Partners - Support
                             Economic
                              Growth
                               GDC




                                                                      Access Threat
                                                                      & Unsecured
                                                                       Unmanaged



                                                                                                   3rd Party
              Production                              Business
    StuxNet                            $
               ICS /
                                            Monitor
                                            Control
                              Report




                                                      Operations
              SCADA

                                       IT       Shamoon




                                                                                Local
                         Internal Threat
                              Poor
6     10/3/2012   Governance – Design – Security
7   10/3/2012
Someone Somewhere with
                    Motivation, Means, and Opportunity
                            Wants to Spy / Harm




                                                                                      Contractors - Partners - Support
                                                                  Internet




                                                                             Remote
                                 Economic
                                  Growth




                                                                                                 3rd Party
                 Production               $                Business




                                               Monitor &
                  ICS /

                                                Control
                                 Report

                                                           Operations
                 SCADA




                                                                             Local
                                          IT


                              Logical Security
                              Physical Security

8   10/3/2012   Governance, Risk, and Compliance Assurance
   It is not a menu that you choose from or an
        advice from a very reliable source, you have to do
        your homework in assessing your risks.
       Solutions can be
        ◦ Administrative, e.g. GRC, policy, and process.
        ◦ Technical
          Safeguards prevents the threat from happening, e.g. firewall.
          Counter measures, e.g. antivirus, remediation and recovery
           procedures.
        ◦ Physical, i.e. gates, doors, barriers… etc.
       The right solution for you should help mitigate
        identified risks and save you some money.

9   10/3/2012
Consultation              MSS                IT Security        Network Security

      Intelligence and
                                SOC            End Point Protection     Firewall / UTM
           reports
 Business Continuity                            Access Control and
    and Disaster         Penetration Testing                               IDS / IPS
                                               Identity Management
      Recovery
                                               Encryption and Data
 Crisis Management       Threat Management                            Traffic Encryption
                                                    Protection

                                                  Data Leakage
     Security Programs       Forensics                                    NAP/NAC
                                                   Prevention

                                                    Host and            Web and Email
                             Awareness         Application Security
Risk and Compliance                                                       Security

                         Fraud and Identity     Vulnerability and
Security Assessment          Protection        Patch Management        Wireless Security
 and Health Check

                                                                      Traffic Monitoring
10       10/3/2012
Security Roadmap and Continues Improvement Plan
                   Development


                            Security Program and Policy Review
                            and Amendment


Crisis Management, Business Continuity and Disaster
Recovery Readiness Assessment


         Security Controls Effectiveness
         Assessment


 ICS/SCADA Risk
 Assessment



 11   10/3/2012
   Remote sites …
         ◦   In the middle of the desert.
         ◦   Connectivity.
         ◦   Local support.
         ◦   Remote support.
         ◦   Log collection.
         ◦   Incident response and handling.
        Security solutions not compatible with
         ICS/SCADA software and communication
         protocols.
        Cyber Security standards for ICS/SCADA.
        Centralized Cyber Security for monitoring,
         control, and response.

12   10/3/2012
    Directly or indirectly connected to the internet or to any 3rd
          party or you allow data transfer or exchange electronically,
          then you are facing Cyber Threats.
         It is never too late to start fixing because you are going to be
          targeted once again.
         Cyber Security same as any complicated problem can be
          concurred if simplified, abstracted, and divided into smaller
          logical groups.
         There is no 100% security and guarantee even if everybody is
          saying so.
         keep doing your best in assessing, discovering risks and
          fortifying your security.
         Make sure that you are ready to survive the crisis and restore
          your business in very short time.
13       10/3/2012
14   10/3/2012

More Related Content

What's hot

Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systemsItex Solutions
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksMaurice Dawson
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiSHIVA101531
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSJim Gilsinn
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. ManufacturingIgnyte Assurance Platform
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceIvanti
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101Priyanka Aash
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general attSHIVA101531
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesTI Safe
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution briefNozomi Networks
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsurancePriyanka Aash
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Networks
 

What's hot (20)

Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 

Viewers also liked

SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 Derek Harp
 
التعرف على الاختراقات في الشبكات المحلية
التعرف على الاختراقات في الشبكات المحليةالتعرف على الاختراقات في الشبكات المحلية
التعرف على الاختراقات في الشبكات المحليةAhmed Al Enizi
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
War in the 5th domain: Cyber Offensive Capability
War in the 5th domain: Cyber Offensive CapabilityWar in the 5th domain: Cyber Offensive Capability
War in the 5th domain: Cyber Offensive CapabilityAhmed Al Enizi
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Jim Gilsinn
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsJim Gilsinn
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Joan Figueras Tugas
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
Insights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessInsights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessWindham Brannon
 
Developing excellence in information security from corporate enterprise to ...
Developing excellence in information security   from corporate enterprise to ...Developing excellence in information security   from corporate enterprise to ...
Developing excellence in information security from corporate enterprise to ...Ahmed Al Enizi
 
security and assurance lecture jan 14
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14subramanian K
 
Overcoming Cyber Attacks
Overcoming Cyber AttacksOvercoming Cyber Attacks
Overcoming Cyber AttacksInuit AB
 
120213 cateura grenoble em smart grid toward which business models
120213 cateura grenoble em smart grid toward which business models120213 cateura grenoble em smart grid toward which business models
120213 cateura grenoble em smart grid toward which business modelsOlivier CATEURA, PhD
 
Comprehensive Security Concept For Process Control Systems V2006
Comprehensive Security Concept For Process Control Systems V2006Comprehensive Security Concept For Process Control Systems V2006
Comprehensive Security Concept For Process Control Systems V2006kaestnja
 
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...sidhota
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Ahmed Al Enizi
 

Viewers also liked (19)

SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
التعرف على الاختراقات في الشبكات المحلية
التعرف على الاختراقات في الشبكات المحليةالتعرف على الاختراقات في الشبكات المحلية
التعرف على الاختراقات في الشبكات المحلية
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
War in the 5th domain: Cyber Offensive Capability
War in the 5th domain: Cyber Offensive CapabilityWar in the 5th domain: Cyber Offensive Capability
War in the 5th domain: Cyber Offensive Capability
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Insights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for SuccessInsights 2015 - Cybersecurity- Game Planning for Success
Insights 2015 - Cybersecurity- Game Planning for Success
 
Developing excellence in information security from corporate enterprise to ...
Developing excellence in information security   from corporate enterprise to ...Developing excellence in information security   from corporate enterprise to ...
Developing excellence in information security from corporate enterprise to ...
 
Source Code Scanners
Source Code ScannersSource Code Scanners
Source Code Scanners
 
security and assurance lecture jan 14
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14
 
Overcoming Cyber Attacks
Overcoming Cyber AttacksOvercoming Cyber Attacks
Overcoming Cyber Attacks
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
120213 cateura grenoble em smart grid toward which business models
120213 cateura grenoble em smart grid toward which business models120213 cateura grenoble em smart grid toward which business models
120213 cateura grenoble em smart grid toward which business models
 
Comprehensive Security Concept For Process Control Systems V2006
Comprehensive Security Concept For Process Control Systems V2006Comprehensive Security Concept For Process Control Systems V2006
Comprehensive Security Concept For Process Control Systems V2006
 
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
 

Similar to Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges V1.5

International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...owaspindia
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To ConsumeJeff Johnson
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity TrendsIRJET Journal
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS UK
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech
 
Pankaj's Resume Information Security Professional
Pankaj's Resume Information Security ProfessionalPankaj's Resume Information Security Professional
Pankaj's Resume Information Security ProfessionalPankaj Kumar
 
Top 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptxTop 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptxBluechipComputerSyst
 

Similar to Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges V1.5 (20)

International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBMArrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Pankaj's Resume Information Security Professional
Pankaj's Resume Information Security ProfessionalPankaj's Resume Information Security Professional
Pankaj's Resume Information Security Professional
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Top 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptxTop 8 Cloud Computing Security Challenges.pptx
Top 8 Cloud Computing Security Challenges.pptx
 

Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges V1.5

  • 1. Cyber Security Solutions & Challenges Ahmed M. Al Enizy IT Security Manager International Systems Engineering
  • 3. ICS and SCADA systems are important for our petroleum business and for our national economic growth because they automate and monitor the production processes.  ICS and SCADA systems are no longer isolated from corporate and internet network.  Most ICS and SCADA protocols, Designs, and Implementations were done without security in mind.  This made them even more exposed to threats and vulnerabilities, and it made challenges even tougher. 3 10/3/2012
  • 4. 4 10/3/2012
  • 5. Concept Abstraction  Solution Concept Abstraction  The Right Solution For You  Cyber Security Services & Solutions Catalog  Suggested Roadmap  Challenges 5 10/3/2012
  • 6. Someone Somewhere with Motivation, Means, and Opportunity Advanced Wants to Spy / Harm Conventional Persistent External Threat Hacking Threat Remote Internet Contractors - Partners - Support Economic Growth GDC Access Threat & Unsecured Unmanaged 3rd Party Production Business StuxNet $ ICS / Monitor Control Report Operations SCADA IT Shamoon Local Internal Threat Poor 6 10/3/2012 Governance – Design – Security
  • 7. 7 10/3/2012
  • 8. Someone Somewhere with Motivation, Means, and Opportunity Wants to Spy / Harm Contractors - Partners - Support Internet Remote Economic Growth 3rd Party Production $ Business Monitor & ICS / Control Report Operations SCADA Local IT Logical Security Physical Security 8 10/3/2012 Governance, Risk, and Compliance Assurance
  • 9. It is not a menu that you choose from or an advice from a very reliable source, you have to do your homework in assessing your risks.  Solutions can be ◦ Administrative, e.g. GRC, policy, and process. ◦ Technical  Safeguards prevents the threat from happening, e.g. firewall.  Counter measures, e.g. antivirus, remediation and recovery procedures. ◦ Physical, i.e. gates, doors, barriers… etc.  The right solution for you should help mitigate identified risks and save you some money. 9 10/3/2012
  • 10. Consultation MSS IT Security Network Security Intelligence and SOC End Point Protection Firewall / UTM reports Business Continuity Access Control and and Disaster Penetration Testing IDS / IPS Identity Management Recovery Encryption and Data Crisis Management Threat Management Traffic Encryption Protection Data Leakage Security Programs Forensics NAP/NAC Prevention Host and Web and Email Awareness Application Security Risk and Compliance Security Fraud and Identity Vulnerability and Security Assessment Protection Patch Management Wireless Security and Health Check Traffic Monitoring 10 10/3/2012
  • 11. Security Roadmap and Continues Improvement Plan Development Security Program and Policy Review and Amendment Crisis Management, Business Continuity and Disaster Recovery Readiness Assessment Security Controls Effectiveness Assessment ICS/SCADA Risk Assessment 11 10/3/2012
  • 12. Remote sites … ◦ In the middle of the desert. ◦ Connectivity. ◦ Local support. ◦ Remote support. ◦ Log collection. ◦ Incident response and handling.  Security solutions not compatible with ICS/SCADA software and communication protocols.  Cyber Security standards for ICS/SCADA.  Centralized Cyber Security for monitoring, control, and response. 12 10/3/2012
  • 13. Directly or indirectly connected to the internet or to any 3rd party or you allow data transfer or exchange electronically, then you are facing Cyber Threats.  It is never too late to start fixing because you are going to be targeted once again.  Cyber Security same as any complicated problem can be concurred if simplified, abstracted, and divided into smaller logical groups.  There is no 100% security and guarantee even if everybody is saying so.  keep doing your best in assessing, discovering risks and fortifying your security.  Make sure that you are ready to survive the crisis and restore your business in very short time. 13 10/3/2012
  • 14. 14 10/3/2012

Editor's Notes

  1. A look into some ICS/SCADA Cyber AttacksStuxnet - June 2010FactsSeven Iranian organizations scoring 70% of infections compared to other countries. It exploited zero day vulnerabilities in Microsoft platformsTargeted Siemens SCADA software. It contained Programmable Logic Unit rootkit that allowed it to spy on specific automated industrials procedures.In other words it is a Cyber Espionage attackWikipedia – Symantec - TrendMicroBusiness ImpactIn countries that their Gross Domestic Product depends heavily on petroleum business, the major impact is the restrain of the national economic growth.Shamoon - August 2012ARAMCO and RasGas were hit by this Cyber AttackFactsMassive outbreak resulting in 30k computers.Loss of data on infected computers.Operation loss on infected computersData leakagesIn other words it is a Cyber Espionage and Destruction attack.Symantec - WikipediaBusiness ImpactImpact on Gross Domestic Product results majorly in restrain of the national economic growth due to the fact that in Saudi Arabia “The petroleum sector accounts for roughly 80% of budget revenues, 45% of GDP, and 90% of export earnings." (mundi index) ICS/SCADA HackingObviously anyone who doesn’t like you or competing with you and has nothing to stop him (Motivation, Means, Opportunity).Conventional or Typical HackingA hacker somewhere in the world doing his best to hack your networkMost of the companies deploy pretty good protection on their internet gateway so it is hard to gain access from that way.Insider ThreatDeliberate harmful act by Disgruntle employee.Simply a human mistake due to poor conduct. Advanced Persistent Threat aka Cyber ThreatA very intelligent group somewhere in the world deploying most sophisticated techniques you probably never have heard about (Zero Day) to spy on you and/or destroy you. 
  2. A look into some ICS/SCADA Cyber AttacksStuxnet - June 2010FactsSeven Iranian organizations scoring 70% of infections compared to other countries. It exploited zero day vulnerabilities in Microsoft platformsTargeted Siemens SCADA software. It contained Programmable Logic Unit rootkit that allowed it to spy on specific automated industrials procedures.In other words it is a Cyber Espionage attackWikipedia – Symantec - TrendMicroBusiness ImpactIn countries that their Gross Domestic Product depends heavily on petroleum business, the major impact is the restrain of the national economic growth.Shamoon - August 2012ARAMCO and RasGas were hit by this Cyber AttackFactsMassive outbreak resulting in 30k computers.Loss of data on infected computers.Operation loss on infected computersData leakagesIn other words it is a Cyber Espionage and Destruction attack.Symantec - WikipediaBusiness ImpactImpact on Gross Domestic Product results majorly in restrain of the national economic growth due to the fact that in Saudi Arabia “The petroleum sector accounts for roughly 80% of budget revenues, 45% of GDP, and 90% of export earnings." (mundi index) ICS/SCADA HackingObviously anyone who doesn’t like you or competing with you and has nothing to stop him (Motivation, Means, Opportunity).Conventional or Typical HackingA hacker somewhere in the world doing his best to hack your networkMost of the companies deploy pretty good protection on their internet gateway so it is hard to gain access from that way.Insider ThreatDeliberate harmful act by Disgruntle employee.Simply a human mistake due to poor conduct. Advanced Persistent Threat aka Cyber ThreatA very intelligent group somewhere in the world deploying most sophisticated techniques you probably never have heard about (Zero Day) to spy on you and/or destroy you.