CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...TI Safe
- The document discusses challenges facing utilities such as aging infrastructure, workforce transitions, reliability pressures, and increasing cyber security threats. It also covers opportunities from digital substation technologies including process bus, cyber security features, teleprotection, phasor measurement units, and wireless communication.
- The presentation discusses definitions of cyber security for utilities and common vulnerabilities in protection and control systems like default passwords, heterogeneous networks, and penetration testing tools. It also summarizes Abb Power Grid's approach to cyber security including secure architectures, product hardening, and lifecycle security services.
- Specific cyber security features for Abb's digital substations are explained including protocol hardening, role-based access control, security event logging, and configuration guidelines for hardening
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
The document discusses modern cybersecurity and operational visibility for industrial control networks. It outlines some of the challenges in protecting industrial control networks, including that systems were previously isolated, use proprietary protocols, and cybersecurity was less rigorous. It emphasizes that operational visibility is critical for cybersecurity as you cannot protect what you cannot see. The document then discusses using Nozomi Networks' solutions to gain visibility into networks and assets, detect malware attacks, and provide hybrid threat detection approaches for industrial control systems. Case studies are presented on network visualization and monitoring, asset discovery and inventory, and hybrid ICS threat detection.
- The document presents an ICS cybersecurity training program created by TI Safe to educate professionals on identifying risks in industrial networks and recommending countermeasures according to international security standards.
- The 20-hour course aims to train students to design and deploy a Cyber Security Management System for critical infrastructure automation networks. It covers topics such as ICS architectures, risks and attacks, and provides demonstrations on industrial network simulators.
- Supporting materials include apostilles in Portuguese and English that are constantly updated based on technical references from leading books and companies in the ICS security field. Practical classes complement the theoretical concepts taught.
Marcelo Branquinho presented on protecting power distribution systems with zero trust cybersecurity. He discussed how digital transformation brings risks from increased connectivity and attacks on industrial control systems. Network segmentation with a zero trust model using firewalls as the network core was proposed. TI Safe and Palo Alto Networks developed a joint product called TI Safe Cybersecurity for Energy to implement zero trust for energy companies through next generation firewalls, remote access security, and continuous monitoring by TI Safe's industrial control system security operations center.
This document discusses how Crypto-Flow segmentation and encryption can help organizations comply with various security standards and regulations. It provides examples of how Crypto-Flow can be used to encrypt data in transit for ISO27001, PCI-DSS, IEC 62443, NESA, and the Cloud Security Alliance guidelines. It also outlines best practices for key management and testing the security of implemented encryption controls.
Cyber & Process Attack Scenarios for ICSJim Gilsinn
Presented at the OPC Foundation's "The Information Revolution 2014" in Redmond, WA August 5-6, 2014
This presentation discusses the modes and methodologies an attacker may use against an industrial control system in order to create a complex process attack. The presentation then discusses some specific examples, both real and hypothetical. The presentation finishes with a description of some common ways in which an organization could defend itself against these types of attacks.
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
This document discusses hackers and security from the perspective of a penetration tester. It begins by distinguishing between hackers and crackers, noting that hackers are highly skilled individuals seeking knowledge, while crackers seek financial gain or to cause damage. It then discusses common misconceptions around security, noting that security is an architecture rather than appliances or policies. Several examples are given of exploiting popular security products and technologies. The document warns that the UAE is a vulnerable target given weaknesses in infrastructure and disaster recovery plans. It then describes hypothetical penetration tests against several large organizations in the UAE, highlighting vulnerabilities discovered. The document concludes by discussing mobile app security risks and advertising an upcoming security conference exhibition.
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...TI Safe
- The document discusses challenges facing utilities such as aging infrastructure, workforce transitions, reliability pressures, and increasing cyber security threats. It also covers opportunities from digital substation technologies including process bus, cyber security features, teleprotection, phasor measurement units, and wireless communication.
- The presentation discusses definitions of cyber security for utilities and common vulnerabilities in protection and control systems like default passwords, heterogeneous networks, and penetration testing tools. It also summarizes Abb Power Grid's approach to cyber security including secure architectures, product hardening, and lifecycle security services.
- Specific cyber security features for Abb's digital substations are explained including protocol hardening, role-based access control, security event logging, and configuration guidelines for hardening
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
The document discusses modern cybersecurity and operational visibility for industrial control networks. It outlines some of the challenges in protecting industrial control networks, including that systems were previously isolated, use proprietary protocols, and cybersecurity was less rigorous. It emphasizes that operational visibility is critical for cybersecurity as you cannot protect what you cannot see. The document then discusses using Nozomi Networks' solutions to gain visibility into networks and assets, detect malware attacks, and provide hybrid threat detection approaches for industrial control systems. Case studies are presented on network visualization and monitoring, asset discovery and inventory, and hybrid ICS threat detection.
- The document presents an ICS cybersecurity training program created by TI Safe to educate professionals on identifying risks in industrial networks and recommending countermeasures according to international security standards.
- The 20-hour course aims to train students to design and deploy a Cyber Security Management System for critical infrastructure automation networks. It covers topics such as ICS architectures, risks and attacks, and provides demonstrations on industrial network simulators.
- Supporting materials include apostilles in Portuguese and English that are constantly updated based on technical references from leading books and companies in the ICS security field. Practical classes complement the theoretical concepts taught.
Marcelo Branquinho presented on protecting power distribution systems with zero trust cybersecurity. He discussed how digital transformation brings risks from increased connectivity and attacks on industrial control systems. Network segmentation with a zero trust model using firewalls as the network core was proposed. TI Safe and Palo Alto Networks developed a joint product called TI Safe Cybersecurity for Energy to implement zero trust for energy companies through next generation firewalls, remote access security, and continuous monitoring by TI Safe's industrial control system security operations center.
This document discusses how Crypto-Flow segmentation and encryption can help organizations comply with various security standards and regulations. It provides examples of how Crypto-Flow can be used to encrypt data in transit for ISO27001, PCI-DSS, IEC 62443, NESA, and the Cloud Security Alliance guidelines. It also outlines best practices for key management and testing the security of implemented encryption controls.
Cyber & Process Attack Scenarios for ICSJim Gilsinn
Presented at the OPC Foundation's "The Information Revolution 2014" in Redmond, WA August 5-6, 2014
This presentation discusses the modes and methodologies an attacker may use against an industrial control system in order to create a complex process attack. The presentation then discusses some specific examples, both real and hypothetical. The presentation finishes with a description of some common ways in which an organization could defend itself against these types of attacks.
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
This document discusses hackers and security from the perspective of a penetration tester. It begins by distinguishing between hackers and crackers, noting that hackers are highly skilled individuals seeking knowledge, while crackers seek financial gain or to cause damage. It then discusses common misconceptions around security, noting that security is an architecture rather than appliances or policies. Several examples are given of exploiting popular security products and technologies. The document warns that the UAE is a vulnerable target given weaknesses in infrastructure and disaster recovery plans. It then describes hypothetical penetration tests against several large organizations in the UAE, highlighting vulnerabilities discovered. The document concludes by discussing mobile app security risks and advertising an upcoming security conference exhibition.
Cybersecurity for modern industrial systemsItex Solutions
The document discusses cybersecurity for modern industrial systems. It outlines the history of control systems from early humans to modern technology. It notes current risks and threats that exploit weaknesses in these systems. The rapid growth of internet-connected devices poses challenges to ensuring stability. While virtually all cyber assets are vulnerable, cybersecurity expertise is in short supply. Achieving reliable safety requires standards, regulations, best practices, visibility of systems and sharing knowledge across industries and nations.
Protecting Infrastructure from Cyber AttacksMaurice Dawson
The Department of Homeland Security (DHS) has become more concerned with cyber attacks on infrastructure such as supervisory control and data acquisition (SCADA) systems. An attack in Iran has proven that the landscape of cyber warfare is continually evolving. As the SCADA systems are the systems that autonomously monitor and adjust switching among other processes within critical infrastructures such as nuclear plants, and power grids DHS has become concerned about these systems as they are unmanned frequently and remotely accessed. A vulnerability such as remote access could allow anyone to take control of assets to critical infrastructure remotely. There has been increasing mandates, and directives to ensure any system deployed meets stringent requirements. As the Stuxnet worm has become a reality, future attacks could be malicious code directly targeting specific locations of critical infrastructure. This paper will address methods to protect infrastructure from cyber attacks using a hybrid of certification & accreditation (C&A) processes and information assurance (IA) controls.
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisTI Safe
This document discusses how machine learning can be applied to industrial control system (ICS) cybersecurity. It provides examples of machine learning applications like self-driving cars and recommendations. For ICS cybersecurity, the Nozomi SCADA Guardian solution uses machine learning to automatically discover industrial network assets, develop security and process profiles, and monitor the system in real time to detect cyber threats and process anomalies. It concludes by demonstrating how machine learning could protect a natural gas plant and questioning if companies are truly protected against attacks.
Kaspersky endpoint security business presentationData Unit
A presentation of the kaspersky portofolio for business. The antivirus package of kaspersky Endpoints, can secure your mobiles, desktops, servers and more.
DTS Solution - Software Defined Security v1.0Shah Sheikh
The document discusses software defined networking (SDN) and network virtualization. It explains that SDN separates the control plane and data plane, allowing network control through external systems rather than individual device configuration. Network virtualization decouples applications from hardware and allows for logical network topologies on the same physical infrastructure through resource isolation. OpenFlow is presented as a standard for SDN implementation, and tools like Open vSwitch, Mininet and OpenDaylight are discussed. Challenges around scalability, reliability and consistency with the separation of planes are also covered.
Conozca como tener una completa visibilidad para identificar e investigar los ataques, detecte y analice ataques avanzados, antes que afecten al negocio, gestione los incidentes más importantes, permitiéndole combinar Logs con otros tipos de datos como tráfico en la red, información end point y datos en la nube.
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
Tom Blauvelt from Symantec and Sean Telles and Chris Dullea from ForeScout share how both companies together can deliver a unified cyber security solution.
WatchGuard's security proposal recommends their network security solution to manage users, filter content and URLs, and inspect HTTPS traffic. It provides network diagrams, security solutions including application control, logs and reports. Application control allows identification, control and reporting of over 1800 applications and sub-functions. It offers broad and granular control of applications and integration with firewall policies. Logs and reports are stored separately on a log and report server for long-term storage and management.
ICS (Industrial Control System) Cybersecurity TrainingTonex
ICS Cybersecurity training is intended for security professionals and control system designs in order to give them propelled cybersecurity aptitudes and learning in order to ensure the Industrial Control System (ICS) and keep their mechanical task condition secure against digital dangers.
Audience:
Control engineers, integrators and architects
System administrators, engineers
Information Technology (IT) professionals
Security Consultants
Managers who are responsible for ICS
Researchers and analysts working on ICS security
Vendors, Executives and managers
Information technology professionals, security engineers, security analysts, policy analysts
Investors and contractors
Technicians, operators, and maintenance personnel
Price: $3,999.00 Length: 4 Days
Training Objectives:
Understand fundamentals of Industrial Control Systems (ICS)
Recognize the security architecture for ICS
Identify different kinds of vulnerabilities in ICS network, remote devices, software, or control servers
Learn about active defense and incident response for ICS
Learn the essentials for NERC Critical Infrastructure Protection (CIP)
Understand policies and procedures for NERC critical infrastructure protection (CIP)
List strategies for NERC CIP version 5/6
Apply risk management techniques to ICS
Describe ICS Active Defense and Incident Response
Describe techniques for defending against the new ICS threat matrix
Assess and audit risks for ICS
Apply IEC standard to network and system security of ICS
Implement the ICS security program step by step
Protect the ICS network from vulnerabilities
Understand different types of servers in ICS and protect them against attacks
Apply security standards to SCADA systems based on NIST SP 800-82
Detect different types of attacks to SCADA systems
Tackle all the security challenges related to ICS cybersecurity
Training Outline:
ICS Cybersecurity training course consists of the following lessons, which can be revised and tailored to the client’s need:
Fundamentals of Industrial Control Systems (ICS)
ICS Security Architecture
Common ICS Vulnerabilities
ICS Threat Intelligence
NERC Critical Infrastructure Protection (CIP)
Risk Management and Risk Assessment
ICS Auditing and Assessment
IEC 62443: Network and System Security for ICS
Implementation of ICS Security Program Development
ICS Incident Response
Network Protection for ICS
ICS Server Protection
SCADA Security Policies and Standards
Detection of Cyber Attacks on SCADA Systems
Our instructors at Tonex will assist you with mastering every one of the ICS Cybersecurity plan strategies by presenting the hazard administration framework, chance evaluation methods, episode reaction, constant monitoring, SCADA security change, and network security approaches for ICS.
ICS Cyber security Training
https://www.tonex.com/training-courses/ics-cybersecurity-training/
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
Jim Girouard, Sr. Product Development Manager at Worcester Polytechnic Institute, outlines the growing menace of cyber attacks on utility companies and how to educate yourself to reduce risk.
Presenter: Chris Sistrunk
Why haven’t we seen more ICS-focused attacks? Perhaps it’s because we’re not looking for them. The current state of security in Industrial Control Systems is a widely publicized issue, but fixes to ICS security issues are long cycle, with some systems and devices that will unfortunately never have patches available.
In this environment, visibility into security threats to ICS is critical, and almost all of ICS monitoring has been focused on compliance, rather than looking for indicators/evidence of compromise. The non-intrusive nature of Network Security Monitoring (NSM) is a perfect fit for ICS. This presentation looks at using NSM as part of an incident response strategy in ICS, various options for implementing NSM, and some of the capabilities that NSM can bring to an ICS cyber security program.
This document discusses endpoint security solutions, focusing on Trend Micro OfficeScan. It defines endpoint categories as endpoint antivirus and endpoint security. It provides features of each category and top vendors. It recommends Trend Micro OfficeScan for its comprehensive threat protection, centralized management, and proven track record. The document outlines OfficeScan's system requirements and provides step-by-step instructions for installing and configuring the OfficeScan server and agents.
This document discusses security risks to industrial control systems (ICS) and strategies to protect them. It begins by providing examples of security incidents that impacted real-world critical infrastructure facilities. These include production line stoppages due to malware infections and temporary loss of control from unauthorized access. The document then notes that ICS environments are becoming more open and connected, increasing risk. It argues that security approaches for ICS must focus on integrity, availability and confidentiality to account for their mission-critical nature of continuously operating specialized systems. The document advocates implementing network segmentation, carefully managing external devices and updating systems without interrupting operations.
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Shah Sheikh
This document provides an overview of cyber security 101 and discusses common myths. It begins with an introduction to cyber security and why it is important given how organizations are connected digitally. It then discusses some major cyber incidents that made headlines in recent years. It also outlines common cyber threats and threat actors. The document also predicts cyber security trends in the coming years. It identifies key industry verticals impacted by cyber threats. Finally, it discusses some common myths around cyber security and emphasizes the importance of going back to cyber security basics.
The document discusses the evolving threat landscape and introduces Sophos' solution for synchronized security. It notes that attack surfaces are exponentially larger due to more devices and threats are increasingly sophisticated. Sophos' synchronized security integrates next-gen endpoint and network security technologies that share threat intelligence in real-time to accelerate detection and automate response. This provides comprehensive protection across devices and networks through a simple, automated system.
Symantec Endpoint Protection (SEP) provides three layers of protection: network threat protection, proactive threat protection, and antivirus/antispyware protection. It combines essential threat protection technologies into a single client. The management console allows administrators to manage SEP and Symantec Network Access Control from a single interface, monitor security threats, and control user access. Installing SEP involves installing the manager software first, then the client software, accepting license agreements, selecting client types, and allowing the installation to complete and check for updates.
The latest massive IoT DDoS attack from the Mirai botnet that took major websites like Twitter and Reddit offline for hours – has already gained notoriety as one of the worst DDoS strikes in history.
In this webinar Manish Rai & Ty Powers of Great Bay Software will help you understand exactly how the enterprise IoT landscape is changing, and what it means for the assumptions organizations have been making in regards to safeguarding against IoT cyberattacks. You will:
Gain insights into how the recent IoT-based DDoS attacks were launched
How similar attacks could be launched inside enterprise networks
How to safeguard against IoT device compromises
How to reduce your risk, whose job is it anyway?
Learn about what your peers are doing for IoT device security, relevant findings from the 2016 Great Bay Software IoT Security Survey
Watch this ondemand webinar with this link: https://go.greatbaysoftware.com/owb-safeguarding-against-iot-ddos-attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksMarie Wilcox
Zero day cyber attacks are almost impossible to detect and defeat as they use exploits that are previously unknown. This threat is increasing and Zero Day Recovery™ from Tectrade is the best option available to get business systems and data back to operational - fast. Learn more with our slide share all about it.
Cybersecurity for modern industrial systemsItex Solutions
The document discusses cybersecurity for modern industrial systems. It outlines the history of control systems from early humans to modern technology. It notes current risks and threats that exploit weaknesses in these systems. The rapid growth of internet-connected devices poses challenges to ensuring stability. While virtually all cyber assets are vulnerable, cybersecurity expertise is in short supply. Achieving reliable safety requires standards, regulations, best practices, visibility of systems and sharing knowledge across industries and nations.
Protecting Infrastructure from Cyber AttacksMaurice Dawson
The Department of Homeland Security (DHS) has become more concerned with cyber attacks on infrastructure such as supervisory control and data acquisition (SCADA) systems. An attack in Iran has proven that the landscape of cyber warfare is continually evolving. As the SCADA systems are the systems that autonomously monitor and adjust switching among other processes within critical infrastructures such as nuclear plants, and power grids DHS has become concerned about these systems as they are unmanned frequently and remotely accessed. A vulnerability such as remote access could allow anyone to take control of assets to critical infrastructure remotely. There has been increasing mandates, and directives to ensure any system deployed meets stringent requirements. As the Stuxnet worm has become a reality, future attacks could be malicious code directly targeting specific locations of critical infrastructure. This paper will address methods to protect infrastructure from cyber attacks using a hybrid of certification & accreditation (C&A) processes and information assurance (IA) controls.
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisTI Safe
This document discusses how machine learning can be applied to industrial control system (ICS) cybersecurity. It provides examples of machine learning applications like self-driving cars and recommendations. For ICS cybersecurity, the Nozomi SCADA Guardian solution uses machine learning to automatically discover industrial network assets, develop security and process profiles, and monitor the system in real time to detect cyber threats and process anomalies. It concludes by demonstrating how machine learning could protect a natural gas plant and questioning if companies are truly protected against attacks.
Kaspersky endpoint security business presentationData Unit
A presentation of the kaspersky portofolio for business. The antivirus package of kaspersky Endpoints, can secure your mobiles, desktops, servers and more.
DTS Solution - Software Defined Security v1.0Shah Sheikh
The document discusses software defined networking (SDN) and network virtualization. It explains that SDN separates the control plane and data plane, allowing network control through external systems rather than individual device configuration. Network virtualization decouples applications from hardware and allows for logical network topologies on the same physical infrastructure through resource isolation. OpenFlow is presented as a standard for SDN implementation, and tools like Open vSwitch, Mininet and OpenDaylight are discussed. Challenges around scalability, reliability and consistency with the separation of planes are also covered.
Conozca como tener una completa visibilidad para identificar e investigar los ataques, detecte y analice ataques avanzados, antes que afecten al negocio, gestione los incidentes más importantes, permitiéndole combinar Logs con otros tipos de datos como tráfico en la red, información end point y datos en la nube.
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
Tom Blauvelt from Symantec and Sean Telles and Chris Dullea from ForeScout share how both companies together can deliver a unified cyber security solution.
WatchGuard's security proposal recommends their network security solution to manage users, filter content and URLs, and inspect HTTPS traffic. It provides network diagrams, security solutions including application control, logs and reports. Application control allows identification, control and reporting of over 1800 applications and sub-functions. It offers broad and granular control of applications and integration with firewall policies. Logs and reports are stored separately on a log and report server for long-term storage and management.
ICS (Industrial Control System) Cybersecurity TrainingTonex
ICS Cybersecurity training is intended for security professionals and control system designs in order to give them propelled cybersecurity aptitudes and learning in order to ensure the Industrial Control System (ICS) and keep their mechanical task condition secure against digital dangers.
Audience:
Control engineers, integrators and architects
System administrators, engineers
Information Technology (IT) professionals
Security Consultants
Managers who are responsible for ICS
Researchers and analysts working on ICS security
Vendors, Executives and managers
Information technology professionals, security engineers, security analysts, policy analysts
Investors and contractors
Technicians, operators, and maintenance personnel
Price: $3,999.00 Length: 4 Days
Training Objectives:
Understand fundamentals of Industrial Control Systems (ICS)
Recognize the security architecture for ICS
Identify different kinds of vulnerabilities in ICS network, remote devices, software, or control servers
Learn about active defense and incident response for ICS
Learn the essentials for NERC Critical Infrastructure Protection (CIP)
Understand policies and procedures for NERC critical infrastructure protection (CIP)
List strategies for NERC CIP version 5/6
Apply risk management techniques to ICS
Describe ICS Active Defense and Incident Response
Describe techniques for defending against the new ICS threat matrix
Assess and audit risks for ICS
Apply IEC standard to network and system security of ICS
Implement the ICS security program step by step
Protect the ICS network from vulnerabilities
Understand different types of servers in ICS and protect them against attacks
Apply security standards to SCADA systems based on NIST SP 800-82
Detect different types of attacks to SCADA systems
Tackle all the security challenges related to ICS cybersecurity
Training Outline:
ICS Cybersecurity training course consists of the following lessons, which can be revised and tailored to the client’s need:
Fundamentals of Industrial Control Systems (ICS)
ICS Security Architecture
Common ICS Vulnerabilities
ICS Threat Intelligence
NERC Critical Infrastructure Protection (CIP)
Risk Management and Risk Assessment
ICS Auditing and Assessment
IEC 62443: Network and System Security for ICS
Implementation of ICS Security Program Development
ICS Incident Response
Network Protection for ICS
ICS Server Protection
SCADA Security Policies and Standards
Detection of Cyber Attacks on SCADA Systems
Our instructors at Tonex will assist you with mastering every one of the ICS Cybersecurity plan strategies by presenting the hazard administration framework, chance evaluation methods, episode reaction, constant monitoring, SCADA security change, and network security approaches for ICS.
ICS Cyber security Training
https://www.tonex.com/training-courses/ics-cybersecurity-training/
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWPICPE
Jim Girouard, Sr. Product Development Manager at Worcester Polytechnic Institute, outlines the growing menace of cyber attacks on utility companies and how to educate yourself to reduce risk.
Presenter: Chris Sistrunk
Why haven’t we seen more ICS-focused attacks? Perhaps it’s because we’re not looking for them. The current state of security in Industrial Control Systems is a widely publicized issue, but fixes to ICS security issues are long cycle, with some systems and devices that will unfortunately never have patches available.
In this environment, visibility into security threats to ICS is critical, and almost all of ICS monitoring has been focused on compliance, rather than looking for indicators/evidence of compromise. The non-intrusive nature of Network Security Monitoring (NSM) is a perfect fit for ICS. This presentation looks at using NSM as part of an incident response strategy in ICS, various options for implementing NSM, and some of the capabilities that NSM can bring to an ICS cyber security program.
This document discusses endpoint security solutions, focusing on Trend Micro OfficeScan. It defines endpoint categories as endpoint antivirus and endpoint security. It provides features of each category and top vendors. It recommends Trend Micro OfficeScan for its comprehensive threat protection, centralized management, and proven track record. The document outlines OfficeScan's system requirements and provides step-by-step instructions for installing and configuring the OfficeScan server and agents.
This document discusses security risks to industrial control systems (ICS) and strategies to protect them. It begins by providing examples of security incidents that impacted real-world critical infrastructure facilities. These include production line stoppages due to malware infections and temporary loss of control from unauthorized access. The document then notes that ICS environments are becoming more open and connected, increasing risk. It argues that security approaches for ICS must focus on integrity, availability and confidentiality to account for their mission-critical nature of continuously operating specialized systems. The document advocates implementing network segmentation, carefully managing external devices and updating systems without interrupting operations.
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Shah Sheikh
This document provides an overview of cyber security 101 and discusses common myths. It begins with an introduction to cyber security and why it is important given how organizations are connected digitally. It then discusses some major cyber incidents that made headlines in recent years. It also outlines common cyber threats and threat actors. The document also predicts cyber security trends in the coming years. It identifies key industry verticals impacted by cyber threats. Finally, it discusses some common myths around cyber security and emphasizes the importance of going back to cyber security basics.
The document discusses the evolving threat landscape and introduces Sophos' solution for synchronized security. It notes that attack surfaces are exponentially larger due to more devices and threats are increasingly sophisticated. Sophos' synchronized security integrates next-gen endpoint and network security technologies that share threat intelligence in real-time to accelerate detection and automate response. This provides comprehensive protection across devices and networks through a simple, automated system.
Symantec Endpoint Protection (SEP) provides three layers of protection: network threat protection, proactive threat protection, and antivirus/antispyware protection. It combines essential threat protection technologies into a single client. The management console allows administrators to manage SEP and Symantec Network Access Control from a single interface, monitor security threats, and control user access. Installing SEP involves installing the manager software first, then the client software, accepting license agreements, selecting client types, and allowing the installation to complete and check for updates.
The latest massive IoT DDoS attack from the Mirai botnet that took major websites like Twitter and Reddit offline for hours – has already gained notoriety as one of the worst DDoS strikes in history.
In this webinar Manish Rai & Ty Powers of Great Bay Software will help you understand exactly how the enterprise IoT landscape is changing, and what it means for the assumptions organizations have been making in regards to safeguarding against IoT cyberattacks. You will:
Gain insights into how the recent IoT-based DDoS attacks were launched
How similar attacks could be launched inside enterprise networks
How to safeguard against IoT device compromises
How to reduce your risk, whose job is it anyway?
Learn about what your peers are doing for IoT device security, relevant findings from the 2016 Great Bay Software IoT Security Survey
Watch this ondemand webinar with this link: https://go.greatbaysoftware.com/owb-safeguarding-against-iot-ddos-attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksMarie Wilcox
Zero day cyber attacks are almost impossible to detect and defeat as they use exploits that are previously unknown. This threat is increasing and Zero Day Recovery™ from Tectrade is the best option available to get business systems and data back to operational - fast. Learn more with our slide share all about it.
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
It’s widely known that patch management is a major pain point for most businesses. IT teams struggle to keep systems patched and secure. Cyber-attacks are continuous and anti-virus protection alone isn’t effective.
Cyber hygiene best practices need to be followed to keep organizations secure and to prevent security breaches.
In this webinar, Chandrashekhar - SecPod’s Founder & CEO, Douglas Smith - BlueHat Cyber’s Senior Sales Director, and Greg Pottebaum - SecPod’s VP OEM & Strategic Alliances, demonstrate:
- How to efficiently reduce the cyber-attack surface of your business
- Simple strategies to improve your security management
- How Blue Hat Cyber uses SanerNow to automate patch management and secure their customer’s endpoints
Request a FREE Demo of SanerNow platform at:
www.secpod.com
About SecPod
SecPod is an endpoint security and management technology company. SecPod (Security Podium, incarnated as SecPod)
was founded in the year 2008. SecPod’s SanerNow platform and tools are used by MSPs and enterprises worldwide.
SecPod also licenses security technology to top security vendors through its SCAP Content Professional Feed.
Facebook: https://www.facebook.com/secpod/
LinkedIn: https://www.linkedin.com/company/secp...
Twitter: https://twitter.com/SecPod
Email us at info@secpod.com to get more details on how to secure your organisation from cyber attacks.
Hem Infotech was founded in 2002 with Main Focus Area Of computer sales and maintenance.
Currently We operate under Five verticals namely Computer Maintenance - AMC, Thin Client - World's Smallest & Lowest Energy Computing, Telephony - Crm/Erp Integration, It Consultancy - AUDIT & SOLUTION SUPPORT & Public Wifi.
We r Business Associates & Oem Service Partner For Brands Like Hp, Ncomputing, Qnap, Sophos, Enjay, Purple Etc.
Currently Maintaining 20000+ Hardwares With 1000+ Customers.
18+ Well Experience, Certified Technical Team Focusing Govt., Banking, Education, Finance, Hospitality Etc..
We r Gujarat's One Of Very Few Companies Using Crm Based Systematic Mechanism For Quick & Accurate Support.
With mega-breaches like Anthem, OPM, IRS, Ashley Madison, UCLA Health and TalkTalk all within the past 12 months, chances are your data has been targeted. What does this mean for 2016?
Review this presentation and learn:
• Why cyber attacks continue to increase in sophistication, magnitude and velocity
• What trends will have the largest and smallest impact on cyber security in 2016
• Why cloud-based apps and the Internet of Things have transformed cyber security
• How you can protect your organization from attacks from the inside
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
Presented by: Gib Sorebo, SAIC
Abstract: For the last few years, energy companies, particularly electric utilities, have been scrambling to meet the onslaught of cybersecurity regulations. However, hackers don’t follow regulations, so the need to rapidly address evolving threats is imperative to meet expectations of senior leadership, board members, and shareholders. This session will discuss how a mature governance structure and a cybersecurity strategy based on a comprehensive understanding of business risk can be used to address threats, comply with regulations, and obtain support from company stakeholders.
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
Work from Home - Practical Advice on Operations and Security Impact and what to do about it.
DR and BCP Planning Ideas
Widening Attack Surface Solutions
Managing Threats Solutions
Philippines Cybersecurity Conference 2021: The role of CERTsAPNIC
APNIC Senior Security Specialist Adli Wahid spoke on the importance and role of CERTs in helping prevent cyber attacks at the Philippines Cybersecurity Conference 2021, held online from 13 to 29 October 2021.
This document provides an overview of network security concepts. It discusses the importance of protecting information assets as the most valuable company assets. It then covers key network security topics like the CIA triad of confidentiality, integrity and availability. It defines threats at both the network and application levels, and discusses how to overcome threats through policies, user awareness training, and security technologies like firewalls, IDS/IPS, antivirus software, VPNs, spam filters and web content filtering. The document aims to educate about network threats and appropriate security controls and protections.
Addressing cyber risk managment from SME perspectiveCyber Watching
Miguel Manteca's (Technical Sales Manager at HISPASEC) presentation will focus on making visible the most frequent cyber risks to which SMEs are exposed. Emphasis will be placed on the loss of data and its possible consequences for the business. The talk will try to give the guidelines to prevent them and make your company digitally safer. Brief introduction to the "Seriot" European project, which addresses the issue of internet security of things.
An Introduction to zOS Real-time Infrastructure and Security PracticesJerry Harding
This document discusses security threats to IBM mainframe systems running z/OS and introduces a real-time security monitoring solution called SMA_RT. It notes that existing security tools like RACF only provide batch auditing and monitoring, leaving systems vulnerable. SMA_RT was developed to enhance security by detecting malicious insider activity in real-time, identifying internal abuse patterns, and meeting government monitoring mandates. The document claims SMA_RT protects against insider threats unlike any other commercial mainframe software and works with other security tools to provide complete enterprise threat monitoring.
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Digital Bond
This document discusses continuous monitoring of industrial networks to detect problems. It describes what aspects of the network should be monitored, including servers, operating systems, processes, protocols, and controllers. It outlines how a test monitoring environment was prepared with a PLC, simulator, monitoring server, and traffic sniffer. Several attacks were performed, like DoS, ARP poisoning, malware infection. The results of monitoring detected these attacks by observing unusual traffic and system behaviors. The conclusion is that establishing a baseline and configuring triggers can help detect anomalies indicating network compromise.
Andrew Ginter, Waterfall's VP Industrial Security speaks to three networks at the DHS ICSJWG 2019 event in Springfield, MA. Secure sites, however, generally do not use three security standards - two are unavoidable and three is two too many.
Richard Kennedy, Director of Cloud Services & Infrastructure at Xperience, gave a presentation on the avoidable security risks of remote working. Once the COVID-19 pandemic hit, Xperience transitioned over 100 employees to working remotely from over 100 different locations across the UK and Ireland in under 24 hours. To protect the business, employees, and customers while working remotely, Xperience implemented a unique solution of routing all employee internet traffic through their London datacenter for real-time threat protection, detection and mitigation. This included implementing technologies like intrusion prevention, big data analytics, encrypted DNS, geo-location restrictions and more. The presentation reviewed the security checklist and measures Xperience put in place and showed a snapshot of
The document discusses how companies can lower their total IT costs through outsourcing maintenance and management of servers, workstations, security, backups, and hosted email services to a third party provider. It claims that outsourcing these services can reduce IT costs by 15-30% while improving reliability, security and allowing accurate budget forecasting without requiring additional in-house IT staff. It highlights the growth and awards of the third party provider, EssentiaLink, which provides these outsourced "MaintenanceFreeIT" services.
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
This document provides a summary of an IoT security presentation. It discusses what IoT devices are, why they pose security risks, and how others have been affected by IoT compromises. The presentation then outlines a basic IoT security checklist and covers common attack vectors like weak passwords, lack of encryption and patching, and physical security issues. It emphasizes the importance of inventory, segmentation, strong unique passwords, logging, and engagement with device vendors on security responsibilities and practices.
FortiRecon is a digital risk protection service that provides earlier warning and insights into risks. It monitors an organization's external attack surface, brand protection, and provides curated threat intelligence reports. FortiRecon identifies vulnerabilities, unknown assets, brand attacks, and imminent threats. This enables organizations to take earlier mitigating actions to reduce the impact and cost of attacks. It offers comprehensive digital asset discovery, attack surface exposure monitoring, and brand protection monitoring and takedown services.
The document provides information on incident response and handling. It discusses:
1) How an incident response team would investigate a denial of service attack by identifying affected resources, analyzing the incident, assigning an identity and severity level, assigning team members, containing threats, collecting evidence, and performing forensic analysis.
2) General guidelines for incident response including identifying affected systems, analyzing the incident, assigning an identifier and severity, assigning a response team, containing threats, collecting evidence, and conducting forensic analysis.
3) Types of information to include in incident reports such as the intensity of the breach, system logs, and synchronization details.
CLASS 2022 - Luiz Fernando Roth e Matheus Tourinho - Ataques Cibernéticos a A...TI Safe
O documento discute ataques cibernéticos em ambientes industriais, descrevendo técnicas como engenharia social, reverse shell, keylogger, fork bomb, phishing e ransomware. Ele também explica como o framework MITRE ATT&CK documenta táticas, técnicas e procedimentos comuns usados em ataques avançados.
CLASS 2022 - Júlio Omori (COPEL) e Tânia Marques (consultora independente) - ...TI Safe
O documento discute os desafios do saneamento em cidades inteligentes. Ele explica que as cidades só podem se tornar verdadeiramente inteligentes quando as utilities de saneamento também se tornam inteligentes e compartilham dados de forma segura. Finalmente, destaca grandes desafios como conectividade, cibersegurança, integração de sistemas e soluções ponta a ponta para infraestruturas inteligentes.
CLASS 2022 - Rodrigo Riella (Lactec) e Claudio Hermeling (TI Safe) - A impor...TI Safe
O documento discute a importância de um laboratório de segurança cibernética industrial para infraestruturas críticas. Ele destaca exemplos de laboratórios em Israel e Portugal e requisitos para um laboratório no setor elétrico brasileiro. O documento também descreve os serviços e desafios de um laboratório como o Energy Cybersecurity Lab, uma parceria entre LACTEC e TI Safe para pesquisa, desenvolvimento e treinamento em segurança cibernética para redes de automação de energia elétrica.
CLASS 2022 - Thiago Branquinho (TI Safe) - Como implementar e certificar um S...TI Safe
O documento discute a certificação do ICS-SOC da TI Safe segundo a norma IEC 62443-2-4. Apresenta os requisitos da norma, o processo de certificação e os desafios de manter a conformidade no futuro, como remediar desvios, revisar documentação e elevar a maturidade dos processos.
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...TI Safe
This document discusses cybersecurity in electrical networks. It provides an overview of the evolving cyber threat landscape, and outlines a holistic approach to cybersecurity involving technology, processes, and people. The document discusses key cybersecurity standards like ISO/IEC 27001, IEC 62443, and IEC 62351. It also outlines Siemens' cybersecurity offerings, including secure products, certified solutions, and support services.
CLASS 2022 - Eduardo Valério (Ternium) - Uma década de cibersegurança em OT, ...TI Safe
O documento descreve a jornada de 10 anos de cibersegurança da Ternium, começando com os desafios iniciais de proteger processos industriais críticos e sistemas de informação. Foi realizada uma análise de riscos com base em normas internacionais e implantada uma defesa em camadas com segmentação de rede, firewalls e monitoramento. O projeto evoluiu para um modelo multinacional com centralização e proteção dedicada para linhas críticas. Próximos passos incluem a adição de soluções de OT e aperfei
CLASS 2022 - Felipe Jordão (Palo Alto Networks) - Boas práticas de operações ...TI Safe
This document discusses best practices for operational technology (OT) security in a hyperconnected world. It outlines the current cybersecurity challenges faced by industries due to expanding attack surfaces and evolving threats. It recommends establishing pillars like segmentation, zero trust, and access control policies based on users to protect OT environments. The document also describes implementing a next-generation firewall, multi-factor authentication, endpoint security, event correlation and response workflows to enhance industrial cybersecurity.
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...TI Safe
1) Thales provides data encryption and security solutions for critical infrastructure sectors like utilities and energy. It has the number 1 market share for payment hardware security modules, general purpose HSMs, and cloud HSMs.
2) Cyber attacks on critical infrastructure are increasing, with ransomware attacks hitting 649 entities in 2021. Operational technology systems are also vulnerable, suffering 83% of breaches.
3) Thales provides end-to-end encryption solutions for critical infrastructure clients to securely transmit sensitive data. Case studies outline deployments for a global energy company and major UK energy operator to encrypt data across hybrid IT and protect critical communications.
CLASS 2022 - Roberto Engler Jr. (IBM) - Gestão e monitoramento de alto nível ...TI Safe
O documento discute a importância de uma plataforma avançada de detecção e resposta a incidentes em ambientes OT/IOT. Apresenta dados sobre os setores mais atacados em 2021, com a manufatura em primeiro lugar. Também analisa as principais ameaças, vetores de ataque e regiões impactadas para os setores de manufatura, energia e transporte.
CLASS 2022 - Maiko Oliveira (Microsoft) - Convergência TO E TI, proteção tota...TI Safe
O documento discute a convergência entre Operational Technology (OT) e Information Technology (IT) e como proteger sistemas cibernéticos conectados à internet. Ele aborda a evolução dos sistemas de controle industrial, padrões como a ISA/IEC 62443 para segurança cibernética e desafios como ataques crescentes a sistemas industriais de controle.
Vitor Sena e Daniel Quintão (Gerdau) - Projeto, implantação, gestão e monitor...TI Safe
Este documento discute a segurança cibernética no ambiente industrial da Gerdau, uma das principais produtoras de aço das Américas. O documento descreve a estrutura do projeto de segurança de redes industriais da Gerdau, incluindo as etapas de levantamento de campo, suprimentos, operação assistida, projeto e planejamento, e preparação e implantação. O projeto teve resultados positivos como nenhuma indisponibilidade causada e forte engajamento entre as equipes.
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...TI Safe
Critical infrastructure is increasingly being targeted by ransomware attacks and hacking, which have evolved from purely financially motivated crimes to acts of terrorism in some cases. A holistic approach is needed to address cybersecurity across both information technology and operational technology systems. Recent high-profile ransomware attacks have caused widespread disruptions by targeting critical infrastructure providers like the Colonial Pipeline and meat processor JBS. These attacks highlight the growing dangers posed by ransomware to critical industries and underscore the importance of proper cybersecurity policies, monitoring, and backups.
CLASS 2022 - Júlio Cezar de Oliveira (Hitachi Energy) - Cibersegurança na era...TI Safe
O documento discute a aplicação dos conceitos de cibersegurança e defesa em profundidade em subestações digitais na era da IEC 61850. Ele descreve um projeto de P&D de uma subestação digital que aplicou esses conceitos por meio de segmentação de redes, proteção de pontos finais, firewalls diversificados, autenticação, criptografia e hardening do sistema de acordo com padrões como a IEC 62351 e IEC 62443. O projeto gerou conhecimento para melhorar aplicações futuras de subestações digitais en
CLASS 2022 - Denis Sousa, Abner Bueno e Eduardo Pontes (Norte Energia) - Anál...TI Safe
O documento discute a análise de riscos de cibersegurança, planejamento e implantação de contramedidas para conformidade com as novas regras do ONS para o Complexo de Belo Monte. Apresenta o histórico de cibersegurança da Norte Energia, a necessidade de conformidade regulatória e o planejamento de segurança. Também descreve a contratação da TI Safe para fornecer a solução ONS Ready e o progresso do projeto, com a Fase 1 concluída e a Fase 2 parcialmente implementada.
O documento discute conceitos como resiliência cibernética, antifragilidade cibernética, efeito Lindy, via negativa, pele no jogo e mercados impulsionando mudanças. Reforça a importância de visibilidade, inventário, segmentação e controle de anomalias para segurança cibernética bem feita.
CLASS 2022 - Gustavo Merighi (Energisa) e Alessandro Moretti (Thales) - O Des...TI Safe
O documento discute o desafio de implementar controle de acesso e autenticação multifator (MFA) no Grupo Energisa. O Grupo Energisa implementou uma solução tecnológica de MFA para melhorar a segurança, cumprir normas regulatórias e restringir acessos não autorizados. A implantação enfrentou desafios como a falta de base centralizada de usuários e mudança de cultura. A solução é gerenciada por meio de um SOC interno que monitora tentativas inválidas de login e aprova novos
CLASS 2022 - Marcelo Branquinho (TI Safe) - Ameaças Modernas e Ataques às red...TI Safe
O documento apresenta as principais ameaças cibernéticas a redes industriais, focando no cenário brasileiro. Apresenta os fatores de risco como ataques poderosos e o mundo em colapso, as ameaças reais como a profissionalização do cibercrime, e os resultados da 4a pesquisa TI Safe sobre a cibersegurança industrial no Brasil.
Webinar cci por que nao se deve contratar so cs de ti hibridos para proteg...TI Safe
Este documento discute por que não se deve contratar SOCs de TI/híbridos para proteger redes industriais. Primeiramente, devido às diferenças no viés operacional entre TI e automação industrial, com a disponibilidade sendo o principal pilar de segurança para sistemas industriais. Além disso, pessoas, tecnologias e serviços de um SOC de TI podem não ser adequados para redes industriais e colocar a operação em risco. Um SOC dedicado à automação industrial deve ter especialistas qualificados, tecnologias apropriadas e procedimentos volt
Em 2020 o mundo experimentou uma situação inédita para a maioria dos seres humanos: uma pandemia global, provocada por um vírus desconhecido, que gerou mudanças significativas na vida de todos. No universo das empresas, foi observado um movimento de intensa digitalização de processos e adequação ao distanciamento social. Muitas delas, inclusive as indústrias, adotaram o trabalho remoto para seus colaboradores. Conforme as empresas adaptaram as suas operações, os criminosos também estabeleceram mudanças. São facilmente encontradas notícias relativas a golpes por email, WhatsApp e telefone. E com “chave de ouro”, 2021 foi aberto com o mega (ou seriaTera?) vazamento de dados de brasileiros, o que fornece mais combustível para esses golpes. O ICS-SOC (Centro de Operações de Segurança Cibernética Industrial, localizado no Rio de Janeiro) da TI Safe protege seus clientes contra ataques cibernéticos que possam afetar suas operações, fundamentais para a população e a cadeia de suprimentos do Brasil.Os dados de (milhões de) ataques de 2020, relativos a projetos desenvolvidos pela empresa, foram analisados para entender o aumento dos ataques em relação a 2019. Por uma questão de privacidade dos dados dos clientes, as informações serão apresentadas em percentuais.
O documento discute os novos procedimentos de segurança cibernética para adequação à rede do Operador Nacional do Sistema Elétrico (ONS), incluindo a implementação de controles de segurança em três ondas ao longo de três anos. A TI Safe propõe sua solução "ONS Ready" para ajudar as empresas de energia a cumprir os novos requisitos de segurança cibernética.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
High performance Serverless Java on AWS- GoTo Amsterdam 2024Vadym Kazulkin
Java is for many years one of the most popular programming languages, but it used to have hard times in the Serverless community. Java is known for its high cold start times and high memory footprint, comparing to other programming languages like Node.js and Python. In this talk I'll look at the general best practices and techniques we can use to decrease memory consumption, cold start times for Java Serverless development on AWS including GraalVM (Native Image) and AWS own offering SnapStart based on Firecracker microVM snapshot and restore and CRaC (Coordinated Restore at Checkpoint) runtime hooks. I'll also provide a lot of benchmarking on Lambda functions trying out various deployment package sizes, Lambda memory settings, Java compilation options and HTTP (a)synchronous clients and measure their impact on cold and warm start times.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
Palestra realizada no S4x17 - Miami - EUA (em Inglês)
1. TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Ransomware in ICS..... It begins
Marcelo Branquinho
January, 2017
2. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
• Introduction
• About Ransomware
• Ransomware in ICS
Study Case #1 – Furniture Factory
Study Case #2 – Electrical Company
• What if the worst happens?
Agenda
3. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
INTRODUCTION
4. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Threats have changed: Advanced Attacks
Data Data
Internet
Encryption Targeted
PURPOSE: Profit, Sabotage and Conflict
among organized nations
• Targeted Attacks
• Funded – Industry Growing Focus
PURPOSE: Notoriety
• One person, small groups
• Limited Knowledge and
Resources
• Basic Attacks
Internet
?Past
Present
5. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
SCADA / ICS - The perfect storm for cyber attacks
6. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Unknown control and persistent advanced threats
Malware impacting industrial production
7. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
The scenery is bad, but can it get worse ??
8. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
The attackers have figured
out that ICS are an easy
target…..and started to
attack them!
Sure!!
9. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
ABOUT RANSOMWARE
10. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
What is Ransomware?
• Ransomware is a type of
malware that prevents the
user from accessing your
data.
• The user will recover
access to the data only by
paying a redemption.
• Ransomware affects
directly the availability of ICS
by blocking access to vital
information for its operation.
11. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Is Ransomware a new threat?
12. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Ransomware in ICS....It Begins
13. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
14. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
The redemption is rising...just happened last week
15. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Ransomware in OT x Ransomware in IT
• Ransomware in OT can be much worst than Ransomware in IT because it
can directly affect SCADA systems operation by:
Blocking Access to HMIs
Ciphering Windows SCADA supervision and programming machines
(HMI)
Ciphering Historians and Production Databases
Ciphering Engineering stations
Spreading to other plants through remote access or VPNs
Blocking access to utilities systems
16. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
RANSOMWARE IN ICS
TWO STUDY CASES IN BRAZIL
17. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
STUDY CASE #1
FURNITURE FACTORY
18. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Study Case #1 – Furniture Factory
• Where: State of Goias, Brazil
• Type of Ransomware: cryptoRSA4096-Ransomware
• Machines infected: Windows SCADA supervision and programming
machines (HMI) inside the factory.
19. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Study Case #1 – Furniture Factory
• Consequence: The factory stopped working. The company lost customer
and supplier registrations, employee payroll and machine supervision and
programming.
• Redemption requested: U$ 3.061,00
• Financial Loss: The factory stayed 15 days stopped (loss of
approximately US $ 100,000.00 due to downtime in production and
delays in deliveries), until it restructured, to return the normal routines.
• No redemption was paid for infected machines that had to be fully
recovered because the OT team didn´t have healthy and updated
backups.
20. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Video - Ransomware in Furniture Factory
Video produced by Globo TV (Brazil) and broadcasted for the
whole brazilian territory at “Fantastico”, a sunday night TV show
21. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
STUDY CASE #2
ELECTRICAL COMPANY
Special thanks to Mr. Alexandre Freire, from the Palo Alto Networks
SCADA & ICS Tiger Team, for sharing information over this study case
22. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Study case #2 – Electrical Company
• Where: South of Brazil
• Type of Ransomware: CryptoLocker
• Machines infected: Windows SCADA supervision machines (HMI) inside a
control center.
23. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Study case #2 – Electrical Company
• Infection Vector: A Flash Drive used at one HMI. The ransomware
spreaded through file shares and network mapped folders infecting other 3
supervision stations at the same automation network segment.
• Consequence: momentary loss of supervision and control of power
distribution.
• Redemption requested: USD 300,00 per machine (4 machines were
infected)
• Financial Loss: No financial loss happened because the control was
automatically transferred to a secondary control center that wasn´t
physically connected to the main control center. No redemption was paid
for infected machines that could be resettled through healthy backups.
24. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
WHAT IF THE WORST HAPPENS?
25. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
What if the worst happens?
When mitigation fails, it is important for organizations and individuals to
consider all possible responses to a Ransomware attack:
• Have a prepared incident response team: This team must have previously
planned a procedure to follow in the event of a ransomware attack during its risk
assessment. This procedure should start notifying the authorities and regulators
because Ransomware attacks are crimes prescribed by law.
• Switch control to a secondary control center: in case of non stop real time
systems, a secondary control center must be fully prepared to be activated.
• Try to recover lost data: System backup and recovery are the only technical
solution to revert ransomware attacks. Having updated backups is vital in cases of
critical data loss. In this case, it will be necessary to perform a recover of the systems
and data to return to normal business activity.
• Do Nothing: In cases where the rescue outweighs the cost of the system, the victim
can purchase a new device and dispose of the infected system.
26. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
What if the worst happens? ( cont.. )
• Pay the redemption: Some attackers may release the system after receiving
payment, because doing different would reduce the probability that new victims will fall
into the blow. Unfortunately, however, there is no guarantee that the attackers would
help you recover the data after the redemption paid.
•A Hybrid Solution: includes simultaneous efforts to pay the rescue and attempt to
restore systems from a trusted backup. Organizations opt for this strategy when
system downtime is even more critical than the consequences of the redemption
payment.
27. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
An important detail ....
• Modern Ransomware is able to search servers and backup applications
running on the network and also encrypt them ...
• In these cases, the only possible solution will be to pay the redemption.
• Paying redemptions can be easy for private institutions, but public companies
do not have the money allocated for this ... They would have to bid the
redemption
28. www.tisafe.com TI Safe Segurança da Informação LTDA, 2007-2010.Todos os direitos reservados.
Marcelo Branquinho
Marcelo.branquinho@tisafe.com
+55 21 994002290