FOUR
FOUR
FOUR
MYTHS
MYTH
ONE:
MYTH
ONE:
INVESTIGATIONS SHOW
INVESTIGATIONS SHOW
 That even systems which are claimed
 to not be connected to the internet…
INVESTIGATIONS SHOW
 That even systems which are claimed




       ARE
 to not be connected to the internet…




 ...
MYTH
TWO:
MYTH
TWO:
WE HAVE
FOUND
VIRUSES
WE HAVE
FOUND
VIRUSES
WE HAVE
FOUND
   at
VIRUSES
WE HAVE
FOUND

        EVERY
   at
VIRUSES
WE HAVE
FOUND

        EVERY
   at

        location that we have been checking systems…
That’s a
That’s a




100%
That’s a




100%       hit rate!
MYTH
THREE:
MYTH
THREE:
WE HAVE

SEEN
VIRUSES
WE HAVE

SEEN
VIRUSES
WE HAVE

SEEN
transmitted via infected USB sticks, hard-drives and laptops
VIRUSES
WE HAVE

SEEN
  transmitted via infected USB sticks, hard-drives and laptops



                         vendors
even from
VIRUSES
WE HAVE

SEEN
  transmitted via infected USB sticks, hard-drives and laptops



                         vendors
even from




   that should have been fine
MYTH
FOUR:
MYTH
FOUR:
50%
50%   of the incidents
      investigated
      by the US ICS-CERT
      !
50%                                   of the incidents
                                      investigated
                                      by the US ICS-CERT
                                      !
are found to be attacks specifically aimed at control systems
50%                                    of the incidents
                                       investigated
                                       by the US ICS-CERT
                                       !
 are found to be attacks specifically aimed at control systems

With the average
time between
attack and
discovery coming in at
50%                                    of the incidents
                                       investigated
                                       by the US ICS-CERT
                                       !
 are found to be attacks specifically aimed at control systems

With the average
time between
attack and
                             EIGHTEEN
discovery coming in at
                             MONTHS
Still believe these process security myths?
It’s up to you to ensure
that your systems are
safe.
It’s up to you to ensure
that your systems are
safe.
It’s up to you to ensure
that your systems are
safe.




             Amor Energy here

Process Control Security Myths