SlideShare a Scribd company logo
©2015 Check Point Software Technologies Ltd. 1
ZERO TOLERANCE
When it comes to protecting your critical infrastructure,
even small failures have huge consequences
©2015 Check Point Software Technologies Ltd. 2
Industrial Control Systems (ICS) Are All Around Us
… and we rely on it every day for our basic functions and needs.
Shipping Traffic ControlFirst Responder Dispatch
Water Treatment Power Transportation
[Protected] Non-confidential content
©2015 Check Point Software Technologies Ltd. 3
Impact of Critical Infrastructure Interruptions
Megacities like New York, Tokyo,
London, Paris rely daily on their
infrastructure:
• Home to 6.7% of world population
• Use 9.6% of global electricity usage
• Produce 12.6% of global waste
Economic impact per day for NYC:
• $3.6 Billion lost revenue
©2015 Check Point Software Technologies Ltd. 44©2014 Check Point Software Technologies Ltd.
Zero Tolerance
for ICS
downtime of any kind
[Protected] Non-confidential content
©2015 Check Point Software Technologies Ltd. 5
The Zero Tolerance Environment
SCADA Environments
SCADA Worlds
©2015 Check Point Software Technologies Ltd. 6©2015 Check Point Software Technologies Ltd. 6©2015 Check Point Software Technologies Ltd. 6[Protected] Non-confidential content
Unique ICS Traits
Survival in Harsh Environments
Unique SCADA Languages
Basic Commands
Large Mechanical Controls
Large Scale Deployments
©2015 Check Point Software Technologies Ltd. 7
OT Security Blueprint
Management Facility
Shop Floor Shop Floor
Control &
monitor
SCADA
Historian
SCADA
VPN
PLC1 PLC2 PLC3 PLC4
Main
Control
Center
Control
Monitor
SmartEvent
[Protected] Non-confidential content
©2015 Check Point Software Technologies Ltd. 8
Full IT-OT Convergence Blueprint
[Protected] Non-confidential content
©2015 Check Point Software Technologies Ltd. 9
Zero Tolerance Means Anticipating Attacks for
IT and SCADA/ICS Equipment
Spear Phishing USB/CD Attacks Targeting Contractors
Free USB Stick
or Music CD
The ‘Symposium’
Spear Phishing
Vendor Access
Credentials
800 Just the IT patches released
in first six months of 2015
[Protected] Non-confidential content
©2015 Check Point Software Technologies Ltd. 10
How would you grade your
Industrial Control Systems
protection?
©2015 Check Point Software Technologies Ltd. 11
Summary
Protecting industrial control systems should
mean Zero Tolerance for mistakes
Hardware that can survive is crucial
Protection is all about capacity and
depth of coverage
[Protected] Non-confidential content
©2015 Check Point Software Technologies Ltd. 12
ZERO TOLERANCE
When it comes to protecting your critical infrastructure,
even small failures have huge consequences
Download the Report to
See How Your Solution
Scored

More Related Content

What's hot

Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
MarketingArrowECS_CZ
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
AlgoSec
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
e-Xpert Solutions SA
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
e-Xpert Solutions SA
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
Moti Sagey מוטי שגיא
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
MarketingArrowECS_CZ
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
Skybox Security
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
MarketingArrowECS_CZ
 
SandBlast Agent
SandBlast AgentSandBlast Agent
SandBlast Agent
MarketingArrowECS_CZ
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
Moti Sagey מוטי שגיא
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
Moti Sagey מוטי שגיא
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
Moti Sagey מוטי שגיא
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
AlgoSec
 
Network Security Best Practices - Reducing Your Attack Surface
Network Security Best Practices - Reducing Your Attack SurfaceNetwork Security Best Practices - Reducing Your Attack Surface
Network Security Best Practices - Reducing Your Attack Surface
Skybox Security
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey מוטי שגיא
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
Moti Sagey מוטי שגיא
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
Moti Sagey מוטי שגיא
 

What's hot (20)

Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
SandBlast Agent
SandBlast AgentSandBlast Agent
SandBlast Agent
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Network Security Best Practices - Reducing Your Attack Surface
Network Security Best Practices - Reducing Your Attack SurfaceNetwork Security Best Practices - Reducing Your Attack Surface
Network Security Best Practices - Reducing Your Attack Surface
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 

Viewers also liked

Anaisis Apple
Anaisis AppleAnaisis Apple
Zero tolerance ppt
Zero tolerance pptZero tolerance ppt
Zero tolerance pptguestba26f5
 
はじめてのライトニングトーク~まとめる・伝える・学びあう 5分間プレゼンテーション~【平成28年度 第6回市民活動活性化講座】
はじめてのライトニングトーク~まとめる・伝える・学びあう 5分間プレゼンテーション~【平成28年度 第6回市民活動活性化講座】はじめてのライトニングトーク~まとめる・伝える・学びあう 5分間プレゼンテーション~【平成28年度 第6回市民活動活性化講座】
はじめてのライトニングトーク~まとめる・伝える・学びあう 5分間プレゼンテーション~【平成28年度 第6回市民活動活性化講座】
Hiroyuki Ishikawa
 
UNESCO ASP Latvijā un pasaulē
UNESCO ASP Latvijā un pasaulēUNESCO ASP Latvijā un pasaulē
UNESCO ASP Latvijā un pasaulē
Latvian National Commission for UNESCO
 
Metacognicion
MetacognicionMetacognicion
Metacognicion
Gustavo Torres
 
Web engineering notes unit 2
Web engineering notes unit 2Web engineering notes unit 2
Web engineering notes unit 2
inshu1890
 
自律的なチームを作る
自律的なチームを作る自律的なチームを作る
自律的なチームを作る
Yuki Kanaya
 
61 fasciculo-3-habilidades-sociales (2)
61 fasciculo-3-habilidades-sociales (2)61 fasciculo-3-habilidades-sociales (2)
61 fasciculo-3-habilidades-sociales (2)
miguel angel fernandez chafloque
 
Azure ml and dynamics 365
Azure ml and dynamics 365Azure ml and dynamics 365
Azure ml and dynamics 365
Jivtesh Singh
 
Quality Management Orientation Program
Quality Management Orientation ProgramQuality Management Orientation Program
Quality Management Orientation Program
Kaye Tacuel, RN
 
Patient Safety & Risk Management Staff Orientation
Patient Safety & Risk Management Staff OrientationPatient Safety & Risk Management Staff Orientation
Patient Safety & Risk Management Staff Orientation
ibn_al07
 
Konsep Komunikasi__Materi Pelatihan Effective CORPORATE COMMUNICATION SKILLS
Konsep Komunikasi__Materi Pelatihan Effective CORPORATE COMMUNICATION SKILLSKonsep Komunikasi__Materi Pelatihan Effective CORPORATE COMMUNICATION SKILLS
Konsep Komunikasi__Materi Pelatihan Effective CORPORATE COMMUNICATION SKILLS
Kanaidi ken
 

Viewers also liked (13)

Anaisis Apple
Anaisis AppleAnaisis Apple
Anaisis Apple
 
Zero tolerance ppt
Zero tolerance pptZero tolerance ppt
Zero tolerance ppt
 
はじめてのライトニングトーク~まとめる・伝える・学びあう 5分間プレゼンテーション~【平成28年度 第6回市民活動活性化講座】
はじめてのライトニングトーク~まとめる・伝える・学びあう 5分間プレゼンテーション~【平成28年度 第6回市民活動活性化講座】はじめてのライトニングトーク~まとめる・伝える・学びあう 5分間プレゼンテーション~【平成28年度 第6回市民活動活性化講座】
はじめてのライトニングトーク~まとめる・伝える・学びあう 5分間プレゼンテーション~【平成28年度 第6回市民活動活性化講座】
 
UNESCO ASP Latvijā un pasaulē
UNESCO ASP Latvijā un pasaulēUNESCO ASP Latvijā un pasaulē
UNESCO ASP Latvijā un pasaulē
 
Metacognicion
MetacognicionMetacognicion
Metacognicion
 
Web engineering notes unit 2
Web engineering notes unit 2Web engineering notes unit 2
Web engineering notes unit 2
 
自律的なチームを作る
自律的なチームを作る自律的なチームを作る
自律的なチームを作る
 
61 fasciculo-3-habilidades-sociales (2)
61 fasciculo-3-habilidades-sociales (2)61 fasciculo-3-habilidades-sociales (2)
61 fasciculo-3-habilidades-sociales (2)
 
Azure ml and dynamics 365
Azure ml and dynamics 365Azure ml and dynamics 365
Azure ml and dynamics 365
 
Quality Management Orientation Program
Quality Management Orientation ProgramQuality Management Orientation Program
Quality Management Orientation Program
 
Patient Safety & Risk Management Staff Orientation
Patient Safety & Risk Management Staff OrientationPatient Safety & Risk Management Staff Orientation
Patient Safety & Risk Management Staff Orientation
 
International patient safety goals
International patient safety goals International patient safety goals
International patient safety goals
 
Konsep Komunikasi__Materi Pelatihan Effective CORPORATE COMMUNICATION SKILLS
Konsep Komunikasi__Materi Pelatihan Effective CORPORATE COMMUNICATION SKILLSKonsep Komunikasi__Materi Pelatihan Effective CORPORATE COMMUNICATION SKILLS
Konsep Komunikasi__Materi Pelatihan Effective CORPORATE COMMUNICATION SKILLS
 

Similar to Protecting Critical Infastrucutre: Zero Tolerance

Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
CSA Argentina
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
Cristian Garcia G.
 
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
MarketingArrowECS_CZ
 
Tomas_Votruba_-_CP_ICS_Solution_for_CI_and_Industrial (1).pptx
Tomas_Votruba_-_CP_ICS_Solution_for_CI_and_Industrial (1).pptxTomas_Votruba_-_CP_ICS_Solution_for_CI_and_Industrial (1).pptx
Tomas_Votruba_-_CP_ICS_Solution_for_CI_and_Industrial (1).pptx
TefElbert
 
How to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNowHow to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNow
SecPod
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
TI Safe
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
vSEC pro VMware NSX
vSEC pro VMware NSXvSEC pro VMware NSX
vSEC pro VMware NSX
MarketingArrowECS_CZ
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Pointaliciasyc
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
Waterfall Security Solutions
 
Ibm iot overview
Ibm   iot overviewIbm   iot overview
Ibm iot overview
Eric Cattoir
 
Industria 4.0. Lucca, 5 luglio 2017 - The Connected Enterprise
Industria 4.0. Lucca, 5 luglio 2017 - The Connected EnterpriseIndustria 4.0. Lucca, 5 luglio 2017 - The Connected Enterprise
Industria 4.0. Lucca, 5 luglio 2017 - The Connected Enterprise
CONFINDUSTRIA TOSCANA NORD
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
Cisco Canada
 
智慧市政大未來 主題一
智慧市政大未來 主題一智慧市政大未來 主題一
智慧市政大未來 主題一
Mavis CHU
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
MarketingArrowECS_CZ
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
TI Safe
 
Keynote Ouverture Plénière - Sébastien Verger
Keynote Ouverture Plénière - Sébastien VergerKeynote Ouverture Plénière - Sébastien Verger
Keynote Ouverture Plénière - Sébastien Verger
RSD
 
relayr IoT Innovation Acceleration
relayr IoT Innovation Accelerationrelayr IoT Innovation Acceleration
relayr IoT Innovation Acceleration
Jens Mueller
 
Report the whole IoT r0.0.pptx
Report   the whole IoT r0.0.pptxReport   the whole IoT r0.0.pptx
Report the whole IoT r0.0.pptx
oldmanegan
 

Similar to Protecting Critical Infastrucutre: Zero Tolerance (20)

Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
 
Tomas_Votruba_-_CP_ICS_Solution_for_CI_and_Industrial (1).pptx
Tomas_Votruba_-_CP_ICS_Solution_for_CI_and_Industrial (1).pptxTomas_Votruba_-_CP_ICS_Solution_for_CI_and_Industrial (1).pptx
Tomas_Votruba_-_CP_ICS_Solution_for_CI_and_Industrial (1).pptx
 
How to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNowHow to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNow
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
vSEC pro VMware NSX
vSEC pro VMware NSXvSEC pro VMware NSX
vSEC pro VMware NSX
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
 
Three Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and EngineeringThree Networks, Different Risks - IT, OT and Engineering
Three Networks, Different Risks - IT, OT and Engineering
 
Ibm iot overview
Ibm   iot overviewIbm   iot overview
Ibm iot overview
 
Industria 4.0. Lucca, 5 luglio 2017 - The Connected Enterprise
Industria 4.0. Lucca, 5 luglio 2017 - The Connected EnterpriseIndustria 4.0. Lucca, 5 luglio 2017 - The Connected Enterprise
Industria 4.0. Lucca, 5 luglio 2017 - The Connected Enterprise
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
 
智慧市政大未來 主題一
智慧市政大未來 主題一智慧市政大未來 主題一
智慧市政大未來 主題一
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Keynote Ouverture Plénière - Sébastien Verger
Keynote Ouverture Plénière - Sébastien VergerKeynote Ouverture Plénière - Sébastien Verger
Keynote Ouverture Plénière - Sébastien Verger
 
relayr IoT Innovation Acceleration
relayr IoT Innovation Accelerationrelayr IoT Innovation Acceleration
relayr IoT Innovation Acceleration
 
Report the whole IoT r0.0.pptx
Report   the whole IoT r0.0.pptxReport   the whole IoT r0.0.pptx
Report the whole IoT r0.0.pptx
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Protecting Critical Infastrucutre: Zero Tolerance

  • 1. ©2015 Check Point Software Technologies Ltd. 1 ZERO TOLERANCE When it comes to protecting your critical infrastructure, even small failures have huge consequences
  • 2. ©2015 Check Point Software Technologies Ltd. 2 Industrial Control Systems (ICS) Are All Around Us … and we rely on it every day for our basic functions and needs. Shipping Traffic ControlFirst Responder Dispatch Water Treatment Power Transportation [Protected] Non-confidential content
  • 3. ©2015 Check Point Software Technologies Ltd. 3 Impact of Critical Infrastructure Interruptions Megacities like New York, Tokyo, London, Paris rely daily on their infrastructure: • Home to 6.7% of world population • Use 9.6% of global electricity usage • Produce 12.6% of global waste Economic impact per day for NYC: • $3.6 Billion lost revenue
  • 4. ©2015 Check Point Software Technologies Ltd. 44©2014 Check Point Software Technologies Ltd. Zero Tolerance for ICS downtime of any kind [Protected] Non-confidential content
  • 5. ©2015 Check Point Software Technologies Ltd. 5 The Zero Tolerance Environment SCADA Environments SCADA Worlds
  • 6. ©2015 Check Point Software Technologies Ltd. 6©2015 Check Point Software Technologies Ltd. 6©2015 Check Point Software Technologies Ltd. 6[Protected] Non-confidential content Unique ICS Traits Survival in Harsh Environments Unique SCADA Languages Basic Commands Large Mechanical Controls Large Scale Deployments
  • 7. ©2015 Check Point Software Technologies Ltd. 7 OT Security Blueprint Management Facility Shop Floor Shop Floor Control & monitor SCADA Historian SCADA VPN PLC1 PLC2 PLC3 PLC4 Main Control Center Control Monitor SmartEvent [Protected] Non-confidential content
  • 8. ©2015 Check Point Software Technologies Ltd. 8 Full IT-OT Convergence Blueprint [Protected] Non-confidential content
  • 9. ©2015 Check Point Software Technologies Ltd. 9 Zero Tolerance Means Anticipating Attacks for IT and SCADA/ICS Equipment Spear Phishing USB/CD Attacks Targeting Contractors Free USB Stick or Music CD The ‘Symposium’ Spear Phishing Vendor Access Credentials 800 Just the IT patches released in first six months of 2015 [Protected] Non-confidential content
  • 10. ©2015 Check Point Software Technologies Ltd. 10 How would you grade your Industrial Control Systems protection?
  • 11. ©2015 Check Point Software Technologies Ltd. 11 Summary Protecting industrial control systems should mean Zero Tolerance for mistakes Hardware that can survive is crucial Protection is all about capacity and depth of coverage [Protected] Non-confidential content
  • 12. ©2015 Check Point Software Technologies Ltd. 12 ZERO TOLERANCE When it comes to protecting your critical infrastructure, even small failures have huge consequences Download the Report to See How Your Solution Scored