SlideShare a Scribd company logo
1 of 12
Protecting the Energy Supply Chain –
From Cyber Attacks to Drones
EgisData solutions
presented by Tom Z.,
Thomas Zakrzewski: Founder and Managing Partner at EgisData, a company
providing an Attribute Based Access Control engine and data privacy. Thomas is
a Former Distinguished Engineer and Head of Blockchain at S&P Global Ratings.
He developed products to protect private and confidential information using
advanced cryptography and blockchain.
He co-authored a patent for a solution addressing issues with data privacy, data localization, and
preparedness for post-quantum ciphers using advanced cryptography and blockchain.
Tom has over 25 years of IT experience in the Financials, Software Engineering, Telecom, e-
Commerce, Distribution & Logistics, and Healthcare industries. He holds a Bachelor’s Degree in
Computer Science and Mathematics from Montclair State University, and a Master’s Degree in
Predictive Analytics from Northwestern University.
Throughout his career, he held numerous positions ranging from developer, to architect, to CIO.
Currently he serves on the Advisory Boards for the Montclair State University, and New Jersey
Institute of Technology (NJIT).
Tom is also a Visiting Technologist Fellow at the National Security Institute (NSI) and is a frequent
speaker at conferences discussing blockchain security, cryptoassets, and quantitative models.
Supply Chain Management
● Definition
o A supply chain is a system of organizations, people, activities, information, and resources involved in
supplying a product or service to a consumer
● Evolution of supply chain management in the age of automation
o Many tasks are automated by AI and the transfer of goods between tasks of the process are often controlled
by IoT devices
● Monitoring the process flow
○ Each party participating in the process of supply chain bears a responsibility to complete their steps
○ Disruptions for most part are only visible to consumers at the end of the supply chain
○ Disruptions by suppliers and resultant spillover effects are often unnoticeable until is too late
● Disruption predictions
o Modeling of risk in supply chain management is complex and challenging
o Modeling needs to take interconnectedness of suppliers and supplies into account
o There is notable resemblance of modeling risk in supply chain management to modeling risk in interconnected
banking systems
Simplified Threat Model
● Countermeasures
o Digital
 Authentication and authorization
 Encryption at rest and in transport
o Physical
 AI weaponry
● Threats
o Digital – cyber attacks
o Physical – Unmanned Aerial Vehicles (UAV) - drones
o Disruptions to Counterparties - consequences of
disruptions
Physical Threats – Drones
● Notable incidents
o September 14, 2019: attack on Saudi Aramco oil facilities near the
cities of Abqaiq and Khurais in Saudi Arabia
● Commercial and military use of drones
○ In 2020 there are 3.55 M small drones in the US alone
○ Over 36 countries produce and possess armed drones
● Protection by autonomous weaponry powered by AI
o UAV (Unmanned Autonomous Vehicle) platform that autonomously detects, hunts,
and takes down other small UAVs in GPS-denied environments (Wyder et al. 2019)
o Combat-proven counter drone technology by Citadel Defense (Staff Writers 2020)
Staff Writers. "Citadel Defense Launches New AI and Machine Learning Software to Detect and Defeat Air, Land, and Sea Drones". Space Daily. April 24, 2020 Friday.
Wyder, Philippe Martin, Yan-Song Chen, Adrian J. Lasrado, Rafael J. Pelles, Robert Kwiatkowski, Edith O. A. Comas, Richard Kennedy, et al. "Autonomous drone hunter operating
by deep learning and all-onboard computations in GPS-denied environments." PLoS ONE 14, no. 11 (2019): e0225092. Gale Academic OneFile (accessed December 1, 2020)
https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0225092
Digital Threats – Cyber Attacks
● Automated Supply Chain Management uses IoT devices:
o GPS devices report location of the transport
o Drones function as inspection devices
o Industrial Control Systems (ICS) devices: control processes of supply management, i.e.
temperature control, flow of oil or gas
● Exploiting ICS vulnerabilities (see appendix pages 8 - 10)
o Firmware and software vulnerabilities
o Misconfiguration: open ports, enabled protocols, elevated-privilege
o Weak authentication schemas
o Failure to protect data at transport and at rest
● Protection methods
o Frequent scanning and updates for firmware and software, code signing implementation
o Multifactor Authentication (MFA) implementation and use of Attribute Based Access Control
o Protection of private keys, ideally using advanced cryptographic schemas such as Multiparty
Computation (MPC), use of strong encryption for data protection at rest and in transport
Counterparties Disruption - Threats
● Dependencies in Supply Chain Management
o Suppliers in one chain can play roles in another chain
o Disruption in one chain supply may cause a spillover
effect on another chain
o Disruption one supplier may cause a spillover effect
on another supplier
● Complexity in modeling dependencies
o Similar models have been used in financial risk
management and measurement (Diebold et al. 2016)
o We can use variance decomposition models and use
vectors of connectedness between suppliers and
supplies (see Appendix page 11)
Diebold, Francis X., Demirer, Mert, Liu, Laura, Yilmaz, Kamil Yilmaz “Estimating global bank network connectedness”.
https://www.sas.upenn.edu/~fdiebold/papers2/DDLYpaper.pdf
Appendix – scanning net for active IoT devices
● Shodan.io is an example of
website listing scanned IoT
devices.
● Cyber adversaries may use
tools like ZenMap
Appendix – scanning IoT devices for open ports and services
● Scanner shows 3 ICS
devices: wind turbines
● Scanner lists IP addresses
for the devices along the
with their physical location
Appendix – scanning IoT device for OS and services vulnerabilities
● Devices accessed by IP
address show open ports
and communication
protocols
● Information about OS and
protocols can lead cyber
adversaries to discover
vulnerabilities
Appendix – Modeling Dependencies in Supply Chain Management
● Vectors of connectedness
between suppliers are
represented by edges in the
graph (Yilmaz and Diebold
2014)
● Dependencies represented
as directed and weighted
edges between suppliers
(example: black - 0.7, red – 0.5,
yellow - 0.3)
● Example of graphical
representation after variance
decomposition is calculated
Diebold, Francis X.,Kamil Yilmaz “Financial and Macroeconomic Connectedness”. http://financialconnectedness.org
Contact Us:
Info@EgisData.com
Find me on LinkedIn:
https://www.linkedin.com/in/tomzakrzewski

More Related Content

Similar to Protecting the Energy Supply Chain - Dubai

Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxodiliagilby
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52Felipe Prado
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfssuserc1c354
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTDaniel Wachtel
 
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsBCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsGareth Niblett
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDr. Raghavendra GS
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-ReviewAki Koivu
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
A Review On Intrusion Detection Systems To Secure IoT Networks
A Review On Intrusion Detection Systems To Secure IoT NetworksA Review On Intrusion Detection Systems To Secure IoT Networks
A Review On Intrusion Detection Systems To Secure IoT NetworksAnna Landers
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxvrickens
 

Similar to Protecting the Energy Supply Chain - Dubai (20)

Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Insecure magazine - 52
Insecure magazine - 52Insecure magazine - 52
Insecure magazine - 52
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
 
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsBCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest Threats
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...A new algorithm to enhance security against cyber threats for internet of thi...
A new algorithm to enhance security against cyber threats for internet of thi...
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
A Review On Intrusion Detection Systems To Secure IoT Networks
A Review On Intrusion Detection Systems To Secure IoT NetworksA Review On Intrusion Detection Systems To Secure IoT Networks
A Review On Intrusion Detection Systems To Secure IoT Networks
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Protecting the Energy Supply Chain - Dubai

  • 1. Protecting the Energy Supply Chain – From Cyber Attacks to Drones EgisData solutions presented by Tom Z.,
  • 2. Thomas Zakrzewski: Founder and Managing Partner at EgisData, a company providing an Attribute Based Access Control engine and data privacy. Thomas is a Former Distinguished Engineer and Head of Blockchain at S&P Global Ratings. He developed products to protect private and confidential information using advanced cryptography and blockchain. He co-authored a patent for a solution addressing issues with data privacy, data localization, and preparedness for post-quantum ciphers using advanced cryptography and blockchain. Tom has over 25 years of IT experience in the Financials, Software Engineering, Telecom, e- Commerce, Distribution & Logistics, and Healthcare industries. He holds a Bachelor’s Degree in Computer Science and Mathematics from Montclair State University, and a Master’s Degree in Predictive Analytics from Northwestern University. Throughout his career, he held numerous positions ranging from developer, to architect, to CIO. Currently he serves on the Advisory Boards for the Montclair State University, and New Jersey Institute of Technology (NJIT). Tom is also a Visiting Technologist Fellow at the National Security Institute (NSI) and is a frequent speaker at conferences discussing blockchain security, cryptoassets, and quantitative models.
  • 3. Supply Chain Management ● Definition o A supply chain is a system of organizations, people, activities, information, and resources involved in supplying a product or service to a consumer ● Evolution of supply chain management in the age of automation o Many tasks are automated by AI and the transfer of goods between tasks of the process are often controlled by IoT devices ● Monitoring the process flow ○ Each party participating in the process of supply chain bears a responsibility to complete their steps ○ Disruptions for most part are only visible to consumers at the end of the supply chain ○ Disruptions by suppliers and resultant spillover effects are often unnoticeable until is too late ● Disruption predictions o Modeling of risk in supply chain management is complex and challenging o Modeling needs to take interconnectedness of suppliers and supplies into account o There is notable resemblance of modeling risk in supply chain management to modeling risk in interconnected banking systems
  • 4. Simplified Threat Model ● Countermeasures o Digital  Authentication and authorization  Encryption at rest and in transport o Physical  AI weaponry ● Threats o Digital – cyber attacks o Physical – Unmanned Aerial Vehicles (UAV) - drones o Disruptions to Counterparties - consequences of disruptions
  • 5. Physical Threats – Drones ● Notable incidents o September 14, 2019: attack on Saudi Aramco oil facilities near the cities of Abqaiq and Khurais in Saudi Arabia ● Commercial and military use of drones ○ In 2020 there are 3.55 M small drones in the US alone ○ Over 36 countries produce and possess armed drones ● Protection by autonomous weaponry powered by AI o UAV (Unmanned Autonomous Vehicle) platform that autonomously detects, hunts, and takes down other small UAVs in GPS-denied environments (Wyder et al. 2019) o Combat-proven counter drone technology by Citadel Defense (Staff Writers 2020) Staff Writers. "Citadel Defense Launches New AI and Machine Learning Software to Detect and Defeat Air, Land, and Sea Drones". Space Daily. April 24, 2020 Friday. Wyder, Philippe Martin, Yan-Song Chen, Adrian J. Lasrado, Rafael J. Pelles, Robert Kwiatkowski, Edith O. A. Comas, Richard Kennedy, et al. "Autonomous drone hunter operating by deep learning and all-onboard computations in GPS-denied environments." PLoS ONE 14, no. 11 (2019): e0225092. Gale Academic OneFile (accessed December 1, 2020) https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0225092
  • 6. Digital Threats – Cyber Attacks ● Automated Supply Chain Management uses IoT devices: o GPS devices report location of the transport o Drones function as inspection devices o Industrial Control Systems (ICS) devices: control processes of supply management, i.e. temperature control, flow of oil or gas ● Exploiting ICS vulnerabilities (see appendix pages 8 - 10) o Firmware and software vulnerabilities o Misconfiguration: open ports, enabled protocols, elevated-privilege o Weak authentication schemas o Failure to protect data at transport and at rest ● Protection methods o Frequent scanning and updates for firmware and software, code signing implementation o Multifactor Authentication (MFA) implementation and use of Attribute Based Access Control o Protection of private keys, ideally using advanced cryptographic schemas such as Multiparty Computation (MPC), use of strong encryption for data protection at rest and in transport
  • 7. Counterparties Disruption - Threats ● Dependencies in Supply Chain Management o Suppliers in one chain can play roles in another chain o Disruption in one chain supply may cause a spillover effect on another chain o Disruption one supplier may cause a spillover effect on another supplier ● Complexity in modeling dependencies o Similar models have been used in financial risk management and measurement (Diebold et al. 2016) o We can use variance decomposition models and use vectors of connectedness between suppliers and supplies (see Appendix page 11) Diebold, Francis X., Demirer, Mert, Liu, Laura, Yilmaz, Kamil Yilmaz “Estimating global bank network connectedness”. https://www.sas.upenn.edu/~fdiebold/papers2/DDLYpaper.pdf
  • 8. Appendix – scanning net for active IoT devices ● Shodan.io is an example of website listing scanned IoT devices. ● Cyber adversaries may use tools like ZenMap
  • 9. Appendix – scanning IoT devices for open ports and services ● Scanner shows 3 ICS devices: wind turbines ● Scanner lists IP addresses for the devices along the with their physical location
  • 10. Appendix – scanning IoT device for OS and services vulnerabilities ● Devices accessed by IP address show open ports and communication protocols ● Information about OS and protocols can lead cyber adversaries to discover vulnerabilities
  • 11. Appendix – Modeling Dependencies in Supply Chain Management ● Vectors of connectedness between suppliers are represented by edges in the graph (Yilmaz and Diebold 2014) ● Dependencies represented as directed and weighted edges between suppliers (example: black - 0.7, red – 0.5, yellow - 0.3) ● Example of graphical representation after variance decomposition is calculated Diebold, Francis X.,Kamil Yilmaz “Financial and Macroeconomic Connectedness”. http://financialconnectedness.org
  • 12. Contact Us: Info@EgisData.com Find me on LinkedIn: https://www.linkedin.com/in/tomzakrzewski