This document discusses cybersecurity risks and strategies for the energy sector. It begins by outlining the current cyber threat landscape, including risks from ransomware, industrial control systems, IoT devices, and attacks on critical infrastructure. It then discusses challenges securing industrial control systems and scenarios where cyber attacks could impact physical systems. The document concludes by recommending steps for energy companies, including implementing standards like NERC CIP and ISO 27001, conducting security assessments and architecture reviews, employee training, cyber drills to test incident response, and working in a regulated environment with independent audits.
2. ACinfotec is Thailand’s leading expert provider of services,
solutions and consultation for IT governance, risk and
compliance management based on various well-known
international standards, best practices and regulations.
Our expertise and client base spans all major industries. We
regularly provide services to leading organization across the
financial, technology, telecommunication, healthcare, insurance,
energy, and manufacturing sectors.
“Driving Business Excellence”
36. What if your ICS/SCADA system is online?
“It took only 18
hours to find the
first signs of attack
on one of the
honeypots. “
Who’s Really Attacking
Your ICS Equipment?
Percentage of attacks per country
52. Enterprise Security Architecture
Surviving organization change, planning for cyber resilient systems
• Change is a constant in life
• Different head, different direction!
• Lack of Enterprise Security Architecture causing duplicate,
ineffective, unalignment or even useless security spending
55. ICS/SCADA Security Assessment
• Port Scan could crash the system because of strange payloads and
overwhelming packets.
• With embedded devices which are not Windows/Unix, you will have
more problems.
• Most control systems use simple HTTP GET/POST requests,
automated tools could shutdown the mission-critical functions.
• Traditional Pentest tools are not enough for ICS protocols. We need
better and more specific tools to tackle the ICS world.
“You need elaborate plans and procedures to conduct
security assessment against ICS environment.”
Danger of Traditional Pentest
56. ACinfotec Services & Approaches
• Layered-approach Security Assessment based on
NERC CIP, CPNI, ISA-99/IEC62443, ISO27001, SANS
• ICS/SCADA Architecture Review
• Smart Grid Security Assessment
• Safety and availability
• With elite team members
58. We Need Regulated Environment
May the force be with you!
• Action by regulator in each sector
• Enforce security best practice
• Independent audit
• Continuous improvement
59. For more information, contact: ACinfotec Consulting Services
02-670-8980-3 | services@acinfotec.com | www.acinfotec.com
THANK YOU
DRIVING BUSINESS EXCELLENCE