SlideShare a Scribd company logo
1 of 51
Download to read offline
Reducing the Risk of a Cyber
Attack on Utilities
Jim Girouard, Sr. Product Development Manager
Corporate and Professional Education
About WPI
 Fully accredited, non-profit, top quartile
national university*
 Founded in 1865 to teach both “Theory and
Practice”
 Robust Computer Science, Power Systems
Engineering and Business Departments
 DHS/NSA Designated Center of Excellence
in Information Security Research
*U.S. News and World Report
Today’s Dialogue –
Cybersecurity Education
Outline:
– The Growing Menace
– New vulnerabilities due to Smart Grid Technology
– National Framework for Cybersecurity Workforce
Education
– Essentials of a cyber security education program
– How to craft a customized education program
– Discussion
Bushehr Nuclear Facility - Iran
Bushehr Centrifuges
Stuxnet
Stuxnet
• Infiltrates Microsoft Windows OS to infect SCADA Systems
Stuxnet
• Infiltrates Microsoft Windows OS to infect SCADA Systems
• A Virus, Worm and Trojan
Stuxnet
• Infiltrates Microsoft Windows OS to infect SCADA Systems
• A Virus, Worm and Trojan
• Evades Detection. Erases its path as it jumps to next system
Stuxnet
• Infiltrates Microsoft Windows OS to infect SCADA Systems
• A Virus, Worm and Trojan
• Evades Detection. Erases its path as it jumps to next system
• Disables Safety systems
Stuxnet
• Infiltrates Microsoft Windows OS to infect SCADA Systems
• A Virus, Worm and Trojan
• Evades Detection. Erases its path as it jumps to next system
• Disables Safety systems
• Utilizes “Man in the Middle” Attack Strategy
Stuxnet
• Infiltrates Microsoft Windows OS to infect SCADA Systems
• A Virus, Worm and Trojan
• Evades Detection. Erases its path as it jumps to next system
• Disables Safety systems
• Utilizes “Man in the Middle” Attack Strategy
• Once it infects SCADA PLCs it waits, observes then acts
Stuxnet
• Infiltrates Microsoft Windows OS to infect SCADA Systems
• A Virus, Worm and Trojan
• Evades Detection. Erases its path as it jumps to next system
• Disables Safety systems
• Utilizes “Man in the Middle” Attack Strategy
• Once it infects SCADA PLCs it waits, observes then acts
• Returns recording of normal operation to operators
Stuxnet
• Infiltrates Microsoft Windows OS to infect SCADA Systems
• A Virus, Worm and Trojan
• Evades Detection. Erases its path as it jumps to next system
• Disables Safety systems
• Utilizes “Man in the Middle” Attack Strategy
• Once it infects SCADA PLCs it waits, observes then acts
• Returns recording of normal operation to operators
• Successfully destroyed ~1,000 centrifuges.
Stuxnet
• Infiltrates Microsoft Windows OS to infect SCADA Systems
• A Virus, Worm and Trojan
• Evades Detection. Erases its path as it jumps to next system
• Disables Safety systems
• Utilizes “Man in the Middle” Attack Strategy
• Once it infects SCADA PLCs it waits, observes then acts
• Returns recording of normal operation to operators
• Successfully destroyed ~1,000 centrifuges. 30% of capacity
• Source code available on web for $150K
BLACK ENERGY
Black Energy
PowerSource
• Also a Virus, Worm and Trojan
• Reported in October 2014 but could have been around in 2011
• Suspected Country of Origin: Russia
• Infects Human-Machine Interfaces including: GE Cimplicity,
Seimens WinCC and Advantech/Broadwin WebAccess
• Attempts to damage, modify, or otherwise disrupt the victim
systems’ control processes
• Modular and difficult to detect
ICS-CERT 2014 Annual Report
• 245 Incidents Reported, including:
– Unauthorized access and exploitation of internet
facing SCADA
– Exploitation of zero-day vulnerabilities
– Infections within “air gapped” control networks
– SQL injection and exploitation
– Network Scanning
– Watering hole attacks
– Spear-phishing campaigns
Attacks by Sector
Smart Grid Field
Area Networks (FAN)
Patrick Grossetete, Cisco
Attack Strategies on Utilities
Physical
Attack
Cyber
Attack
Anatomy of a Sophisticated
Cyber Attack
Domain Knowledge
Physical
Attack
Cyber
Attack
Anatomy of a Sophisticated
Cyber Attack
Domain Knowledge
Physical
Attack
Cyber
Attack
“There are two types of companies. Those that have
been attacked and those that don’t know it yet”
Scott Aaronson, Senior Director
Edison Electric Institute
All Other
Personnel
MIS & IT
Professionals
Resiliency
via secure
software
design
Resiliency
via several barrier
defense
strategies
Intrusion
Detection
ForensicsSoftware
Engineers
Cyber Defense Roles
to prevent, detect and effectively respond
Human Firewall
Training
Executive Response
Training
Graduate
Cyber-CS
Education
Certifications,
Professional
Development
&
Graduate Cyber-
CS Education
Scenario:
A USB drive in the grass
What it looks like
to the typical finder
What it represents
to your network
The National Cybersecurity
Workforce Framework*
30
* http://csrc.nist.gov/nice/framework/
• Issued by the National Initiative for Cybersecurity Education (NICE)
• Provides a common lexicon for cybersecurity work.
• A collaboration of federal agencies, academia and general industry.
• Constructed of “Categories” and “Specialty Areas” to group similar types of
work.
• Provides tasks, knowledge, skills, and abilities (tKSAs) within each area.
• Version 2.0 is currently being drafted
http://csrc.nist.gov/nice
National Cybersecurity
Workforce Framework
32
Category
Securely Provision
Operate and Maintain
Protect and Defend
Investigate
Collect and Operate
Analyze
Oversight and
Development
National Cybersecurity
Workforce Framework
33
Category Specialty Areas Include:
Securely Provision
Systems Security Architecture Secure Acquisition
Software Assurance and Security Engineering
Test and Evaluation Systems Development
Operate and Maintain System Administration Network Services Systems Security Analysis
Protect and Defend
Incident Response Computer Network Defense Analysis
Vulnerability Assessment and Management
Investigate Digital Forensics Cyber Investigation
Collect and Operate Federal Government Role
Collection Operations Cyber Operations and Planning
Cyber Intelligence Exploitation Analysis / Targets / Threat AnalysisAnalyze
Oversight and
Development
Legal Advice and Advocacy Security Program Management
Strategic Planning and Policy Development
Training, Education and Awareness Knowledge Management
DHS Cyber Security
Evaluation Tool
What to Look For:
Academic Partner
What to Look For:
Accreditations
Computer Science Engineering
Business Whole University
What to Look For:
Domain Knowledge
For example, at WPI:
 NSA/DHS Designated Center of Excellence
 Core Faculty Performing Current Research
• Trusted Computing Platforms
• Algorithms & Architectures for Cryptography
• Analysis of Access-Control and Firewall Policies
• Wireless Network Security
• Cyber-Physical System Security
 Power Systems Engineering – Utility technology, systems, equipment &
culture
What to Look For:
Program Tailored to Your Needs
The Framework is Generic
To Maximize Your ROI, your
program must be relevant:
• Address your unique requirements.
• Address SCADA vulnerabilities
• Include NERC CIP
• Provide utility-based examples/case studies
• Be convenient for your students
Timeline to a Customized Program
The WPI Process:
Identify
Customer Needs
Create Learning
Objectives
Meet with
Executive
Sponsor
Go/
NoGo
Effective Learning Objectives
“ As a result of this course, the student will be able
to …”
Verbs to Use Verbs to Avoid
Explain, estimate, design, solve,
prepare, detect, assess, determine,
infer, illustrate, complete, operate,
employ, rank, test, visualize, lead, etc.
Appreciate, Understand, Learn,
Cover, Believe, Study,
Comprehend, etc.
The WPI Process:
Identify
Customer Needs
Create Learning
Objectives
Select
Instructor(s)
Meet with
Executive
Sponsor
Select Best
Delivery
Method
Develop
Customized
Curriculum
Launch
Pilot
Program
Assign Dedicated
Support Team
Survey Students
Mid End
Evaluate
Surveys with
Sponsor
Go/
NoGo
Timeline to a Customized Program
Courses Customized for
the Power Industry
Computer and Network
Security Including SCADA Protection
and NERC CIP Standards
Operations Risk Management
Focus on Social Media Phishing and
Embedded Malware Risks
Case Studies in Computer Security
Including Power Industry Examples
A Custom Graduate
Cybersecurity Program
Framework Category Courses
Securely Provision
Computer and Network Security
Software Security Design and Analysis
Operate and Maintain Computer and Network Security
Protect and Defend Intruder Detection
Investigate Digital Forensics
Collect and Operate
Government Role - Not in Program
Analyze
Oversight and
Development
Operations Risk Management
Case Studies in Computer Security
Modeled after
The National
Cybersecurity
Workforce
Framework
In Summary
“There are known knowns, things
we know that we know; and there
are known unknowns, things that
we know we don't know. But there
are also unknown unknowns,
things we do not know we don't
know.”
- Donald Rumsfeld
“There are known knowns, things
we know that we know; and there
are known unknowns, things that
we know we don't know. But there
are also unkown unknowns,
things we do not know we don't
know.”
- Donald Rumsfeld
In Summary
Attack Mode Counter Measures
• Maintain Robust Cyber Security Infrastructure
• Maintain Physical Security Measures (NERC CIP)
• Continue Secure Process Training (Human Firewall)
known knowns
known unknowns
unknown unknowns
In Summary
Attack Mode Counter Measures
• Maintain Robust Cyber Security Infrastructure
• Maintain Physical Security Measures (NERC CIP)
• Continue Secure Process Training (Human Firewall)
• Evaluate Penetration Testing Results
• Perform Cyber Security Gap Analysis (DHS CSET)
• Practice Supply Chain Cyber Risk Management
• Stay Informed on Evolving Vulnerability
Assessments
known knowns
known unknowns
unknown unknowns
In Summary
Attack Mode Counter Measures
• Maintain Robust Cyber Security Infrastructure
• Maintain Physical Security Measures
• Continue Secure Process Training (Human Firewall)
• Conduct Penetration Testing & Analysis
• Perform Cyber Security Gap Analysis (DHS CSET)
• Practice Supply Chain Cyber Risk Management
• Stay Informed on Evolving Vulnerability
Assessments
• Prepare for “the day after”
• Perform Incident Response and Analysis - Forensics
• Develop Systems Behavior Modeling
• Invest in Continuing
Education
known knowns
known unknowns
unknown unknowns
Discussion
What do you think?
Thank you
51

More Related Content

What's hot

DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
Shah Sheikh
 

What's hot (20)

Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0DTS Solution - Penetration Testing Services v1.0
DTS Solution - Penetration Testing Services v1.0
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
 
Supply chain-attack
Supply chain-attackSupply chain-attack
Supply chain-attack
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
Panda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security - Adaptive Defense
Panda Security - Adaptive Defense
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 

Viewers also liked (6)

ICS CERT- Incidence Reports
ICS CERT- Incidence ReportsICS CERT- Incidence Reports
ICS CERT- Incidence Reports
 
Scada
ScadaScada
Scada
 
Power system protection
Power system protectionPower system protection
Power system protection
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Power system protection topic 1
Power system protection topic 1Power system protection topic 1
Power system protection topic 1
 
Scada and power system automation
Scada and power system automationScada and power system automation
Scada and power system automation
 

Similar to Webinar - Reducing the Risk of a Cyber Attack on Utilities

5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
isc2-hellenic
 

Similar to Webinar - Reducing the Risk of a Cyber Attack on Utilities (20)

Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
1_Introduction.pdf
1_Introduction.pdf1_Introduction.pdf
1_Introduction.pdf
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
SecurityOperations
SecurityOperationsSecurityOperations
SecurityOperations
 
5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises5. Experience from recent national & international cyber exercises
5. Experience from recent national & international cyber exercises
 

More from WPICPE

More from WPICPE (14)

Reliability Engineering in Biomanufacturing - Presentation by Michael Andrews
Reliability Engineering in Biomanufacturing - Presentation by Michael AndrewsReliability Engineering in Biomanufacturing - Presentation by Michael Andrews
Reliability Engineering in Biomanufacturing - Presentation by Michael Andrews
 
Quality by Design - Presentation by Naveen Pathak
Quality by Design - Presentation by Naveen PathakQuality by Design - Presentation by Naveen Pathak
Quality by Design - Presentation by Naveen Pathak
 
BETC Advanced Industrial Biomanufacturing Symposium | April 2016
BETC Advanced Industrial Biomanufacturing Symposium | April 2016BETC Advanced Industrial Biomanufacturing Symposium | April 2016
BETC Advanced Industrial Biomanufacturing Symposium | April 2016
 
WPI's Energy Symposium Photos
WPI's Energy Symposium PhotosWPI's Energy Symposium Photos
WPI's Energy Symposium Photos
 
Fire Protection Engineering: Specific Application Sprinklers
Fire Protection Engineering: Specific Application SprinklersFire Protection Engineering: Specific Application Sprinklers
Fire Protection Engineering: Specific Application Sprinklers
 
Fire Protection Engineering: Critical Decisions
Fire Protection Engineering: Critical DecisionsFire Protection Engineering: Critical Decisions
Fire Protection Engineering: Critical Decisions
 
Graduation Reception WPI CPE 2016 Photo Album
Graduation Reception WPI CPE 2016 Photo AlbumGraduation Reception WPI CPE 2016 Photo Album
Graduation Reception WPI CPE 2016 Photo Album
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Webinar - Distributed and Renewable Power Generation
Webinar - Distributed and Renewable Power GenerationWebinar - Distributed and Renewable Power Generation
Webinar - Distributed and Renewable Power Generation
 
An Overview of Biologics Manufacturing Processes and Things to Consider from ...
An Overview of Biologics Manufacturing Processes and Things to Consider from ...An Overview of Biologics Manufacturing Processes and Things to Consider from ...
An Overview of Biologics Manufacturing Processes and Things to Consider from ...
 
High Level Recombinant Protein Production In Insect Cell Culture
High Level Recombinant Protein Production In Insect Cell CultureHigh Level Recombinant Protein Production In Insect Cell Culture
High Level Recombinant Protein Production In Insect Cell Culture
 
Tracking Single-Use & Scale-Up Best Practices
Tracking Single-Use & Scale-Up Best PracticesTracking Single-Use & Scale-Up Best Practices
Tracking Single-Use & Scale-Up Best Practices
 
How to ruin a perfectly good webinar
How to ruin a perfectly good webinarHow to ruin a perfectly good webinar
How to ruin a perfectly good webinar
 
What makes a webinar great
What makes a webinar greatWhat makes a webinar great
What makes a webinar great
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Webinar - Reducing the Risk of a Cyber Attack on Utilities

  • 1. Reducing the Risk of a Cyber Attack on Utilities Jim Girouard, Sr. Product Development Manager Corporate and Professional Education
  • 2. About WPI  Fully accredited, non-profit, top quartile national university*  Founded in 1865 to teach both “Theory and Practice”  Robust Computer Science, Power Systems Engineering and Business Departments  DHS/NSA Designated Center of Excellence in Information Security Research *U.S. News and World Report
  • 3. Today’s Dialogue – Cybersecurity Education Outline: – The Growing Menace – New vulnerabilities due to Smart Grid Technology – National Framework for Cybersecurity Workforce Education – Essentials of a cyber security education program – How to craft a customized education program – Discussion
  • 7. Stuxnet • Infiltrates Microsoft Windows OS to infect SCADA Systems
  • 8. Stuxnet • Infiltrates Microsoft Windows OS to infect SCADA Systems • A Virus, Worm and Trojan
  • 9. Stuxnet • Infiltrates Microsoft Windows OS to infect SCADA Systems • A Virus, Worm and Trojan • Evades Detection. Erases its path as it jumps to next system
  • 10. Stuxnet • Infiltrates Microsoft Windows OS to infect SCADA Systems • A Virus, Worm and Trojan • Evades Detection. Erases its path as it jumps to next system • Disables Safety systems
  • 11. Stuxnet • Infiltrates Microsoft Windows OS to infect SCADA Systems • A Virus, Worm and Trojan • Evades Detection. Erases its path as it jumps to next system • Disables Safety systems • Utilizes “Man in the Middle” Attack Strategy
  • 12. Stuxnet • Infiltrates Microsoft Windows OS to infect SCADA Systems • A Virus, Worm and Trojan • Evades Detection. Erases its path as it jumps to next system • Disables Safety systems • Utilizes “Man in the Middle” Attack Strategy • Once it infects SCADA PLCs it waits, observes then acts
  • 13. Stuxnet • Infiltrates Microsoft Windows OS to infect SCADA Systems • A Virus, Worm and Trojan • Evades Detection. Erases its path as it jumps to next system • Disables Safety systems • Utilizes “Man in the Middle” Attack Strategy • Once it infects SCADA PLCs it waits, observes then acts • Returns recording of normal operation to operators
  • 14. Stuxnet • Infiltrates Microsoft Windows OS to infect SCADA Systems • A Virus, Worm and Trojan • Evades Detection. Erases its path as it jumps to next system • Disables Safety systems • Utilizes “Man in the Middle” Attack Strategy • Once it infects SCADA PLCs it waits, observes then acts • Returns recording of normal operation to operators • Successfully destroyed ~1,000 centrifuges.
  • 15. Stuxnet • Infiltrates Microsoft Windows OS to infect SCADA Systems • A Virus, Worm and Trojan • Evades Detection. Erases its path as it jumps to next system • Disables Safety systems • Utilizes “Man in the Middle” Attack Strategy • Once it infects SCADA PLCs it waits, observes then acts • Returns recording of normal operation to operators • Successfully destroyed ~1,000 centrifuges. 30% of capacity • Source code available on web for $150K
  • 17. Black Energy PowerSource • Also a Virus, Worm and Trojan • Reported in October 2014 but could have been around in 2011 • Suspected Country of Origin: Russia • Infects Human-Machine Interfaces including: GE Cimplicity, Seimens WinCC and Advantech/Broadwin WebAccess • Attempts to damage, modify, or otherwise disrupt the victim systems’ control processes • Modular and difficult to detect
  • 18.
  • 19. ICS-CERT 2014 Annual Report • 245 Incidents Reported, including: – Unauthorized access and exploitation of internet facing SCADA – Exploitation of zero-day vulnerabilities – Infections within “air gapped” control networks – SQL injection and exploitation – Network Scanning – Watering hole attacks – Spear-phishing campaigns
  • 21. Smart Grid Field Area Networks (FAN) Patrick Grossetete, Cisco
  • 22. Attack Strategies on Utilities Physical Attack Cyber Attack
  • 23. Anatomy of a Sophisticated Cyber Attack Domain Knowledge Physical Attack Cyber Attack
  • 24. Anatomy of a Sophisticated Cyber Attack Domain Knowledge Physical Attack Cyber Attack
  • 25. “There are two types of companies. Those that have been attacked and those that don’t know it yet” Scott Aaronson, Senior Director Edison Electric Institute
  • 26. All Other Personnel MIS & IT Professionals Resiliency via secure software design Resiliency via several barrier defense strategies Intrusion Detection ForensicsSoftware Engineers Cyber Defense Roles to prevent, detect and effectively respond Human Firewall Training Executive Response Training Graduate Cyber-CS Education Certifications, Professional Development & Graduate Cyber- CS Education
  • 27. Scenario: A USB drive in the grass
  • 28. What it looks like to the typical finder
  • 29. What it represents to your network
  • 30. The National Cybersecurity Workforce Framework* 30 * http://csrc.nist.gov/nice/framework/ • Issued by the National Initiative for Cybersecurity Education (NICE) • Provides a common lexicon for cybersecurity work. • A collaboration of federal agencies, academia and general industry. • Constructed of “Categories” and “Specialty Areas” to group similar types of work. • Provides tasks, knowledge, skills, and abilities (tKSAs) within each area. • Version 2.0 is currently being drafted
  • 32. National Cybersecurity Workforce Framework 32 Category Securely Provision Operate and Maintain Protect and Defend Investigate Collect and Operate Analyze Oversight and Development
  • 33. National Cybersecurity Workforce Framework 33 Category Specialty Areas Include: Securely Provision Systems Security Architecture Secure Acquisition Software Assurance and Security Engineering Test and Evaluation Systems Development Operate and Maintain System Administration Network Services Systems Security Analysis Protect and Defend Incident Response Computer Network Defense Analysis Vulnerability Assessment and Management Investigate Digital Forensics Cyber Investigation Collect and Operate Federal Government Role Collection Operations Cyber Operations and Planning Cyber Intelligence Exploitation Analysis / Targets / Threat AnalysisAnalyze Oversight and Development Legal Advice and Advocacy Security Program Management Strategic Planning and Policy Development Training, Education and Awareness Knowledge Management
  • 35. What to Look For: Academic Partner
  • 36. What to Look For: Accreditations Computer Science Engineering Business Whole University
  • 37. What to Look For: Domain Knowledge For example, at WPI:  NSA/DHS Designated Center of Excellence  Core Faculty Performing Current Research • Trusted Computing Platforms • Algorithms & Architectures for Cryptography • Analysis of Access-Control and Firewall Policies • Wireless Network Security • Cyber-Physical System Security  Power Systems Engineering – Utility technology, systems, equipment & culture
  • 38. What to Look For: Program Tailored to Your Needs The Framework is Generic To Maximize Your ROI, your program must be relevant: • Address your unique requirements. • Address SCADA vulnerabilities • Include NERC CIP • Provide utility-based examples/case studies • Be convenient for your students
  • 39. Timeline to a Customized Program The WPI Process: Identify Customer Needs Create Learning Objectives Meet with Executive Sponsor Go/ NoGo
  • 40. Effective Learning Objectives “ As a result of this course, the student will be able to …” Verbs to Use Verbs to Avoid Explain, estimate, design, solve, prepare, detect, assess, determine, infer, illustrate, complete, operate, employ, rank, test, visualize, lead, etc. Appreciate, Understand, Learn, Cover, Believe, Study, Comprehend, etc.
  • 41. The WPI Process: Identify Customer Needs Create Learning Objectives Select Instructor(s) Meet with Executive Sponsor Select Best Delivery Method Develop Customized Curriculum Launch Pilot Program Assign Dedicated Support Team Survey Students Mid End Evaluate Surveys with Sponsor Go/ NoGo Timeline to a Customized Program
  • 42. Courses Customized for the Power Industry Computer and Network Security Including SCADA Protection and NERC CIP Standards Operations Risk Management Focus on Social Media Phishing and Embedded Malware Risks Case Studies in Computer Security Including Power Industry Examples
  • 43. A Custom Graduate Cybersecurity Program Framework Category Courses Securely Provision Computer and Network Security Software Security Design and Analysis Operate and Maintain Computer and Network Security Protect and Defend Intruder Detection Investigate Digital Forensics Collect and Operate Government Role - Not in Program Analyze Oversight and Development Operations Risk Management Case Studies in Computer Security Modeled after The National Cybersecurity Workforce Framework
  • 45. “There are known knowns, things we know that we know; and there are known unknowns, things that we know we don't know. But there are also unknown unknowns, things we do not know we don't know.” - Donald Rumsfeld
  • 46. “There are known knowns, things we know that we know; and there are known unknowns, things that we know we don't know. But there are also unkown unknowns, things we do not know we don't know.” - Donald Rumsfeld
  • 47. In Summary Attack Mode Counter Measures • Maintain Robust Cyber Security Infrastructure • Maintain Physical Security Measures (NERC CIP) • Continue Secure Process Training (Human Firewall) known knowns known unknowns unknown unknowns
  • 48. In Summary Attack Mode Counter Measures • Maintain Robust Cyber Security Infrastructure • Maintain Physical Security Measures (NERC CIP) • Continue Secure Process Training (Human Firewall) • Evaluate Penetration Testing Results • Perform Cyber Security Gap Analysis (DHS CSET) • Practice Supply Chain Cyber Risk Management • Stay Informed on Evolving Vulnerability Assessments known knowns known unknowns unknown unknowns
  • 49. In Summary Attack Mode Counter Measures • Maintain Robust Cyber Security Infrastructure • Maintain Physical Security Measures • Continue Secure Process Training (Human Firewall) • Conduct Penetration Testing & Analysis • Perform Cyber Security Gap Analysis (DHS CSET) • Practice Supply Chain Cyber Risk Management • Stay Informed on Evolving Vulnerability Assessments • Prepare for “the day after” • Perform Incident Response and Analysis - Forensics • Develop Systems Behavior Modeling • Invest in Continuing Education known knowns known unknowns unknown unknowns