SlideShare a Scribd company logo
Industrial Control Systems 101
Why Hack The Network If You Can
Shut Down The Data Center?
Page 2
Agenda
• Introductions
• What are Industrial Control Systems (ICS)?
• Security Risks associated with ICS
• Do’s & Don’ts of ICS
• Q&A
Page 3
Remembering Boston – 4/15/13
http://onefundboston.org/
Page 4
Introductions: Today’s Speakers
• Ted Julian – Chief Marketing Officer, Co3 Systems
Ted is a serial entrepreneur who has launched four
companies during his ~20 years in the security /
compliance industry.
• Billy Rios – Technical Director, Cylance
Billy is seasoned security professional whose
background spans both the military and the private
sector. He is a noted expert in ICS security.
Page 5
Co3 Automates Breach Management
PREPARE
Improve Organizational
Readiness
• Assign response team
• Describe environment
• Simulate events and incidents
• Focus on organizational gaps
REPORT
Document Results and
Track Performance
• Document incident results
• Track historical performance
• Demonstrate organizational
preparedness
• Generate audit/compliance reports
ASSESS
Quantify Potential Impact,
Support Privacy Impact
Assessments
• Track events
• Scope regulatory requirements
• See $ exposure
• Send notice to team
• Generate Impact Assessments
MANAGE
Easily Generate Detailed
Incident Response Plans
• Escalate to complete IR plan
• Oversee the complete plan
• Assign tasks: who/what/when
• Notify regulators and clients
• Monitor progress to completion
Page 6
• Cyber Services &
Technology
• Led by Stuart McClure,
former CTO McAfee &
founder of Foundstone
Vulnerability Mgmt Co.
• 55 employees
• Irvine, CA HQ
Cylance, Inc. – Secures the Unsecurable
Page 7
ICS Expertise
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-175-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-175-02.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-182-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-182-02.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-195-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-243-02.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-244-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-273-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-03.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-03A.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-285-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-11-356-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-12-024-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-12-039-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-12-047-01A.pdf
Page 8
ICS Expertise
• http://www.us-cert.gov/control_systems/pdf/ICSA-12-062-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-12-083-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICSA-12-095-01.pdf
• https://ics-cert.us-cert.gov/pdf/ICS-ALERT-12-195-01.pdf
• http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-343-01.pdf
• http://ics-cert.us-cert.gov/pdf/ICS-ALERT-11-343-01A.pdf
• https://ics-cert.us-cert.gov/pdf/ICSA-12-228-01.pdf
• http://ics-cert.us-cert.gov/pdf/ICSA-13-079-03.pdf
Page 9
You might have ICS… 
Page 10
Unoccupied building, Saturday night
Card Access
Video
Intrusion Elevator HVAC Lighting
Energy
Tenant Billing
System
Interaction:
Examples of ICS
Page 11
Scott swipes card at main entrance, works on 4th floor South
Card Access
Video
Intrusion Elevator HVAC Lighting
Energy
Tenant Billing
System
Interaction:
“Access Granted,
Zone 4”
Examples of ICS
Page 12
Video system needs to verify and record Scott’s entrance
Card Access
Video
Intrusion Elevator HVAC Lighting
Energy
Tenant Billing
System
Interaction:
“Access Granted,
Zone 4”
“Camera Preset 1,
Initiate Recording”
HTTP
Examples of ICS
Page 13
Alarm system armed, need to disarm 4th floor intrusion zone
Card Access
Video
Intrusion Elevator HVAC Lighting
Energy
Tenant Billing
System
Interaction:
“Access Granted,
Zone 4”
“Camera Preset 1,
Initiate Recording”
HTTP
“Disarm Intrusion
Zone 4”
LEGACY
Examples of ICS
Page 14
Allow access to 4th floor
Card Access
Video
Intrusion Elevator HVAC Lighting
Energy
Tenant Billing
System
Interaction:
“Access Granted,
Zone 4”
“Camera Preset 1,
Initiate Recording”
HTTP
“Disarm Intrusion
Zone 4”
“Floor 3 Enable”
XML
LEGACY
Examples of ICS
Page 15
It is hot in Scott’s office, turn on AC
Card Access
Video
Intrusion Elevator HVAC Lighting
Energy
Tenant Billing
System
Interaction:
“Access Granted,
Zone 4”
“Camera Preset 1,
Initiate Recording”
HTTP
“Disarm Intrusion
Zone 4”
“Floor 3 Enable”
XML
“Zone 4 Occupied”
LEGACY
Examples of ICS
Page 16
Scott needs light on 4th floor hallway and office
Card Access
Video
Intrusion Elevator HVAC Lighting
Energy
Tenant Billing
System
Interaction:
“Access Granted,
Zone 4”
“Camera Preset 1,
Initiate Recording”
HTTP
“Disarm Intrusion
Zone 4”
“Floor 3 Enable”
XML
“Zone 4 Occupied”
“Circuit 1, 2 ON”
MODBUS
®
LEGACY
Examples of ICS
Page 17
Lights and AC for Scott used 50 kWH
Card Access
Video
Intrusion Elevator HVAC Lighting
Energy
Tenant Billing
System
Interaction:
“Access Granted,
Zone 4”
“Camera Preset 1,
Initiate Recording”
HTTP
“Disarm Intrusion
Zone 4”
“Floor 3 Enable”
XML
“Zone 4 Occupied”
“Circuit 1, 2 ON”
MODBUS
®
“Totalize light and
HVAC for Zone
4”
LEGACY
Examples of ICS
Page 18
Invoice Scott for $150 of after hours energy usage
Card Access
Video
Intrusion Elevator HVAC Lighting
Energy
Tenant Billing
System
Interaction:
“Access Granted,
Zone 4”
“Camera Preset 1,
Initiate Recording”
HTTP
“Disarm Intrusion
Zone 4”
LEGACY
“Floor 3 Enable”
XML
“Zone 4 Occupied”
“Circuit 1, 2 ON”
MODBUS
®
“Totalize light and
HVAC for Zone
4”
“Generate / email
Invoice for Sat”
SMTP
Examples of ICS
Page 19
We can work without AC
Page 20
We can work without AC
Page 21
We can work without AC
Page 22
But Billy… who would do such a thing?
Page 23
But Billy… who would do such a thing?
Page 24
We need to move quickly
Page 25
We need to move quickly
Page 26
We need to move quickly
Page 27
We need to move quickly
POLL
Page 29
ICS Security – Current State
• Software:
• Extremely poor, Windows XP
• Vulnerable to common, unsophisticated attacks
(remote/local)
• Lack of industry standard exploit mitigations (DEP/ASLR)
• Deployment:
• Extremely poor
• Be wary of remote access
• Poor guidance from vendors
• Impossible/unreasonable deployment architectures
• Lack of automated verification
Page 30
ICS Security – Current State
• Vulnerability Management:
• Extremely poor
• Lack of managed awareness
• Lack of managed patch management
• Lack of vulnerability detection
• Lack of mature reporting
• Lack of awareness
• Inability to scale limited expertise
Page 31
ICS Security – Current State
• Detection and Enumeration:
• Foundation for all ICS security operations
• Safety is a priority
• Differentiate between ICS deployments
• Manual processes are common
• Expertise is limited
POLL
Page 33
ICS Dos and Don’ts
• Don’ts
• Run a traditional vulnerability scanner on ICS
devices/software
• Expect traditional tools to identify vulnerabilities with ICS
software
• Expect notification of vulnerabilities
• Expect centralized patch management from vendors
Page 34
ICS Dos and Don’ts
• Do
• Identify where your ICS is on the network
• Identify the paths to reaching ICS
• Monitor paths to ICS devices
• Identify users/engineers that work with ICS
QUESTIONS
Page 36
Next Webinar
“Introducing the Co3 Security Module”
• IR for security incidents: malware, system
intrusion, DDoS, etc.
• Wednesday, May 1 @ 1 PM ET
“One of the hottest products at RSA…”
NETWORK WORLD – FEBRUARY 2013
“…an invaluable weapon when responding
to security incidents.”
GOVERNMENT COMPUTER NEWS – APRIL 2013
One Alewife Center, Suite 450
Cambridge, MA 02140
PHONE 617.206.3900
WWW.CO3SYS.COM
“Co3 Systems makes the process of
planning for a nightmare scenario as
painless as possible, making it an Editors’
Choice.”
PC MAGAZINE, EDITOR’S CHOICE
“Co3…defines what software packages
for privacy look like.”
GARTNER
“Platform is comprehensive, user
friendly, and very well designed.”
PONEMON INSTITUTE
Billy Rios
Technical Director
Cylance
brios@cylance.com
www.cylance.com

More Related Content

What's hot

Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
Rahul Neel Mani
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
Ben Rothke
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
AlienVault
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
AlienVault
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
AlienVault
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
Ahmed Banafa
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
AlienVault
 
Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligence
AlienVault
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
Infosec
 
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityHow Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
Dragos, Inc.
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
AlienVault
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
Steppa Cyber Security
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Outpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface management
Outpost24
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
Dirk Cipido
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
Rohit Kapoor
 

What's hot (18)

Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligence
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
 
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityHow Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Outpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface management
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 

Viewers also liked

SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
Lancope, Inc.
 
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Priyanka Aash
 
Protecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data Breaches
Lancope, Inc.
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
Lancope, Inc.
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
Lancope, Inc.
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
Jim Gilsinn
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
Chris Sistrunk
 
PowerUp - Automating Windows Privilege Escalation
PowerUp - Automating Windows Privilege EscalationPowerUp - Automating Windows Privilege Escalation
PowerUp - Automating Windows Privilege Escalation
Will Schroeder
 
I hunt sys admins 2.0
I hunt sys admins 2.0I hunt sys admins 2.0
I hunt sys admins 2.0
Will Schroeder
 
The Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to CompromiseThe Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to Compromise
Will Schroeder
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
Lancope, Inc.
 
Wanted & available
Wanted & availableWanted & available
Wanted & available
Gurgaon Property
 
Using Tape on Multi-Part Items
Using Tape on Multi-Part ItemsUsing Tape on Multi-Part Items
Using Tape on Multi-Part Items
Jennifer Webb
 
Notable quotations work and workers rights
Notable quotations work and workers rightsNotable quotations work and workers rights
Notable quotations work and workers rightsDenni Domingo
 
HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update Resilient Systems
 
Case Study: Pharmaceutical Track And Trace System in Turkey
Case Study: Pharmaceutical Track And Trace System in TurkeyCase Study: Pharmaceutical Track And Trace System in Turkey
Case Study: Pharmaceutical Track And Trace System in Turkey
İlaç Takip Sistemi (İTS)
 
Chushi151022
Chushi151022Chushi151022
Chushi151022
Koyo Yamamori
 

Viewers also liked (20)

Organ Thieves#14 Elevator Speech
Organ Thieves#14 Elevator SpeechOrgan Thieves#14 Elevator Speech
Organ Thieves#14 Elevator Speech
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
 
Protecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data Breaches
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
PowerUp - Automating Windows Privilege Escalation
PowerUp - Automating Windows Privilege EscalationPowerUp - Automating Windows Privilege Escalation
PowerUp - Automating Windows Privilege Escalation
 
I hunt sys admins 2.0
I hunt sys admins 2.0I hunt sys admins 2.0
I hunt sys admins 2.0
 
The Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to CompromiseThe Travelling Pentester: Diaries of the Shortest Path to Compromise
The Travelling Pentester: Diaries of the Shortest Path to Compromise
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
Majestic auto limited
Majestic  auto limitedMajestic  auto limited
Majestic auto limited
 
Wanted & available
Wanted & availableWanted & available
Wanted & available
 
Using Tape on Multi-Part Items
Using Tape on Multi-Part ItemsUsing Tape on Multi-Part Items
Using Tape on Multi-Part Items
 
Notable quotations work and workers rights
Notable quotations work and workers rightsNotable quotations work and workers rights
Notable quotations work and workers rights
 
HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update
 
Case Study: Pharmaceutical Track And Trace System in Turkey
Case Study: Pharmaceutical Track And Trace System in TurkeyCase Study: Pharmaceutical Track And Trace System in Turkey
Case Study: Pharmaceutical Track And Trace System in Turkey
 
Chushi151022
Chushi151022Chushi151022
Chushi151022
 

Similar to Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down The Data Center?

Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
Resilient Systems
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
Precisely
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
Nicholas Davis
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
Precisely
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
Precisely
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
Precisely
 
Incident Response: Security's Special Teams
Incident Response: Security's Special TeamsIncident Response: Security's Special Teams
Incident Response: Security's Special Teams
Resilient Systems
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
John Gilligan
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a ShoestringNCC Group
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
IBM Security
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
Infonaligy
 
24 Hours After a Breach
24 Hours After a Breach 24 Hours After a Breach
24 Hours After a Breach
LIFARS
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
ST_World
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
Scalar Decisions
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
 
Как автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOCКак автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOC
Denis Batrankov, CISSP
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
ssusera76ea9
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
Precisely
 
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk
 

Similar to Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down The Data Center? (20)

Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
Incident Response: Security's Special Teams
Incident Response: Security's Special TeamsIncident Response: Security's Special Teams
Incident Response: Security's Special Teams
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
Practical SME Security on a Shoestring
Practical SME Security on a ShoestringPractical SME Security on a Shoestring
Practical SME Security on a Shoestring
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
24 Hours After a Breach
24 Hours After a Breach 24 Hours After a Breach
24 Hours After a Breach
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Как автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOCКак автоматизировать, то что находит аналитик SOC
Как автоматизировать, то что находит аналитик SOC
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
 

More from Resilient Systems

You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The Incident
Resilient Systems
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Resilient Systems
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
Resilient Systems
 
By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features
Resilient Systems
 
Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents
Resilient Systems
 
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Resilient Systems
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Resilient Systems
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
Resilient Systems
 
EU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response ImperativeEU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response Imperative
Resilient Systems
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To Prepare
Resilient Systems
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
Resilient Systems
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
Resilient Systems
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
Resilient Systems
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
Resilient Systems
 
How To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their TracksHow To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their Tracks
Resilient Systems
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
Resilient Systems
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
Resilient Systems
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
Resilient Systems
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
Resilient Systems
 
You're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat LandscapeYou're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat Landscape
Resilient Systems
 

More from Resilient Systems (20)

You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The Incident
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
 
By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features
 
Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents
 
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
 
EU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response ImperativeEU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response Imperative
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To Prepare
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
How To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their TracksHow To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their Tracks
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
 
You're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat LandscapeYou're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat Landscape
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down The Data Center?

  • 1. Industrial Control Systems 101 Why Hack The Network If You Can Shut Down The Data Center?
  • 2. Page 2 Agenda • Introductions • What are Industrial Control Systems (ICS)? • Security Risks associated with ICS • Do’s & Don’ts of ICS • Q&A
  • 3. Page 3 Remembering Boston – 4/15/13 http://onefundboston.org/
  • 4. Page 4 Introductions: Today’s Speakers • Ted Julian – Chief Marketing Officer, Co3 Systems Ted is a serial entrepreneur who has launched four companies during his ~20 years in the security / compliance industry. • Billy Rios – Technical Director, Cylance Billy is seasoned security professional whose background spans both the military and the private sector. He is a noted expert in ICS security.
  • 5. Page 5 Co3 Automates Breach Management PREPARE Improve Organizational Readiness • Assign response team • Describe environment • Simulate events and incidents • Focus on organizational gaps REPORT Document Results and Track Performance • Document incident results • Track historical performance • Demonstrate organizational preparedness • Generate audit/compliance reports ASSESS Quantify Potential Impact, Support Privacy Impact Assessments • Track events • Scope regulatory requirements • See $ exposure • Send notice to team • Generate Impact Assessments MANAGE Easily Generate Detailed Incident Response Plans • Escalate to complete IR plan • Oversee the complete plan • Assign tasks: who/what/when • Notify regulators and clients • Monitor progress to completion
  • 6. Page 6 • Cyber Services & Technology • Led by Stuart McClure, former CTO McAfee & founder of Foundstone Vulnerability Mgmt Co. • 55 employees • Irvine, CA HQ Cylance, Inc. – Secures the Unsecurable
  • 7. Page 7 ICS Expertise • http://www.us-cert.gov/control_systems/pdf/ICSA-11-175-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-11-175-02.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-11-182-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-11-182-02.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-11-195-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-11-243-02.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-11-244-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-11-273-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-03.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-11-279-03A.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-11-285-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-11-356-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-12-024-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-12-030-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-12-039-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-12-047-01A.pdf
  • 8. Page 8 ICS Expertise • http://www.us-cert.gov/control_systems/pdf/ICSA-12-062-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-12-083-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICSA-12-095-01.pdf • https://ics-cert.us-cert.gov/pdf/ICS-ALERT-12-195-01.pdf • http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-343-01.pdf • http://ics-cert.us-cert.gov/pdf/ICS-ALERT-11-343-01A.pdf • https://ics-cert.us-cert.gov/pdf/ICSA-12-228-01.pdf • http://ics-cert.us-cert.gov/pdf/ICSA-13-079-03.pdf
  • 9. Page 9 You might have ICS… 
  • 10. Page 10 Unoccupied building, Saturday night Card Access Video Intrusion Elevator HVAC Lighting Energy Tenant Billing System Interaction: Examples of ICS
  • 11. Page 11 Scott swipes card at main entrance, works on 4th floor South Card Access Video Intrusion Elevator HVAC Lighting Energy Tenant Billing System Interaction: “Access Granted, Zone 4” Examples of ICS
  • 12. Page 12 Video system needs to verify and record Scott’s entrance Card Access Video Intrusion Elevator HVAC Lighting Energy Tenant Billing System Interaction: “Access Granted, Zone 4” “Camera Preset 1, Initiate Recording” HTTP Examples of ICS
  • 13. Page 13 Alarm system armed, need to disarm 4th floor intrusion zone Card Access Video Intrusion Elevator HVAC Lighting Energy Tenant Billing System Interaction: “Access Granted, Zone 4” “Camera Preset 1, Initiate Recording” HTTP “Disarm Intrusion Zone 4” LEGACY Examples of ICS
  • 14. Page 14 Allow access to 4th floor Card Access Video Intrusion Elevator HVAC Lighting Energy Tenant Billing System Interaction: “Access Granted, Zone 4” “Camera Preset 1, Initiate Recording” HTTP “Disarm Intrusion Zone 4” “Floor 3 Enable” XML LEGACY Examples of ICS
  • 15. Page 15 It is hot in Scott’s office, turn on AC Card Access Video Intrusion Elevator HVAC Lighting Energy Tenant Billing System Interaction: “Access Granted, Zone 4” “Camera Preset 1, Initiate Recording” HTTP “Disarm Intrusion Zone 4” “Floor 3 Enable” XML “Zone 4 Occupied” LEGACY Examples of ICS
  • 16. Page 16 Scott needs light on 4th floor hallway and office Card Access Video Intrusion Elevator HVAC Lighting Energy Tenant Billing System Interaction: “Access Granted, Zone 4” “Camera Preset 1, Initiate Recording” HTTP “Disarm Intrusion Zone 4” “Floor 3 Enable” XML “Zone 4 Occupied” “Circuit 1, 2 ON” MODBUS ® LEGACY Examples of ICS
  • 17. Page 17 Lights and AC for Scott used 50 kWH Card Access Video Intrusion Elevator HVAC Lighting Energy Tenant Billing System Interaction: “Access Granted, Zone 4” “Camera Preset 1, Initiate Recording” HTTP “Disarm Intrusion Zone 4” “Floor 3 Enable” XML “Zone 4 Occupied” “Circuit 1, 2 ON” MODBUS ® “Totalize light and HVAC for Zone 4” LEGACY Examples of ICS
  • 18. Page 18 Invoice Scott for $150 of after hours energy usage Card Access Video Intrusion Elevator HVAC Lighting Energy Tenant Billing System Interaction: “Access Granted, Zone 4” “Camera Preset 1, Initiate Recording” HTTP “Disarm Intrusion Zone 4” LEGACY “Floor 3 Enable” XML “Zone 4 Occupied” “Circuit 1, 2 ON” MODBUS ® “Totalize light and HVAC for Zone 4” “Generate / email Invoice for Sat” SMTP Examples of ICS
  • 19. Page 19 We can work without AC
  • 20. Page 20 We can work without AC
  • 21. Page 21 We can work without AC
  • 22. Page 22 But Billy… who would do such a thing?
  • 23. Page 23 But Billy… who would do such a thing?
  • 24. Page 24 We need to move quickly
  • 25. Page 25 We need to move quickly
  • 26. Page 26 We need to move quickly
  • 27. Page 27 We need to move quickly
  • 28. POLL
  • 29. Page 29 ICS Security – Current State • Software: • Extremely poor, Windows XP • Vulnerable to common, unsophisticated attacks (remote/local) • Lack of industry standard exploit mitigations (DEP/ASLR) • Deployment: • Extremely poor • Be wary of remote access • Poor guidance from vendors • Impossible/unreasonable deployment architectures • Lack of automated verification
  • 30. Page 30 ICS Security – Current State • Vulnerability Management: • Extremely poor • Lack of managed awareness • Lack of managed patch management • Lack of vulnerability detection • Lack of mature reporting • Lack of awareness • Inability to scale limited expertise
  • 31. Page 31 ICS Security – Current State • Detection and Enumeration: • Foundation for all ICS security operations • Safety is a priority • Differentiate between ICS deployments • Manual processes are common • Expertise is limited
  • 32. POLL
  • 33. Page 33 ICS Dos and Don’ts • Don’ts • Run a traditional vulnerability scanner on ICS devices/software • Expect traditional tools to identify vulnerabilities with ICS software • Expect notification of vulnerabilities • Expect centralized patch management from vendors
  • 34. Page 34 ICS Dos and Don’ts • Do • Identify where your ICS is on the network • Identify the paths to reaching ICS • Monitor paths to ICS devices • Identify users/engineers that work with ICS
  • 36. Page 36 Next Webinar “Introducing the Co3 Security Module” • IR for security incidents: malware, system intrusion, DDoS, etc. • Wednesday, May 1 @ 1 PM ET “One of the hottest products at RSA…” NETWORK WORLD – FEBRUARY 2013 “…an invaluable weapon when responding to security incidents.” GOVERNMENT COMPUTER NEWS – APRIL 2013
  • 37. One Alewife Center, Suite 450 Cambridge, MA 02140 PHONE 617.206.3900 WWW.CO3SYS.COM “Co3 Systems makes the process of planning for a nightmare scenario as painless as possible, making it an Editors’ Choice.” PC MAGAZINE, EDITOR’S CHOICE “Co3…defines what software packages for privacy look like.” GARTNER “Platform is comprehensive, user friendly, and very well designed.” PONEMON INSTITUTE Billy Rios Technical Director Cylance brios@cylance.com www.cylance.com