SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
www.ria.ee
FOR OFFICIAL USE ONLY
Estonian
Overview of practical CIIP
activities in EE
Aare Reintam
ISKE area manager
CIIP unit
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Outline of my talk
• What is the aim of protecting CII?
• Community building
• Activities - security assessments and port
scanning
• Legislation, regulations, ICS/SCADA guidelines
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
When talking about CII protection
• We mean vital services that depend on IT
systems
• Electricity supply (production, transmission,
distribution)
• Data communications
• Water supply and sewerage
• Air navigation service
• …
• 43 vital services in total
www.ria.ee
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
CII Incidents and impact on economy
• Some examples from this year CII incidents in Europe
Sector Time Impact Reason
Energy Sept 2013 2,5 hours the hole
county electricity
distribution was
interrupted
Software error
Railway
transport
March
2013
3 hours long
Interruption of train
service between two
main cities in Europe
Optical cable breakage.
Trains leading dispatcher
was unable to carry out
work and had to stop the
traffic
Air
transport
August
2013
3 hours interruption in
X city air travel service.
No planes could land.
Flight control software
error.
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Community building
• CIIP lead (expert / mid-management level)
• SCADA workgroup
• CII protection council
• Annual CIIP conference
• CERT-EE lead (expert level)
• Government system administrators
• ISP & hosting abuse handlers
• CERT + CIIP joint events
• 0ct0b3rf3st
• EISA management lead:
• Quarterly reports to high government officials
• Seminars for management
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
How to keep communities
running?
• Regular meetings on interesting topics
• Share information
• State sponsored training, seminars,
conferences etc.
• 5 day advanced SCADA security
• Netflow, IDS, logging
• Managing small office networks (SOHO)
• …
• Social events
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Security assessment projects
• Find out what is the “real” security level of
vital service provider
• Based on attack scenarios
• Verifying them with penetration testing
• State sponsored
• We are using 3rd party consultants
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Sample security assessment task
list
• Information gathering from public sources
• Corporate LAN security assessment
(Windows domain, servers, workstations, Wi-
Fi etc.)
• Network perimeter testing (from corporate
<-> SCADA <-> control network)
• Assessment of SCADA servers, operator
workstation etc.
• Remote access to networks (VPN)
• Physical security
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Finding CII equipment from the
Internet
• Locating possibly vulnerable devices before
the “bad guys”
• Notifying the owner and explaining the risk
• Using shodanhq.com and other tools
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
Legislation & guidelines
• We are giving input to Ministry of justice to
amend appropriate legislation.
• Security measure regulation is established:
• Security responsibilities have to be in place when
providing vital services
• Implement security standard (ISO 27001, our
own local standard “ISKE” or industry specific)
• ICS/SCADA security guidelines
• 25 security controls
www.ria.ee
FOR OFFICIAL USE ONLY
FOR OFFICIAL USE ONLY
To sum up
• Incidents happen on daily basis
• Only legislation is not enough
• There has to be balanced responsibility
between state and service providers
• People are important
Thank You!
www.ria.ee
Aare Reintam
Aare.reintam@ria.ee

Mais conteúdo relacionado

Mais procurados

Civilian Infrastructure Monitoring System Generic
Civilian Infrastructure Monitoring System GenericCivilian Infrastructure Monitoring System Generic
Civilian Infrastructure Monitoring System Generic
Agincourt Business Services
 
Presentation IndiciaTech.nl - Preventing is Protecting
Presentation IndiciaTech.nl - Preventing is ProtectingPresentation IndiciaTech.nl - Preventing is Protecting
Presentation IndiciaTech.nl - Preventing is Protecting
Antonio Chan
 
2019 punter data voor slimme systemen dvc 17okt-pdf
2019 punter data voor slimme systemen dvc 17okt-pdf2019 punter data voor slimme systemen dvc 17okt-pdf
2019 punter data voor slimme systemen dvc 17okt-pdf
DVCSI
 

Mais procurados (20)

Civilian Infrastructure Monitoring System Generic
Civilian Infrastructure Monitoring System GenericCivilian Infrastructure Monitoring System Generic
Civilian Infrastructure Monitoring System Generic
 
Setting up network in an office
Setting up network in an officeSetting up network in an office
Setting up network in an office
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
IoT in ITS: Network Impacts
IoT in ITS: Network ImpactsIoT in ITS: Network Impacts
IoT in ITS: Network Impacts
 
CIR Conferences - Arrowhead
CIR Conferences - ArrowheadCIR Conferences - Arrowhead
CIR Conferences - Arrowhead
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-world
 
Presentation IndiciaTech.nl - Preventing is Protecting
Presentation IndiciaTech.nl - Preventing is ProtectingPresentation IndiciaTech.nl - Preventing is Protecting
Presentation IndiciaTech.nl - Preventing is Protecting
 
2019 punter data voor slimme systemen dvc 17okt-pdf
2019 punter data voor slimme systemen dvc 17okt-pdf2019 punter data voor slimme systemen dvc 17okt-pdf
2019 punter data voor slimme systemen dvc 17okt-pdf
 
Innovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantageInnovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantage
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
International Journal of Network Security & Its Applications (IJNSA)
 International Journal of Network Security & Its Applications (IJNSA) International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA) International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
 International Journal of Network Security & Its Applications (IJNSA) International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's Universities
 

Destaque

Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
pr0jectk
 
Final production piece v2
Final production piece v2Final production piece v2
Final production piece v2
PJG123
 
Defining an audience copy
Defining an audience   copyDefining an audience   copy
Defining an audience copy
PJG123
 
Video Wagner
Video   WagnerVideo   Wagner
Video Wagner
wagneragp
 
WSO2Con US 2013 - Connected Business - making it happen
WSO2Con US 2013 - Connected Business - making it happenWSO2Con US 2013 - Connected Business - making it happen
WSO2Con US 2013 - Connected Business - making it happen
WSO2
 
WSO2Con US 2013 - APIs Everywhere
WSO2Con US 2013 - APIs EverywhereWSO2Con US 2013 - APIs Everywhere
WSO2Con US 2013 - APIs Everywhere
WSO2
 
NODEjs Lesson1
NODEjs Lesson1NODEjs Lesson1
NODEjs Lesson1
3dmodeldiy
 
The thrilling potential of sixth sense technology
The thrilling potential of sixth sense technologyThe thrilling potential of sixth sense technology
The thrilling potential of sixth sense technology
3dmodeldiy
 

Destaque (20)

Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
Agus bambang .a (x tkj-2) menginstall 2 os [windows 7 dan ubuntu]
 
Final production piece v2
Final production piece v2Final production piece v2
Final production piece v2
 
9 ways to improve your sales team
9 ways to improve your sales team9 ways to improve your sales team
9 ways to improve your sales team
 
Defining an audience copy
Defining an audience   copyDefining an audience   copy
Defining an audience copy
 
02408b
02408b02408b
02408b
 
Video Wagner
Video   WagnerVideo   Wagner
Video Wagner
 
01824d
01824d01824d
01824d
 
WSO2Con US 2013 - Connected Business - making it happen
WSO2Con US 2013 - Connected Business - making it happenWSO2Con US 2013 - Connected Business - making it happen
WSO2Con US 2013 - Connected Business - making it happen
 
Smart room home automation
Smart room  home automationSmart room  home automation
Smart room home automation
 
WSO2Con US 2013 - APIs Everywhere
WSO2Con US 2013 - APIs EverywhereWSO2Con US 2013 - APIs Everywhere
WSO2Con US 2013 - APIs Everywhere
 
Julia Didenko - Donetsk Institute of Information
Julia Didenko - Donetsk Institute of InformationJulia Didenko - Donetsk Institute of Information
Julia Didenko - Donetsk Institute of Information
 
Andrew Haggard - #PutinAtWar
Andrew Haggard - #PutinAtWarAndrew Haggard - #PutinAtWar
Andrew Haggard - #PutinAtWar
 
How We Use GitHub
How We Use GitHubHow We Use GitHub
How We Use GitHub
 
NODEjs Lesson1
NODEjs Lesson1NODEjs Lesson1
NODEjs Lesson1
 
The thrilling potential of sixth sense technology
The thrilling potential of sixth sense technologyThe thrilling potential of sixth sense technology
The thrilling potential of sixth sense technology
 
Киберпреступность отступает?
Киберпреступность отступает?Киберпреступность отступает?
Киберпреступность отступает?
 
Symantec (2)
Symantec (2)Symantec (2)
Symantec (2)
 
Prezentare compartiment securitatea (2)
Prezentare compartiment securitatea (2)Prezentare compartiment securitatea (2)
Prezentare compartiment securitatea (2)
 
Paweł Ławiński - Jedna opowieść, cztery różne platformy
Paweł Ławiński - Jedna opowieść, cztery różne platformyPaweł Ławiński - Jedna opowieść, cztery różne platformy
Paweł Ławiński - Jedna opowieść, cztery różne platformy
 
Moldova cyber security 02.10.2013 rr
Moldova cyber security 02.10.2013 rrMoldova cyber security 02.10.2013 rr
Moldova cyber security 02.10.2013 rr
 

Semelhante a Aare reintam estonia_ciip_activites

Automotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADAAutomotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADA
Gilad Bandel
 
CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2
John Rooksby
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
 
High speed electric sky pods for passenger and cargo presentation by link vue
High speed electric sky pods for passenger and cargo presentation by link vueHigh speed electric sky pods for passenger and cargo presentation by link vue
High speed electric sky pods for passenger and cargo presentation by link vue
Mahesh Chandra Manav
 

Semelhante a Aare reintam estonia_ciip_activites (20)

Automotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADAAutomotive Cyber-Security Insights learned from IT and ICS/SCADA
Automotive Cyber-Security Insights learned from IT and ICS/SCADA
 
European Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challengesEuropean Critical Internet Infrastructure: past, present and future challenges
European Critical Internet Infrastructure: past, present and future challenges
 
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOTConnectivité temps réel et bi-directionnelle ​ pour solutions IOT
Connectivité temps réel et bi-directionnelle ​ pour solutions IOT
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2CS5032 Lecture 20: Dependable infrastructure 2
CS5032 Lecture 20: Dependable infrastructure 2
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Driving Efficiency with Splunk Cloud at Gatwick Airport
Driving Efficiency with Splunk Cloud at Gatwick AirportDriving Efficiency with Splunk Cloud at Gatwick Airport
Driving Efficiency with Splunk Cloud at Gatwick Airport
 
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in SplunkGet Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
Connected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptxConnected roadways external launch feb26 revised_final.ptx
Connected roadways external launch feb26 revised_final.ptx
 
Unit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdfUnit 1 IoT Fundamentals.pdf
Unit 1 IoT Fundamentals.pdf
 
Cyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillanCyber Security for SCADA and Networks - Sean McMillan
Cyber Security for SCADA and Networks - Sean McMillan
 
High speed electric sky pods for passenger and cargo presentation by link vue
High speed electric sky pods for passenger and cargo presentation by link vueHigh speed electric sky pods for passenger and cargo presentation by link vue
High speed electric sky pods for passenger and cargo presentation by link vue
 
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
How To Handle Breach Disclosures? Bug Bounty, Coordinated Vulnerability Discl...
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Critical Infrastructure and Security
Critical Infrastructure and SecurityCritical Infrastructure and Security
Critical Infrastructure and Security
 
DEVNET-1145 How APIs are Driving City Digitization
DEVNET-1145	How APIs are Driving City DigitizationDEVNET-1145	How APIs are Driving City Digitization
DEVNET-1145 How APIs are Driving City Digitization
 

Mais de S.E. CTS CERT-GOV-MD

Mais de S.E. CTS CERT-GOV-MD (14)

System of security controls
System of security controlsSystem of security controls
System of security controls
 
Symantec (3)
Symantec (3)Symantec (3)
Symantec (3)
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
Criminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legiiCriminalitatea cibernetică – provocare pentru aplicarea legii
Criminalitatea cibernetică – provocare pentru aplicarea legii
 
SIS PREZENTARE CTS
SIS PREZENTARE CTSSIS PREZENTARE CTS
SIS PREZENTARE CTS
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
CLOUD COMPUTING Security Risks or Opportunities
CLOUD COMPUTING Security Risks or  OpportunitiesCLOUD COMPUTING Security Risks or  Opportunities
CLOUD COMPUTING Security Risks or Opportunities
 
Operarea md cert în reţea naţională de
Operarea md cert în reţea naţională deOperarea md cert în reţea naţională de
Operarea md cert în reţea naţională de
 
GESTIONAREA RISCURILOR DE SECURITATE A INFORMAȚIEI
GESTIONAREA RISCURILOR DE  SECURITATE A INFORMAȚIEIGESTIONAREA RISCURILOR DE  SECURITATE A INFORMAȚIEI
GESTIONAREA RISCURILOR DE SECURITATE A INFORMAȚIEI
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
Cisco Secure X
Cisco Secure XCisco Secure X
Cisco Secure X
 
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and ResponsesCERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
CERT-GOV-MD: Cyber Security in Moldova: Challenges and Responses
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Symantec
SymantecSymantec
Symantec
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Aare reintam estonia_ciip_activites

  • 1. www.ria.ee FOR OFFICIAL USE ONLY Estonian Overview of practical CIIP activities in EE Aare Reintam ISKE area manager CIIP unit
  • 2. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Outline of my talk • What is the aim of protecting CII? • Community building • Activities - security assessments and port scanning • Legislation, regulations, ICS/SCADA guidelines
  • 3. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY When talking about CII protection • We mean vital services that depend on IT systems • Electricity supply (production, transmission, distribution) • Data communications • Water supply and sewerage • Air navigation service • … • 43 vital services in total
  • 5. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY CII Incidents and impact on economy • Some examples from this year CII incidents in Europe Sector Time Impact Reason Energy Sept 2013 2,5 hours the hole county electricity distribution was interrupted Software error Railway transport March 2013 3 hours long Interruption of train service between two main cities in Europe Optical cable breakage. Trains leading dispatcher was unable to carry out work and had to stop the traffic Air transport August 2013 3 hours interruption in X city air travel service. No planes could land. Flight control software error.
  • 6. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Community building • CIIP lead (expert / mid-management level) • SCADA workgroup • CII protection council • Annual CIIP conference • CERT-EE lead (expert level) • Government system administrators • ISP & hosting abuse handlers • CERT + CIIP joint events • 0ct0b3rf3st • EISA management lead: • Quarterly reports to high government officials • Seminars for management
  • 7. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY How to keep communities running? • Regular meetings on interesting topics • Share information • State sponsored training, seminars, conferences etc. • 5 day advanced SCADA security • Netflow, IDS, logging • Managing small office networks (SOHO) • … • Social events
  • 8. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Security assessment projects • Find out what is the “real” security level of vital service provider • Based on attack scenarios • Verifying them with penetration testing • State sponsored • We are using 3rd party consultants
  • 9. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Sample security assessment task list • Information gathering from public sources • Corporate LAN security assessment (Windows domain, servers, workstations, Wi- Fi etc.) • Network perimeter testing (from corporate <-> SCADA <-> control network) • Assessment of SCADA servers, operator workstation etc. • Remote access to networks (VPN) • Physical security
  • 10. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Finding CII equipment from the Internet • Locating possibly vulnerable devices before the “bad guys” • Notifying the owner and explaining the risk • Using shodanhq.com and other tools
  • 11. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY Legislation & guidelines • We are giving input to Ministry of justice to amend appropriate legislation. • Security measure regulation is established: • Security responsibilities have to be in place when providing vital services • Implement security standard (ISO 27001, our own local standard “ISKE” or industry specific) • ICS/SCADA security guidelines • 25 security controls
  • 12. www.ria.ee FOR OFFICIAL USE ONLY FOR OFFICIAL USE ONLY To sum up • Incidents happen on daily basis • Only legislation is not enough • There has to be balanced responsibility between state and service providers • People are important