SlideShare uma empresa Scribd logo
1 de 20
1
Cyber Security:
A Roadmap to Secure Solutions
Mike Pyle
VP Cyber Security
Tweet Live!
#SchneiderXE
2
Why Pay Attention to Cybersecurity
●Protecting assets against computer or network threats (CIA triad)
● Confidentiality: protect against unauthorised data disclosure
● Integrity: Ensure data and routines has not been modified or tampered
● Availability: Promote system uptime and operational capability
●Cyber attacks have “jumped the gap” from virtual to physical
world resulting in real physical damage to critical assets
●Cyber attacks can now put people at risk, cause production
downtime, create financial loss and can ex-filtrate sensitive data
3
Why Schneider Electric cares
Focus of attacks has shifted from the IT world towards critical
infrastructure. Schneider Electric’s customers may be in the cross hairs of
many groups looking to harm infrastructure
● Cyber warfare
● Criminal activities
● Revenge
● Maliciousness
● Send a political message or
build street creds in the hacker
community
IT Security
Confidentiality &
Integrity first
Availability important
Thousands of
devices
Cross industry
regulations
Transaction model
OT Security
Human Safety &
Reliability first
Integrity important
Millions of devices
Industry-specific
regulations
Real-time model
4
Key benefits
Key Trends & Drivers
Terrorism
Extortion
650% increase in cyber threats
during the last year
Successfully attacking best guarded
organizations
Terrorism
Extortion
Espionage
IT – Information Technology
OT – Operations Technology
Regulatory compliance is in a constant state of flux
Increasing budgetary pressures & fewer resources
Rapid pace of technology evolution – IT/OT convergence
5
DamageMethod
Source: TrendMicro – 12 Security Predictions for 2012
To: Control Room Operators
From: Help Desk
Please apply the latest
patches to ensure safety of
computer systems, click here
for the updates.
Shamoon
Stuxnet
Duqu
Scan the Internet
Spear phishing
Inject Malware
Motive
Rapid Evolution of Threat
Threat Landscape
6
Case in Point – The Shamoon Virus
Goal: Cyber Espionage and Damage.
Initially targeted oil and gas operations
in the Middle East
● Currently considered the most destructive
attack in the business sector
● More than 30,000 computers at an oil
company replaced
● Used to attacked a natural gas firm a few
days later
● Included a routine coded to self-execute,
replacing crucial system files with an
image of a burning U.S. flag
● Overwrote all real data on the machines
with garbage data
7
- Restrict access
- Comply with
regulations
- Assess Threat systems
- Protect equipment
- Secure local
and hosted sites
- Harden products
and architectures
- Comply with
regulations & standards
- Define regulations
- Mandate security
- Drive collaboration
Industry Suppliers
ICT, energy, transportation &
service providers
Planners & Developers
Real estate developers &
urban planners
Governments
National, regional and local
city officials
Utilities
City and private electric,
water & gas utilities
NGO’s & Associations
Local organizations:
citizens, businesses & NGOs
Other Infrastructure
Internet & MAN
providers, banks and
transportation
Smart Cities Require Comprehensive Security
People & Communities
Responsible stakeholder action & collaboration is a must
8
Compliance & Reporting Architecture
Information sharing Monitoring
Increasing Resiliency - Key Focus Areas
Connectivity
Third Party/Agnostic
• Compliant with current
standards
• Assessing upcoming
regulations
• Follow internal policies & best
practices
• Uniform security across
products
• Reinforce weakest link
• Tackle security at core of
product
• Secure communications
among products
• Use strong authentication to
access critical systems
• Vendors to disclose security
vulnerabilities to utilities
• Utilities to disclose critical
breaches to US Government
• Prevent, detect and react to
breaches in real-time
• Automatic monitoring tools &
human-driven solutions
• Vendors cannot create all
technology layers
• Fully test third party modules
to be safe from breaches
9
Value Proposition
• Threats surged 17x in 2 years due to devices interconnectivity, IT networks convergence &
heterogeneous architectures
• Operational networks with many unpatched legacy systems, making them as resilient as weakest link
• High levels of awareness and scrutiny by regulators and general public
Problem - Cyber Security & Change Management
• Schneider Electric to provide a secure & reliable core offering with additional security products & services
• Allow customers to have control over security and compliance, while enhancing operational
effectiveness, through an extended set of integrated solutions
Positioning
Schneider Electric – Our Differentiation
Best of Breed Certified Solutions
IT/OT Expertise &-
Domain Knowledge
10
Key Benefits
• Protect human life
• Avoid loss of service
• Avoid loss of productivity
• Avoid brand damage
• Mitigate and reduce impact on assets
• Limit damage on image and society
11
Listen to customer expectations,
analyze regulatory mandates and
translate into documented security
requirements and implement within
our offers
Develop using proper
security principles:
• Secure by design
• Threat model and risk
analysis
• Security features are
implemented properly
• Secure coding principles
applied
• Mature SDL program with
metrics
Secure Product Testing
• Robustness & Fuzz testing
• Vulnerability Scanning
• Penetration Testing
• Security feature validation
Document how to securely
install, commission, maintain,
decommission products to
manage a secure system
Security: Built in, not Bolted on..
Building secure products and solutions
12
Most Resilient SCADA Solution in the Market
• Last 15 years, invested ~$20M on security on OASyS
• Currently, investing around $1M yearly on security activities
• Dedicated security team
● Throughout the years, Schneider Electric has committed to security, by investing over
$20 million dollars, to provide safe, resilient and compliant products
● We are recognized within the industry as a real-time and secure solutions company
• Only firm providing solutions with secure & rapid escalation
• Best in class 3rd party integration model (SCADA)
• Ability to access external data in a secure manner
• World class security technology throughout all our products
• Anti-virus support
• Separation of Duties support
• Multi-factor authentication
• We meet and exceed main security standards in the market
• NERC Critical Infrastructure Protection (CIP)
• NIST Industrial Control Systems Security (SP 800-82)
Commitment
Capabilities
Key Technologies
Standards
Partnerships
13
Incident Response Plan is Crucial
●Objectives:
● Respond to events & customer’s concerns
● Rapidly & effectively address disclosures
●Types of Incidents:
● Intentional - deliberate attack on a customer’s
system
●Steal customer’s sensitive information
●Disrupt customer’s operations
● Unintentional - misuse of a customer
operation using the system
● Vulnerability disclosure; only reported as a
vulnerability; no evidence of disruption of a
customer operation
IRP Simplified Conceptual Flow
Vulnerability/ Incident
Reported
Analyze & Report
Action Plan &
Contain
Communicate &
Publish
Mitigate & Resolve
Communicate
Resolution & Close
14
DIACAP Lifecycle
DIACAP:: DoD Information Assurance Certification & Accreditation Process
Required for all DoD projects
Meeting Customer Requirements
15
Comprehensive Approach to Security
Consulting, Integration and Managed Security Services
Monitoring, Compliance, Change Management, Whitelisting, Big Data Security, Firewalls
Oil & Gas Electric WWW Transportation MMM
Schneider Electric’s Core OfferingSecure coding, Encryption, Access, Authorization & Authentication, etc.
Security
Services
Security
Products
Schneider Electric stands by a safe, reliable and secure core offering
Cyber security products & services, increasing prevention, detection & response
Providing portfolio of services through recognized Schneider Electric’s consulting arm & local players
A Defense in-Depth approach offering a combination of physical controls, monitoring and analytics
Built-in
Security
16
Industrial DMZ
Boundaries Control Room
Operation
Business Systems
Control Network
Operation Network
Enterprise Network
Device Network
MES, WMS, DMS, LMS…
SCADA, DCS, Controllers, Local & Remote
Communications Network Devices…
Instruments and Controls, Distributed IO, …
Enterprise
Performance
Systems
Field Devices
Core Offering
Cyber Security Products & Services
Security Products – Partnership Ecosystem
Monitoring
Compliance
Management
Change
Management
Application
Whitelisting
Intrusion
Detection
System
Firewalls
Outsourcing:ManagedServices,Maintenance&Cloud
Cyber Security Services
Integration
Consulting:Assessment&Design
17
For More Information
http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page
Schneider Electric 18- Infrastructure Business – Rodrigo Kaschny – March 2012
Make the most of
your energy
business
Appendix
Schneider Electric 20- Infrastructure Business – Rodrigo Kaschny – March 2012
Key Terms
DIACAP:
DoD Information
Assurance Certification &
Accreditation Process
CoN:
Certificate of
Networthiness
DISA:
Defense Information
Systems Agency
ICS-CERT:
Industrial Control System
Cyber Emergency
Response Team; A part of
the U.S. Dept. of
Homeland Security US-
CERT Organization
IA:
Information Assurance
DAA:
Designated Approval
Authority
STIG’s:
Security Technical
Implementation Guides
IRP:
Incident Response Plan

Mais conteúdo relacionado

Mais procurados

Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 

Mais procurados (20)

ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Case studies in cybersecurity strategies
Case studies in cybersecurity strategiesCase studies in cybersecurity strategies
Case studies in cybersecurity strategies
 

Semelhante a Cyber security: A roadmap to secure solutions

Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
S .Ali Raza
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
SolarWinds
 

Semelhante a Cyber security: A roadmap to secure solutions (20)

Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Webinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWindsWebinar: Real IT Compliance with SolarWinds
Webinar: Real IT Compliance with SolarWinds
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 

Mais de Schneider Electric

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design Considerations
Schneider Electric
 

Mais de Schneider Electric (20)

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design Considerations
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting Investors
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation Trends
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service Providers
 
Magelis Basic HMI Briefing
Magelis Basic HMI Briefing Magelis Basic HMI Briefing
Magelis Basic HMI Briefing
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay Briefing
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR Briefing
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software Briefing
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive Industries
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoT
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories Briefing
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors Briefing
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches Briefing
 

Último

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Cyber security: A roadmap to secure solutions

  • 1. 1 Cyber Security: A Roadmap to Secure Solutions Mike Pyle VP Cyber Security Tweet Live! #SchneiderXE
  • 2. 2 Why Pay Attention to Cybersecurity ●Protecting assets against computer or network threats (CIA triad) ● Confidentiality: protect against unauthorised data disclosure ● Integrity: Ensure data and routines has not been modified or tampered ● Availability: Promote system uptime and operational capability ●Cyber attacks have “jumped the gap” from virtual to physical world resulting in real physical damage to critical assets ●Cyber attacks can now put people at risk, cause production downtime, create financial loss and can ex-filtrate sensitive data
  • 3. 3 Why Schneider Electric cares Focus of attacks has shifted from the IT world towards critical infrastructure. Schneider Electric’s customers may be in the cross hairs of many groups looking to harm infrastructure ● Cyber warfare ● Criminal activities ● Revenge ● Maliciousness ● Send a political message or build street creds in the hacker community IT Security Confidentiality & Integrity first Availability important Thousands of devices Cross industry regulations Transaction model OT Security Human Safety & Reliability first Integrity important Millions of devices Industry-specific regulations Real-time model
  • 4. 4 Key benefits Key Trends & Drivers Terrorism Extortion 650% increase in cyber threats during the last year Successfully attacking best guarded organizations Terrorism Extortion Espionage IT – Information Technology OT – Operations Technology Regulatory compliance is in a constant state of flux Increasing budgetary pressures & fewer resources Rapid pace of technology evolution – IT/OT convergence
  • 5. 5 DamageMethod Source: TrendMicro – 12 Security Predictions for 2012 To: Control Room Operators From: Help Desk Please apply the latest patches to ensure safety of computer systems, click here for the updates. Shamoon Stuxnet Duqu Scan the Internet Spear phishing Inject Malware Motive Rapid Evolution of Threat Threat Landscape
  • 6. 6 Case in Point – The Shamoon Virus Goal: Cyber Espionage and Damage. Initially targeted oil and gas operations in the Middle East ● Currently considered the most destructive attack in the business sector ● More than 30,000 computers at an oil company replaced ● Used to attacked a natural gas firm a few days later ● Included a routine coded to self-execute, replacing crucial system files with an image of a burning U.S. flag ● Overwrote all real data on the machines with garbage data
  • 7. 7 - Restrict access - Comply with regulations - Assess Threat systems - Protect equipment - Secure local and hosted sites - Harden products and architectures - Comply with regulations & standards - Define regulations - Mandate security - Drive collaboration Industry Suppliers ICT, energy, transportation & service providers Planners & Developers Real estate developers & urban planners Governments National, regional and local city officials Utilities City and private electric, water & gas utilities NGO’s & Associations Local organizations: citizens, businesses & NGOs Other Infrastructure Internet & MAN providers, banks and transportation Smart Cities Require Comprehensive Security People & Communities Responsible stakeholder action & collaboration is a must
  • 8. 8 Compliance & Reporting Architecture Information sharing Monitoring Increasing Resiliency - Key Focus Areas Connectivity Third Party/Agnostic • Compliant with current standards • Assessing upcoming regulations • Follow internal policies & best practices • Uniform security across products • Reinforce weakest link • Tackle security at core of product • Secure communications among products • Use strong authentication to access critical systems • Vendors to disclose security vulnerabilities to utilities • Utilities to disclose critical breaches to US Government • Prevent, detect and react to breaches in real-time • Automatic monitoring tools & human-driven solutions • Vendors cannot create all technology layers • Fully test third party modules to be safe from breaches
  • 9. 9 Value Proposition • Threats surged 17x in 2 years due to devices interconnectivity, IT networks convergence & heterogeneous architectures • Operational networks with many unpatched legacy systems, making them as resilient as weakest link • High levels of awareness and scrutiny by regulators and general public Problem - Cyber Security & Change Management • Schneider Electric to provide a secure & reliable core offering with additional security products & services • Allow customers to have control over security and compliance, while enhancing operational effectiveness, through an extended set of integrated solutions Positioning Schneider Electric – Our Differentiation Best of Breed Certified Solutions IT/OT Expertise &- Domain Knowledge
  • 10. 10 Key Benefits • Protect human life • Avoid loss of service • Avoid loss of productivity • Avoid brand damage • Mitigate and reduce impact on assets • Limit damage on image and society
  • 11. 11 Listen to customer expectations, analyze regulatory mandates and translate into documented security requirements and implement within our offers Develop using proper security principles: • Secure by design • Threat model and risk analysis • Security features are implemented properly • Secure coding principles applied • Mature SDL program with metrics Secure Product Testing • Robustness & Fuzz testing • Vulnerability Scanning • Penetration Testing • Security feature validation Document how to securely install, commission, maintain, decommission products to manage a secure system Security: Built in, not Bolted on.. Building secure products and solutions
  • 12. 12 Most Resilient SCADA Solution in the Market • Last 15 years, invested ~$20M on security on OASyS • Currently, investing around $1M yearly on security activities • Dedicated security team ● Throughout the years, Schneider Electric has committed to security, by investing over $20 million dollars, to provide safe, resilient and compliant products ● We are recognized within the industry as a real-time and secure solutions company • Only firm providing solutions with secure & rapid escalation • Best in class 3rd party integration model (SCADA) • Ability to access external data in a secure manner • World class security technology throughout all our products • Anti-virus support • Separation of Duties support • Multi-factor authentication • We meet and exceed main security standards in the market • NERC Critical Infrastructure Protection (CIP) • NIST Industrial Control Systems Security (SP 800-82) Commitment Capabilities Key Technologies Standards Partnerships
  • 13. 13 Incident Response Plan is Crucial ●Objectives: ● Respond to events & customer’s concerns ● Rapidly & effectively address disclosures ●Types of Incidents: ● Intentional - deliberate attack on a customer’s system ●Steal customer’s sensitive information ●Disrupt customer’s operations ● Unintentional - misuse of a customer operation using the system ● Vulnerability disclosure; only reported as a vulnerability; no evidence of disruption of a customer operation IRP Simplified Conceptual Flow Vulnerability/ Incident Reported Analyze & Report Action Plan & Contain Communicate & Publish Mitigate & Resolve Communicate Resolution & Close
  • 14. 14 DIACAP Lifecycle DIACAP:: DoD Information Assurance Certification & Accreditation Process Required for all DoD projects Meeting Customer Requirements
  • 15. 15 Comprehensive Approach to Security Consulting, Integration and Managed Security Services Monitoring, Compliance, Change Management, Whitelisting, Big Data Security, Firewalls Oil & Gas Electric WWW Transportation MMM Schneider Electric’s Core OfferingSecure coding, Encryption, Access, Authorization & Authentication, etc. Security Services Security Products Schneider Electric stands by a safe, reliable and secure core offering Cyber security products & services, increasing prevention, detection & response Providing portfolio of services through recognized Schneider Electric’s consulting arm & local players A Defense in-Depth approach offering a combination of physical controls, monitoring and analytics Built-in Security
  • 16. 16 Industrial DMZ Boundaries Control Room Operation Business Systems Control Network Operation Network Enterprise Network Device Network MES, WMS, DMS, LMS… SCADA, DCS, Controllers, Local & Remote Communications Network Devices… Instruments and Controls, Distributed IO, … Enterprise Performance Systems Field Devices Core Offering Cyber Security Products & Services Security Products – Partnership Ecosystem Monitoring Compliance Management Change Management Application Whitelisting Intrusion Detection System Firewalls Outsourcing:ManagedServices,Maintenance&Cloud Cyber Security Services Integration Consulting:Assessment&Design
  • 18. Schneider Electric 18- Infrastructure Business – Rodrigo Kaschny – March 2012 Make the most of your energy business
  • 20. Schneider Electric 20- Infrastructure Business – Rodrigo Kaschny – March 2012 Key Terms DIACAP: DoD Information Assurance Certification & Accreditation Process CoN: Certificate of Networthiness DISA: Defense Information Systems Agency ICS-CERT: Industrial Control System Cyber Emergency Response Team; A part of the U.S. Dept. of Homeland Security US- CERT Organization IA: Information Assurance DAA: Designated Approval Authority STIG’s: Security Technical Implementation Guides IRP: Incident Response Plan

Notas do Editor

  1. What is Cybersecurity:Threats attack vulnerabilities and caninclude: Internal threats External threatsPotential risks: Safety of personnel (injury, fatality) Production and financial loss Loss of sensitive dataKey Security Principles:Confidentiality – Prevent disclosure of private information. Integrity – Data cannot be modified without authorization. Availability – The information must be available when it is needed.
  2. Hackers are not sitting still, as new mitigations are put in place, hacker find a new pathway inPeople/Employees can be a vulnerability soft spot – a trained and aware person is a less vulnerable person
  3. Effective Cybersecurity cannot be addressed as an afterthought
  4. Schneider Electric’s IRP is defined as a Corporate Directive and ProcedureIRP Tools: 8 Disciplines (8D) used to determine root cause Common Vulnerability Scoring System (CVSS) is used to prioritize the vulnerabilitiesIRP Tracking of activities:Issue to Prevention (I2P)Incorporates the 8D process