SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
Cyber resilience – What’s in a number?
The real threat to industrial control systems today
Confidential Property of Schneider Electric
Jay Abdallah | CISSP, CISM, CISA
Director – EMEA Cyber Security Services
Page 2Confidential Property of Schneider Electric |
1 The current threat landscape
2 Statistics
3
Schneider Electric’s commitment
to security
4
Train-ride surprise – the importance of
security awareness
Agenda
The current threat landscape
Page 3Confidential Property of Schneider Electric |
Page 4Confidential Property of Schneider Electric |
The danger of malware
390,000 new infections per day
AV-Test.org Jan 2016
0
20 000 000
40 000 000
60 000 000
80 000 000
100 000 000
120 000 000
140 000 000
160 000 000
2012 2013 2014 2015 2016*
Page 5Confidential Property of Schneider Electric |
Recent industrial cyber incidents
German steel millUkraine power gridUSA water dam
Statistics
Page 6Confidential Property of Schneider Electric |
Page 7Confidential Property of Schneider Electric |
Attacks targeted towards
German industrial systems
• 1 in every 7 registered security attacks in Q4, 2015, came from Germany
• Germany ranked #2 globally in critical infrastructure targets
• Critical infrastructure infections from Germany have doubled every year since 2012
• 78% of malicious software installation attempts from Germany in 2015 were successful
Page 8Confidential Property of Schneider Electric |
German cyber attack sequence
Source: TFOT 2015
56,3%
Cyber crime
20%
Hacktivism
16,1%
Cyber espionage
7,6%
Cyber war
Page 9Confidential Property of Schneider Electric |
• With so many statistics, which ones matter
the most? Are one set more important
than another?
• How reliable is our source TFOT?
Data reliability
• The previous slides about Germany
contained false statistics from a fake source
• Did you notice?
Page 10Confidential Property of Schneider Electric |
How do we identify and manage our
biggest vulnerabilities?
Where is the weak link?
Schneider Electric’s commitment to security
Page 11Confidential Property of Schneider Electric |
More than just IT security
Critical infrastructure systems require high reliability and uptime:
• Need 99.999% or greater uptime
• Critical performance
• Fast reaction time
Page 12Confidential Property of Schneider Electric |
Confidentiality
Integrity
Availability
Availability
Integrity
Confidentiality
IT security OT security
OTPRIORITIES
CONTROL SYSTEMS
SECURITY / OT
IT SECURITY
PHYSICAL
SECURITY
Page 13Confidential Property of Schneider Electric |
Cyber security at Schneider Electric
Defense in depth
POLICIES, PROCEDURES & AWARENESS
PERIMETER
INTERNAL NETWORK
HOST
APPLICATION
DATA
PHYSICAL SECURITY
Page 14Confidential Property of Schneider Electric |
Cyber security at Schneider Electric
Specialized industrial security services – our offers
• Cyber security training
• Cyber security control design & implementation
• Cyber security consulting
• Cyber security maintenance services
Train ride surprise – the importance of security awareness
London, United Kingdom
Page 15Confidential Property of Schneider Electric |
Page 17Confidential Property of Schneider Electric |
Train ride surprise
• On a phone call, with no line disturbance
• Perfectly clear, normal conversation:
• “Enjoy the train ride along the
English countryside”
• “Are you coming home tonight?”
• “Be sure to order a nice hot cup of tea”
• “I’m sure it’s much colder there than it is here”
• Begins acting strangely after five minutes
– seems incoherent.
• When I ask the her what she is doing, she
doesn’t answer and instead says one of the
above statements randomly
• Answers yes or no questions flawlessly
• Responds to other questions with one of the
above random statements
Page 20Confidential Property of Schneider Electric |
What happened?
• Technical malfunction causing me to hear
recorded sayings?
• What about coherent responses?
• Why is my conversation being recorded?
• Scrambler device?
• Not sophisticated enough for real-time responses
• 212 area code is in Manhattan, New York.
When called, I get a strange error.
• Recorded sentences used as fillers or common
talk to encourage me to lead the discussion
(and possibly say something incriminating)
• Stealth listening
• Similar to behavior of advanced malware,
spyware, and Trojans
Page 21Confidential Property of Schneider Electric |
Who is behind this?
• MI6 (UK)
• Unknown body
It is likely, however, we do not and will
not ever know who is really behind most
cyber attacks.
• CIA and NSA (USA)
• FSB (Russia)
Page 22Confidential Property of Schneider Electric |
Moral of the story
• Appreciation of privacy and confidentiality
• Importance of security awareness
• Always be alert, Big Brother is always
listening
• It is unsettling the first time it happens to
you …
• … but it is likely not to be the first time, it’s
just the first time you have noticed
Page 23Confidential Property of Schneider Electric |
Cyber resilience threat industrial systems

Mais conteúdo relacionado

Mais procurados

Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?Schneider Electric
 
IT Consulting and Integration Services brochure
IT Consulting and Integration Services brochureIT Consulting and Integration Services brochure
IT Consulting and Integration Services brochureSchneider Electric
 
Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration davranetworks
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Schneider Electric
 
Maximize your business and machine performance
Maximize your business and machine performanceMaximize your business and machine performance
Maximize your business and machine performanceSchneider Electric
 
Cisco Energy Management-tech-intro-for-paris-hackathon
Cisco Energy Management-tech-intro-for-paris-hackathonCisco Energy Management-tech-intro-for-paris-hackathon
Cisco Energy Management-tech-intro-for-paris-hackathonCisco DevNet
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service ProvidersSchneider Electric
 
Industrial sawmill solution Wood Mizer
Industrial sawmill solution Wood MizerIndustrial sawmill solution Wood Mizer
Industrial sawmill solution Wood MizerSchneider Electric
 
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...Mining Intelligence Tools: How to Consolidate Information and Drive Business ...
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...Schneider Electric
 
Basic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control SystemBasic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control SystemSchneider Electric
 
Aged Data Center Infrastructure.pptx
Aged Data Center Infrastructure.pptxAged Data Center Infrastructure.pptx
Aged Data Center Infrastructure.pptxSchneider Electric
 
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...Schneider Electric
 
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...Schneider Electric
 
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Schneider Electric
 
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...Schneider Electric
 
Safety for life: Bringing new Life to Process Safety
Safety for life:  Bringing new Life to Process SafetySafety for life:  Bringing new Life to Process Safety
Safety for life: Bringing new Life to Process SafetySchneider Electric
 
[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network
[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network
[Case Study] Stedin (The Netherlands) - Underground Self-Healing NetworkSchneider Electric
 
The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas Ghazi Wadi, PMP
 

Mais procurados (20)

Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?Will DCIM-driven cloud services change the game for data center management?
Will DCIM-driven cloud services change the game for data center management?
 
IT Consulting and Integration Services brochure
IT Consulting and Integration Services brochureIT Consulting and Integration Services brochure
IT Consulting and Integration Services brochure
 
Smart Energy Systems of Future
Smart Energy Systems of FutureSmart Energy Systems of Future
Smart Energy Systems of Future
 
Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?
 
Maximize your business and machine performance
Maximize your business and machine performanceMaximize your business and machine performance
Maximize your business and machine performance
 
Cisco Energy Management-tech-intro-for-paris-hackathon
Cisco Energy Management-tech-intro-for-paris-hackathonCisco Energy Management-tech-intro-for-paris-hackathon
Cisco Energy Management-tech-intro-for-paris-hackathon
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service Providers
 
Industrial sawmill solution Wood Mizer
Industrial sawmill solution Wood MizerIndustrial sawmill solution Wood Mizer
Industrial sawmill solution Wood Mizer
 
DTN ProphetX® - At a Glance
DTN ProphetX® - At a GlanceDTN ProphetX® - At a Glance
DTN ProphetX® - At a Glance
 
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...Mining Intelligence Tools: How to Consolidate Information and Drive Business ...
Mining Intelligence Tools: How to Consolidate Information and Drive Business ...
 
Basic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control SystemBasic Concepts for an Integrated Steel Process Control System
Basic Concepts for an Integrated Steel Process Control System
 
Aged Data Center Infrastructure.pptx
Aged Data Center Infrastructure.pptxAged Data Center Infrastructure.pptx
Aged Data Center Infrastructure.pptx
 
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
Trends in Automation Operator Interface and Data Management - Are You Up-to-D...
 
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...
Redefining IoT with Innovation At Every Level - Prith Banerjee, Chief Technol...
 
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
 
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
Impact of IEC 61508 Standards on Intelligent Electrial Networks and Safety Im...
 
Safety for life: Bringing new Life to Process Safety
Safety for life:  Bringing new Life to Process SafetySafety for life:  Bringing new Life to Process Safety
Safety for life: Bringing new Life to Process Safety
 
[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network
[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network
[Case Study] Stedin (The Netherlands) - Underground Self-Healing Network
 
The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas
 

Destaque

How IIoT and Intelligent Pumping can contribute to solving the Global Water C...
How IIoT and Intelligent Pumping can contribute to solving the Global Water C...How IIoT and Intelligent Pumping can contribute to solving the Global Water C...
How IIoT and Intelligent Pumping can contribute to solving the Global Water C...Schneider Electric
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Joan Figueras Tugas
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
Schneider Electric Services_Modernization and Upgrade Solutions.pptx
Schneider Electric Services_Modernization and Upgrade Solutions.pptxSchneider Electric Services_Modernization and Upgrade Solutions.pptx
Schneider Electric Services_Modernization and Upgrade Solutions.pptxSchneider Electric
 
How Row-based Data Center Cooling Works
How Row-based Data Center Cooling WorksHow Row-based Data Center Cooling Works
How Row-based Data Center Cooling WorksSchneider Electric
 
Accelerate Mining Operations Excellence
Accelerate Mining Operations ExcellenceAccelerate Mining Operations Excellence
Accelerate Mining Operations ExcellenceSchneider Electric
 
Arc Flash Considerations for Data Center IT Space
Arc Flash Considerations for Data Center IT SpaceArc Flash Considerations for Data Center IT Space
Arc Flash Considerations for Data Center IT SpaceSchneider Electric
 
Water solution delivers an affordable upgrade and future-proof control
Water solution delivers an affordable upgrade and future-proof controlWater solution delivers an affordable upgrade and future-proof control
Water solution delivers an affordable upgrade and future-proof controlSchneider Electric
 
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...Schneider Electric
 
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...guest3e1229f
 
CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014Barry Shteiman
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry
 
How Data Center Infrastructure Management Software Improves Planning and Cuts...
How Data Center Infrastructure Management Software Improves Planning and Cuts...How Data Center Infrastructure Management Software Improves Planning and Cuts...
How Data Center Infrastructure Management Software Improves Planning and Cuts...Schneider Electric
 
Nigeria's blueprint for a brighter tomorrow
Nigeria's blueprint for a brighter tomorrowNigeria's blueprint for a brighter tomorrow
Nigeria's blueprint for a brighter tomorrowSchneider Electric
 
Trends in Distribution Automation
Trends in Distribution AutomationTrends in Distribution Automation
Trends in Distribution AutomationSchneider Electric
 
The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseChristiaan Beek
 
Augmenting engagement value through communities - Schneider Electric - APQC K...
Augmenting engagement value through communities - Schneider Electric - APQC K...Augmenting engagement value through communities - Schneider Electric - APQC K...
Augmenting engagement value through communities - Schneider Electric - APQC K...Louis-Pierre Guillaume
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityChris Sistrunk
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseSplunk
 
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Schneider Electric
 

Destaque (20)

How IIoT and Intelligent Pumping can contribute to solving the Global Water C...
How IIoT and Intelligent Pumping can contribute to solving the Global Water C...How IIoT and Intelligent Pumping can contribute to solving the Global Water C...
How IIoT and Intelligent Pumping can contribute to solving the Global Water C...
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Schneider Electric Services_Modernization and Upgrade Solutions.pptx
Schneider Electric Services_Modernization and Upgrade Solutions.pptxSchneider Electric Services_Modernization and Upgrade Solutions.pptx
Schneider Electric Services_Modernization and Upgrade Solutions.pptx
 
How Row-based Data Center Cooling Works
How Row-based Data Center Cooling WorksHow Row-based Data Center Cooling Works
How Row-based Data Center Cooling Works
 
Accelerate Mining Operations Excellence
Accelerate Mining Operations ExcellenceAccelerate Mining Operations Excellence
Accelerate Mining Operations Excellence
 
Arc Flash Considerations for Data Center IT Space
Arc Flash Considerations for Data Center IT SpaceArc Flash Considerations for Data Center IT Space
Arc Flash Considerations for Data Center IT Space
 
Water solution delivers an affordable upgrade and future-proof control
Water solution delivers an affordable upgrade and future-proof controlWater solution delivers an affordable upgrade and future-proof control
Water solution delivers an affordable upgrade and future-proof control
 
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...
Energy Management in the era of Internet of Things - Εκδήλωση "Connect to Suc...
 
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...
Paul Hamilton, Schneider Electric: Lean and Clean: Equipping Modern Manufactu...
 
CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014CuSRF. OWASP AppSecUS 2014
CuSRF. OWASP AppSecUS 2014
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
How Data Center Infrastructure Management Software Improves Planning and Cuts...
How Data Center Infrastructure Management Software Improves Planning and Cuts...How Data Center Infrastructure Management Software Improves Planning and Cuts...
How Data Center Infrastructure Management Software Improves Planning and Cuts...
 
Nigeria's blueprint for a brighter tomorrow
Nigeria's blueprint for a brighter tomorrowNigeria's blueprint for a brighter tomorrow
Nigeria's blueprint for a brighter tomorrow
 
Trends in Distribution Automation
Trends in Distribution AutomationTrends in Distribution Automation
Trends in Distribution Automation
 
The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypse
 
Augmenting engagement value through communities - Schneider Electric - APQC K...
Augmenting engagement value through communities - Schneider Electric - APQC K...Augmenting engagement value through communities - Schneider Electric - APQC K...
Augmenting engagement value through communities - Schneider Electric - APQC K...
 
RSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS SecurityRSAC 2016: How to Get into ICS Security
RSAC 2016: How to Get into ICS Security
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
 
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
 

Semelhante a Cyber resilience threat industrial systems

Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar PresentationCertrec
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUMohit Rampal
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionShah Sheikh
 
The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015Ollie Whitehouse
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018joshquarrie
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Kyle Lai
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsThreatConnect
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Network security
Network securityNetwork security
Network securityNikhil Vyas
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Cyren, Inc
 

Semelhante a Cyber resilience threat industrial systems (20)

Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
Cyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSUCyber as WMD- April 2015- GFSU
Cyber as WMD- April 2015- GFSU
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015The Technology Horizon & Cyber Security from EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 

Mais de Schneider Electric

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design ConsiderationsSchneider Electric
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsSchneider Electric
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing Schneider Electric
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsSchneider Electric
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingSchneider Electric
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSchneider Electric
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingSchneider Electric
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingSchneider Electric
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesSchneider Electric
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Schneider Electric
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.Schneider Electric
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580Schneider Electric
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...Schneider Electric
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTSchneider Electric
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingSchneider Electric
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingSchneider Electric
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingSchneider Electric
 
Telemecanique Pressure Switches Briefing
Telemecanique Pressure Switches BriefingTelemecanique Pressure Switches Briefing
Telemecanique Pressure Switches BriefingSchneider Electric
 

Mais de Schneider Electric (20)

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design Considerations
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting Investors
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation Trends
 
Magelis Basic HMI Briefing
Magelis Basic HMI Briefing Magelis Basic HMI Briefing
Magelis Basic HMI Briefing
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay Briefing
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR Briefing
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software Briefing
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive Industries
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoT
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories Briefing
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors Briefing
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches Briefing
 
Telemecanique Pressure Switches Briefing
Telemecanique Pressure Switches BriefingTelemecanique Pressure Switches Briefing
Telemecanique Pressure Switches Briefing
 
Proximity Switches Briefing
Proximity Switches BriefingProximity Switches Briefing
Proximity Switches Briefing
 

Último

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Cyber resilience threat industrial systems

  • 1. Cyber resilience – What’s in a number? The real threat to industrial control systems today Confidential Property of Schneider Electric Jay Abdallah | CISSP, CISM, CISA Director – EMEA Cyber Security Services
  • 2. Page 2Confidential Property of Schneider Electric | 1 The current threat landscape 2 Statistics 3 Schneider Electric’s commitment to security 4 Train-ride surprise – the importance of security awareness Agenda
  • 3. The current threat landscape Page 3Confidential Property of Schneider Electric |
  • 4. Page 4Confidential Property of Schneider Electric | The danger of malware 390,000 new infections per day AV-Test.org Jan 2016 0 20 000 000 40 000 000 60 000 000 80 000 000 100 000 000 120 000 000 140 000 000 160 000 000 2012 2013 2014 2015 2016*
  • 5. Page 5Confidential Property of Schneider Electric | Recent industrial cyber incidents German steel millUkraine power gridUSA water dam
  • 6. Statistics Page 6Confidential Property of Schneider Electric |
  • 7. Page 7Confidential Property of Schneider Electric | Attacks targeted towards German industrial systems • 1 in every 7 registered security attacks in Q4, 2015, came from Germany • Germany ranked #2 globally in critical infrastructure targets • Critical infrastructure infections from Germany have doubled every year since 2012 • 78% of malicious software installation attempts from Germany in 2015 were successful
  • 8. Page 8Confidential Property of Schneider Electric | German cyber attack sequence Source: TFOT 2015 56,3% Cyber crime 20% Hacktivism 16,1% Cyber espionage 7,6% Cyber war
  • 9. Page 9Confidential Property of Schneider Electric | • With so many statistics, which ones matter the most? Are one set more important than another? • How reliable is our source TFOT? Data reliability • The previous slides about Germany contained false statistics from a fake source • Did you notice?
  • 10. Page 10Confidential Property of Schneider Electric | How do we identify and manage our biggest vulnerabilities? Where is the weak link?
  • 11. Schneider Electric’s commitment to security Page 11Confidential Property of Schneider Electric |
  • 12. More than just IT security Critical infrastructure systems require high reliability and uptime: • Need 99.999% or greater uptime • Critical performance • Fast reaction time Page 12Confidential Property of Schneider Electric | Confidentiality Integrity Availability Availability Integrity Confidentiality IT security OT security OTPRIORITIES CONTROL SYSTEMS SECURITY / OT IT SECURITY PHYSICAL SECURITY
  • 13. Page 13Confidential Property of Schneider Electric | Cyber security at Schneider Electric Defense in depth POLICIES, PROCEDURES & AWARENESS PERIMETER INTERNAL NETWORK HOST APPLICATION DATA PHYSICAL SECURITY
  • 14. Page 14Confidential Property of Schneider Electric | Cyber security at Schneider Electric Specialized industrial security services – our offers • Cyber security training • Cyber security control design & implementation • Cyber security consulting • Cyber security maintenance services
  • 15. Train ride surprise – the importance of security awareness London, United Kingdom Page 15Confidential Property of Schneider Electric |
  • 16.
  • 17. Page 17Confidential Property of Schneider Electric | Train ride surprise • On a phone call, with no line disturbance • Perfectly clear, normal conversation: • “Enjoy the train ride along the English countryside” • “Are you coming home tonight?” • “Be sure to order a nice hot cup of tea” • “I’m sure it’s much colder there than it is here” • Begins acting strangely after five minutes – seems incoherent. • When I ask the her what she is doing, she doesn’t answer and instead says one of the above statements randomly • Answers yes or no questions flawlessly • Responds to other questions with one of the above random statements
  • 18.
  • 19.
  • 20. Page 20Confidential Property of Schneider Electric | What happened? • Technical malfunction causing me to hear recorded sayings? • What about coherent responses? • Why is my conversation being recorded? • Scrambler device? • Not sophisticated enough for real-time responses • 212 area code is in Manhattan, New York. When called, I get a strange error. • Recorded sentences used as fillers or common talk to encourage me to lead the discussion (and possibly say something incriminating) • Stealth listening • Similar to behavior of advanced malware, spyware, and Trojans
  • 21. Page 21Confidential Property of Schneider Electric | Who is behind this? • MI6 (UK) • Unknown body It is likely, however, we do not and will not ever know who is really behind most cyber attacks. • CIA and NSA (USA) • FSB (Russia)
  • 22. Page 22Confidential Property of Schneider Electric | Moral of the story • Appreciation of privacy and confidentiality • Importance of security awareness • Always be alert, Big Brother is always listening • It is unsettling the first time it happens to you … • … but it is likely not to be the first time, it’s just the first time you have noticed
  • 23. Page 23Confidential Property of Schneider Electric |