SlideShare uma empresa Scribd logo
1 de 13
Cognitive Security Transformation for
the Energy Sector
INTRODUCTION TO IBM SECURITY ENERGY ENVIRONMENT & UTILITIES
Steven Dougherty
October 2017
Associate Partner, Energy Environment & Utilities
2 IBM Security
Ransomware phishing on
a Michigan-based
electric and water utility
Malware discovered on a fuel
system at a Bavaria-based
nuclear power plant
SCADA systems of
three Ukrainian electricity
distributors infiltrated
Network breach of US
natural gas and
electricity company
SCADA system for a
New York dam hacked
Ransomware email
delivered to the Israeli
Electricity Authority
Confidential SCADA system
data for a hydroelectric
generator exposed on
the Dark Web
Hackers breach a water
company’s SCADA system,
controlling water flow and
chemical levels
Sophisticated attacks really trending on the industry nationally and globally
April
2016
January
2016
December
2015
June
2015
March
2016
SCADA systems of
Kiev Ukrainian electricity
distribution infiltrated
(again)
December
2016
Busy Month!
WannaCry Industroyer
NotPetya and Cyber
Warfare on Ukraine
June
2017
Sept
2017
Dragonfly 2.0
USA, Europe &
Turkey
3 IBM Security
The sophistication on energy sector challenges today’s practices
• Attack macros far more complex and coordinated
̶ 30% of code used to create noise to confused forensic analysis and hide sources
̶ 69% contained obfuscation of techniques
̶ 1% actual launcher payload
̶ Several teams collaborating
• Malware unwrapping in several iterations in empty memory spaces, similar to a process of putting
together a puzzle
• Malware mimic legitimate hardware driver behavior
• Domain servers targeted first
• Detailed recon and analyzed infrastructure logging, history, tools, privilege user behavior and activities
• Rapid use of mimicry and camouflage through valid credentials and common service software tools of
victims to mask activities
• External threats can now be indistinguishable from internal threats
11/21/2017
4 IBM Security
If traditional IT security practices are unsustainable, where
does that leave ICS (Industrial Control Systems)
MILLION
unfilled security
positions by 20201.5
PERCENT of CEOs are
reluctant to share incident
information externally68
85security tools from
45vendors
5 IBM Security
Network visibility and segmentation
How do I get started when all I see is chaos?
IP reputation
Indicators of compromise
Firewalls
Network forensics and threat management
Virtual patching
Sandboxing
Malware protection
Data access control
Data monitoring
Application security management
Application scanning
Access management
Entitlements and roles
Identity management
Transaction protection
Device management
Content security
Workload
protection
Cloud access
security broker
Vulnerability management
Privileged identity management
Incident response
Criminal detection
Fraud protection
Endpoint patching
and management
Cognitive security
User behavior analysis
Threat and anomaly detection
Threat hunting and investigation
Threat sharing
Endpoint detection
and response
6 IBM Security
Beyond PIM for insider threats, establish a security immune system
Criminal detection
Fraud protection
Workload
protection
Cloud access
security broker
Access management
Entitlements and roles
Privileged identity management (PIM)
Identity management
Data access control
Application security management
Application scanning
Data monitoring
Device management
Transaction protection
Content security
Malware protection
Endpoint detection
and response
Endpoint patching
and management
Virtual patching
Firewalls
Network forensics and threat management
Sandboxing
Network visibility and segmentation
Indicators of compromise
IP reputation Threat sharing
Vulnerability management Incident response
User behavior analysis
Threat hunting and investigationCognitive security
Threat and anomaly detection
7 IBM Security
E&U Approach – Until we can protect ICS, invest in detect & respond
SECURITY
ANALYTICS
LogSIEM
Vulnerability Cloud
UBA DNS
EDR
THREAT
HUNTING
Search Link Analysis
Visualizations
THREAT
INTELLIGENCE
Sharing
Open Interfaces
Malware Analysis
INCIDENT
RESPONSE
Orchestration
Collaboration Workflow
Cognitive Security
What do clients want?
• End-to-end protection against advanced threats
despite resource and skills gaps
• Ability to prevent, analyze, hunt, and respond
across the enterprise and beyond
• Orchestrated people, processes and technology
that work together in unison
Delivering on client needs by:
• Differentiating with cognitive security
• Delivering integrated detection and response
• Leading with new security orchestration
• Enhancing intelligence with malware analysis
• Expanding our ecosystem and open platforms
• Breaking ground with new threat services
Patch
Query
Remediate
8 IBM Security
IT
OT
ICS data collection SIEM
Security from gateway to sensor coverage
Eric Knapp, Sygress (2012)
Solutions:
- SCADA level operation
data analysis
- Industrial honeypot
- Deep asset/vulnerability
mgmt.& machine learning
- Firewall-RAS-encryption
& Authentication to PLC
- deep operational &
security data
- Asset discovery +
configuration mgmt.
Future:
- PLC level protection
- smart sensor monitoring
- Trusted remote industrial
component
Network based
Host based
New:
IBM: QNI
Industrial IoT
9 IBM Security
Trending SOC analysts gain speed from user behavior analytics
10 IBM Security
Comprehensive data sets and open analytics to sense malicious users
E&U Threat Profile: pull OT UBA to detect internal and
external threats mimicking privilege engineers
Machine learning on user patterns against
risk score and peer groups
11 IBM Security
UBM Qradar UBA: Machine Learning algorithms
Detecting change in activity vs. frequency and deviation from peer groups
12 IBM Security
IBM - here to deploy and manage optimized E&U security programs
IBM Security Transformation Services
• Automate governance, risk and compliance programs
Security Strategy, Risk and Compliance
• Build security operations and security fusion centers
Security Intelligence and Operations
• Establish proactive incident response programs
X-Force Incident Response and Intelligence
• Take a programmatic approach to security testing
X-Force Red Offensive Security
• Modernize identity and access management
for the cloud and mobile era
Identity and Access Management
• Deploy robust critical data protection programs
Data and Application Security
• Redefine infrastructure and endpoint solutions
with secure software-defined networks
Infrastructure and Endpoint Security
SECURITY TRANSFORMATION SERVICES
CEO CIO CISO CRO CCO CLO
Systems
Integration
Management
Consulting
Managed
Security
Security Strategy, Risk and Compliance
Security Intelligence and Operations
X-Force Incident Response and Intelligence
Identity and Access Management
Data and Application Security
Infrastructure and Endpoint Security
X-Force Red Offensive Security
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU

Mais conteúdo relacionado

Mais procurados

Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolioPatrick Bouillaud
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware IBM Security
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseIBM Security
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...IBM Security
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!IBM Security
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...IBM Security
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security IntelligenceAnna Landolfi
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...IBM Security
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerThierry Matusiak
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...Jürgen Ambrosi
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius
 

Mais procurados (20)

Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
IBM Security Immune System
IBM Security Immune SystemIBM Security Immune System
IBM Security Immune System
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...
SIEM/QRadar: le Soluzioni cognitive e di Security Intelligence di IBM per ril...
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 

Semelhante a IBM: Cognitive Security Transformation for the Enrgy Sector

5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEMThomas Springer
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingSPI Conference
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_referencesMaarten Werff
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 

Semelhante a IBM: Cognitive Security Transformation for the Enrgy Sector (20)

5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEM
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 

Mais de FMA Summits

Lockheed Martin - The Future of Facilities Leadership
Lockheed Martin - The Future of Facilities LeadershipLockheed Martin - The Future of Facilities Leadership
Lockheed Martin - The Future of Facilities LeadershipFMA Summits
 
Cleaver Brooks - To Condense or Not to Condense - How to Choose the Correct B...
Cleaver Brooks - To Condense or Not to Condense - How to Choose the Correct B...Cleaver Brooks - To Condense or Not to Condense - How to Choose the Correct B...
Cleaver Brooks - To Condense or Not to Condense - How to Choose the Correct B...FMA Summits
 
Bell Helicopter, Textron - Leveraging Sustainability Ideas Across the Enterprise
Bell Helicopter, Textron - Leveraging Sustainability Ideas Across the EnterpriseBell Helicopter, Textron - Leveraging Sustainability Ideas Across the Enterprise
Bell Helicopter, Textron - Leveraging Sustainability Ideas Across the EnterpriseFMA Summits
 
Toward a Carbon Neutral Fort Collins
Toward a Carbon Neutral Fort CollinsToward a Carbon Neutral Fort Collins
Toward a Carbon Neutral Fort CollinsFMA Summits
 
Texas Parks & Wildlife's Trail to Sustainability
Texas Parks & Wildlife's Trail to SustainabilityTexas Parks & Wildlife's Trail to Sustainability
Texas Parks & Wildlife's Trail to SustainabilityFMA Summits
 
Higher Education Facilities Challenges & Opportunities: What Business Partner...
Higher Education Facilities Challenges & Opportunities: What Business Partner...Higher Education Facilities Challenges & Opportunities: What Business Partner...
Higher Education Facilities Challenges & Opportunities: What Business Partner...FMA Summits
 
Texas Tech University - Energy Data and the Transition from Deferred Maintena...
Texas Tech University - Energy Data and the Transition from Deferred Maintena...Texas Tech University - Energy Data and the Transition from Deferred Maintena...
Texas Tech University - Energy Data and the Transition from Deferred Maintena...FMA Summits
 
Texas Wesleyan University- Blue + Gold = Green. A Strategic Approach to Susta...
Texas Wesleyan University- Blue + Gold = Green. A Strategic Approach to Susta...Texas Wesleyan University- Blue + Gold = Green. A Strategic Approach to Susta...
Texas Wesleyan University- Blue + Gold = Green. A Strategic Approach to Susta...FMA Summits
 
SYLVANIA -The Reality of Costs to LED and Beyond -A Case Study
SYLVANIA -The Reality of Costs to LED and Beyond -A Case StudySYLVANIA -The Reality of Costs to LED and Beyond -A Case Study
SYLVANIA -The Reality of Costs to LED and Beyond -A Case StudyFMA Summits
 
Eliminating Carbon Footprint in Power Generation From Fossil Fuels
Eliminating Carbon Footprint in Power Generation From Fossil FuelsEliminating Carbon Footprint in Power Generation From Fossil Fuels
Eliminating Carbon Footprint in Power Generation From Fossil FuelsFMA Summits
 
Sloan - High Performing & Sustainable Restroom Solutions
Sloan - High Performing & Sustainable Restroom SolutionsSloan - High Performing & Sustainable Restroom Solutions
Sloan - High Performing & Sustainable Restroom SolutionsFMA Summits
 
LG - The Digital Canvas: Imagination Realized
LG - The Digital Canvas: Imagination RealizedLG - The Digital Canvas: Imagination Realized
LG - The Digital Canvas: Imagination RealizedFMA Summits
 
GE Distributed Power - On Site Energy Solutions For Commercial And Industrial...
GE Distributed Power - On Site Energy Solutions For Commercial And Industrial...GE Distributed Power - On Site Energy Solutions For Commercial And Industrial...
GE Distributed Power - On Site Energy Solutions For Commercial And Industrial...FMA Summits
 

Mais de FMA Summits (14)

Lockheed Martin - The Future of Facilities Leadership
Lockheed Martin - The Future of Facilities LeadershipLockheed Martin - The Future of Facilities Leadership
Lockheed Martin - The Future of Facilities Leadership
 
Cleaver Brooks - To Condense or Not to Condense - How to Choose the Correct B...
Cleaver Brooks - To Condense or Not to Condense - How to Choose the Correct B...Cleaver Brooks - To Condense or Not to Condense - How to Choose the Correct B...
Cleaver Brooks - To Condense or Not to Condense - How to Choose the Correct B...
 
Bell Helicopter, Textron - Leveraging Sustainability Ideas Across the Enterprise
Bell Helicopter, Textron - Leveraging Sustainability Ideas Across the EnterpriseBell Helicopter, Textron - Leveraging Sustainability Ideas Across the Enterprise
Bell Helicopter, Textron - Leveraging Sustainability Ideas Across the Enterprise
 
Toward a Carbon Neutral Fort Collins
Toward a Carbon Neutral Fort CollinsToward a Carbon Neutral Fort Collins
Toward a Carbon Neutral Fort Collins
 
Texas Parks & Wildlife's Trail to Sustainability
Texas Parks & Wildlife's Trail to SustainabilityTexas Parks & Wildlife's Trail to Sustainability
Texas Parks & Wildlife's Trail to Sustainability
 
Higher Education Facilities Challenges & Opportunities: What Business Partner...
Higher Education Facilities Challenges & Opportunities: What Business Partner...Higher Education Facilities Challenges & Opportunities: What Business Partner...
Higher Education Facilities Challenges & Opportunities: What Business Partner...
 
Texas Tech University - Energy Data and the Transition from Deferred Maintena...
Texas Tech University - Energy Data and the Transition from Deferred Maintena...Texas Tech University - Energy Data and the Transition from Deferred Maintena...
Texas Tech University - Energy Data and the Transition from Deferred Maintena...
 
Texas Wesleyan University- Blue + Gold = Green. A Strategic Approach to Susta...
Texas Wesleyan University- Blue + Gold = Green. A Strategic Approach to Susta...Texas Wesleyan University- Blue + Gold = Green. A Strategic Approach to Susta...
Texas Wesleyan University- Blue + Gold = Green. A Strategic Approach to Susta...
 
SYLVANIA -The Reality of Costs to LED and Beyond -A Case Study
SYLVANIA -The Reality of Costs to LED and Beyond -A Case StudySYLVANIA -The Reality of Costs to LED and Beyond -A Case Study
SYLVANIA -The Reality of Costs to LED and Beyond -A Case Study
 
Eliminating Carbon Footprint in Power Generation From Fossil Fuels
Eliminating Carbon Footprint in Power Generation From Fossil FuelsEliminating Carbon Footprint in Power Generation From Fossil Fuels
Eliminating Carbon Footprint in Power Generation From Fossil Fuels
 
Sloan - High Performing & Sustainable Restroom Solutions
Sloan - High Performing & Sustainable Restroom SolutionsSloan - High Performing & Sustainable Restroom Solutions
Sloan - High Performing & Sustainable Restroom Solutions
 
LG - The Digital Canvas: Imagination Realized
LG - The Digital Canvas: Imagination RealizedLG - The Digital Canvas: Imagination Realized
LG - The Digital Canvas: Imagination Realized
 
GE Distributed Power - On Site Energy Solutions For Commercial And Industrial...
GE Distributed Power - On Site Energy Solutions For Commercial And Industrial...GE Distributed Power - On Site Energy Solutions For Commercial And Industrial...
GE Distributed Power - On Site Energy Solutions For Commercial And Industrial...
 
Brochure FFS6
Brochure FFS6Brochure FFS6
Brochure FFS6
 

Último

Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingsocarem879
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxTasha Penwell
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectBoston Institute of Analytics
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Cathrine Wilhelmsen
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxSimranPal17
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 

Último (20)

Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processing
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis Project
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)Data Factory in Microsoft Fabric (MsBIP #82)
Data Factory in Microsoft Fabric (MsBIP #82)
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptx
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 

IBM: Cognitive Security Transformation for the Enrgy Sector

  • 1. Cognitive Security Transformation for the Energy Sector INTRODUCTION TO IBM SECURITY ENERGY ENVIRONMENT & UTILITIES Steven Dougherty October 2017 Associate Partner, Energy Environment & Utilities
  • 2. 2 IBM Security Ransomware phishing on a Michigan-based electric and water utility Malware discovered on a fuel system at a Bavaria-based nuclear power plant SCADA systems of three Ukrainian electricity distributors infiltrated Network breach of US natural gas and electricity company SCADA system for a New York dam hacked Ransomware email delivered to the Israeli Electricity Authority Confidential SCADA system data for a hydroelectric generator exposed on the Dark Web Hackers breach a water company’s SCADA system, controlling water flow and chemical levels Sophisticated attacks really trending on the industry nationally and globally April 2016 January 2016 December 2015 June 2015 March 2016 SCADA systems of Kiev Ukrainian electricity distribution infiltrated (again) December 2016 Busy Month! WannaCry Industroyer NotPetya and Cyber Warfare on Ukraine June 2017 Sept 2017 Dragonfly 2.0 USA, Europe & Turkey
  • 3. 3 IBM Security The sophistication on energy sector challenges today’s practices • Attack macros far more complex and coordinated ̶ 30% of code used to create noise to confused forensic analysis and hide sources ̶ 69% contained obfuscation of techniques ̶ 1% actual launcher payload ̶ Several teams collaborating • Malware unwrapping in several iterations in empty memory spaces, similar to a process of putting together a puzzle • Malware mimic legitimate hardware driver behavior • Domain servers targeted first • Detailed recon and analyzed infrastructure logging, history, tools, privilege user behavior and activities • Rapid use of mimicry and camouflage through valid credentials and common service software tools of victims to mask activities • External threats can now be indistinguishable from internal threats 11/21/2017
  • 4. 4 IBM Security If traditional IT security practices are unsustainable, where does that leave ICS (Industrial Control Systems) MILLION unfilled security positions by 20201.5 PERCENT of CEOs are reluctant to share incident information externally68 85security tools from 45vendors
  • 5. 5 IBM Security Network visibility and segmentation How do I get started when all I see is chaos? IP reputation Indicators of compromise Firewalls Network forensics and threat management Virtual patching Sandboxing Malware protection Data access control Data monitoring Application security management Application scanning Access management Entitlements and roles Identity management Transaction protection Device management Content security Workload protection Cloud access security broker Vulnerability management Privileged identity management Incident response Criminal detection Fraud protection Endpoint patching and management Cognitive security User behavior analysis Threat and anomaly detection Threat hunting and investigation Threat sharing Endpoint detection and response
  • 6. 6 IBM Security Beyond PIM for insider threats, establish a security immune system Criminal detection Fraud protection Workload protection Cloud access security broker Access management Entitlements and roles Privileged identity management (PIM) Identity management Data access control Application security management Application scanning Data monitoring Device management Transaction protection Content security Malware protection Endpoint detection and response Endpoint patching and management Virtual patching Firewalls Network forensics and threat management Sandboxing Network visibility and segmentation Indicators of compromise IP reputation Threat sharing Vulnerability management Incident response User behavior analysis Threat hunting and investigationCognitive security Threat and anomaly detection
  • 7. 7 IBM Security E&U Approach – Until we can protect ICS, invest in detect & respond SECURITY ANALYTICS LogSIEM Vulnerability Cloud UBA DNS EDR THREAT HUNTING Search Link Analysis Visualizations THREAT INTELLIGENCE Sharing Open Interfaces Malware Analysis INCIDENT RESPONSE Orchestration Collaboration Workflow Cognitive Security What do clients want? • End-to-end protection against advanced threats despite resource and skills gaps • Ability to prevent, analyze, hunt, and respond across the enterprise and beyond • Orchestrated people, processes and technology that work together in unison Delivering on client needs by: • Differentiating with cognitive security • Delivering integrated detection and response • Leading with new security orchestration • Enhancing intelligence with malware analysis • Expanding our ecosystem and open platforms • Breaking ground with new threat services Patch Query Remediate
  • 8. 8 IBM Security IT OT ICS data collection SIEM Security from gateway to sensor coverage Eric Knapp, Sygress (2012) Solutions: - SCADA level operation data analysis - Industrial honeypot - Deep asset/vulnerability mgmt.& machine learning - Firewall-RAS-encryption & Authentication to PLC - deep operational & security data - Asset discovery + configuration mgmt. Future: - PLC level protection - smart sensor monitoring - Trusted remote industrial component Network based Host based New: IBM: QNI Industrial IoT
  • 9. 9 IBM Security Trending SOC analysts gain speed from user behavior analytics
  • 10. 10 IBM Security Comprehensive data sets and open analytics to sense malicious users E&U Threat Profile: pull OT UBA to detect internal and external threats mimicking privilege engineers Machine learning on user patterns against risk score and peer groups
  • 11. 11 IBM Security UBM Qradar UBA: Machine Learning algorithms Detecting change in activity vs. frequency and deviation from peer groups
  • 12. 12 IBM Security IBM - here to deploy and manage optimized E&U security programs IBM Security Transformation Services • Automate governance, risk and compliance programs Security Strategy, Risk and Compliance • Build security operations and security fusion centers Security Intelligence and Operations • Establish proactive incident response programs X-Force Incident Response and Intelligence • Take a programmatic approach to security testing X-Force Red Offensive Security • Modernize identity and access management for the cloud and mobile era Identity and Access Management • Deploy robust critical data protection programs Data and Application Security • Redefine infrastructure and endpoint solutions with secure software-defined networks Infrastructure and Endpoint Security SECURITY TRANSFORMATION SERVICES CEO CIO CISO CRO CCO CLO Systems Integration Management Consulting Managed Security Security Strategy, Risk and Compliance Security Intelligence and Operations X-Force Incident Response and Intelligence Identity and Access Management Data and Application Security Infrastructure and Endpoint Security X-Force Red Offensive Security
  • 13. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU

Notas do Editor

  1. Sophisticated attacks on the energy and utilities industry are increasingly making news. Those shown on this slide are just a sampling of recent threats and breaches: April 2016: Malware was discovered on a fuel assembly loading system at the Bavaria-based Gundremmingen nuclear power plant. Cyber criminals delivered ransomware via phishing to the corporate network of Board of Water & Light (BWL), a Michigan-based public electric and water utility. Administrators shut down the corporate network to isolate the ransomware and prevent it from potentially moving into the company’s operational technology (OT) environment. March 2016: Hackers infiltrated a water company’s SCADA control system and changed the levels of chemicals being used to treat tap water to make it safe to drink. They manipulated the programmable logic controllers (PLCs) regulating the valves and ducts that controlled the flow of water and chemicals. January 2016: An unknown threat actor delivered ransomware via email to the Israeli Electricity Authority, Israel’s electricity regulatory agency. Infected machines were taken off the corporate network for several days to prevent lateral movement, including into the OT environment. December 2015: Investigators disclosed that an Iranian hacker established remote access to a SCADA system controlling the Bowman Dam in New York. The attacker gained access via the system’s cellular modem and gathered information on water levels, temperature and the status of the sluice gate. Security researchers disclosed a campaign in which alleged Iranian threat actors gained access to networks operated by a US natural gas and geothermal electricity company. The actors stole engineering drawings of the company’s networks, including details on devices used to manage the company’s gas turbines, boilers and other critical equipment. The breach was part of a campaign beginning as early as August 2013. An allegedly Russia-backed group establishes remote access to SCADA systems of three electricity distributors in Ukraine after procuring valid network credentials via spearphishing. The threat actors use access to systematically open breakers, causing blackouts for 225,000 customers. June 2015: A cyber criminal advertised the sale of SCADA access credentials on a Dark Web forum dedicated to selling stolen data. The post included a screenshot of the SCADA system’s graphical user interface, IP addresses, and virtual network computing passwords. The system managed a hydroelectric generator.
  2. 5
  3. 6
  4. Security Strategy, Risk and Compliance Automate governance, risk and compliance programs Better manage risks and drive transformative security programs Security Intelligence and Operations Build security operations and security fusion centers Build gold-standard security operations for clients, infused with security intelligence and running at optimal performance Cyber Security Assessment and Response Establish robust security testing and incident management programs Apply threat intelligence to the entire security lifecycle: remediate vulnerabilities, respond to breaches and incidents Identity and Access Management Modernize identity and access management for the cloud and mobile era Provide the right access to the right information at the right time Data and Application Security Deploy robust critical data protection programs Protect “Crown Jewel” data against threats, across all platforms Infrastructure and Endpoint Security Redefine infrastructure and endpoint solutions with secure software-defined networks Solidify network, infrastructure and endpoint security across the enterprise, including Cloud, Mobile, IoT
  5. Mandatory closing slide with copyright and legal disclaimers.