SlideShare une entreprise Scribd logo
1  sur  105
Cybersecurity Guidance for Industrial
Automation in Oil and Gas Applications
February 17, 2015
Agenda
Agenda
Introductions
Agenda
Introductions
Discussion of the current state of Cybersecurity for
Controls Systems with discussions from outside sources
Agenda
Introductions
Discussion of the current state of Cybersecurity for
Controls Systems with discussions from outside sources
New Cybersecurity Guidance eBook and Engineering
Services available from InduSoft
Agenda
Introductions
Discussion of the current state of Cybersecurity for
Controls Systems with discussions from outside sources
New Cybersecurity Guidance eBook and Engineering
Services available from InduSoft
Deeper dive into the Security eBook – a look inside.
Agenda
Introductions
Discussion of the current state of Cybersecurity for
Controls Systems with discussions from outside sources
New Cybersecurity Guidance eBook and Engineering
Services available from InduSoft
Deeper dive into the Security eBook – a look inside.
Discussion of the new SCADA Cybersecurity Framework
eBook and the associated certificate courses at Eastern
New Mexico University-Ruidoso
Agenda
Introductions
Discussion of the current state of Cybersecurity for
Controls Systems with discussions from outside sources
New Cybersecurity Guidance eBook and Engineering
Services available from InduSoft
Deeper dive into the Security eBook – a look inside.
Discussion of the new SCADA Cybersecurity Framework
eBook and the associated certificate courses at Eastern
New Mexico University-Ruidoso
Q&A Session
Speakers Today (in order of presentation)
Richard Clark
– Technical Marketing and Cybersecurity Engineer
Richard H Clark
Cybersecurity Background
Mr. Clark has been in Automation, Process System, and Control System
design and implementation for more than 25 years and was employed by
Wonderware where he developed a non-proprietary means of using IP-Sec
for securing current and legacy Automation, SCADA, and Process Control
Systems, and developed non-proprietary IT security techniques. Industry
expert by peer review and spokesperson on IT security; consultant, analyst
and voting member of ISA- SP99. Contributor to PCSF Vendor Forum.
Consultant to NIST and other government labs and NSA during the
development of NIST Special Publication 800-82. Published engineering
white papers, manuals, and instruction documents, developed and given
classes and lectures on the topic of ICS/SCADA Security.
– Participated in forming the NIST Cybersecurity Framework during the
workshops last year along with our second speaker today…
Speakers Today (in order of presentation)
Richard Clark
– Technical Marketing and Cybersecurity Engineer
Stephen Miller
– Associate Professor and Department Chair of Business and
Information Systems/Cybersecurity Center of Excellence at
Eastern New Mexico University-Ruidoso
Stephen Miller
Cybersecurity Background
Mr. Miller (Associate Professor/Director of Eastern New Mexico University-
Ruidoso Cybersecurity Center of Excellence) has been in the Information
Systems profession since 1966 working in many business, government,
and educational sectors; including being IT/Technology Manager and
Advisor at ExxonMobil Global Information Systems. Mr. Miller worked for
Univac Corp at NASA Mission Control for the Apollo Mission, including
Apollo 13 and Skylab missions, he also worked for Ford Tech-rep Division
and TRW Controls, among others.
Stephen developed the online computer and network Cybersecurity
Certification program at ENMU-Ruidoso, and revised the Information
Systems Associates Applied Science Degree Programs under INFOSEC
4011, 4016E, and Center of Academics (CAE-2Y) certifications
RICHARD H CLARK
Cybersecurity eBooks/Guidance
Introduction
Introduction
InduSoft is used in various Oil and Gas, Refinery, and
Pipeline applications around the world
Introduction
InduSoft is used in various Oil and Gas, Refinery, and
Pipeline applications around the world
We strive to assist customers in designing and building
safe, secure and functional applications
Introduction
InduSoft is used in various Oil and Gas, Refinery, and
Pipeline applications around the world
We strive to assist customers in designing and building
safe, secure and functional applications
We have condensed a great deal of our security guidance
and discussions into a single eBook
Introduction
InduSoft is used in various Oil and Gas, Refinery, and
Pipeline applications around the world
We strive to assist customers in designing and building
safe, secure and functional applications
We have condensed a great deal of our security guidance
and discussions into a single eBook
InduSoft has recently added On-Demand Engineering
Services to assist your development and engineering
teams
Introduction
InduSoft is used in various Oil and Gas, Refinery, and
Pipeline applications around the world
We strive to assist customers in designing and building
safe, secure and functional applications
We have condensed a great deal of our security guidance
and discussions into a single eBook
InduSoft has recently added On-Demand Engineering
Services to assist your development and engineering
teams
InduSoft has assisted in creating the NIST Cybersecurity
Framework and collaborated with ENMU-Ruidoso in
creating a curriculum textbook
The Scope of the Problem
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity.
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
– Major Problems that I have with this “Unified Approach”:
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
– Major Problems that I have with this “Unified Approach”:
• They’ve thrown the SME’s (plant engineers) “under the bus”
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
– Major Problems that I have with this “Unified Approach”:
• They’ve thrown the SME’s (plant engineers) “under the bus”
• They are only addressing security patches and antivirus
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
– Major Problems that I have with this “Unified Approach”:
• They’ve thrown the SME’s (plant engineers) “under the bus”
• They are only addressing security patches and antivirus
• It is being managed from a central location which is the same entry vector
used in the retail and healthcare cyberattacks
The Scope of the Problem
IT Departments believe that they are equipped to handle
Control System Cybersecurity. They aren’t.
– Example: AutomationWorld, February 10, 2015, “Shell Works with
Yokogawa and Cisco on a Unified Cybersecurity Approach”
– Major Problems that I have with this “Unified Approach”:
• They’ve thrown the SME’s (plant engineers) “under the bus”
• They are only addressing security patches and antivirus
• It is being managed from a central location which is the same entry vector
used in the retail and healthcare cyberattacks
• They are considering the refinery as part of the IOT, which is to say that they
think it is just as important as Mrs. Fitsby’s new hot water heater, not critical
infrastructure.
New SCADA Cybersecurity eBooks
InduSoft Security Guide NIST Cybersecurity Framework
ISBN 978-1311-49042-1 ISBN 978-1310-30996-0
Available at Smashwords.com and other major booksellers
Available to you as “Name Your Price”
InduSoft Security Guide NIST Cybersecurity Framework
ISBN 978-1311-49042-1 ISBN 978-1310-30996-0
Download at Smashwords.com to “Name Your Price”
All eBook Proceeds Benefit the Eastern
New Mexico University-Ruidoso Foundation
InduSoft Security Guide– Why?
InduSoft Security Guide– Why?
The eBook is a compilation of InduSoft cybersecurity
guidance making it available in one place
InduSoft Security Guide– Why?
The eBook is a compilation of InduSoft cybersecurity
guidance making it available in one place
– There is a chapter on guidelines for designing and building your
projects
InduSoft Security Guide– Why?
The eBook is a compilation of InduSoft cybersecurity
guidance making it available in one place
– There is a chapter on guidelines for designing and building your
projects
– Includes reprints of many InduSoft white papers and published
articles on cybersecurity guidance describing everything from
runtime servers and IT guidance for control system networks, to
handheld smart devices and wireless networks
InduSoft Security Guide– Why?
The eBook is a compilation of InduSoft cybersecurity
guidance making it available in one place
– There is a chapter on guidelines for designing and building your
projects
– Includes reprints of many InduSoft white papers and published
articles on cybersecurity guidance describing everything from
runtime servers and IT guidance for control system networks, to
handheld smart devices and wireless networks
– The eBook contains transcripts of many InduSoft webinars on
securing InduSoft Web Studio as well as broader IT and SCADA
security guidance
InduSoft Security Guide– Why?
The eBook is a compilation of InduSoft cybersecurity
guidance making it available in one place
– There is a chapter on guidelines for designing and building your
projects
– Includes reprints of many InduSoft white papers and published
articles on cybersecurity guidance describing everything from
runtime servers and IT guidance for control system networks, to
handheld smart devices and wireless networks
– The eBook contains transcripts of many InduSoft webinars on
securing InduSoft Web Studio as well as broader IT and SCADA
security guidance
– Also contains an Appendix with NIST Framework information
InduSoft Security Guide– Why?
The eBook is a compilation of InduSoft cybersecurity
guidance making it available in one place
– There is a chapter on guidelines for designing and building your
projects
– Includes reprints of many InduSoft white papers and published
articles on cybersecurity guidance describing everything from
runtime servers and IT guidance for control system networks, to
handheld smart devices and wireless networks
– The eBook contains transcripts of many InduSoft webinars on
securing InduSoft Web Studio as well as broader IT and SCADA
security guidance
– Also contains an Appendix with NIST Framework information
– Available in .mobi (Kindle), .epub, .pdf, .html, and .doc formats
Contents of “Security Guidance” eBook
The Chapters and Sections contain many useful topics
Chapter 1: New Projects and Security as a Design
Consideration
Section 1: Building your Project
– Extract from the InduSoft Technical Note: Application
Guidelines
Chapter 2: Existing Projects
Chapter 3: Cloud Based Applications
Section 1: Working with Cloud Based Applications
– The following is an extract from the InduSoft White
Paper: Cloud Computing for SCADA
Chapter 4: InduSoft Application Security
Section 1: SCADA System Security Best Practices
– The following is a transcript extract from the InduSoft
Webinar: SCADA System Security Webinar
Chapter 5: InduSoft Security Discussion for Web
Based Applications
Section 1: Using Security with Distributed Web
Applications
– Extract 1 - From InduSoft White Paper: Security Issues
with Distributed Web Applications
Section 2 – Using Security with Web-Based
Applications
– Extract 2 - From the InduSoft Tech Note: IWS Security
System for Web Based Applications
Section 3 – Using Security with Web-Based
Applications
– Reprint - Control Engineering Magazine - August 2014:
Cybersecurity for Smart Mobile Devices
Chapter 6: InduSoft Recommendations for IT
Security
Section 1: Firewalls and other SCADA Security
Considerations
– Transcript extract from the InduSoft Webinar: SCADA
and HMI Security in InduSoft Web Studio
Section 2: Control Systems Security Overview
– Transcript extract from the InduSoft Webinar: SCADA
Security Considerations: Overview
Section 3: SCADA Security - Operational
Considerations
– Transcript extract from the InduSoft Webinar: SCADA
Security Considerations: Operational
Section 4: SCADA Security - Management
Considerations
– Transcript extract from the InduSoft Webinar: SCADA
Security Considerations: Management
Appendix A: NIST Cybersecurity Framework Core
Appendix B: Cyber Security Evaluation Tool (CSET)
Information
Examples of topics and subjects covered
New SCADA Projects Should be
Designed with Security as a Primary Goal
Good project design
includes the following:
New SCADA Projects Should be
Designed with Security as a Primary Goal
Good project design
includes the following:
Security as a primary design
consideration
New SCADA Projects Should be
Designed with Security as a Primary Goal
Good project design
includes the following:
Security as a primary design
consideration
Safety needs to be
considered throughout
project design and
implementation
New SCADA Projects Should be
Designed with Security as a Primary Goal
Good project design
includes the following:
Security as a primary design
consideration
Safety needs to be
considered throughout
project design and
implementation
Functionality should be
moderated based on the first
two design goals
New SCADA Projects Should be
Designed with Security as a Primary Goal
Good project design
includes the following:
Security as a primary design
consideration
Safety needs to be
considered throughout
project design and
implementation
Functionality should be
moderated based on the first
two design goals
New SCADA Projects Should be
Designed with Security as a Primary Goal
Good project design
includes the following:
Security as a primary design
consideration
Safety needs to be
considered throughout
project design and
implementation
Functionality should be
moderated based on the first
two design goals
New SCADA Projects Should be
Designed with Security as a Primary Goal
Good project design
includes the following:
Security as a primary design
consideration
Safety needs to be
considered throughout
project design and
implementation
Functionality should be
moderated based on the first
two design goals
New SCADA Projects Should be
Designed with Security as a Primary Goal
Good project design
includes the following:
Security as a primary design
consideration
Safety needs to be
considered throughout
project design and
implementation
Functionality should be
moderated based on the first
two design goals
New SCADA Projects Should be
Designed with Security as a Primary Goal
Good project design
includes the following:
Security as a primary design
consideration
Safety needs to be
considered throughout
project design and
implementation
Functionality should be
moderated based on the first
two design goals
New SCADA Projects Should be
Designed with Security as a Primary Goal
Good project design
includes the following:
Security as a primary design
consideration
Safety needs to be
considered throughout
project design and
implementation
Functionality should be
moderated based on the first
two design goals
New SCADA Projects Should be
Designed with Security as a Primary Goal
Good project design
includes the following:
Security as a primary design
consideration
Safety needs to be
considered throughout
project design and
implementation
Functionality should be
moderated based on the first
two design goals
Diverse SCADA Projects Require
Different Types of Security Profiles
Diverse SCADA Projects Require
Different Types of Security Profiles
We recognize that customers use InduSoft Web
Studio in many different ways.
Diverse SCADA Projects Require
Different Types of Security Profiles
We recognize that customers use InduSoft Web
Studio in many different ways.
– This fact presents many differing security scenarios for our
customers
Diverse SCADA Projects Require
Different Types of Security Profiles
We recognize that customers use InduSoft Web
Studio in many different ways.
– This fact presents many differing security scenarios for our
customers
– A specific type of security implementation to a particular SCADA
system may be entirely inappropriate for a differing system.
Diverse SCADA Projects Require
Different Types of Security Profiles
We recognize that customers use InduSoft Web
Studio in many different ways.
– This fact presents many differing security scenarios for our
customers
– A specific type of security implementation to a particular SCADA
system may be entirely inappropriate for a differing system.
We have recommended many different ways that
security can be implemented into SCADA and HMIs
Diverse SCADA Projects Require
Different Types of Security Profiles
We recognize that customers use InduSoft Web
Studio in many different ways.
– This fact presents many differing security scenarios for our
customers
– A specific type of security implementation to a particular SCADA
system may be entirely inappropriate for a differing system.
We have recommended many different ways that
security can be implemented into SCADA and HMIs
– Talks, classes, white papers, webinars, forums, Technical
Support, and individualized guidance on projects has been
available for quite some time
Diverse SCADA Projects Require
Different Types of Security Profiles
We recognize that customers use InduSoft Web
Studio in many different ways.
– This fact presents many differing security scenarios for our
customers
– A specific type of security implementation to a particular SCADA
system may be entirely inappropriate for a differing system.
We have recommended many different ways that
security can be implemented into SCADA and HMIs
– Talks, classes, white papers, webinars, forums, Technical
Support, and individualized guidance on projects has been
available for quite some time
– InduSoft now has on-demand engineering assistance available
on our website!
Services On Demand is Now Live!
Engineering assistance is available when designing
projects and implementing project security
Stay Informed…
How to get Product Update and Webinar Announcements
Stay Informed…
How to get Product Update Announcements
THANKS FOR ATTENDING!
Here’s how to contact us…
Email
(US) info@indusoft.com
(Brazil) info@indusoft.com.br
(Germany) info@indusoft.com.de
Support support@indusoft.com
Web site
(English) www.indusoft.com
(Portuguese) www.indusoft.com.br
(German) www.indusoft.com.de
Phone (512) 349-0334 (US)
+55-11-3293-9139 (Brazil)
+49 (0) 6227-732510 (Germany)
Toll-Free 877-INDUSOFT (877-463-8763)
Fax (512) 349-0375
Germany
USA
Brazil
Contact InduSoft Today
Email
(US) info@indusoft.com
(Brazil) info@indusoft.com.br
(Germany) info@indusoft.com.de
Support support@indusoft.com
Web site
(English) www.indusoft.com
(Portuguese) www.indusoft.com.br
(German) www.indusoft.com.de
Phone (512) 349-0334 (US)
+55-11-3293-9139 (Brazil)
+49 (0) 6227-732510 (Germany)
Toll-Free 877-INDUSOFT (877-463-8763)
Fax (512) 349-0375
Germany
USA
Brazil
Contact InduSoft TodayEmail richard.indusoft@gmail.com if you
would like to request a copy of this
presentation or with other questions.
Email
(US) info@indusoft.com
(Brazil) info@indusoft.com.br
(Germany) info@indusoft.com.de
Support support@indusoft.com
Web site
(English) www.indusoft.com
(Portuguese) www.indusoft.com.br
(German) www.indusoft.com.de
Phone (512) 349-0334 (US)
+55-11-3293-9139 (Brazil)
+49 (0) 6227-732510 (Germany)
Toll-Free 877-INDUSOFT (877-463-8763)
Fax (512) 349-0375
Germany
USA
Brazil
Contact InduSoft TodayEmail richard.indusoft@gmail.com if you
would like to request a copy of this
presentation or with other questions.
The upcoming InduSoft webinar tomorrow
(Feb 18th) month will focus on Engineering
Services and how you can get the most out
of them. Visit: http://www.indusoft.com
Email
(US) info@indusoft.com
(Brazil) info@indusoft.com.br
(Germany) info@indusoft.com.de
Support support@indusoft.com
Web site
(English) www.indusoft.com
(Portuguese) www.indusoft.com.br
(German) www.indusoft.com.de
Phone (512) 349-0334 (US)
+55-11-3293-9139 (Brazil)
+49 (0) 6227-732510 (Germany)
Toll-Free 877-INDUSOFT (877-463-8763)
Fax (512) 349-0375
Germany
USA
Brazil
Contact InduSoft TodayEmail richard.indusoft@gmail.com if you
would like to request a copy of this
presentation or with other questions.
The upcoming InduSoft webinar tomorrow
(Feb 18th) month will focus on Engineering
Services and how you can get the most out
of them. Visit: http://www.indusoft.com
Join our webinars and we will send you an
InduSoft webinar series Tee-Shirt!
Next: STEPHEN MILLER
SCADA Cybersecurity Framework
CAE-2Y Accredited
Topics Covered
• E-Book Purpose
• Key Objectives
• Outline Of Content
• Training Plans
– Cybersecurity Programs
– Boot Camp
• About ENMU-Ruidoso
• Q & A?
76
CAE-2Y Accredited
E-Book Purpose
• Provide a quick reference guide to the
framework
Promote awareness of
• Cybersecurity Critical Infrastructure Framework
• SCADA Cybersecurity threats and vulnerabilities
• The importance of risk assessments
• How to use the framework
• Look into applying security to Indusoft Web Studio
77
CAE-2Y Accredited
Key Objectives
• Knowledge of SCADA and cybersecurity
environment
– Types of SCADA systems
– Threats and risks
Understanding of framework
Knowledge of tools and processes for risk
analysis
Ability to apply risk management processes to
obtain the right framework tier for an
organization 78
CAE-2Y Accredited
Outline Of Content
• Chapter 1 - SCADA Cybersecurity Introduction
and Review
– What is SCADA
• How it works, In Depth Look, field devices, control units, HMI
– Overview of Cybersecurity Vulnerabilities
• Security Challenges, Understanding & defining information security,
Cyber Threat Source to Control/SCADA Systems, GAO Threats, Attacks
& Defenses, Vulnerability Scanning vs Penetration Testing
– Understanding Control System Cyber Vulnerabilities
• Gaining control of SCADA Systems, Categories of SCADA Systems
79
CAE-2Y Accredited
Information security components
Gov’t Acct. Office
Threat Table
Steps of a cyberattack
Geographic Layer
Physical Network Layer
Logical Network Layer
Cyber Organization/Personal
Layer “Internet of Things”
One individual…
…with multiple,
complex relationships
to other levels of the
environment...
…that also change over time.
Control System Environment
Three Categories of SCADA Systems
Modern/Common Diagram Modern/Proprietary Diagram
Legacy/Proprietary
Diagram
Outline Of Content
• Chapter 2 – Cybersecurity Framework
Introduction
• Framework Introduction
– Executive Order 13636 (EO), “Improving Critical
Infrastructure Cybersecurity”
• Risk Management Process
• The Cybersecurity Framework
90
CAE-2Y Accredited
Overview of the Framework
Risk Management Decomposition Diagram
Outline Of Content
• Chapter 3 – Cybersecurity Framework Basics
– Basic framework overview
– Framework core
CAE-2Y Accredited
Business Process Management (BPM)
Approach to the Framework
How Does it All Come Together?
Outline Of Content
• Chapter 4 – How to Use
the Framework
Basic Review of
Cybersecurity Practices
Establishing or
Improving a
Cybersecurity Program
Communicating
Cybersecurity
Requirements with
Stakeholders
CAE-2Y Accredited
Using the CSET Tool for Risk Management
and Future Framework Analysis
Select Standard(s)
 NIST Framework for Improving Critical Infrastructure Cybersecurity V1 (Recommended)
 NIST Special Publication 800-53 Rev 3 and NIST Special Publication 800-53 Rev 3 App l
 NIST Special Publication 800-53 Rev 4 and NIST Special Publication 800-53 Rev 4 App l
 Consensus Audit Guidelines (CAG)
 Components Questions Set
 CFATS Risk Based Performance Standard (RBPS) 8: Chemical Facilities Anti-Terrorism Standard, Risk- Based Performance Standards
Guidance 8 - Cyber, 6 CFR Part 27
 CNSSI No. 1253 Baseline
 CNSSI No. 1253 Industrial Control System (ICS) Overlay V1
 Catalog of Recommendations Rev 7 – (DHS Catalog of Control Systems Security: Recommendations for Standards Developers,
Revisions 6 and 7)
 INGAA Control Systems Cyber Security Guidelines for the Natural Gas Pipeline Industry Key Questions Set
 DoD Instruction 8500.2 Information Assurance Implementation, February 2, 2003
 ISO/IEC 15408 revision 3.1: Common Criteria for Information Technology Security Evaluation, Revision 3.1
 NERC Reliability Standards CIP-002-009 Revisions 3 and 4
 NIST Special Publication 800-82 Guide to Industrial Control Systems Security, June 2011
 NIST Special Publication 800-82 Rev 1
 NIST Special Publication 800-82 Rev 2 (Draft)
 NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems Rev 3 and with Appendix I, ICS
Controls
 NRC Regulatory Guide 5.71 Cyber Security Programs for Nuclear Facilities, January 2010
 NEI 0809 Cyber Security Plan for Nuclear Power Reactors
 TSA Pipeline Security Guidelines April 2011
 Universal Questions Set
Outline Of Content
• Chapter 5 – Indusoft Security Guide
– Embedded in this chapter.
• Appendix (Framework Core, CSET Tool, References, and Glossary)
CAE-2Y Accredited
CSET 6.1 Tool
100
https://ics-cert.us-cert.gov/Assessments
CAE-2Y Accredited
ENMU-Ruidoso
Cybersecurity Programs
• Computer and Network Security Certification Program (Online) Credited or
Self-paced ($2,495)
• Associates of Applied Science Degree - Information Systems Cybersecurity
• The programs are designed to prepare students as:
– Information Systems Security (INFOSEC) Professionals NSTISSI No. 4011
– CNSSI No. 4016 Entry Level Risk Analysts
– CAE-2Y Information Assurance/Cyber Defense Accredited
• IS 131: Network Security Fundamentals-3
• IS 136: Guide to Disaster Recovery- 3
• IS 153/L: Introduction to Information System- 4
• IS 253: Firewalls and How They Work- 3
• IS 257: Network Defense and Counter Measures- 3
• IS 258: Cyber Ethics, Professionalism, and Career Development- 3
• IS 285: Ethical Hacking – 3
• IS 289: Capstone/Internship/NCL Cybersecurity Challenge
CAE-2Y Accredited
Training Plans:
Boot Camp
Four day Boot Camp covering:
• Course Orientation and Introduction to Cybersecurity and SCADA
• CompTIA-Security+ Key Topics
• SCADA Cybersecurity Recommended Practice/ Infrastructure
Guiding Principles/National Infrastructure Protection Plan
– IS-821 Critical Infrastructure and Key Resources Support Annex
– IS-860.a National Infrastructure Protection Plan (NIPP)
• Cybersecurity Critical Infrastructure Framework / CAP
Process/Intro to a SCADA Product (IDUSOFT)
• CSET Department of Homeland Security Risk Assessment Process
and Tools Using the Cybersecurity Critical Infrastructure Framework
102
CAE-2Y Accredited
About ENMU-Ruidoso
 The National Security Agency and the Department of Homeland
Security have designated Eastern New Mexico University - Ruidoso
 National Center of Academic Excellence in Information
Assurance/Cybersecurity Defense through academic year 2019. “CAE-2Y”
 Based on the universities ability to meet the increasing demands
of the program criteria will serve the nation well in contributing to
the protection of the National Information Infrastructure.
 Meets the eleven Knowledge Units learning objectives
 Recognized by the National Initiative in Cybersecurity Education
(NICE) as a certified Training Institution for the NIST National
Cybersecurity Workforce Framework.
 http://csrc.nist.gov/nice/index.htm
103
CAE-2Y Accredited
ENMU-Ruidoso Foundation
Foundation, as noted below.
If you find this ebook useful in your business, tax deductable donations to the
university 501 (c) (3) foundation are encouraged by contacting:
http://www.us-cert.gov/control_systems/csstandards.html
CAE-2Y Accredited

Contenu connexe

Tendances

IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of thingsnajascj
 
Infosek Luca Moroni Nova Gorica (SLO)
Infosek Luca Moroni Nova Gorica (SLO)Infosek Luca Moroni Nova Gorica (SLO)
Infosek Luca Moroni Nova Gorica (SLO)Luca_Moroni
 
Cyber security innovation imho v5
Cyber security innovation imho v5Cyber security innovation imho v5
Cyber security innovation imho v5W Fred Seigneur
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman Security
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsHuntsman Security
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforcejlieberman07
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesSkycure
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaLuca Moroni ✔✔
 
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation Luca Moroni ✔✔
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
 
IRJET- IBMS: Intrusion Based Movement Detection System
IRJET- IBMS: Intrusion Based Movement Detection SystemIRJET- IBMS: Intrusion Based Movement Detection System
IRJET- IBMS: Intrusion Based Movement Detection SystemIRJET Journal
 

Tendances (20)

IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
 
Sarwono sutikno its 17 maret 2016 dari public-isaca csx-update-18_apr
Sarwono sutikno   its 17 maret 2016 dari public-isaca csx-update-18_aprSarwono sutikno   its 17 maret 2016 dari public-isaca csx-update-18_apr
Sarwono sutikno its 17 maret 2016 dari public-isaca csx-update-18_apr
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of things
 
Infosek Luca Moroni Nova Gorica (SLO)
Infosek Luca Moroni Nova Gorica (SLO)Infosek Luca Moroni Nova Gorica (SLO)
Infosek Luca Moroni Nova Gorica (SLO)
 
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
Sncs2015 cybersecurityy risk and control   jakarta 3-4 juni 2015 ver01Sncs2015 cybersecurityy risk and control   jakarta 3-4 juni 2015 ver01
Sncs2015 cybersecurityy risk and control jakarta 3-4 juni 2015 ver01
 
Cyber security innovation imho v5
Cyber security innovation imho v5Cyber security innovation imho v5
Cyber security innovation imho v5
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
 
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - LubianaISACA SLOVENIA CHAPTER October 2016 - Lubiana
ISACA SLOVENIA CHAPTER October 2016 - Lubiana
 
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
INFOSEK 2016 Slovenia - Cyber Risk Insurance - Scenario and Evaluation
 
FICCI-talk
FICCI-talkFICCI-talk
FICCI-talk
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
IRJET- IBMS: Intrusion Based Movement Detection System
IRJET- IBMS: Intrusion Based Movement Detection SystemIRJET- IBMS: Intrusion Based Movement Detection System
IRJET- IBMS: Intrusion Based Movement Detection System
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 

En vedette

Industrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentationIndustrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentationGavin Davey
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...AVEVA
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Honeywell
 
Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...
Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...
Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...RodBeckstrom
 
Enterprise Architecture and Information Security
Enterprise Architecture and Information SecurityEnterprise Architecture and Information Security
Enterprise Architecture and Information SecurityJohn Macasio
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementKeelan Stewart
 
Presentation on PLC and SCADA
Presentation on PLC and SCADAPresentation on PLC and SCADA
Presentation on PLC and SCADAAnil Maurya
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Joan Figueras Tugas
 
A presentation on scada system
A presentation on scada systemA presentation on scada system
A presentation on scada systemIIT INDORE
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introductionShu Shin
 
plc and scada presentation
plc and scada presentationplc and scada presentation
plc and scada presentationIndira Kundu
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Improving and Scaling SCADA Systems: Is WinCC OA Right for Me?
Improving and Scaling SCADA Systems: Is WinCC OA Right for Me?Improving and Scaling SCADA Systems: Is WinCC OA Right for Me?
Improving and Scaling SCADA Systems: Is WinCC OA Right for Me?DMC, Inc.
 
Plc and scada report
Plc and scada reportPlc and scada report
Plc and scada reportIndira Kundu
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityBen Liu
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 

En vedette (20)

Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Industrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentationIndustrial Cybersecurity & SCADA hacks presentation
Industrial Cybersecurity & SCADA hacks presentation
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...
Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...
Economics Of Networks - Rod Beckstrom, National Cybersecurity Center, Departm...
 
Enterprise Architecture and Information Security
Enterprise Architecture and Information SecurityEnterprise Architecture and Information Security
Enterprise Architecture and Information Security
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Presentation on PLC and SCADA
Presentation on PLC and SCADAPresentation on PLC and SCADA
Presentation on PLC and SCADA
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
A presentation on scada system
A presentation on scada systemA presentation on scada system
A presentation on scada system
 
Information System Security introduction
Information System Security introductionInformation System Security introduction
Information System Security introduction
 
plc and scada presentation
plc and scada presentationplc and scada presentation
plc and scada presentation
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Improving and Scaling SCADA Systems: Is WinCC OA Right for Me?
Improving and Scaling SCADA Systems: Is WinCC OA Right for Me?Improving and Scaling SCADA Systems: Is WinCC OA Right for Me?
Improving and Scaling SCADA Systems: Is WinCC OA Right for Me?
 
Plc and scada report
Plc and scada reportPlc and scada report
Plc and scada report
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 

Similaire à InduSoft Speaks at Houston Infragard on February 17, 2015

[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Luca Moroni ✔✔
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...Mighty Guides, Inc.
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldMark Nunnikhoven
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityMighty Guides, Inc.
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateAndy Bochman
 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?Utah Tech Labs
 
Elastic Security keynote
Elastic Security keynoteElastic Security keynote
Elastic Security keynoteElasticsearch
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Keynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionKeynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionElasticsearch
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksPriyanka Aash
 

Similaire à InduSoft Speaks at Houston Infragard on February 17, 2015 (20)

[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Erp Implementation
Erp ImplementationErp Implementation
Erp Implementation
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT Cybersecurity
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security Update
 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
 
Elastic Security keynote
Elastic Security keynoteElastic Security keynote
Elastic Security keynote
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
security onion
security onionsecurity onion
security onion
 
Keynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and visionKeynote: Elastic Security evolution and vision
Keynote: Elastic Security evolution and vision
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 

Plus de AVEVA

What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAWhat's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAAVEVA
 
What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2AVEVA
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...AVEVA
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...AVEVA
 
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1AVEVA
 
Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1AVEVA
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioAVEVA
 
Graphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web StudioGraphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web StudioAVEVA
 
What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1AVEVA
 
Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1AVEVA
 
What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1AVEVA
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...AVEVA
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...AVEVA
 
Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017AVEVA
 

Plus de AVEVA (20)

What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAWhat's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4
 
Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5
 
What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3
 
Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3
 
Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2
 
What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
 
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
 
What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1
 
Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
 
Graphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web StudioGraphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web Studio
 
What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1
 
Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1
 
What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
 
Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

InduSoft Speaks at Houston Infragard on February 17, 2015

  • 1. Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications February 17, 2015
  • 4. Agenda Introductions Discussion of the current state of Cybersecurity for Controls Systems with discussions from outside sources
  • 5. Agenda Introductions Discussion of the current state of Cybersecurity for Controls Systems with discussions from outside sources New Cybersecurity Guidance eBook and Engineering Services available from InduSoft
  • 6. Agenda Introductions Discussion of the current state of Cybersecurity for Controls Systems with discussions from outside sources New Cybersecurity Guidance eBook and Engineering Services available from InduSoft Deeper dive into the Security eBook – a look inside.
  • 7. Agenda Introductions Discussion of the current state of Cybersecurity for Controls Systems with discussions from outside sources New Cybersecurity Guidance eBook and Engineering Services available from InduSoft Deeper dive into the Security eBook – a look inside. Discussion of the new SCADA Cybersecurity Framework eBook and the associated certificate courses at Eastern New Mexico University-Ruidoso
  • 8. Agenda Introductions Discussion of the current state of Cybersecurity for Controls Systems with discussions from outside sources New Cybersecurity Guidance eBook and Engineering Services available from InduSoft Deeper dive into the Security eBook – a look inside. Discussion of the new SCADA Cybersecurity Framework eBook and the associated certificate courses at Eastern New Mexico University-Ruidoso Q&A Session
  • 9. Speakers Today (in order of presentation) Richard Clark – Technical Marketing and Cybersecurity Engineer
  • 10. Richard H Clark Cybersecurity Background Mr. Clark has been in Automation, Process System, and Control System design and implementation for more than 25 years and was employed by Wonderware where he developed a non-proprietary means of using IP-Sec for securing current and legacy Automation, SCADA, and Process Control Systems, and developed non-proprietary IT security techniques. Industry expert by peer review and spokesperson on IT security; consultant, analyst and voting member of ISA- SP99. Contributor to PCSF Vendor Forum. Consultant to NIST and other government labs and NSA during the development of NIST Special Publication 800-82. Published engineering white papers, manuals, and instruction documents, developed and given classes and lectures on the topic of ICS/SCADA Security. – Participated in forming the NIST Cybersecurity Framework during the workshops last year along with our second speaker today…
  • 11. Speakers Today (in order of presentation) Richard Clark – Technical Marketing and Cybersecurity Engineer Stephen Miller – Associate Professor and Department Chair of Business and Information Systems/Cybersecurity Center of Excellence at Eastern New Mexico University-Ruidoso
  • 12. Stephen Miller Cybersecurity Background Mr. Miller (Associate Professor/Director of Eastern New Mexico University- Ruidoso Cybersecurity Center of Excellence) has been in the Information Systems profession since 1966 working in many business, government, and educational sectors; including being IT/Technology Manager and Advisor at ExxonMobil Global Information Systems. Mr. Miller worked for Univac Corp at NASA Mission Control for the Apollo Mission, including Apollo 13 and Skylab missions, he also worked for Ford Tech-rep Division and TRW Controls, among others. Stephen developed the online computer and network Cybersecurity Certification program at ENMU-Ruidoso, and revised the Information Systems Associates Applied Science Degree Programs under INFOSEC 4011, 4016E, and Center of Academics (CAE-2Y) certifications
  • 13. RICHARD H CLARK Cybersecurity eBooks/Guidance
  • 15. Introduction InduSoft is used in various Oil and Gas, Refinery, and Pipeline applications around the world
  • 16. Introduction InduSoft is used in various Oil and Gas, Refinery, and Pipeline applications around the world We strive to assist customers in designing and building safe, secure and functional applications
  • 17. Introduction InduSoft is used in various Oil and Gas, Refinery, and Pipeline applications around the world We strive to assist customers in designing and building safe, secure and functional applications We have condensed a great deal of our security guidance and discussions into a single eBook
  • 18. Introduction InduSoft is used in various Oil and Gas, Refinery, and Pipeline applications around the world We strive to assist customers in designing and building safe, secure and functional applications We have condensed a great deal of our security guidance and discussions into a single eBook InduSoft has recently added On-Demand Engineering Services to assist your development and engineering teams
  • 19. Introduction InduSoft is used in various Oil and Gas, Refinery, and Pipeline applications around the world We strive to assist customers in designing and building safe, secure and functional applications We have condensed a great deal of our security guidance and discussions into a single eBook InduSoft has recently added On-Demand Engineering Services to assist your development and engineering teams InduSoft has assisted in creating the NIST Cybersecurity Framework and collaborated with ENMU-Ruidoso in creating a curriculum textbook
  • 20. The Scope of the Problem
  • 21. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity.
  • 22. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t.
  • 23. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach”
  • 24. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach”
  • 25. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach”
  • 26. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach”
  • 27. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach”
  • 28. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach”
  • 29. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach”
  • 30. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach”
  • 31. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach” – Major Problems that I have with this “Unified Approach”:
  • 32. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach” – Major Problems that I have with this “Unified Approach”: • They’ve thrown the SME’s (plant engineers) “under the bus”
  • 33. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach” – Major Problems that I have with this “Unified Approach”: • They’ve thrown the SME’s (plant engineers) “under the bus” • They are only addressing security patches and antivirus
  • 34. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach” – Major Problems that I have with this “Unified Approach”: • They’ve thrown the SME’s (plant engineers) “under the bus” • They are only addressing security patches and antivirus • It is being managed from a central location which is the same entry vector used in the retail and healthcare cyberattacks
  • 35. The Scope of the Problem IT Departments believe that they are equipped to handle Control System Cybersecurity. They aren’t. – Example: AutomationWorld, February 10, 2015, “Shell Works with Yokogawa and Cisco on a Unified Cybersecurity Approach” – Major Problems that I have with this “Unified Approach”: • They’ve thrown the SME’s (plant engineers) “under the bus” • They are only addressing security patches and antivirus • It is being managed from a central location which is the same entry vector used in the retail and healthcare cyberattacks • They are considering the refinery as part of the IOT, which is to say that they think it is just as important as Mrs. Fitsby’s new hot water heater, not critical infrastructure.
  • 36. New SCADA Cybersecurity eBooks InduSoft Security Guide NIST Cybersecurity Framework ISBN 978-1311-49042-1 ISBN 978-1310-30996-0 Available at Smashwords.com and other major booksellers
  • 37. Available to you as “Name Your Price” InduSoft Security Guide NIST Cybersecurity Framework ISBN 978-1311-49042-1 ISBN 978-1310-30996-0 Download at Smashwords.com to “Name Your Price”
  • 38. All eBook Proceeds Benefit the Eastern New Mexico University-Ruidoso Foundation
  • 40. InduSoft Security Guide– Why? The eBook is a compilation of InduSoft cybersecurity guidance making it available in one place
  • 41. InduSoft Security Guide– Why? The eBook is a compilation of InduSoft cybersecurity guidance making it available in one place – There is a chapter on guidelines for designing and building your projects
  • 42. InduSoft Security Guide– Why? The eBook is a compilation of InduSoft cybersecurity guidance making it available in one place – There is a chapter on guidelines for designing and building your projects – Includes reprints of many InduSoft white papers and published articles on cybersecurity guidance describing everything from runtime servers and IT guidance for control system networks, to handheld smart devices and wireless networks
  • 43. InduSoft Security Guide– Why? The eBook is a compilation of InduSoft cybersecurity guidance making it available in one place – There is a chapter on guidelines for designing and building your projects – Includes reprints of many InduSoft white papers and published articles on cybersecurity guidance describing everything from runtime servers and IT guidance for control system networks, to handheld smart devices and wireless networks – The eBook contains transcripts of many InduSoft webinars on securing InduSoft Web Studio as well as broader IT and SCADA security guidance
  • 44. InduSoft Security Guide– Why? The eBook is a compilation of InduSoft cybersecurity guidance making it available in one place – There is a chapter on guidelines for designing and building your projects – Includes reprints of many InduSoft white papers and published articles on cybersecurity guidance describing everything from runtime servers and IT guidance for control system networks, to handheld smart devices and wireless networks – The eBook contains transcripts of many InduSoft webinars on securing InduSoft Web Studio as well as broader IT and SCADA security guidance – Also contains an Appendix with NIST Framework information
  • 45. InduSoft Security Guide– Why? The eBook is a compilation of InduSoft cybersecurity guidance making it available in one place – There is a chapter on guidelines for designing and building your projects – Includes reprints of many InduSoft white papers and published articles on cybersecurity guidance describing everything from runtime servers and IT guidance for control system networks, to handheld smart devices and wireless networks – The eBook contains transcripts of many InduSoft webinars on securing InduSoft Web Studio as well as broader IT and SCADA security guidance – Also contains an Appendix with NIST Framework information – Available in .mobi (Kindle), .epub, .pdf, .html, and .doc formats
  • 46. Contents of “Security Guidance” eBook The Chapters and Sections contain many useful topics Chapter 1: New Projects and Security as a Design Consideration Section 1: Building your Project – Extract from the InduSoft Technical Note: Application Guidelines Chapter 2: Existing Projects Chapter 3: Cloud Based Applications Section 1: Working with Cloud Based Applications – The following is an extract from the InduSoft White Paper: Cloud Computing for SCADA Chapter 4: InduSoft Application Security Section 1: SCADA System Security Best Practices – The following is a transcript extract from the InduSoft Webinar: SCADA System Security Webinar Chapter 5: InduSoft Security Discussion for Web Based Applications Section 1: Using Security with Distributed Web Applications – Extract 1 - From InduSoft White Paper: Security Issues with Distributed Web Applications Section 2 – Using Security with Web-Based Applications – Extract 2 - From the InduSoft Tech Note: IWS Security System for Web Based Applications Section 3 – Using Security with Web-Based Applications – Reprint - Control Engineering Magazine - August 2014: Cybersecurity for Smart Mobile Devices Chapter 6: InduSoft Recommendations for IT Security Section 1: Firewalls and other SCADA Security Considerations – Transcript extract from the InduSoft Webinar: SCADA and HMI Security in InduSoft Web Studio Section 2: Control Systems Security Overview – Transcript extract from the InduSoft Webinar: SCADA Security Considerations: Overview Section 3: SCADA Security - Operational Considerations – Transcript extract from the InduSoft Webinar: SCADA Security Considerations: Operational Section 4: SCADA Security - Management Considerations – Transcript extract from the InduSoft Webinar: SCADA Security Considerations: Management Appendix A: NIST Cybersecurity Framework Core Appendix B: Cyber Security Evaluation Tool (CSET) Information
  • 47. Examples of topics and subjects covered
  • 48. New SCADA Projects Should be Designed with Security as a Primary Goal Good project design includes the following:
  • 49. New SCADA Projects Should be Designed with Security as a Primary Goal Good project design includes the following: Security as a primary design consideration
  • 50. New SCADA Projects Should be Designed with Security as a Primary Goal Good project design includes the following: Security as a primary design consideration Safety needs to be considered throughout project design and implementation
  • 51. New SCADA Projects Should be Designed with Security as a Primary Goal Good project design includes the following: Security as a primary design consideration Safety needs to be considered throughout project design and implementation Functionality should be moderated based on the first two design goals
  • 52. New SCADA Projects Should be Designed with Security as a Primary Goal Good project design includes the following: Security as a primary design consideration Safety needs to be considered throughout project design and implementation Functionality should be moderated based on the first two design goals
  • 53. New SCADA Projects Should be Designed with Security as a Primary Goal Good project design includes the following: Security as a primary design consideration Safety needs to be considered throughout project design and implementation Functionality should be moderated based on the first two design goals
  • 54. New SCADA Projects Should be Designed with Security as a Primary Goal Good project design includes the following: Security as a primary design consideration Safety needs to be considered throughout project design and implementation Functionality should be moderated based on the first two design goals
  • 55. New SCADA Projects Should be Designed with Security as a Primary Goal Good project design includes the following: Security as a primary design consideration Safety needs to be considered throughout project design and implementation Functionality should be moderated based on the first two design goals
  • 56. New SCADA Projects Should be Designed with Security as a Primary Goal Good project design includes the following: Security as a primary design consideration Safety needs to be considered throughout project design and implementation Functionality should be moderated based on the first two design goals
  • 57. New SCADA Projects Should be Designed with Security as a Primary Goal Good project design includes the following: Security as a primary design consideration Safety needs to be considered throughout project design and implementation Functionality should be moderated based on the first two design goals
  • 58. New SCADA Projects Should be Designed with Security as a Primary Goal Good project design includes the following: Security as a primary design consideration Safety needs to be considered throughout project design and implementation Functionality should be moderated based on the first two design goals
  • 59. Diverse SCADA Projects Require Different Types of Security Profiles
  • 60. Diverse SCADA Projects Require Different Types of Security Profiles We recognize that customers use InduSoft Web Studio in many different ways.
  • 61. Diverse SCADA Projects Require Different Types of Security Profiles We recognize that customers use InduSoft Web Studio in many different ways. – This fact presents many differing security scenarios for our customers
  • 62. Diverse SCADA Projects Require Different Types of Security Profiles We recognize that customers use InduSoft Web Studio in many different ways. – This fact presents many differing security scenarios for our customers – A specific type of security implementation to a particular SCADA system may be entirely inappropriate for a differing system.
  • 63. Diverse SCADA Projects Require Different Types of Security Profiles We recognize that customers use InduSoft Web Studio in many different ways. – This fact presents many differing security scenarios for our customers – A specific type of security implementation to a particular SCADA system may be entirely inappropriate for a differing system. We have recommended many different ways that security can be implemented into SCADA and HMIs
  • 64. Diverse SCADA Projects Require Different Types of Security Profiles We recognize that customers use InduSoft Web Studio in many different ways. – This fact presents many differing security scenarios for our customers – A specific type of security implementation to a particular SCADA system may be entirely inappropriate for a differing system. We have recommended many different ways that security can be implemented into SCADA and HMIs – Talks, classes, white papers, webinars, forums, Technical Support, and individualized guidance on projects has been available for quite some time
  • 65. Diverse SCADA Projects Require Different Types of Security Profiles We recognize that customers use InduSoft Web Studio in many different ways. – This fact presents many differing security scenarios for our customers – A specific type of security implementation to a particular SCADA system may be entirely inappropriate for a differing system. We have recommended many different ways that security can be implemented into SCADA and HMIs – Talks, classes, white papers, webinars, forums, Technical Support, and individualized guidance on projects has been available for quite some time – InduSoft now has on-demand engineering assistance available on our website!
  • 66. Services On Demand is Now Live! Engineering assistance is available when designing projects and implementing project security
  • 67. Stay Informed… How to get Product Update and Webinar Announcements
  • 68. Stay Informed… How to get Product Update Announcements
  • 69. THANKS FOR ATTENDING! Here’s how to contact us…
  • 70. Email (US) info@indusoft.com (Brazil) info@indusoft.com.br (Germany) info@indusoft.com.de Support support@indusoft.com Web site (English) www.indusoft.com (Portuguese) www.indusoft.com.br (German) www.indusoft.com.de Phone (512) 349-0334 (US) +55-11-3293-9139 (Brazil) +49 (0) 6227-732510 (Germany) Toll-Free 877-INDUSOFT (877-463-8763) Fax (512) 349-0375 Germany USA Brazil Contact InduSoft Today
  • 71. Email (US) info@indusoft.com (Brazil) info@indusoft.com.br (Germany) info@indusoft.com.de Support support@indusoft.com Web site (English) www.indusoft.com (Portuguese) www.indusoft.com.br (German) www.indusoft.com.de Phone (512) 349-0334 (US) +55-11-3293-9139 (Brazil) +49 (0) 6227-732510 (Germany) Toll-Free 877-INDUSOFT (877-463-8763) Fax (512) 349-0375 Germany USA Brazil Contact InduSoft TodayEmail richard.indusoft@gmail.com if you would like to request a copy of this presentation or with other questions.
  • 72. Email (US) info@indusoft.com (Brazil) info@indusoft.com.br (Germany) info@indusoft.com.de Support support@indusoft.com Web site (English) www.indusoft.com (Portuguese) www.indusoft.com.br (German) www.indusoft.com.de Phone (512) 349-0334 (US) +55-11-3293-9139 (Brazil) +49 (0) 6227-732510 (Germany) Toll-Free 877-INDUSOFT (877-463-8763) Fax (512) 349-0375 Germany USA Brazil Contact InduSoft TodayEmail richard.indusoft@gmail.com if you would like to request a copy of this presentation or with other questions. The upcoming InduSoft webinar tomorrow (Feb 18th) month will focus on Engineering Services and how you can get the most out of them. Visit: http://www.indusoft.com
  • 73. Email (US) info@indusoft.com (Brazil) info@indusoft.com.br (Germany) info@indusoft.com.de Support support@indusoft.com Web site (English) www.indusoft.com (Portuguese) www.indusoft.com.br (German) www.indusoft.com.de Phone (512) 349-0334 (US) +55-11-3293-9139 (Brazil) +49 (0) 6227-732510 (Germany) Toll-Free 877-INDUSOFT (877-463-8763) Fax (512) 349-0375 Germany USA Brazil Contact InduSoft TodayEmail richard.indusoft@gmail.com if you would like to request a copy of this presentation or with other questions. The upcoming InduSoft webinar tomorrow (Feb 18th) month will focus on Engineering Services and how you can get the most out of them. Visit: http://www.indusoft.com Join our webinars and we will send you an InduSoft webinar series Tee-Shirt!
  • 74. Next: STEPHEN MILLER SCADA Cybersecurity Framework
  • 76. Topics Covered • E-Book Purpose • Key Objectives • Outline Of Content • Training Plans – Cybersecurity Programs – Boot Camp • About ENMU-Ruidoso • Q & A? 76 CAE-2Y Accredited
  • 77. E-Book Purpose • Provide a quick reference guide to the framework Promote awareness of • Cybersecurity Critical Infrastructure Framework • SCADA Cybersecurity threats and vulnerabilities • The importance of risk assessments • How to use the framework • Look into applying security to Indusoft Web Studio 77 CAE-2Y Accredited
  • 78. Key Objectives • Knowledge of SCADA and cybersecurity environment – Types of SCADA systems – Threats and risks Understanding of framework Knowledge of tools and processes for risk analysis Ability to apply risk management processes to obtain the right framework tier for an organization 78 CAE-2Y Accredited
  • 79. Outline Of Content • Chapter 1 - SCADA Cybersecurity Introduction and Review – What is SCADA • How it works, In Depth Look, field devices, control units, HMI – Overview of Cybersecurity Vulnerabilities • Security Challenges, Understanding & defining information security, Cyber Threat Source to Control/SCADA Systems, GAO Threats, Attacks & Defenses, Vulnerability Scanning vs Penetration Testing – Understanding Control System Cyber Vulnerabilities • Gaining control of SCADA Systems, Categories of SCADA Systems 79 CAE-2Y Accredited
  • 82. Steps of a cyberattack
  • 87. One individual… …with multiple, complex relationships to other levels of the environment... …that also change over time.
  • 89. Three Categories of SCADA Systems Modern/Common Diagram Modern/Proprietary Diagram Legacy/Proprietary Diagram
  • 90. Outline Of Content • Chapter 2 – Cybersecurity Framework Introduction • Framework Introduction – Executive Order 13636 (EO), “Improving Critical Infrastructure Cybersecurity” • Risk Management Process • The Cybersecurity Framework 90 CAE-2Y Accredited
  • 91. Overview of the Framework
  • 93. Outline Of Content • Chapter 3 – Cybersecurity Framework Basics – Basic framework overview – Framework core CAE-2Y Accredited
  • 94. Business Process Management (BPM) Approach to the Framework
  • 95. How Does it All Come Together?
  • 96. Outline Of Content • Chapter 4 – How to Use the Framework Basic Review of Cybersecurity Practices Establishing or Improving a Cybersecurity Program Communicating Cybersecurity Requirements with Stakeholders CAE-2Y Accredited
  • 97. Using the CSET Tool for Risk Management and Future Framework Analysis
  • 98. Select Standard(s)  NIST Framework for Improving Critical Infrastructure Cybersecurity V1 (Recommended)  NIST Special Publication 800-53 Rev 3 and NIST Special Publication 800-53 Rev 3 App l  NIST Special Publication 800-53 Rev 4 and NIST Special Publication 800-53 Rev 4 App l  Consensus Audit Guidelines (CAG)  Components Questions Set  CFATS Risk Based Performance Standard (RBPS) 8: Chemical Facilities Anti-Terrorism Standard, Risk- Based Performance Standards Guidance 8 - Cyber, 6 CFR Part 27  CNSSI No. 1253 Baseline  CNSSI No. 1253 Industrial Control System (ICS) Overlay V1  Catalog of Recommendations Rev 7 – (DHS Catalog of Control Systems Security: Recommendations for Standards Developers, Revisions 6 and 7)  INGAA Control Systems Cyber Security Guidelines for the Natural Gas Pipeline Industry Key Questions Set  DoD Instruction 8500.2 Information Assurance Implementation, February 2, 2003  ISO/IEC 15408 revision 3.1: Common Criteria for Information Technology Security Evaluation, Revision 3.1  NERC Reliability Standards CIP-002-009 Revisions 3 and 4  NIST Special Publication 800-82 Guide to Industrial Control Systems Security, June 2011  NIST Special Publication 800-82 Rev 1  NIST Special Publication 800-82 Rev 2 (Draft)  NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems Rev 3 and with Appendix I, ICS Controls  NRC Regulatory Guide 5.71 Cyber Security Programs for Nuclear Facilities, January 2010  NEI 0809 Cyber Security Plan for Nuclear Power Reactors  TSA Pipeline Security Guidelines April 2011  Universal Questions Set
  • 99. Outline Of Content • Chapter 5 – Indusoft Security Guide – Embedded in this chapter. • Appendix (Framework Core, CSET Tool, References, and Glossary) CAE-2Y Accredited
  • 101. ENMU-Ruidoso Cybersecurity Programs • Computer and Network Security Certification Program (Online) Credited or Self-paced ($2,495) • Associates of Applied Science Degree - Information Systems Cybersecurity • The programs are designed to prepare students as: – Information Systems Security (INFOSEC) Professionals NSTISSI No. 4011 – CNSSI No. 4016 Entry Level Risk Analysts – CAE-2Y Information Assurance/Cyber Defense Accredited • IS 131: Network Security Fundamentals-3 • IS 136: Guide to Disaster Recovery- 3 • IS 153/L: Introduction to Information System- 4 • IS 253: Firewalls and How They Work- 3 • IS 257: Network Defense and Counter Measures- 3 • IS 258: Cyber Ethics, Professionalism, and Career Development- 3 • IS 285: Ethical Hacking – 3 • IS 289: Capstone/Internship/NCL Cybersecurity Challenge CAE-2Y Accredited
  • 102. Training Plans: Boot Camp Four day Boot Camp covering: • Course Orientation and Introduction to Cybersecurity and SCADA • CompTIA-Security+ Key Topics • SCADA Cybersecurity Recommended Practice/ Infrastructure Guiding Principles/National Infrastructure Protection Plan – IS-821 Critical Infrastructure and Key Resources Support Annex – IS-860.a National Infrastructure Protection Plan (NIPP) • Cybersecurity Critical Infrastructure Framework / CAP Process/Intro to a SCADA Product (IDUSOFT) • CSET Department of Homeland Security Risk Assessment Process and Tools Using the Cybersecurity Critical Infrastructure Framework 102 CAE-2Y Accredited
  • 103. About ENMU-Ruidoso  The National Security Agency and the Department of Homeland Security have designated Eastern New Mexico University - Ruidoso  National Center of Academic Excellence in Information Assurance/Cybersecurity Defense through academic year 2019. “CAE-2Y”  Based on the universities ability to meet the increasing demands of the program criteria will serve the nation well in contributing to the protection of the National Information Infrastructure.  Meets the eleven Knowledge Units learning objectives  Recognized by the National Initiative in Cybersecurity Education (NICE) as a certified Training Institution for the NIST National Cybersecurity Workforce Framework.  http://csrc.nist.gov/nice/index.htm 103 CAE-2Y Accredited
  • 104. ENMU-Ruidoso Foundation Foundation, as noted below. If you find this ebook useful in your business, tax deductable donations to the university 501 (c) (3) foundation are encouraged by contacting:

Notes de l'éditeur

  1. Chapter 1: This chapter will provide an introduction to Supervisory Control and Data Acquisition (SCADA), Distributed Control Systems (DCS), and Process Control Systems (PCS). What they are and how they are used. Then we will look at cybersecurity vulnerabilities in general and those that are of a higher concern for SCADA and PCS systems. Section 1: What is SCADA? Overview History and Installed Base How SCADA Systems Work A More In-Depth Look at a SCADA System Field Devices Measure the Process for Flow Rate, Pressure, Temperature, Level, Density, Etc. Field Control Uses Two Types of Controllers Examples of HMI Screens and Displays Used Within SCADA Systems Section 2: Overview of Cyber Vulnerabilities In this section the key objectives are: Challenges of Securing Information Understanding and Defining Information Security Cyber Threat Source to Control/SCADA Systems Descriptions GAO Threat Table Cyber-Attacks and Defenses Vulnerability Scanning vs. Penetration Testing Section 3: Understanding Control System Cyber Vulnerabilities Gaining Control of the SCADA System Three Categories of SCADA Systems
  2. Modern/Common Figure 1.13 illustrates some of the technologies used in a control systems environment most likely to be of the Modern/Common type. This category of technologies inside the control systems domain will be those that would be most susceptible to modern cyber threats and vulnerabilities, at the same time being mature enough to allow some contemporary forensic methods to be successfully performed on them. Most common technologies that fall into this category include Microsoft Windows, UNIX platform, or another vendor specific solution that has functionality that can be investigated using standard forensics methodologies Modern/Proprietary Modern/Proprietary technologies (Figure 1.14) are those that are critical to a control systems operation, have been created within the last 10 years, are still fully supported and understood primarily by the vendor (or systems integrator). , the control systems technology and information about its operation are not generally available through open-source methods. Moreover, the technology and protocols associated with command and control of the operational environment may only be known to the vendor and just partially to the owner/operator. Legacy/Proprietary Legacy/Proprietary technologies (Figure 1.15) are those that are critical to a control systems operation, may have been deployed more than 10 years ago, have moderate computing capabilities (compared to modern systems), may or may not be supported be the vendor (if still around), in most cases only understood (in-depth) by the vendor.
  3. Chapter 2: To strengthen the resilience of this infrastructure, President Obama issued Executive Order 13636 (EO), “Improving Critical Infrastructure Cybersecurity”, on February 12, 2013.1 This Executive Order calls for the development of a voluntary Cybersecurity Framework (“Framework”) that provides a “prioritized, flexible, repeatable, performance-based, and cost- effective approach” to manage cybersecurity risk for those processes, information, and systems directly involved in the delivery of critical infrastructure services. The Framework, developed in collaboration with industry, provides guidance to an organization on managing cybersecurity risk. Executive Order no. 13636, "Improving Critical Infrastructure Cybersecurity", DCPD-201300091, February 12,2013. http://www.gpo.gov/fdsys/pkg/FR-2013-02-19/pdf/2013-03915.pdf Chapter 2: Cybersecurity Framework Introduction Section 1: Framework Introduction Overview of the Framework Framework Core Framework Implementation Tiers Framework Profile Section 2: Risk Management and the Cybersecurity Framework Risk Management Redefined
  4. The Tier definitions are based on the conditions of satisfaction of three attributes: Risk Management Process 2) Integrated Risk Management Program 3) External Participation Tier 1: Partial[58] Risk Management Process Organizational cybersecurity risk management practices are not formalized, and risk is managed in an ad hoc and sometimes reactive manner. Prioritization of cybersecurity activities may not be directly informed by organizational risk objectives, the threat environment, or business/mission requirements. Integrated Risk Management Program There is limited awareness of cybersecurity risk at the organizational level and an organization-wide approach to managing cybersecurity risk has not been established. The organization implements cybersecurity risk management on an irregular, case-by-case basis due to varied experience or information gained from outside sources. The organization may not have processes that enable cybersecurity information to be shared within the organization. External Participation An organization may not have the processes in place to participate in coordination or collaboration with other entities. Tier 4: Adaptive[61] Risk Management Process The organization adapts its cybersecurity practices based on lessons learned and predictive indicators derived from previous and current cybersecurity activities. Through a process of continuous improvement incorporating advanced cybersecurity technologies and practices, the organization actively adapts to a changing cybersecurity landscape and responds to evolving and sophisticated threats in a timely manner. Integrated Risk Management Program There is an organization-wide approach to managing cybersecurity risk that uses risk-informed policies, processes, and procedures to address potential cybersecurity events. Cybersecurity risk management is part of the organizational culture and evolves from an awareness of previous activities, information shared by other sources, and continuous awareness of activities on their systems and networks. External Participation The organization manages risk and actively shares information with partners to ensure that accurate, current information is being distributed and consumed to improve cybersecurity before a cybersecurity event occurs.
  5. Chapter 3: The purpose of the Framework is to provide a common language to enable understanding, managing, and communicating cybersecurity risk both internally and externally. It is intended for use in helping identify and prioritize actions for reducing cybersecurity risk. The Framework is a tool, used for aligning policy, business, and technological approaches to managing that risk. It is meant to be used to manage cybersecurity risk across entire organization or can be focused to service, department within the organization. “Different types of entities - including sector coordinating structures, associations, and organizations - can use the Framework for different purposes, including the creation of common Profiles.” "Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0", National Institute of Standards and Technology, February 12, 2014 The ebook introduces a business process perspective in looking at the framework and how to apply the framework from a Business Process Re-engineering perspective. Chapter 3: Cybersecurity Framework Basics Section 1: Framework Basics Section 2: Framework Core Functions Categories Subcategories Framework Implementation Tiers Section 3: How Does it All Come Together? Coordination of Framework Implementation Business Process Management (BPM) Approach to the Framework Cybersecurity Framework Assessment Process Model Breakdown and Component Parts critical infrastructure sectors: Chemical Sector Commercial Facilities Sector Communications Sector Critical Manufacturing Sector Dams Sector Defense Industrial Base Sector Emergency Services Sector Energy Sector Financial Services Sector Food and Agriculture Sector Government Facilities Sector Healthcare and Public Health Sector Information Technology Sector Nuclear Reactors, Materials, and Waste Sector Transportation Systems Sector Water and Wastewater Systems Sector
  6. Chapter4: The purpose of this chapter is to look at how an organization can use the Framework as a key part or enabler of its current process for identifying, assessing, and managing cybersecurity risk. Note, the Framework is not designed to replace existing processes; an organization can use its current process and overlay it onto the Framework to determine gaps in its current cybersecurity risk approach and develop a roadmap to improvement. Using the Framework as a cybersecurity risk management tool, can enable the organization in determining activities that are most important to critical service delivery and prioritize the cost of those activities to reduce the risk and maximize the impact of the investment. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, National Institute of Standards and Technology, February 12, 2014 Chapter 4: How to Use the Framework Section 1: Basic Review of Cybersecurity Practices Section 2: Establishing or Improving a Cybersecurity Program Step 1: Prioritize and Scope Step 2: Orient Step 3: Create a Current Profile Step 4: Conduct a Risk Assessment Step 5: Create a Target Profile Step 6: Determine, Analyze, and Prioritize Gaps Step 7: Implement Action Plan Section 3: Communicating Cybersecurity Requirements with Stakeholders Identifying Gaps
  7. Appendix A: Framework Core Information regarding Informative References described in Appendix A may be found at the following locations: Appendix B: Cyber Security Evaluation Tool (CSET) Information Appendix C: References Recommended Publications for Purchase Further Reading and Links to Organizations Appendix D: Glossary Terms Used in this Publication Acronyms Used in this Publication CSET Tool The Cyber Security Evaluation Tool (CSET®) is a Department of Homeland Security (DHS) no-cost tool that assists organizations in protecting their key national cyber assets. The tool was developed by the DHS Industrial Control System Cyber Emergency Response Team (ICS-CERT) with assistance from the National Institute of Standards and Technology (NIST). This tool provides users with a systematic, consistent, and standards based approach for assessing the security posture of their Information Technology systems and networks. The tool uses high-level and detailed questions related to all industrial control and IT systems that includes the NIST Cybersecurity Critical Infrastructure Framework, referenced in the tool standards as “NCSF V1”. The value of the tool is that it can guide the key stakeholders, custodians, and owners in systematically understanding their current IT and control system environment, potential gaps in security, and assist in developing a plan to close those gaps. The tool includes instructional videos, help screens, and information not only about how to use the tool but information on what standards might apply to one’s organization. The tool gives organizations who have not conducted any sort of comprehensive risk assessment of the IT infrastructure, an excellent starting point.
  8. 1.1. Basic Data Analysis 1.2. Basic Scripting or Introductory Programming (4 yr core) 1.3. Cyber Defense 1.4. Cyber Threats 1.5. Fundamental Security Design Principles 1.6. IA Fundamentals 1.7. Intro to Cryptography 1.8. IT Systems Components 1.9. Networking Concepts 1.10. Policy, Legal, Ethics, and Compliance 1.11. System Administration