In our increasingly connected world, networks of machines help critical infrastructure run more efficiently and prevent downtime. However, systems which were once isolated are now being exposed to digital security threats that operators never considered.
Joseph Blankenship of Forrester Research and Gabe Authier of Tripwire discuss the evolving threat landscape and how we can protect these critical assets from cyber threats.
Topics covered include:
-Examples of some of the most recent cyber-attacks to critical infrastructure
-Why traditional IT security approaches won't work
-Recommended approaches for securing critical infrastructure
23. 23
Difficulties Securing Critical Infrastructure
» Systems use purpose built hardware with legacy protocols
» Many of these systems are designed on flat networks
» ICS / OT systems meshing with IT
» IT / OT convergence
24. 24
Asset Discovery and Vulnerability Assessment
» Passive Asset Discovery techniques and ”no-touch”
approach
» Active Discovery
» Vulnerability assesment
25. 25
Tripwire Data Collector
» Industrial protocols support for Modbus TCP, Ethernet IP
CIP and SNMP
» Integrations with Rockwell AssetCentre, MDT AutoSave
and Kepware
» Vulnerability risk scoring
27. 27
Tripwire Industrial Suite
» Tripwire Enterprise with Whitelist Profiler
» SCM, Policy, and open ports and services
» Tripwire Enterprise Data Collector
» Industrial protocols and integrations
» Tripwire Log Center
» Industrial log aggregation, normalization and
correlation rules