SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1
Don’t Be Left in the
Dark: Secure Critical
Infrastructure
Systems to Defend
Against Cyberattacks
Stephen Schouten l April 17, 2018
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2
@Bomgar
#bomgarwebinar
#securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3
• Security landscape
• The need for a focus on security
• Meeting Industry Regulations: NIS and
NERC
• Tools and solutions for gaining control of
ICS
• Q&A
• Additional Resources
Agenda
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4
• Poorly secured/weak or default
passwords are easy to
compromise
• Credentials and passwords are
the “keys to the kingdom” that
cyber criminals want
• Remote access solutions
continue to be used as attack
pathways in security breaches
Security Landscape
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5
Stolen credentials lead the
way
2018 Data Breach Investigations Report, Verizon
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 6
• 62 % of respondents
think it’s possible or
definite they’ve suffered
a breach through insider
action
• 66% of respondents think
it’s possible or definite
they have suffered a
breach through third-
party access
2018 Privileged Access
Threat Report
https://www.bomgar.com/resources/whitepapers/privileged-access-threat-report
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7
• Old outdated systems are easy to
compromise
• Lack of security features
• Easy to guess credentials
• Vital to running ‘everyday life’ entities
such as water and electrical systems
Why Industrial Control Systems Are So Attractive
To Hackers
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8
Ukraine Power Grid Attack
• Attackers used stolen operator
credentials to launch a
synchronized attack against
operating systems
• The perpetrators gained access
to energy distribution company
systems more than six months
before the Dec. 23, 2015 outage
that temporarily left about
225,000 customers without
power.
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9
Industry
Standards
NERC CIP | NIS Directive
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10
Industry Standards
• NERC CIP
• North American Electric
Reliability Corporation’s
Critical Infrastructure
Protection
• Set or requirements designed
to secure electronic
perimeters and protect critical
cyber assets
• Currently enforced
• NIS Directive
• Networks and Information
Systems
• Goes into effect May 9, 2018
• Improve security of network
and information systems
across the UK, with a
particular focus on essential
services – which, if disrupted –
could potentially cause
significant damage to the
economy, society and welfare
of individuals
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11
NIS
Directive
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12
NIS Directive: Managing Security Risk
• Governance
• Risk Management
• Asset Management
• Supply Chain
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13
NIS Directive: Protecting against cyberattacks
• Service protection polices and
processes
• Identity and access control
• Data security
• System security
• Resilient networks and systems
• Staff awareness and training
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14
NIS Directive: Detecting cyber security events
• Security monitoring
• Proactive security event
discovery
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15
NIS Directive: Minimizing the impact of cyber
security incidents
• Response and recovery
planning
• Lessons Learned
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16
4 Questions to ask
about your
industrial control
systems security
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17
Do I know who is accessing my systems & when?
• Properly managing access for privileged
insiders/employees
• Properly managing access for
vendors/third-party contractors
• Fourth-party (your vendor’s vendors)
• Enforcing least privilege
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18
Do I know where all of my privileged accounts are?
• Identifying all systems and privileged accounts
is important, because every privileged
account is a potential source of risk
• Auto Discovery works on a continuous basis
where changes are detected as they happen
and can trigger automatic enrollment
• Gives admins the ability to see what they
didn’t see before
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 19
Do I have people in place to manage and maintain
ICS security?
• Internal communication towards
security risks
• Prioritize security
• Deploying solutions with a security
focus
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 20
Do I have true cybersecurity polices in place for
the control systems?
• Continuing security education for all
employees
• Phishing
• Malware
• Social Engineering
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22
Bomgar Remote Support
SUPPORT MORE
More devices, more platforms, more people, more locations. Provide
instant remote support to end-users on or off your network using
Windows, Mac, iOS, Android and more.
PROVIDE SUPERIOR SERVICE
Improve service levels and customer satisfaction with seamless,
high-quality remote support for every end-user.
SECURE YOUR BUSINESS
Securing in remote access tools is crucial in protecting your network
from threats and meeting compliance regulations.
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23
Bomgar Privileged Access
PROTECT THE ACCESS
Enable role-based access to specific systems and define session
parameters, such as access timeframes, required approvals, and
permitted functions.
MANAGE ACTIVITY
Actively manage the ongoing operational use of network devices and
hardware on the network.
ANALYZE & AUDIT DATA
Understand what privileged users are actually doing within the
network and audit for misuse, while meeting audit trail requirements.
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24
Lieberman Rapid Enterprise Defense (RED) Suite
SEAMLESSLY INJECT CREDENTIALS
When integrated with Bomgar Privileged Access of Remote
Support, users can directly inject credentials into end servers
and systems without exposing plain text passwords.
ROTATE & DISCOVER AT SCALE
Rotate privileged identities at scale- up to thousands per minute- and
easily randomize local account passwords while continuously
detecting systems, devices and accounts as they come on and off
the network.
MANAGE SERVICE ACCOUNTS
Automatically discover service accounts and their dependencies- both
clustered and individual services- to achieve optimal system uptime.
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 25
• 2018 Privileged Access Threat
Report
• Bomgar Privileged Access and the
NIS Directive (whitepaper)
• Secure Access and NERC CIP
(whitepaper)
• Northumbrian Water Group (case
study)
• Bomgar Compliance Matrix
• Four Pitfalls of Privilege
Additional Resources
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 26

Contenu connexe

Tendances

2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Alliance
 
Enterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesEnterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesWSO2
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)Kimberly Simon MBA
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Imperva
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAForgeRock
 
Building a Customer Identity and Access Management (CIAM) Solution
Building a Customer Identity and Access Management (CIAM) SolutionBuilding a Customer Identity and Access Management (CIAM) Solution
Building a Customer Identity and Access Management (CIAM) SolutionWSO2
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
CIAM: Conquering the Phygital Battleground with WSO2 Identity Server
CIAM: Conquering the Phygital Battleground with WSO2 Identity ServerCIAM: Conquering the Phygital Battleground with WSO2 Identity Server
CIAM: Conquering the Phygital Battleground with WSO2 Identity ServerWSO2
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionFIDO Alliance
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in GovernmentFIDO Alliance
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesCristian Garcia G.
 

Tendances (19)

2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
Enterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesEnterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use Cases
 
GDPR Webinar - feb
GDPR Webinar - febGDPR Webinar - feb
GDPR Webinar - feb
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
 
Building a Customer Identity and Access Management (CIAM) Solution
Building a Customer Identity and Access Management (CIAM) SolutionBuilding a Customer Identity and Access Management (CIAM) Solution
Building a Customer Identity and Access Management (CIAM) Solution
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
CIAM: Conquering the Phygital Battleground with WSO2 Identity Server
CIAM: Conquering the Phygital Battleground with WSO2 Identity ServerCIAM: Conquering the Phygital Battleground with WSO2 Identity Server
CIAM: Conquering the Phygital Battleground with WSO2 Identity Server
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 

Similaire à Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend Against Cyberattacks

Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Kehinde Tolude
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloudUlf Mattsson
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Next generation access controls
Next generation access controlsNext generation access controls
Next generation access controlsTranscendent Group
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessPrecisely
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesDenim Group
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdflangkahgontay88
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_API Security & Fraud Detection - Are you ready?2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_API Security & Fraud Detection - Are you ready?APIsecure_ Official
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsSchneider Electric
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonksRohit Kapoor
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
Scrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budgetScrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budgetRyan Wisniewski
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 

Similaire à Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend Against Cyberattacks (20)

Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Next generation access controls
Next generation access controlsNext generation access controls
Next generation access controls
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_API Security & Fraud Detection - Are you ready?2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_API Security & Fraud Detection - Are you ready?
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
Scrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budgetScrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budget
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 

Plus de Bomgar

The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management Bomgar
 
Post GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote AccessPost GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote AccessBomgar
 
10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk Value10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk ValueBomgar
 
Privileged Access in Healthcare
Privileged Access in HealthcarePrivileged Access in Healthcare
Privileged Access in HealthcareBomgar
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Bomgar
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, TooBomgar
 

Plus de Bomgar (6)

The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management
 
Post GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote AccessPost GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote Access
 
10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk Value10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk Value
 
Privileged Access in Healthcare
Privileged Access in HealthcarePrivileged Access in Healthcare
Privileged Access in Healthcare
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
 

Dernier

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 

Dernier (20)

The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 

Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend Against Cyberattacks

  • 1. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend Against Cyberattacks Stephen Schouten l April 17, 2018
  • 2. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2 @Bomgar #bomgarwebinar #securingICS
  • 3. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3 • Security landscape • The need for a focus on security • Meeting Industry Regulations: NIS and NERC • Tools and solutions for gaining control of ICS • Q&A • Additional Resources Agenda
  • 4. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4 • Poorly secured/weak or default passwords are easy to compromise • Credentials and passwords are the “keys to the kingdom” that cyber criminals want • Remote access solutions continue to be used as attack pathways in security breaches Security Landscape #bomgarwebinar #securingICS
  • 5. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5 Stolen credentials lead the way 2018 Data Breach Investigations Report, Verizon
  • 6. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 6 • 62 % of respondents think it’s possible or definite they’ve suffered a breach through insider action • 66% of respondents think it’s possible or definite they have suffered a breach through third- party access 2018 Privileged Access Threat Report https://www.bomgar.com/resources/whitepapers/privileged-access-threat-report
  • 7. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7 • Old outdated systems are easy to compromise • Lack of security features • Easy to guess credentials • Vital to running ‘everyday life’ entities such as water and electrical systems Why Industrial Control Systems Are So Attractive To Hackers #bomgarwebinar #securingICS
  • 8. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8 Ukraine Power Grid Attack • Attackers used stolen operator credentials to launch a synchronized attack against operating systems • The perpetrators gained access to energy distribution company systems more than six months before the Dec. 23, 2015 outage that temporarily left about 225,000 customers without power. #bomgarwebinar #securingICS
  • 9. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9 Industry Standards NERC CIP | NIS Directive
  • 10. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10 Industry Standards • NERC CIP • North American Electric Reliability Corporation’s Critical Infrastructure Protection • Set or requirements designed to secure electronic perimeters and protect critical cyber assets • Currently enforced • NIS Directive • Networks and Information Systems • Goes into effect May 9, 2018 • Improve security of network and information systems across the UK, with a particular focus on essential services – which, if disrupted – could potentially cause significant damage to the economy, society and welfare of individuals
  • 11. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11 NIS Directive
  • 12. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12 NIS Directive: Managing Security Risk • Governance • Risk Management • Asset Management • Supply Chain
  • 13. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13 NIS Directive: Protecting against cyberattacks • Service protection polices and processes • Identity and access control • Data security • System security • Resilient networks and systems • Staff awareness and training
  • 14. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14 NIS Directive: Detecting cyber security events • Security monitoring • Proactive security event discovery
  • 15. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15 NIS Directive: Minimizing the impact of cyber security incidents • Response and recovery planning • Lessons Learned
  • 16. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16 4 Questions to ask about your industrial control systems security #bomgarwebinar #securingICS
  • 17. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17 Do I know who is accessing my systems & when? • Properly managing access for privileged insiders/employees • Properly managing access for vendors/third-party contractors • Fourth-party (your vendor’s vendors) • Enforcing least privilege #bomgarwebinar #securingICS
  • 18. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18 Do I know where all of my privileged accounts are? • Identifying all systems and privileged accounts is important, because every privileged account is a potential source of risk • Auto Discovery works on a continuous basis where changes are detected as they happen and can trigger automatic enrollment • Gives admins the ability to see what they didn’t see before #bomgarwebinar #securingICS
  • 19. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 19 Do I have people in place to manage and maintain ICS security? • Internal communication towards security risks • Prioritize security • Deploying solutions with a security focus #bomgarwebinar #securingICS
  • 20. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 20 Do I have true cybersecurity polices in place for the control systems? • Continuing security education for all employees • Phishing • Malware • Social Engineering #bomgarwebinar #securingICS
  • 21. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21
  • 22. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22 Bomgar Remote Support SUPPORT MORE More devices, more platforms, more people, more locations. Provide instant remote support to end-users on or off your network using Windows, Mac, iOS, Android and more. PROVIDE SUPERIOR SERVICE Improve service levels and customer satisfaction with seamless, high-quality remote support for every end-user. SECURE YOUR BUSINESS Securing in remote access tools is crucial in protecting your network from threats and meeting compliance regulations.
  • 23. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23 Bomgar Privileged Access PROTECT THE ACCESS Enable role-based access to specific systems and define session parameters, such as access timeframes, required approvals, and permitted functions. MANAGE ACTIVITY Actively manage the ongoing operational use of network devices and hardware on the network. ANALYZE & AUDIT DATA Understand what privileged users are actually doing within the network and audit for misuse, while meeting audit trail requirements.
  • 24. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24 Lieberman Rapid Enterprise Defense (RED) Suite SEAMLESSLY INJECT CREDENTIALS When integrated with Bomgar Privileged Access of Remote Support, users can directly inject credentials into end servers and systems without exposing plain text passwords. ROTATE & DISCOVER AT SCALE Rotate privileged identities at scale- up to thousands per minute- and easily randomize local account passwords while continuously detecting systems, devices and accounts as they come on and off the network. MANAGE SERVICE ACCOUNTS Automatically discover service accounts and their dependencies- both clustered and individual services- to achieve optimal system uptime.
  • 25. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 25 • 2018 Privileged Access Threat Report • Bomgar Privileged Access and the NIS Directive (whitepaper) • Secure Access and NERC CIP (whitepaper) • Northumbrian Water Group (case study) • Bomgar Compliance Matrix • Four Pitfalls of Privilege Additional Resources
  • 26. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 26