4
Most read
8
Most read
12
Most read
Cyber Security Solutions & Challenges
                              Ahmed M. Al Enizy
                             IT Security Manager
              International Systems Engineering
2
10/3/2012
   ICS and SCADA systems are important for our petroleum
         business and for our national economic growth because
         they automate and monitor the production processes.
        ICS and SCADA systems are no longer isolated from
         corporate and internet network.
        Most ICS and SCADA protocols, Designs, and
         Implementations were done without security in mind.
        This made them even more exposed to threats and
         vulnerabilities, and it made challenges even tougher.

3   10/3/2012
4   10/3/2012
   Concept Abstraction
       Solution Concept Abstraction
       The Right Solution For You
       Cyber Security Services & Solutions Catalog
       Suggested Roadmap
       Challenges




5   10/3/2012
Someone Somewhere with Motivation, Means, and
                      Opportunity
         Advanced  Wants to Spy / Harm
                                                      Conventional
         Persistent
                           External Threat              Hacking
          Threat




                                                                                Remote
                                                           Internet




                                                                                        Contractors - Partners - Support
                             Economic
                              Growth
                               GDC




                                                                      Access Threat
                                                                      & Unsecured
                                                                       Unmanaged



                                                                                                   3rd Party
              Production                              Business
    StuxNet                            $
               ICS /
                                            Monitor
                                            Control
                              Report




                                                      Operations
              SCADA

                                       IT       Shamoon




                                                                                Local
                         Internal Threat
                              Poor
6     10/3/2012   Governance – Design – Security
7   10/3/2012
Someone Somewhere with
                    Motivation, Means, and Opportunity
                            Wants to Spy / Harm




                                                                                      Contractors - Partners - Support
                                                                  Internet




                                                                             Remote
                                 Economic
                                  Growth




                                                                                                 3rd Party
                 Production               $                Business




                                               Monitor &
                  ICS /

                                                Control
                                 Report

                                                           Operations
                 SCADA




                                                                             Local
                                          IT


                              Logical Security
                              Physical Security

8   10/3/2012   Governance, Risk, and Compliance Assurance
   It is not a menu that you choose from or an
        advice from a very reliable source, you have to do
        your homework in assessing your risks.
       Solutions can be
        ◦ Administrative, e.g. GRC, policy, and process.
        ◦ Technical
          Safeguards prevents the threat from happening, e.g. firewall.
          Counter measures, e.g. antivirus, remediation and recovery
           procedures.
        ◦ Physical, i.e. gates, doors, barriers… etc.
       The right solution for you should help mitigate
        identified risks and save you some money.

9   10/3/2012
Consultation              MSS                IT Security        Network Security

      Intelligence and
                                SOC            End Point Protection     Firewall / UTM
           reports
 Business Continuity                            Access Control and
    and Disaster         Penetration Testing                               IDS / IPS
                                               Identity Management
      Recovery
                                               Encryption and Data
 Crisis Management       Threat Management                            Traffic Encryption
                                                    Protection

                                                  Data Leakage
     Security Programs       Forensics                                    NAP/NAC
                                                   Prevention

                                                    Host and            Web and Email
                             Awareness         Application Security
Risk and Compliance                                                       Security

                         Fraud and Identity     Vulnerability and
Security Assessment          Protection        Patch Management        Wireless Security
 and Health Check

                                                                      Traffic Monitoring
10       10/3/2012
Security Roadmap and Continues Improvement Plan
                   Development


                            Security Program and Policy Review
                            and Amendment


Crisis Management, Business Continuity and Disaster
Recovery Readiness Assessment


         Security Controls Effectiveness
         Assessment


 ICS/SCADA Risk
 Assessment



 11   10/3/2012
   Remote sites …
         ◦   In the middle of the desert.
         ◦   Connectivity.
         ◦   Local support.
         ◦   Remote support.
         ◦   Log collection.
         ◦   Incident response and handling.
        Security solutions not compatible with
         ICS/SCADA software and communication
         protocols.
        Cyber Security standards for ICS/SCADA.
        Centralized Cyber Security for monitoring,
         control, and response.

12   10/3/2012
    Directly or indirectly connected to the internet or to any 3rd
          party or you allow data transfer or exchange electronically,
          then you are facing Cyber Threats.
         It is never too late to start fixing because you are going to be
          targeted once again.
         Cyber Security same as any complicated problem can be
          concurred if simplified, abstracted, and divided into smaller
          logical groups.
         There is no 100% security and guarantee even if everybody is
          saying so.
         keep doing your best in assessing, discovering risks and
          fortifying your security.
         Make sure that you are ready to survive the crisis and restore
          your business in very short time.
13       10/3/2012
14   10/3/2012

More Related Content

PPTX
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
PDF
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PDF
Industrial Control Cyber Security Europe 2015
PDF
Should I Patch My ICS?
PDF
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
PPTX
SCADA Security Training
PDF
Solvit identity is the new perimeter
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Industrial Control Cyber Security Europe 2015
Should I Patch My ICS?
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
SCADA Security Training
Solvit identity is the new perimeter

What's hot (20)

PDF
Cybersecurity for modern industrial systems
PDF
IT vs. OT: ICS Cyber Security in TSOs
PPTX
Protecting Infrastructure from Cyber Attacks
DOCX
Residency research makeup project acme enterprise scenario resi
PPTX
Cyber & Process Attack Scenarios for ICS
PPTX
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
PPTX
Navigating the Zero Trust Journey for Today's Everywhere Workplace
PPTX
Protect Against 85% of Cyberattacks
PDF
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
DOCX
Security architecture principles isys 0575general att
PPT
Top Tactics For Endpoint Security
PDF
Endpoint Security
PDF
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
PDF
Industrial Control Security USA Sacramento California Oct 13/14
PPTX
Symantec and ForeScout Delivering a Unified Cyber Security Solution
PDF
CLASS 2016 - Palestra José Antunes
PPTX
Critical Infrastructure Security by Subodh Belgi
PDF
Nozomi networks-solution brief
PDF
Reference Security Architecture for Mobility- Insurance
PPTX
Nozomi Fortinet Accelerate18
Cybersecurity for modern industrial systems
IT vs. OT: ICS Cyber Security in TSOs
Protecting Infrastructure from Cyber Attacks
Residency research makeup project acme enterprise scenario resi
Cyber & Process Attack Scenarios for ICS
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Protect Against 85% of Cyberattacks
Defcon 22-aaron-bayles-alxrogan-protecting-scada-dc101
Security architecture principles isys 0575general att
Top Tactics For Endpoint Security
Endpoint Security
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Industrial Control Security USA Sacramento California Oct 13/14
Symantec and ForeScout Delivering a Unified Cyber Security Solution
CLASS 2016 - Palestra José Antunes
Critical Infrastructure Security by Subodh Belgi
Nozomi networks-solution brief
Reference Security Architecture for Mobility- Insurance
Nozomi Fortinet Accelerate18
Ad

Viewers also liked (19)

PPTX
SANS ICS Security Survey Report 2016
PPTX
التعرف على الاختراقات في الشبكات المحلية
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PDF
War in the 5th domain: Cyber Offensive Capability
PPTX
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
PPTX
Integrating the Alphabet Soup of Standards
PDF
Cybersecurity in Industrial Control Systems (ICS)
PDF
PT-DTS SCADA Security using MaxPatrol
PPTX
Security Operation Center - Design & Build
PPTX
Insights 2015 - Cybersecurity- Game Planning for Success
PPTX
Developing excellence in information security from corporate enterprise to ...
PPT
Source Code Scanners
PDF
security and assurance lecture jan 14
PDF
Overcoming Cyber Attacks
PDF
PDF
120213 cateura grenoble em smart grid toward which business models
PDF
Comprehensive Security Concept For Process Control Systems V2006
PPT
Cyber security of smart grid communication: Risk analysis and experimental te...
PDF
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
SANS ICS Security Survey Report 2016
التعرف على الاختراقات في الشبكات المحلية
Building a Cyber Security Operations Center for SCADA/ICS Environments
War in the 5th domain: Cyber Offensive Capability
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Integrating the Alphabet Soup of Standards
Cybersecurity in Industrial Control Systems (ICS)
PT-DTS SCADA Security using MaxPatrol
Security Operation Center - Design & Build
Insights 2015 - Cybersecurity- Game Planning for Success
Developing excellence in information security from corporate enterprise to ...
Source Code Scanners
security and assurance lecture jan 14
Overcoming Cyber Attacks
120213 cateura grenoble em smart grid toward which business models
Comprehensive Security Concept For Process Control Systems V2006
Cyber security of smart grid communication: Risk analysis and experimental te...
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Ad

Similar to Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges V1.5 (20)

PDF
S series presentation
PDF
VSD Infotech
PDF
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
PDF
Security Awareness Training
PPT
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
PDF
Day 3 p2 - security
PDF
Day 3 p2 - security
PPT
Cybersecurity exchange briefing oct 2012 v2
PDF
Enterprise Strategy for Cloud Security
PPTX
Securing Mobile - A Business Centric Approach
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PDF
Isc2conferancepremay15final
PPTX
SunGard Enterprise Cloud Services @ Cloud Connect 2011
PDF
Security Patterns How To Make Security Arch Easy To Consume
PDF
Cisco tec chris young - security intelligence operations
PDF
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
PPT
Cio ciso security_strategyv1.1
PPTX
Check Point75 Makes3 D Security A Reality Q22011
PPT
2012 ReEnergize the Americas 3B: Gene Rodriguez
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
S series presentation
VSD Infotech
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
Security Awareness Training
Arrow ECS IBM Partner Jam - Security Update - Vicki Cooper - IBM
Day 3 p2 - security
Day 3 p2 - security
Cybersecurity exchange briefing oct 2012 v2
Enterprise Strategy for Cloud Security
Securing Mobile - A Business Centric Approach
PCTY 2012, IBM Security and Strategy v. Fabio Panada
Isc2conferancepremay15final
SunGard Enterprise Cloud Services @ Cloud Connect 2011
Security Patterns How To Make Security Arch Easy To Consume
Cisco tec chris young - security intelligence operations
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Cio ciso security_strategyv1.1
Check Point75 Makes3 D Security A Reality Q22011
2012 ReEnergize the Americas 3B: Gene Rodriguez
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...

Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges V1.5

  • 1. Cyber Security Solutions & Challenges Ahmed M. Al Enizy IT Security Manager International Systems Engineering
  • 3. ICS and SCADA systems are important for our petroleum business and for our national economic growth because they automate and monitor the production processes.  ICS and SCADA systems are no longer isolated from corporate and internet network.  Most ICS and SCADA protocols, Designs, and Implementations were done without security in mind.  This made them even more exposed to threats and vulnerabilities, and it made challenges even tougher. 3 10/3/2012
  • 4. 4 10/3/2012
  • 5. Concept Abstraction  Solution Concept Abstraction  The Right Solution For You  Cyber Security Services & Solutions Catalog  Suggested Roadmap  Challenges 5 10/3/2012
  • 6. Someone Somewhere with Motivation, Means, and Opportunity Advanced Wants to Spy / Harm Conventional Persistent External Threat Hacking Threat Remote Internet Contractors - Partners - Support Economic Growth GDC Access Threat & Unsecured Unmanaged 3rd Party Production Business StuxNet $ ICS / Monitor Control Report Operations SCADA IT Shamoon Local Internal Threat Poor 6 10/3/2012 Governance – Design – Security
  • 7. 7 10/3/2012
  • 8. Someone Somewhere with Motivation, Means, and Opportunity Wants to Spy / Harm Contractors - Partners - Support Internet Remote Economic Growth 3rd Party Production $ Business Monitor & ICS / Control Report Operations SCADA Local IT Logical Security Physical Security 8 10/3/2012 Governance, Risk, and Compliance Assurance
  • 9. It is not a menu that you choose from or an advice from a very reliable source, you have to do your homework in assessing your risks.  Solutions can be ◦ Administrative, e.g. GRC, policy, and process. ◦ Technical  Safeguards prevents the threat from happening, e.g. firewall.  Counter measures, e.g. antivirus, remediation and recovery procedures. ◦ Physical, i.e. gates, doors, barriers… etc.  The right solution for you should help mitigate identified risks and save you some money. 9 10/3/2012
  • 10. Consultation MSS IT Security Network Security Intelligence and SOC End Point Protection Firewall / UTM reports Business Continuity Access Control and and Disaster Penetration Testing IDS / IPS Identity Management Recovery Encryption and Data Crisis Management Threat Management Traffic Encryption Protection Data Leakage Security Programs Forensics NAP/NAC Prevention Host and Web and Email Awareness Application Security Risk and Compliance Security Fraud and Identity Vulnerability and Security Assessment Protection Patch Management Wireless Security and Health Check Traffic Monitoring 10 10/3/2012
  • 11. Security Roadmap and Continues Improvement Plan Development Security Program and Policy Review and Amendment Crisis Management, Business Continuity and Disaster Recovery Readiness Assessment Security Controls Effectiveness Assessment ICS/SCADA Risk Assessment 11 10/3/2012
  • 12. Remote sites … ◦ In the middle of the desert. ◦ Connectivity. ◦ Local support. ◦ Remote support. ◦ Log collection. ◦ Incident response and handling.  Security solutions not compatible with ICS/SCADA software and communication protocols.  Cyber Security standards for ICS/SCADA.  Centralized Cyber Security for monitoring, control, and response. 12 10/3/2012
  • 13. Directly or indirectly connected to the internet or to any 3rd party or you allow data transfer or exchange electronically, then you are facing Cyber Threats.  It is never too late to start fixing because you are going to be targeted once again.  Cyber Security same as any complicated problem can be concurred if simplified, abstracted, and divided into smaller logical groups.  There is no 100% security and guarantee even if everybody is saying so.  keep doing your best in assessing, discovering risks and fortifying your security.  Make sure that you are ready to survive the crisis and restore your business in very short time. 13 10/3/2012
  • 14. 14 10/3/2012

Editor's Notes

  • #7: A look into some ICS/SCADA Cyber AttacksStuxnet - June 2010FactsSeven Iranian organizations scoring 70% of infections compared to other countries. It exploited zero day vulnerabilities in Microsoft platformsTargeted Siemens SCADA software. It contained Programmable Logic Unit rootkit that allowed it to spy on specific automated industrials procedures.In other words it is a Cyber Espionage attackWikipedia – Symantec - TrendMicroBusiness ImpactIn countries that their Gross Domestic Product depends heavily on petroleum business, the major impact is the restrain of the national economic growth.Shamoon - August 2012ARAMCO and RasGas were hit by this Cyber AttackFactsMassive outbreak resulting in 30k computers.Loss of data on infected computers.Operation loss on infected computersData leakagesIn other words it is a Cyber Espionage and Destruction attack.Symantec - WikipediaBusiness ImpactImpact on Gross Domestic Product results majorly in restrain of the national economic growth due to the fact that in Saudi Arabia “The petroleum sector accounts for roughly 80% of budget revenues, 45% of GDP, and 90% of export earnings." (mundi index) ICS/SCADA HackingObviously anyone who doesn’t like you or competing with you and has nothing to stop him (Motivation, Means, Opportunity).Conventional or Typical HackingA hacker somewhere in the world doing his best to hack your networkMost of the companies deploy pretty good protection on their internet gateway so it is hard to gain access from that way.Insider ThreatDeliberate harmful act by Disgruntle employee.Simply a human mistake due to poor conduct. Advanced Persistent Threat aka Cyber ThreatA very intelligent group somewhere in the world deploying most sophisticated techniques you probably never have heard about (Zero Day) to spy on you and/or destroy you. 
  • #9: A look into some ICS/SCADA Cyber AttacksStuxnet - June 2010FactsSeven Iranian organizations scoring 70% of infections compared to other countries. It exploited zero day vulnerabilities in Microsoft platformsTargeted Siemens SCADA software. It contained Programmable Logic Unit rootkit that allowed it to spy on specific automated industrials procedures.In other words it is a Cyber Espionage attackWikipedia – Symantec - TrendMicroBusiness ImpactIn countries that their Gross Domestic Product depends heavily on petroleum business, the major impact is the restrain of the national economic growth.Shamoon - August 2012ARAMCO and RasGas were hit by this Cyber AttackFactsMassive outbreak resulting in 30k computers.Loss of data on infected computers.Operation loss on infected computersData leakagesIn other words it is a Cyber Espionage and Destruction attack.Symantec - WikipediaBusiness ImpactImpact on Gross Domestic Product results majorly in restrain of the national economic growth due to the fact that in Saudi Arabia “The petroleum sector accounts for roughly 80% of budget revenues, 45% of GDP, and 90% of export earnings." (mundi index) ICS/SCADA HackingObviously anyone who doesn’t like you or competing with you and has nothing to stop him (Motivation, Means, Opportunity).Conventional or Typical HackingA hacker somewhere in the world doing his best to hack your networkMost of the companies deploy pretty good protection on their internet gateway so it is hard to gain access from that way.Insider ThreatDeliberate harmful act by Disgruntle employee.Simply a human mistake due to poor conduct. Advanced Persistent Threat aka Cyber ThreatA very intelligent group somewhere in the world deploying most sophisticated techniques you probably never have heard about (Zero Day) to spy on you and/or destroy you.