Home » News » critical infrastructure supply chain

Tag: critical infrastructure supply chain

Industrial Control Cyber Security USA 2017 Cyber Senate conference

“The security threats to U.S. critical infrastructure span the digital divide” Presented by Idaho National Labs this October in Sacramento

The security threats to U.S. critical infrastructure span the digital divide. Resent attacks, like those in the Ukraine, blend the cyber and physical environment to cause confusion within and damage to the production environment. Modern cyber defense requires sophisticated operational tactics and strategies. Although, cyber hygiene is essential for fending off the daily barrage of lower level threats that can impair an organization’s performance, few companies are prepared for a targeted attack on their core operational processes from an advanced adversary.

 

If it can be programmed, it can be hacked. This daunting reality facing our interconnected and digital environments has been described as a battle to be won every day by cybersecurity professionals.

Control systems present unprecedented challenges as they are transitioned to a modern architecture based on digital control systems and increasingly wireless communications systems.  This transition creates a paradox – more efficient, effective operation, but dramatically increased vulnerabilities and attack surfaces.

 

INL’s unparalleled capabilities in nuclear nonproliferation and cybersecurity are fundamentally changing how the nation and world approach complex threats to nuclear assets, energy systems and cyber-physical systems.

 

•       Internationally recognized nonproliferation experts with real-world experience in nuclear facility inspection, physical protection, modeling and simulation, material science, physics and engineering.

 

•       Comprehensive instrumentation and control, cyber and nuclear nonproliferation capabilities with similar nuclear infrastructure and examination equipment found worldwide.

 

•       INL’s full-scale infrastructure includes; isolated, industry scale power grid, water and telecommunication distribution systems to provide an expansive and unique test site that can replicate critical services across a region or municipality.

 

•       Inclusive nuclear security approach that allows for field and laboratory technology evaluation.

 

•       Replication of typical control system network for architecture reviews and system hygiene to support asset owners in securing their systems.

 

•       Protocol analysis, reverse engineering and cybersecurity forensics to advance persistent threat mitigations for the nuclear industry.

 

•       Cyber-informed risk methods and unique engineering methodologies and tools designed to anticipate cyber and physical security risk, and inform investment strategies.

 

•       Frameworks for prioritization of investments and threat indicators to inform and advanced security profile for high-consequence operations.

 

Safeguarding critical infrastructure including the power grid, nuclear materials and facilities is inextricably linked to the cybersecurity of the command and control environment.

 

These environments are complicated by instrumentation and controls that are continuously connected with information technology and wireless communications.

 

An integrated cyber physical security approach is essential to address the resiliency of the power and nuclear installations and continuity of operations.

 

INL’s world-leading cyber and industrial control systems security experts are changing the way the nation and the world meet the unique security demands of operational environments.

 

 

Cyber Senate 4th annual Industrial Control Cybersecurity Europe conference

Understandings the BASICS – Optimising your ICS Security Posture

As Operational Technology (OT) environments become increasingly interconnected and smarter, organizations face significant digital transformation challenges. The business demand for the raw data and information produced by OT systems is growing exponentially both from an internal and external perspective. As the demand for data increases, so has the volume of cyber-attacks specifically aimed at OT system. Cyber-attacks are becoming more advanced and have the potential to impact a number of aspects of a company’s business including safety, health and environment, production operations, information integrity, financial performance and reputation.

For a company looking to harden their OT environment, identifying where to begin can often be a confusing and difficult process. Before embarking on an OT hardening project, for example by either implementing costly technical solutions or introducing new OT specific policies and procedures, leaders need take a step back and ask themselves if they understand, or have thought about, the “BASICs” of OT.

In this session, Leidos Cyber Expert, Scott Keenan, will explain Leidos’ view of OT “BASICS” which provides organizations with the foundation necessary to build a OT hardening project.

Cyber Senate 4th annual Industrial Control Cybersecurity Europe conference

4th Annual Industrial Control Cyber Security Europe Summit London September 19/20th

European Rail Cyber Security Working Group announced

On September 12th the Cyber Senate will be hosting the European Rail Cyber Security Working Group in a roundtable format with discussion groups in the morning and outcomes presented in the afternoon. Capped at 70 participants, this face to face knowledge sharing exercise is specifically designed to assist all stakeholders in the rail ecosystem with an opportunity to assess their security posture, and collaborate with their industry counterparts.
Already confirmed table leaders include the Rail Delivery Group, Deutsche Bahn, and the ERTMS Users Group. More announcements will be made shortly.

The Cyber Senate announce ICS ISAC Alliance

ICS-ISAC Chair Chris Blask noted that Cyber Senate is an example of an information sharing organization which spans key demographics. “The mission of information sharing involves many stakeholders groups across the entire global community. Cyber Senate captures key thought leaders and works to share information among them and with critical communities. We see Cyber Senate as a highly valuable organization and are pleased to support the good work they are doing.”

Cyber security for the digital railway

Join the Cyber Senate on March 16th in London for an in-depth discussion on the current and future threat, how the industry is responding, the absolute importance of “Security by Design,” the challenges that bridging IT and OT bring in deploying enterprise facing architecture and how to further develop a culture of awareness. Cyber threats are growing in frequency and capability across every industry, but none carry more consequences than those carried out against critical national infrastructure. The global rail industry is where the Smart Grid industry was 10 years ago, now realising that through advanced connectivity and digitisation that greater levels of efficiency and optimisation can be achieved, reduction of carbon footprints and greater value can be provided to both asset owners and operators, passengers and shareholders. The rush to next generation infrastructure however is not with out its vulnerabilities. The proliferation of machine to machine sensors, the Internet of Things and the convergence of IT and OT – two very different disciplines, has extended the attack surface dramatically for an industry historically isolated from modern day cyber threats. Join the Cyber Senate on March 16th in Londonfor an in-depth discussion on the advancing threat, the reality of security of our future rail networks, the absolute importance of “Security by Design,” the challenges that bridging IT and OT bring in deploying enterprise facing architecture and more. This is a unique opportunity to address key cyber issues in the design stage within the rail industry, so let us begin. A strong cyber security strategy saves lives. All stakeholders have a responsibility in ensuring the safety, reliability and stability of our Critical National Infrastructure. Information sharing is paramount in educating ourselves and the industry

 

 

 

Anti-IS group’ claims BBC website attack

Reports state the BBC was subject to a DDoS attack by group calling itself “New World Hacking,” targeting IS affiliated web activity. They are reported to have stated “We are based in the US, but we strive to take down Isis [IS] affiliated websites, also Isis members. The reason we really targeted the BBC is because we wanted to see our actual server power. It was a test.”

Source: BBC news

Read more here 

IAEA join the ICS Nuclear conference as Key Note speakers

The Cyber Senate are pleased to announce the IAEA will be joining us as Key Note presenters on the Industrial Control Cyber Security Nuclear conference we will be hosting in Warrington UK, May 24-25th 2016.

For further information see www.industrialcontrolsecuritynuclear.com

the Industrial Control Systems Cyber Emergency Response Team received and responded to 245 incidents reported by asset owners and industry partners.

“The Energy Sector led all others again in 2014 with the most reported incidents” Please find the report here https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf
“Of the total number of incidents reported to ICS-CERT, roughly 55 percent involved advanced persistent threats (APT) or sophisticated actors. Other actor types included hacktivists, insider threats, and criminals. In many cases, the threat actors were unknown due to a lack of attributional data.”
Those involved in the security sector however are quoting numbers for higher than this, as many incidents go unreported.

The Department of Homeland Security join as Key Note Speakers

The Cyber Senate are pleased to announce Mr Marty Edwards, Director ICS CERT, Department of Homeland Security will be joining us as the Key Note speaker on October 13th and 14th in Sacramento California for the 2nd annual Industrial Control Cyber Security USA conference. 

Marty Edwards Photo (1)

Assistant Deputy Director, National Cybersecurity and Communications Integration Center (NCCIC) Director, Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Department of Homeland Security Marty Edwards is the Director of the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), an operational division of the department’s National Cybersecurity and Communications Integration Center (NCCIC) and the DHS Office of Cybersecurity and Communications (CS&C) ICS-CERT works to reduce industrial control system risks within and across all critical infrastructure and key resource sectors by coordinating efforts among federal, state, local and tribal governments, as well as industrial control systems owners, operators and vendors. In collaboration with the other NCCIC components the ICS-CERT responds to and analyzes control systems related incidents, conducts vulnerability and malware analysis, and shares and coordinates vulnerability information and threat analysis through products and alerts.

Mr. Edwards has over 20 years of experience and brings a strong industrial control system industry focus to DHS. Before coming to the ICS-CERT, Mr. Edwards was a program manager focused on control systems security work at Idaho National Laboratory. Prior to his work at the laboratory, Mr. Edwards held a wide variety of roles in the instrumentation and automation fields, including field service, instrument engineering, control systems engineering and project management. Mr. Edwards has also held various positions in nonprofit organizations, including Chairman of the Board for one of the automation communities’ largest user group conferences. Mr. Edwards holds a diploma of technology in Process Control and Industrial Automation (Magna cum Laude) from the British Columbia Institute of Technology.

Operation Dragonfly Imperils Industrial Protocol

By  ,  on Jul 02, 2014
Reblogged with permission orginal article here http://blogs.mcafee.com/mcafee-labs/operation-dragonfly-imperils-industrial-protocol

Recent headlines (here and here) may have struck fear into those living near major energy installations due to references about the Stuxnet malware. In 2009, this particular strain of malware caused significant damage to the Nantanz nuclear facility, reportedly destroying a fifth of Iran’s nuclear centrifuges. Recent reports about Operation Dragonfly, however, appear to be focused on espionage (at least for now), and the scope of the attack appears to be considerably broader than that of Stuxnet. Read more