+ All Categories
Home > Documents > Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges V1.5

Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges V1.5

Date post: 28-Jun-2015
Category:
Upload: ahmed-al-enizi
View: 740 times
Download: 0 times
Share this document with a friend
Description:
ICS SCADA Cyber Security Solutions and Challenges
Popular Tags:
14
ICS/SCADA Cyber Security Solutions & Challenges Ahmed M. Al Enizy IT Security Manager International Systems Engineering
Transcript
  • 1. Cyber Security Solutions & ChallengesAhmed M. Al Enizy IT Security ManagerInternational Systems Engineering

2. 210/3/2012 3. ICS and SCADA systems are important for our petroleum business and for our national economic growth because they automate and monitor the production processes. ICS and SCADA systems are no longer isolated from corporate and internet network. Most ICS and SCADA protocols, Designs, and Implementations were done without security in mind. This made them even more exposed to threats and vulnerabilities, and it made challenges even tougher.3 10/3/2012 4. 4 10/3/2012 5. Concept Abstraction Solution Concept Abstraction The Right Solution For You Cyber Security Services & Solutions Catalog Suggested Roadmap Challenges5 10/3/2012 6. Someone Somewhere with Motivation, Means, andOpportunity AdvancedWants to Spy / HarmConventional Persistent External ThreatHackingThreatRemote InternetContractors - Partners - Support EconomicGrowth GDCAccess Threat& Unsecured Unmanaged 3rd PartyProductionBusinessStuxNet$ ICS /MonitorControlReportOperationsSCADA IT ShamoonLocal Internal ThreatPoor6 10/3/2012 Governance Design Security 7. 7 10/3/2012 8. Someone Somewhere withMotivation, Means, and OpportunityWants to Spy / HarmContractors - Partners - SupportInternet Remote EconomicGrowth 3rd Party Production $Business Monitor &ICS /Control Report Operations SCADA LocalITLogical SecurityPhysical Security8 10/3/2012 Governance, Risk, and Compliance Assurance 9. It is not a menu that you choose from or anadvice from a very reliable source, you have to doyour homework in assessing your risks. Solutions can be Administrative, e.g. GRC, policy, and process. Technical Safeguards prevents the threat from happening, e.g. firewall. Counter measures, e.g. antivirus, remediation and recovery procedures. Physical, i.e. gates, doors, barriers etc. The right solution for you should help mitigateidentified risks and save you some money.9 10/3/2012 10. ConsultationMSSIT SecurityNetwork SecurityIntelligence andSOCEnd Point Protection Firewall / UTM reports Business ContinuityAccess Control andand Disaster Penetration Testing IDS / IPS Identity ManagementRecovery Encryption and Data Crisis Management Threat ManagementTraffic EncryptionProtectionData Leakage Security Programs ForensicsNAP/NAC PreventionHost andWeb and Email Awareness Application SecurityRisk and Compliance Security Fraud and Identity Vulnerability andSecurity AssessmentProtectionPatch ManagementWireless Security and Health CheckTraffic Monitoring10 10/3/2012 11. Security Roadmap and Continues Improvement Plan DevelopmentSecurity Program and Policy Reviewand AmendmentCrisis Management, Business Continuity and DisasterRecovery Readiness Assessment Security Controls Effectiveness Assessment ICS/SCADA Risk Assessment 11 10/3/2012 12. Remote sites In the middle of the desert. Connectivity. Local support. Remote support. Log collection. Incident response and handling. Security solutions not compatible with ICS/SCADA software and communication protocols. Cyber Security standards for ICS/SCADA. Centralized Cyber Security for monitoring, control, and response.12 10/3/2012 13. Directly or indirectly connected to the internet or to any 3rdparty or you allow data transfer or exchange electronically,then you are facing Cyber Threats. It is never too late to start fixing because you are going to betargeted once again. Cyber Security same as any complicated problem can beconcurred if simplified, abstracted, and divided into smallerlogical groups. There is no 100% security and guarantee even if everybody issaying so. keep doing your best in assessing, discovering risks andfortifying your security. Make sure that you are ready to survive the crisis and restoreyour business in very short time.13 10/3/2012 14. 14 10/3/2012


Recommended