+ All Categories
Transcript
Page 1: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

CYBERSECURITY AND CRITICAL

INFRASTRUCTUREErka Koivunen @ekoivune

Cyber Security Advisor

Page 2: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

VIEWPOINTS TO “CRITICAL”

Critical Infrastructure Vulnerabilities Critical Dependencies

Immature Technology

Unnecessary Exposure to threats

Target of Deliberate Attacks

Building Resilience Adopting a Hacker Mindset

Knowing Your Enemies

Assume Breach

From Defender’s Dilemma to Attacker’s Dilemma

Mandatory Breach Notification

Page 3: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

CRITICAL INFRASTRUCTUREVULNERABILITIES

Page 4: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”
Page 5: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”
Page 6: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”
Page 7: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”
Page 8: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”
Page 9: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”
Page 10: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

Heist 1Bangladesh → Philippines$81 Million dollars

Heist 2Unknown bankUnknown amount

Heist 3Ecuador → Hong Kong$12 Million

Heist 4Vietnam → SloveniaFailed

Heists 5 → Ukraine → ?

Page 11: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

PRYKARPATTYAOBLENERGO

Page 12: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”
Page 13: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

BUILDING RESILIENCY

Page 14: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

+

+

INDUSTRIAL CONTROL SYSTEMS

CORPORATE IT

Page 15: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

WE ARE NO LONGER SECURING

COMPUTERS,WE ARE SECURING

SOCIETY

Page 16: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

HACKING IS AN ATTACK

AGAINSTASSUMPTIONS

Page 17: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”
Page 18: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

KNOW YOUR ADVERSARIES

Page 19: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”
Page 20: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”
Page 21: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

© F-Secure Confidential21

ASSUME BREACH

Page 22: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

PREVENTPREDICT

DETECTRESPOND

PREPARE FOR THE INEVITABLE

Page 23: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

© F-Secure Confidential23

DEFENDER’S DILEMMA?

Page 24: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

DEFENDERS: STOP FEELING PITIFUL

DEFENDER’S DILEMMA The intruder only needs to exploit one of victim’s

vulnerabilities in order to compromise the enterprise.

INTRUDER’S DILEMMA The defender only needs to detect one of the indicators of

intruder’s presence in order to initiate incident response within the enterprise.

Page 25: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

LETS LOOK AT HOW ATTACKERS OPERATEAND WHAT THEY ARE AFTER

CRIMINALS HACKTIVISTS

INDUSTRIALESPIONAGE

NATIONSTATES

USER CREDENTIALS

OPERATING ENVIRONMENT

OPERATING SYSTEM

FOOTHOLD

DATA CONTROL

OBJECTIVE

Page 26: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

ATTACK IN STAGES

RECON

EXPLOI-TATION

DELIVERY

LATERAL MOVEMENT

DATA COLLEC-

TION

EXFILTRA-TION

Page 27: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

ATTACKERS WILL ALWAYS LEAVE FOOTPRINTS SOMEWHERE(SOMETIMES VERY SUBTLE ONES, THOUGH)

CRIMINALS HACKTIVISTS

USER CREDENTIALS

OPERATING ENVIRONMENT

OPERATING SYSTEM

OPERATING ENVIRONMENT

FOOTPRINTS

OS LEVEL FOOTPRINTS

NETWORK LEVELFOOTPRINTS

USER LEVEL FOOTPRINTS

APPLICATION LEVEL FOOTPRINTS

INDUSTRIALESPIONAGE

NATIONSTATES

Page 28: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

MANDATORY BREACH NOTIFICATION

Page 29: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

MANDATORY REPORTING

MANDATORY REPORTING – Supervised by Authorities

PUBLIC DISCLOSURE – Silence is Not an Option

MINOR BREACHES – Internal Incident Handling Process

Page 30: CYBERSECURITY AND CRITICAL INFRASTRUCTURE · 2016-11-30 · CYBERSECURITY AND CRITICAL INFRASTRUCTURE Erka Koivunen @ekoivune Cyber Security Advisor. VIEWPOINTS TO “CRITICAL”

Top Related