0x70 Eric Bärenzung. Cyber risks. in the satellite industry

Similar documents
Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

The Cyber War on Small Business

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Cyber Resilience. Think18. Felicity March IBM Corporation

CAGFO Conference September 2018

Cybersecurity Today Avoid Becoming a News Headline

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

You ve Been Hacked Now What? Incident Response Tabletop Exercise

Cyber-Threats and Countermeasures in Financial Sector

Incident Response Table Tops

Cybowall Solution Overview

Dell EMC Isolated Recovery

Cybersecurity, safety and resilience - Airline perspective

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Why you should adopt the NIST Cybersecurity Framework

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Ransomware A case study of the impact, recovery and remediation events

Cybersecurity for Health Care Providers

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Cyber fraud and its impact on the NHS: How organisations can manage the risk

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

Cybersecurity Auditing in an Unsecure World

Cyber Resiliency. Felicity March. May 2018

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment

Protecting your next investment: The importance of cybersecurity due diligence

Cyber Risk in the Marine Transportation System

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Hacking and Cyber Espionage

Cyber Security on Commercial Airplanes

ANATOMY OF AN ATTACK!

CYBER SECURITY WORKSHOP NOVEMBER 2, Anurag Sharma [CISA, CISSP, CRISC] Principal Cyber & Information Security Services

Cyber Attack: Is Your Business at Risk?

Governance Ideas Exchange

Business continuity management and cyber resiliency

Supplier Training Excellence Program

Cyber (In)Security. What Business Leaders Need To Know. Roy Luebke Innovation and Growth Consultant. Presented by:

Service Provider View of Cyber Security. July 2017

Bring Your Own Device (BYOD)

Disaster Recovery Is A Business Strategy

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

CYBER SECURITY AIR TRANSPORT IT SUMMIT

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

Protect Your Institution with Effective Cybersecurity Governance. Baker Tilly Virchow Krause, LLP

Cloud Security Myths Paul Mazzucco, Chief Security Officer

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Principles of Protection: Cybersecurity Data Protection. 11/01/2017 Julia Breaux William Sellers

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

ISACA West Florida Chapter - Cybersecurity Event

Cyber Security. It s not just about technology. May 2017

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cybersecurity and Nonprofit

Industrial Control System Cyber Security

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Cyber Insurance: What is your bank doing to manage risk? presented by

External Supplier Control Obligations. Cyber Security

Federal Mobility: A Year in Review

Gujarat Forensic Sciences University

Business Continuity Management

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Top Five Ways to Protect Your Organization from Data Loss & Cyber Hackers

Best Practices in Healthcare Risk Management. Balancing Frameworks/Compliance and Practical Security

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment

Cyber Attacks & Breaches It s not if, it s When

Cyber Defense Operations Center

Cybersecurity Session IIA Conference 2018

RUAG Cyber Security Understand Cyber. Protect Values.

CISO as Change Agent: Getting to Yes

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

Cybersecurity Overview

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

ISACA January 2016 Cybersecurity Snapshot US Results. Number of respondents (n) = 862

Intro to Capture the Flag

Ransomware A case study of the impact, recovery and remediation events

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

Cyber Risks in the Boardroom Conference

Legal Aspects of Cybersecurity

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Hacker Academy UK. Black Suits, White Hats!

Endpoint Protection : Last line of defense?

Cybersecurity Fundamentals

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK

Standing Together for Financial Industry Resilience Quantum Dawn IV after-action report June 2018

Sage Data Security Services Directory

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

DIGITAL ACCOUNTANCY FORUM CYBER SESSION. Sheila Pancholi Partner, Technology Risk Assurance

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

MODERN MALWARE, MODERN DEFENSES AND PROTECTION

Understanding the Changing Cybersecurity Problem

TAN Jenny Partner PwC Singapore

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

Transcription:

Cyber risks in the satellite industry

A critical infrastructure for many sectors

A 36 000 km high overview Partners / Suppliers / Customers Satellite Operator Ground station

Main threats

Fraudulent usage

Pay TV and Satellite Key Sharing PayTV Operator Legal Subscriber Illegal Subscriber Subscriber using illegal additional rights

Signal jamming

Signal jamming https://www.ebu.ch/contents/news/2012/10/ebu-deplores-middle-east-satelli.html

In a ideal Operations mode

Baikonour, we have a problem Taking control of the satellite

To resume Protecting and monitoring signal integrity is key!

Then, as for any company Partners / Suppliers / Customers Phishing Malware Ransomware BYOD Bring Your Own Device DDoS Distributed Denial Of Services

but with special interests Partners / Suppliers / Customers Espionage including Office reconnaissance IP mapping Social Engineering Etc. APT (Advanced Persitent Threat)

Why hacking? Only few of the potential reasons

Just for fun?! Sean Caffrey UK citizen 25 years old Ranks, usernames and email addresses of more than 800 users 30 000 satellite phones http://www.nationalcrimeagency.gov.uk/news/1111-hacker-stole-satellite-data-from-usdepartment-of-defense

Or «dreaming» to be a spy. US engineer enamored with spy dramas gets 5 years for trying to sell secrets to Foreign secret service agent 49 years old More info on: https://www.justice.gov/opa/pr/defense-contractor-employeearrested-selling-satellite-secrets-undercover-agent-posing http://www.thedailybeast.com/wannabe-russian-spy-sentenced-to-five-years-in-prison Information sold for 3 500 USD

Command and Control

The standard way Hacker Find a way to install a malware/ransomware C&C ISP Internet Service Provider Activate and control the malware You

«Easy» to stop (But you will have to do many times) C&C ISP Internet Service Provider Ask ISP to take down Domain / server

Talking about Wannacry Source: https://www.bluecatnetworks.com/blog/2017/05/17/dns-helped-stopwannacry-ransomware-attack/ More info on https://www.malwaretech.com/2017/05/how-to-accidentally-stop-aglobal-cyber-attacks.html Source: http://www.telegraph.co.uk/technology/2017/08/03/fbi-arrests-wannacryhero-marcus-hutchins-las-vegas-reports/ Marcus Hutchins Kronos

Using satellite transmission Port / Service unknown Þ Invalid request Þ Call droped? Call broadcasted by the satellite The infected system calls «decoy» satellite subscribers C&C pretends to be «decoy» user Þ Call accepted C&C? C&C anwers to the attacked system acting as it was the «decoy» user Internet Malware sends back to C&C the hacked data Source: https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/

Cybersecurity: A business opportunity

Satellite industry starting to offer cyber security services http://www.maritime-executive.com/article/inmarsat-unveils-cybersecurity-service

The future? Quantum computing a «hack-proof» communication system Source: http://thehackernews.com/2017/08/quantum-satellite-data.html

Framework For Critical Infrastructure https://www.nist.gov

NIST Cybersecurity Framework Identify Protect Detect Respond Recover Asset Management Access Control Anomalies & Events Respond Planning Recovery Planning Business Environment Awareness & Training Security Continuous Monitoring Communications Improvements Governance Data Security Detection Processes Analysis Communication Risk Assesment Risk Management Strategy Info Protection Processes and Procedures Maintenance Protective Technology Mitigation Improvements

NIST Cybersecurity Framework Identify Protect Detect Respond Recover HIGH Risk Assesment PROBABILITY LOW BUSINESS IMPACT HIGH Think on Cyber Insurance Define your priorities

NIST Cybersecurity Framework Identify Protect Detect Respond Recover Awareness & Training 84% cyberattacks reported been due, at least in part, to human error (**) The X-Factor https://securityintelligence.com/news/insider-threats-account-for-nearly-75-percent-of-security-breach-incidents/ (**) http://www.computerweekly.com/news/450425184/security-professionals-name-top-causes-of-breaches

NIST Cybersecurity Framework Identify Protect Detect Respond Recover Acquisition Anomalies & Events The rise of Machine Learning & Artificial Intelligence Action Analyze ACTION ACTION

NIST Cybersecurity Framework Identify Protect Detect Respond Recover þ þ Crisis Management requires PREPARATION and TRAINING ü Who? ü What? ü How? ü When? Mitigation ü Regional Cyber Drill Recovery Planning

NIST Cybersecurity Framework Identify Protect Detect Respond Recover Improve Develop Test Service level Last backup Incident Recovery Point Objective RPO Down Time Degraded Service Return Time on Objective RTO Recovery Planning Back to standard operations Time

To resume Take aways

3 take aways Satellite industry is a sensitive target for hackers Start, if not done already, to Evaluate your risks Develop your strategy to protect your organization from cyber threats Cybersecurity is a business opportunity To differentiate from your competitors And also to bring you additional revenues opportunities

Thanks for your attention Eric Bärenzung ebg@0x70.eu