Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Similar documents
ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team

ICS-CERT Year in Review

Critical Infrastructure Sectors and DHS ICS CERT Overview

Cyber Security & Homeland Security:

Emerging Issues: Cybersecurity. Directors College 2015

Statement for the Record

Critical Infrastructure Partnership

DHS Cybersecurity: Services for State and Local Officials. February 2017

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Water Information Sharing and Analysis Center

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Election Infrastructure Security: The How and Why of It

DHS Cybersecurity Services and Resources

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices

align security instill confidence

Software & Supply Chain Assurance: Enabling Enterprise Resilience through Security Automation, Software Assurance and Supply Chain Risk Management

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DEFENSE LOGISTICS AGENCY

2011 North American SCADA & Process Control Summit March 1, 2011 Orlando, Fl

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Incident response to a breach: Right of boom you find ashes

CYBER SOLUTIONS & THREAT INTELLIGENCE

Cyber Resilience. Think18. Felicity March IBM Corporation

NCCIC/ICS-CERT Year in Review National Cybersecurity and Communications Integration Center/ Industrial Control Systems Cyber Emergency Response Team

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

American Association of Port Authorities Port Security Seminar & Expo Cyber Security Preparedness and Resiliency in the Marine Environment

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

ISAO SO Product Outline

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Center for Internet Security Confidence in the Connected World

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

American Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED

Kaspersky Security. The Power to Protect Your Organization

June 5, 2018 Independence, Ohio

Industry role moving forward

End-to-End Trust, Segmentation and Segregation in the IIoT

Symantec Security Monitoring Services

Regional Workshop on Frameworks for Cybersecurity and CIIP Feb 2008 Doha, Qatar

Build Your Cybersecurity Program in Minutes: Click, Copy, Modify, Implement

Cyber Threat Intelligence Standards - A high-level overview

Cyber Security Technologies

California Cybersecurity Integration Center (Cal-CSIC)

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

PIPELINE SECURITY An Overview of TSA Programs

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

Vulnerability Assessments and Penetration Testing

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

How Boards use the NIST Cybersecurity Framework as a Roadmap to oversee cybersecurity

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Chapter X Security Performance Metrics

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

Threat Centric Vulnerability Management

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Are we breached? Deloitte's Cyber Threat Hunting

New Zealand National Cyber Security Centre Incident Summary

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Jeff Marron, IT Specialist Security National Institute of Standards and Technology (NIST)

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Homeland Security Perspectives: Oregon Fire District Directors Association October 25, 2018

RSA INCIDENT RESPONSE SERVICES

Improving SCADA System Security

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

National Policy and Guiding Principles

CYBERSECURITY. Protecting Against the Financial, Regulatory and Reputational Impacts of Cyber Attack

Bird of a Feather Automated Responses

Achieving & Measuring the Value of Cyber Threat Information Sharing. Lindsley Boiney, Clem Skorupka (presenting)

How to Align with the NIST Cybersecurity Framework

The Office of Infrastructure Protection

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

HPH SCC CYBERSECURITY WORKING GROUP

Continuous protection to reduce risk and maintain production availability

CYBER ASSISTANCE TEAM OVERVIEW BRIEFING

locuz.com SOC Services

BUILDING AND MAINTAINING SOC

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

ITU-IMPACT Capacity Building for Least Developed & Developed Countries

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

CYBER RESILIENCE & INCIDENT RESPONSE

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

RSA NetWitness Suite Respond in Minutes, Not Months

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Defining Computer Security Incident Response Teams

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

Defending Our Digital Density.

Security by Default: Enabling Transformation Through Cyber Resilience

Heavy Vehicle Cyber Security Bulletin

GPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security

Vulnerability Disclosure

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

Transcription:

SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure providers will talk about major efforts that are providing greater levels of protection for our Critical Information Infrastructure. New levels of collaboration, technology that reaches well beyond current solutions, and the generation of new resiliency tactics will be offered. Remaining challenges for work in both government and industry will also be addressed.

Panelists Moderator: Dr. John H. Saunders, MITRE Corporation

DHS ICS-CERT Organization National Cybersecurity and Communications Integration Center (NCCIC) Risk Reduction ICSJWG Training Assessments Tools - CSET Mission Assisting critical infrastructure asset owners to reduce the risk of impacts from cyber attacks and events by assisting them to improve their cybersecurity defensive posture and respond to incidents and emerging threats/vulnerabilities. Benefits Awareness of emerging threats State of the art analysis Incident response support Established partnerships Collaboration with other agencies and partners Operations Incident Response Vulnerability Coordination Situational Awareness Technical Analysis Partners: ISACs, Asset Owners, IC, LE, Agencies, Associations, International 3

Products: Situational Awareness Threat actor indicators in the form of Alerts, Advisories, and Indicator Bulletins Advanced analysis capabilities to provide actionable information about: Malware Spear-phishing emails Compromised hosts Lateral movement of threat actors ICS-CERT s Perspective: Broad vision of threat landscape Ability to correlate specific incidents with previous threat actor activity Actionable Intel and coordination with IC and Law Enforcement 4

Cyber Security Evaluation Tool Stand-alone software application Self-assessment using recognized standards Tool for integrating cybersecurity into existing corporate risk management strategy CSET Download: us-cert.gov/control_systems/csetdownload.html 5

Assessments: On-Site Support Cyber Security Evaluation Tool (CSET): Assists critical infrastructure asset owners in conducting self-assessments. Design Architecture Review (DAR): Provides a comprehensive evaluation and discovery process, focusing on defense strategies associated with an asset owner s specific control systems network. Includes an in-depth review and evaluation of the control system s network design, configuration, interdependencies, and its applications. Network Architecture Validation and Verification (NAVV): Provides a sophisticated analysis of the asset owner s network packet-data. Passively analyzes data and develops a detailed representation of the communications flows and relationships between devices. 6

ICS-CERT Incident Response Assist asset owners - Onsite incident response teams - Host based intrusion detection - USG provided indicators - Network architecture - Data collection - Mitigation Offsite technical analysis teams - Analysis of collected data - Customer reporting Providing a unique perspective of the threat landscape and associated defensive strategies 7

8 Advanced Analytic Lab Provides cyber expertise and services in support of ICS-CERT Capabilities include: Malware analysis Forensic analysis Incident response Vulnerability verification Patch validation Control systems test bed environment Embedded device forensics

Available Training Web-based Training Operational Security for Control Systems Cybersecurity for Industrial Control systems Instructor-led Courses Introduction to Industrial Control Systems Cybersecurity Intermediate Industrial Control Systems Cybersecurity (lecture only) Intermediate Industrial Control Systems Cybersecurity (hands-on) Industrial Control System Red/Blue Cybersecurity Training (Access ICS-CERT Web Based Training at http://www.ics-cert.us-cert.gov <Training>)

ICS-CERT Contact Information Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) ICS-CERT@hq.dhs.gov Phone: (877) 776-7585 Web: https://ics-cert.us-cert.gov/