Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016

Similar documents
National Policy and Guiding Principles

Energy Assurance Plans

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

Directive on security of network and information systems (NIS): State of Play

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

Department of Homeland Security Updates

MELANI: Information exchange a story of success

American Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Cyber Security in Europe

Bradford J. Willke. 19 September 2007

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Critical Infrastructure

NIS-Directive and Smart Grids

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

Cyber Security of Industrial Control Systems (ICSs)

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Why you should adopt the NIST Cybersecurity Framework

FEMA Region III Cyber Security Program

Cyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference

National Cyber Incident Response - Architectural Concepts

The UK s National Cyber Security Strategy

EUROPEAN COMMISSION JOINT RESEARCH CENTRE. Information Note. JRC activities in the field of. Cybersecurity

Cyber Resilience. Think18. Felicity March IBM Corporation

Critical Infrastructure Sectors and DHS ICS CERT Overview

Directive on Security of Network and Information Systems

Cyber Security: Threat and Prevention

The Australian Government s Approach to Critical Infrastructure Resilience

FSOR. Cyber security in the financial sector VISION 2020 FINANCIAL SECTOR FORUM FOR OPERATIONAL RESILIENCE

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team

PIPELINE SECURITY An Overview of TSA Programs

Statement for the Record

Security in India: Enabling a New Connected Era

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

Background. Threats. Present Status. Challenges and Strategies 9/30/2009 TRAI 2

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

BRIEFING COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES. Geneva 18 April David Satola

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Panel 1 National CSIRT Experience

Critical Infrastructure Partnership

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Enhancing the cyber security &

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Creating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular

Building Resilience to Disasters for Sustainable Development: Visakhapatnam Declaration and Plan of Action

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

June 5, 2018 Independence, Ohio

CYBER SOLUTIONS & THREAT INTELLIGENCE

GPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

A Forensic Accountant in Cyber Security

Promoting Global Cybersecurity

Cyber Security Strategy

The Office of Infrastructure Protection

ISAO SO Product Outline

Business continuity management and cyber resiliency

California Cybersecurity Integration Center (Cal-CSIC)

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk

Itu regional workshop

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

ENISA Cooperation in the EU / NIS Directive

The NIS Directive and Cybersecurity in

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

Cybersecurity for the Electric Grid

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

AAPA Smart Ports. Cyber Management for Ports Panel. Small Port Cyber Security Workshops. March 6, 2018

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Legal Foundation and Enforcement: Promoting Cybersecurity

Making plans. An integrated and holistic solution

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

Cybersecurity for Health Care Providers

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Governance Ideas Exchange

Cyber Security and Cyber Fraud

Department of Defense. Installation Energy Resilience

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

CYBER SECURITY AIR TRANSPORT IT SUMMIT

South East Region THIRA

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Transcription:

Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange Dennis Denham Ssempereza - CISA, CISM, CRISC August 16, 2016

About me! Involved in Risk Management and Security Implementation Consultancy Security Strategist - Cipher Solutions Cipher Solutions

Topic of Discussion Critical National Infrastructure and Key Resource Analysis and Protection Supervisory Control and Data Acquistion(SCADA) Secure Information Exchange National Response Framework

Digital Trends Society is increasingly dependent on digital systems that are highly complex and often based on trust Gigabit connectivity will offer new possibilities for everyone including criminals. Impact: Increased exposure to attacks and disruption to critical business systems. This has proven to be an unreliable method of operating systems that are integral to the global economy.

Acronyms CNI: Critical National Infrastructure KR: Key Resources NISF: National Information Security Framework

Protected Systems

CNI in Uganda Telecommunications Energy o oil and gas, electric power Environment o water, air, waste Banking and Finance Transportation o roads, dams, airports, railway lines, shipping, postal Healthcare and public health Emergency Services Continuity of Government o Immigrations, customs, law enforcement, justice Agriculture and food

KEY RESOURCES Publicly or privately controlled resources Essential to minimal operation of the economy and the government

CNI Protection The NISF provides a strategic context for CNI protection / resilience Dynamic threat environment o Natural Disasters o Terrorists o Accidents o Cyber Attacks A complex problem, requiring a national plan and organizing framework o Multi sector environment, all different, ranging from asset-focused to systems and networks o 80% privately owned 20% in State owned

Aspects of CNI Protection Assessment Preparedness Prevention Response Recovery Detection Communication o Coordination of outages

M O T I V A T I O N Rapidly Evolving Threat Landscape National Security, Economic Espionage Notoriety, Activism, Defamation Monetary Gain Nation-state actors Stuxnet, Titan Rain, Estonia Hacktivists Islamic Ghosts Team, Anonymous Organized crime Zeus, Ransom ware Nuisance, Curiosity Insiders, Spammers, Script-kiddies Nigerian 419 Scams S O P H I S T I C A T I O N

Other Incidents UKRAINE, 2015 Phishing email containing a malwarerigged attachment. Word Documents and Excel spreadsheets-dropped BlackEnergy3 malware 700.000 people without electricity for several hours The Northeast (U.S.) blackout : 11 deaths and an estimated $6 billion in economic damages, having disrupted power over a wide area for at least two days Back Home : Banks and other financial institutions have been victims of cyber attacks and in the process losing millions of shillings.

SCADA SYSTEM SCADA main feature of most Critical infrastructures Relies on a variety of sensors strategically placed along the network(sensors may sense pressure, temperature, flow rates, and voltages. ) RTU are field elements of the SCADA The state of all RTUs is stored in the database and viewed through an OCC operator user interface typically computer monitors, big-screen displays, and switches and dials mounted on a wall.

TYPICAL SCADA SYSTEM

Where is the Weakness? Skills and Competence Gap Lack of awareness of cyber-threats and Threat Intelligence Absence of a meaningful public-private sector cyber security partnership Inadequate Incident Management Capabilities Legal Measures.

Secure Information Sharing As a minimum requirement from NISF, organizations must: Identify and record risks involving external parties; Create information exchange policies and procedures; Use formal exchange agreements such as codes of connection and memoranda of understanding; Assess compliance of exchange partners at least annually or when required; and, Disconnect/end sharing with non-compliant entities.

Theat Information Exchange Sharing situational awareness information Inter Government information exchange Making information open to the public and receiving data from the public CNI providers sharing key management data from the process control systems

Sharing is Caring!! EWI Information Sharing Community portal formed - US ICS CERT Initiative DHS - Cyber Information Sharing and Collaboration Program (CISCP) (FBI) - Infraguard

Sharing is Caring!! NITA CERT formed 2014 - Key cybersecurity hub UCC CERT formed 2013 - Communication Sector based Police Cybercrime Unit - formed 2015 - Set up to prevent and investigate IT crime conducted online

Way Foward Strengthened cyber security and more knowledge Uganda as a strong International Partner Strong investigation and high level of information Robust infrastructure in the energy and telecommunications sectors