leveraging cyber security lab environments · leveraging cyber security lab environments to...

13
Leveraging Cyber Security Lab Environments To Identify Cyber Threats Robert Alston June 19, 2018

Upload: lekhanh

Post on 27-Feb-2019

228 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Leveraging Cyber Security Lab Environments To Identify Cyber Threats

Robert Alston

June 19, 2018

Page 2: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Leveraging Cyber Security Lab Environments to Identify Threats

1

As companies seek to improve their

industrial cyber security maturity

levels, a lab environment can yield

pragmatic risk reduction insights, as

well as help expedite security solution

implementations. Such environments,

however, can be costly to equip and

maintain.

Page 3: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Leveraging Cyber Security Lab Environments

2

• What are cyber lab environments?

• Why are cyber lab environments needed?

• How can a cyber lab help my business?

• To build or buy – That is the question.

Page 4: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

What Are Cyber Lab Environments

3

• An environment which is designed,

operated and staffed with a focus on

cyber security

• Secure environment with dedicated tools

and equipment to simulate actual

environment, support cyber research,

development and training

• Isolated testing facility for cyber threats,

malware and vendor solutions

Page 5: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Why Are Cyber Lab Environments Needed

4

• Provide insight into risk elements

• Safely evaluate security products

• Expedite installation of security solutions

• Raise awareness level of employees on

new technology without exposing

operations to more risk.

Page 6: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

5

How Can a Cyber Lab Help My Business

• Lower cost of implementation of security

solutions

• Eliminate cost of installing the wrong solution

• Prioritize remediation efforts to maximize

benefits

• Increase awareness level of employees

• Optimize cyber security for business or

business unit

Page 7: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Case Studies6

What impact will this network scanner have on my network?- One of the world's largest independent petroleum refiners

Oil & Gas

How vulnerable are my existing security controls?- Large refining, marketing, and transportation company

How can I improve employee awareness of industrial cyber

security?- Large Asian petroleum company

Which firewall will work best in my configuration?- Large agriculture company

Refining & Petrochemical

Agriculture

Page 8: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Cyber Lab Environments7

To build a lab:

• Concept

• Equipment

NFR, Funding, etc.

• Space

• Staff

Where do you find staff?

Would you hire them if you found them?

Can you afford? utilize? retain?

Do they fit in your HR profile?

• How would you calculate ROI?

Page 9: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Cyber Lab Capabilities

8

• Off-production test bed

• Test, discover & remediate

industrial cyber security issues

• Validate third party security

product capabilities

Safely Test Industrial

Solutions

• Real-time attack simulations

• Understand threat vector impact on

a process control network

• Purpose-built Honeywell simulations

integrating global attack knowledge &

domain expertise

Simulated Cyber Attacks

Access Technology & Expertise

• State-of-the-art equipment

• Domain expert collaboration

• Cyber awareness training

• Advanced cyber techniques

What does it Cost to Build a Cyber Lab

• To build out a functional, flexible state of

the art cyber lab costs millions in

Building

Hardware

Staff

Page 10: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

What Is a Cost Effective Solution?

9

Atlanta Dubai

Singapore

Infrastructure:

• Experion, FX2 Virtualization Platform, ControlEdge PLC

• 3rd party PLCs and HMI/SCADA, physical process simulation, RTU

• Extensive security controls (min. 2 vendors per control)

• State of the art security monitoring and detection tools (e.g. SIEM, network monitoring, scanning, firewall

management)

Honeywell

Singapore

Page 11: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Why Honeywell? Complete Industrial Cyber Security Solutions

10

- Whitelisting

- Antivirus

- Next-generation Firewall

- IDS/IPS

- Security Information & Event Management (SIEM)

- Threat Intelligence

- Industrial security program development

- Assessment services

- Architecture and design

- Implementation and systems integration

- Operational service and support

- Compliance audit & reporting

INDUSTRIALSECURITY

CONSULTING

Adaptive

Emergent

Se

curity

Ma

turity

- Secure remote access

- Continuous monitoring and alerting

- Automated patch & antivirus updates

- Incident response & recovery/back up

- Security device co-management

- Hosting, management and operation of ICS Shield®

- OT SOC management & operations

INTEGRATED SECURITY

TECHNOLOGY

CYBER SECURITY

SOFTWARE

- ICS Shield® platform forcyber security operations

- Industrial Cyber SecurityRisk Manager: Enterprise and Site

- Secure Media Exchange (SMX)

- Advanced Threat Intelligence Exchange (ATIX)

- Industrial assessment software & tools

MANAGED SECURITY SERVICES

Page 12: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Get this Hot Deal at Americas HUG11

Secure Media Exchange systems for $9,999 each and SMX ATIX subscriptions for:

- $7K/year per SMX System – on 1 year agreements- $5K/year per SMX System – on 5 year agreements

Visit the Promotions Center to learn more.

Get details at the Promotions Center or www.hwll.co/HUG18offers. These limited-time discounts and offerings are only available and valid for new inquiries and commitments made at 2018 Americas HUG in San Antonio, TX, June 18-23. Orders must be placed within 90 days of receiving an estimate.

Page 13: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

www.becybersecure.com