leveraging cyber security lab environments · leveraging cyber security lab environments to...
TRANSCRIPT
Leveraging Cyber Security Lab Environments To Identify Cyber Threats
Robert Alston
June 19, 2018
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
Leveraging Cyber Security Lab Environments to Identify Threats
1
As companies seek to improve their
industrial cyber security maturity
levels, a lab environment can yield
pragmatic risk reduction insights, as
well as help expedite security solution
implementations. Such environments,
however, can be costly to equip and
maintain.
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
Leveraging Cyber Security Lab Environments
2
• What are cyber lab environments?
• Why are cyber lab environments needed?
• How can a cyber lab help my business?
• To build or buy – That is the question.
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
What Are Cyber Lab Environments
3
• An environment which is designed,
operated and staffed with a focus on
cyber security
• Secure environment with dedicated tools
and equipment to simulate actual
environment, support cyber research,
development and training
• Isolated testing facility for cyber threats,
malware and vendor solutions
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
Why Are Cyber Lab Environments Needed
4
• Provide insight into risk elements
• Safely evaluate security products
• Expedite installation of security solutions
• Raise awareness level of employees on
new technology without exposing
operations to more risk.
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
5
How Can a Cyber Lab Help My Business
• Lower cost of implementation of security
solutions
• Eliminate cost of installing the wrong solution
• Prioritize remediation efforts to maximize
benefits
• Increase awareness level of employees
• Optimize cyber security for business or
business unit
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
Case Studies6
What impact will this network scanner have on my network?- One of the world's largest independent petroleum refiners
Oil & Gas
How vulnerable are my existing security controls?- Large refining, marketing, and transportation company
How can I improve employee awareness of industrial cyber
security?- Large Asian petroleum company
Which firewall will work best in my configuration?- Large agriculture company
Refining & Petrochemical
Agriculture
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
Cyber Lab Environments7
To build a lab:
• Concept
• Equipment
NFR, Funding, etc.
• Space
• Staff
Where do you find staff?
Would you hire them if you found them?
Can you afford? utilize? retain?
Do they fit in your HR profile?
• How would you calculate ROI?
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
Cyber Lab Capabilities
8
• Off-production test bed
• Test, discover & remediate
industrial cyber security issues
• Validate third party security
product capabilities
Safely Test Industrial
Solutions
• Real-time attack simulations
• Understand threat vector impact on
a process control network
• Purpose-built Honeywell simulations
integrating global attack knowledge &
domain expertise
Simulated Cyber Attacks
Access Technology & Expertise
• State-of-the-art equipment
• Domain expert collaboration
• Cyber awareness training
• Advanced cyber techniques
What does it Cost to Build a Cyber Lab
• To build out a functional, flexible state of
the art cyber lab costs millions in
Building
Hardware
Staff
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
What Is a Cost Effective Solution?
9
Atlanta Dubai
Singapore
Infrastructure:
• Experion, FX2 Virtualization Platform, ControlEdge PLC
• 3rd party PLCs and HMI/SCADA, physical process simulation, RTU
• Extensive security controls (min. 2 vendors per control)
• State of the art security monitoring and detection tools (e.g. SIEM, network monitoring, scanning, firewall
management)
Honeywell
Singapore
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
Why Honeywell? Complete Industrial Cyber Security Solutions
10
- Whitelisting
- Antivirus
- Next-generation Firewall
- IDS/IPS
- Security Information & Event Management (SIEM)
- Threat Intelligence
- Industrial security program development
- Assessment services
- Architecture and design
- Implementation and systems integration
- Operational service and support
- Compliance audit & reporting
INDUSTRIALSECURITY
CONSULTING
Adaptive
Emergent
Se
curity
Ma
turity
- Secure remote access
- Continuous monitoring and alerting
- Automated patch & antivirus updates
- Incident response & recovery/back up
- Security device co-management
- Hosting, management and operation of ICS Shield®
- OT SOC management & operations
INTEGRATED SECURITY
TECHNOLOGY
CYBER SECURITY
SOFTWARE
- ICS Shield® platform forcyber security operations
- Industrial Cyber SecurityRisk Manager: Enterprise and Site
- Secure Media Exchange (SMX)
- Advanced Threat Intelligence Exchange (ATIX)
- Industrial assessment software & tools
MANAGED SECURITY SERVICES
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
Get this Hot Deal at Americas HUG11
Secure Media Exchange systems for $9,999 each and SMX ATIX subscriptions for:
- $7K/year per SMX System – on 1 year agreements- $5K/year per SMX System – on 5 year agreements
Visit the Promotions Center to learn more.
Get details at the Promotions Center or www.hwll.co/HUG18offers. These limited-time discounts and offerings are only available and valid for new inquiries and commitments made at 2018 Americas HUG in San Antonio, TX, June 18-23. Orders must be placed within 90 days of receiving an estimate.
Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.
www.becybersecure.com