process control security myths
DESCRIPTION
Process Control Security Myths - www.amorgroup.com/energyTRANSCRIPT
FOUR
FOUR
FOUR MYTHS
MYTH �ONE:
MYTH �ONE:
INVESTIGATIONS SHOW �
INVESTIGATIONS SHOW �That even systems which are claimed to not be connected to the internet…
INVESTIGATIONS SHOW �That even systems which are claimed to not be connected to the internet…
...ARE �
MYTH �TWO:
MYTH �TWO:
WE HAVE �FOUND�
WE HAVE �FOUND� VIRUSES�
WE HAVE �FOUND� VIRUSES�
at �
WE HAVE �FOUND� VIRUSES�
at �EVERY �
WE HAVE �FOUND�
location that we have been checking systems…
VIRUSES�at �EVERY �
That’s a�
That’s a�
100%�
That’s a�
100%�hit rate!
MYTH �THREE:
MYTH �THREE:
WE HAVE �
SEEN �
WE HAVE �
SEEN � VIRUSES�
WE HAVE �
SEEN �transmitted via infected USB sticks, hard-drives and laptops
VIRUSES�
WE HAVE �
SEEN �transmitted via infected USB sticks, hard-drives and laptops
VIRUSES�even from vendors �
WE HAVE �
SEEN �transmitted via infected USB sticks, hard-drives and laptops
VIRUSES�even from vendors �
that should have been fine �
MYTH �FOUR:
MYTH �FOUR:
50%�
50%� of the incidents �investigated �by the US ICS-CERT�!
50%�are found to be attacks specifically aimed at control systems
of the incidents �investigated �by the US ICS-CERT�!
50%�are found to be attacks specifically aimed at control systems
of the incidents �investigated �by the US ICS-CERT�!
With the average time between attack and discovery coming in at
50%�are found to be attacks specifically aimed at control systems
EIGHTEEN MONTHS�
of the incidents �investigated �by the US ICS-CERT�!
With the average time between attack and discovery coming in at
Still believe these process security myths?
It’s up to you to ensure that your systems are safe.
It’s up to you to ensure that your systems are safe.
It’s up to you to ensure that your systems are safe.
Amor Energy here