process control security myths

40

Upload: amor-group

Post on 07-Dec-2014

5.799 views

Category:

Technology


4 download

DESCRIPTION

Process Control Security Myths - www.amorgroup.com/energy

TRANSCRIPT

Page 1: Process Control Security Myths
Page 2: Process Control Security Myths

FOUR

Page 3: Process Control Security Myths

FOUR

Page 4: Process Control Security Myths

FOUR MYTHS

Page 5: Process Control Security Myths

MYTH �ONE:

Page 6: Process Control Security Myths

MYTH �ONE:

Page 7: Process Control Security Myths

INVESTIGATIONS SHOW �

Page 8: Process Control Security Myths

INVESTIGATIONS SHOW �That even systems which are claimed to not be connected to the internet…

Page 9: Process Control Security Myths

INVESTIGATIONS SHOW �That even systems which are claimed to not be connected to the internet…

...ARE �

Page 10: Process Control Security Myths

MYTH �TWO:

Page 11: Process Control Security Myths

MYTH �TWO:

Page 12: Process Control Security Myths
Page 13: Process Control Security Myths

WE HAVE �FOUND�

Page 14: Process Control Security Myths

WE HAVE �FOUND� VIRUSES�

Page 15: Process Control Security Myths

WE HAVE �FOUND� VIRUSES�

at �

Page 16: Process Control Security Myths

WE HAVE �FOUND� VIRUSES�

at �EVERY �

Page 17: Process Control Security Myths

WE HAVE �FOUND�

location that we have been checking systems…

VIRUSES�at �EVERY �

Page 18: Process Control Security Myths

That’s a�

Page 19: Process Control Security Myths

That’s a�

100%�

Page 20: Process Control Security Myths

That’s a�

100%�hit rate!

Page 21: Process Control Security Myths

MYTH �THREE:

Page 22: Process Control Security Myths

MYTH �THREE:

Page 23: Process Control Security Myths
Page 24: Process Control Security Myths

WE HAVE �

SEEN �

Page 25: Process Control Security Myths

WE HAVE �

SEEN � VIRUSES�

Page 26: Process Control Security Myths

WE HAVE �

SEEN �transmitted via infected USB sticks, hard-drives and laptops

VIRUSES�

Page 27: Process Control Security Myths

WE HAVE �

SEEN �transmitted via infected USB sticks, hard-drives and laptops

VIRUSES�even from vendors �

Page 28: Process Control Security Myths

WE HAVE �

SEEN �transmitted via infected USB sticks, hard-drives and laptops

VIRUSES�even from vendors �

that should have been fine �

Page 29: Process Control Security Myths

MYTH �FOUR:

Page 30: Process Control Security Myths

MYTH �FOUR:

Page 31: Process Control Security Myths
Page 32: Process Control Security Myths

50%�

Page 33: Process Control Security Myths

50%� of the incidents �investigated �by the US ICS-CERT�!

Page 34: Process Control Security Myths

50%�are found to be attacks specifically aimed at control systems

of the incidents �investigated �by the US ICS-CERT�!

Page 35: Process Control Security Myths

50%�are found to be attacks specifically aimed at control systems

of the incidents �investigated �by the US ICS-CERT�!

With the average time between attack and discovery coming in at

Page 36: Process Control Security Myths

50%�are found to be attacks specifically aimed at control systems

EIGHTEEN MONTHS�

of the incidents �investigated �by the US ICS-CERT�!

With the average time between attack and discovery coming in at

Page 37: Process Control Security Myths

Still believe these process security myths?

Page 38: Process Control Security Myths

It’s up to you to ensure that your systems are safe.

Page 39: Process Control Security Myths

It’s up to you to ensure that your systems are safe.

Page 40: Process Control Security Myths

It’s up to you to ensure that your systems are safe.

Amor Energy here