SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Mike Gillespie – Advent IM Ltd, Independent Holistic Security Consultancy
The Cyber Threat to the Built Environment
• our buildings have become smarter creating new threats and vulnerabilities
• some threats may not be geographically sensitive – the threat can come from
anywhere
• our infrastructure is under threat too
• our attitude to ‘cyber’ needs to change
• we need to secure our security systems
• buying secure
• protecting them once installed
• cyber threat to our infrastructure and built estate has to be included in
Threat Assessments
coming up
Definitions
Smart - systems operating as if by human intelligence by using automatic computer control,
system or component that performs the correct action in a wide variety of complicated circumstances
Integrated - To make into a whole by bringing all parts together; unify
Holistic - Emphasizing the importance of the whole and the interdependence of its parts.
Concerned with wholes rather than analysis or separation into parts
Smart integrated holistic
aircon
light
access control
restricted access
heat
parking control
intruder detection fire & life safety
cctv
power management
water & waste
Integrated systems providing big data and big benefits
Security integrating with other
systems such as heating,
creating Efficiency
improvement.
A better environment for users
and managers alike.
Cross business silo adoption
and application, returning
actionable information.
Helping move security from the
cost column and into the
investment column
aircon
light
access
control
restricted
access
heat
fire &
life
safety
water &
waste
intruder
detection
cctv
parking
control
power
management
The creation of this new integrated entity is the
creation of a not just a new and powerful building
management system but that of a new asset. An asset
without geographical location in the cyber world and
that needs to be protected.
a new truth
Cyber threat to the built environment: once your security
systems are networked, your smart building’s geography fails to
apply and your address becomes “Earth”…
…which means an attack on a building’s security systems could
come from anywhere on the globe, just ask Iran.
made in the USA
within minutes a building could be totally disabled
• door entry system disabled or locked
down
• automatic barriers disabled or locked
down
• CCTV disabled
• fire & life safety systems disabled
• Air conditioning disabled
Image courtesy www.explodingdog.com
Air quality and
conditioning systems
How secure are our security systems?
Door entry systems
CCTV and monitoring
systems
Alarm systems
some visuals courtesy of freedigitalphotos.net
our buildings and our national infrastructure
some visuals courtesy of freedigitalphotos.net
building cyber threat into Threat Assessments
some visuals courtesy of freedigitalphotos.net
in summary
• our buildings have become smarter creating new threats and
vulnerabilities
• some threats may not be geographically sensitive – the threat can
come from anywhere
• our infrastructure is under threat too
• our attitude to ‘cyber’ needs to change
• we need to secure our security systems
• buying secure
• protecting them once installed
• cyber threat to our infrastructure and built estate has to be included in
Threat Assessments
thank you
The Cyber Threat to the Built Environment
www.advent-im.co.uk

Weitere ähnliche Inhalte

Was ist angesagt?

ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
Tonex
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeigh
Christina McVeigh
 

Was ist angesagt? (20)

Home Automation Service
Home Automation ServiceHome Automation Service
Home Automation Service
 
Computer security
Computer securityComputer security
Computer security
 
Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015Security Monitoring using SIEM null bangalore meet april 2015
Security Monitoring using SIEM null bangalore meet april 2015
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
 
CYBERSECURITY.pdf
CYBERSECURITY.pdfCYBERSECURITY.pdf
CYBERSECURITY.pdf
 
How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart Meter
 
Security Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersSecurity Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for Beginners
 
Data Center Security: Always a Main Concern for Businesses
Data Center Security:  Always a Main Concern for BusinessesData Center Security:  Always a Main Concern for Businesses
Data Center Security: Always a Main Concern for Businesses
 
Saner 2.0 product sheet
Saner 2.0   product sheetSaner 2.0   product sheet
Saner 2.0 product sheet
 
4 Things to know about cybersecurity
4 Things to know about cybersecurity4 Things to know about cybersecurity
4 Things to know about cybersecurity
 
Architecting Security Measurement & Management for Compliance
Architecting Security Measurement & Management for ComplianceArchitecting Security Measurement & Management for Compliance
Architecting Security Measurement & Management for Compliance
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Webgraphicorganizerkaur
WebgraphicorganizerkaurWebgraphicorganizerkaur
Webgraphicorganizerkaur
 
Benefits of Cloud without risking your Data or Security
Benefits of Cloud without risking your Data or SecurityBenefits of Cloud without risking your Data or Security
Benefits of Cloud without risking your Data or Security
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeigh
 
New Smart Technology Surge Protectors for Computers
New Smart Technology Surge Protectors for Computers New Smart Technology Surge Protectors for Computers
New Smart Technology Surge Protectors for Computers
 
Outpost24 webinar - Reinventing application security with Omnicom
Outpost24 webinar - Reinventing application security with OmnicomOutpost24 webinar - Reinventing application security with Omnicom
Outpost24 webinar - Reinventing application security with Omnicom
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
 
Date security introduction
Date security   introductionDate security   introduction
Date security introduction
 

Andere mochten auch

Kodemint Technologies Pvt Ltd
Kodemint Technologies Pvt LtdKodemint Technologies Pvt Ltd
Kodemint Technologies Pvt Ltd
Samsheer Moosa
 
Waldrons march 2013 v1.0
Waldrons march 2013 v1.0Waldrons march 2013 v1.0
Waldrons march 2013 v1.0
Advent IM Ltd
 
興大資訊社 CPE 訓練宣傳
興大資訊社 CPE 訓練宣傳興大資訊社 CPE 訓練宣傳
興大資訊社 CPE 訓練宣傳
均民 戴
 

Andere mochten auch (18)

Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012
 
SMEs, Security and How Its a Growing Threat
SMEs, Security and How Its a Growing ThreatSMEs, Security and How Its a Growing Threat
SMEs, Security and How Its a Growing Threat
 
Employee monitoring updated
Employee monitoring updatedEmployee monitoring updated
Employee monitoring updated
 
Drupal 7 Entity & Entity API
Drupal 7 Entity & Entity APIDrupal 7 Entity & Entity API
Drupal 7 Entity & Entity API
 
Kodemint Technologies Pvt Ltd
Kodemint Technologies Pvt LtdKodemint Technologies Pvt Ltd
Kodemint Technologies Pvt Ltd
 
The Human Threat in Data protection
The Human Threat in Data protection The Human Threat in Data protection
The Human Threat in Data protection
 
Kodemint brochure
Kodemint brochureKodemint brochure
Kodemint brochure
 
Waldrons march 2013 v1.0
Waldrons march 2013 v1.0Waldrons march 2013 v1.0
Waldrons march 2013 v1.0
 
植基於個人本體論的新聞推薦系統
植基於個人本體論的新聞推薦系統植基於個人本體論的新聞推薦系統
植基於個人本體論的新聞推薦系統
 
Data Breach and Hacking
Data Breach and HackingData Breach and Hacking
Data Breach and Hacking
 
The IT Cyber Battle
The IT Cyber BattleThe IT Cyber Battle
The IT Cyber Battle
 
Bootstrap個人網站 20141027
Bootstrap個人網站 20141027Bootstrap個人網站 20141027
Bootstrap個人網站 20141027
 
Castanyada 2012
Castanyada  2012Castanyada  2012
Castanyada 2012
 
20130706閃電秀
20130706閃電秀20130706閃電秀
20130706閃電秀
 
Social Engineering, Insider and Cyber Threat
Social Engineering, Insider and Cyber Threat Social Engineering, Insider and Cyber Threat
Social Engineering, Insider and Cyber Threat
 
興大資訊社 CPE 訓練宣傳
興大資訊社 CPE 訓練宣傳興大資訊社 CPE 訓練宣傳
興大資訊社 CPE 訓練宣傳
 
Drupalize your data use entities
Drupalize your data use entitiesDrupalize your data use entities
Drupalize your data use entities
 
寫程式?那些老師沒教的事
寫程式?那些老師沒教的事寫程式?那些老師沒教的事
寫程式?那些老師沒教的事
 

Ähnlich wie The Cyber Threat to the Built Estate

5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management
AlgoSec
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
RAJESH S
 

Ähnlich wie The Cyber Threat to the Built Estate (20)

SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
IoT security
IoT securityIoT security
IoT security
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
Be wp cybersmart_buildings
Be wp cybersmart_buildingsBe wp cybersmart_buildings
Be wp cybersmart_buildings
 
Cybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automationCybersmart_buildings_securing your investment in connectivity and automation
Cybersmart_buildings_securing your investment in connectivity and automation
 
Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)Be wp cybersmart_buildings (1)
Be wp cybersmart_buildings (1)
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart building
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management5 things you didnt know you could do with security policy management
5 things you didnt know you could do with security policy management
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
 
Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
 
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS SolutionGISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
Enhancing Security With CCTV Monitoring Services
Enhancing Security With CCTV Monitoring ServicesEnhancing Security With CCTV Monitoring Services
Enhancing Security With CCTV Monitoring Services
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 

Kürzlich hochgeladen

!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Kürzlich hochgeladen (20)

Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 

The Cyber Threat to the Built Estate

  • 1. Mike Gillespie – Advent IM Ltd, Independent Holistic Security Consultancy The Cyber Threat to the Built Environment
  • 2. • our buildings have become smarter creating new threats and vulnerabilities • some threats may not be geographically sensitive – the threat can come from anywhere • our infrastructure is under threat too • our attitude to ‘cyber’ needs to change • we need to secure our security systems • buying secure • protecting them once installed • cyber threat to our infrastructure and built estate has to be included in Threat Assessments coming up
  • 3. Definitions Smart - systems operating as if by human intelligence by using automatic computer control, system or component that performs the correct action in a wide variety of complicated circumstances Integrated - To make into a whole by bringing all parts together; unify Holistic - Emphasizing the importance of the whole and the interdependence of its parts. Concerned with wholes rather than analysis or separation into parts Smart integrated holistic
  • 4. aircon light access control restricted access heat parking control intruder detection fire & life safety cctv power management water & waste
  • 5. Integrated systems providing big data and big benefits Security integrating with other systems such as heating, creating Efficiency improvement. A better environment for users and managers alike. Cross business silo adoption and application, returning actionable information. Helping move security from the cost column and into the investment column aircon light access control restricted access heat fire & life safety water & waste intruder detection cctv parking control power management
  • 6. The creation of this new integrated entity is the creation of a not just a new and powerful building management system but that of a new asset. An asset without geographical location in the cyber world and that needs to be protected. a new truth
  • 7. Cyber threat to the built environment: once your security systems are networked, your smart building’s geography fails to apply and your address becomes “Earth”… …which means an attack on a building’s security systems could come from anywhere on the globe, just ask Iran. made in the USA
  • 8. within minutes a building could be totally disabled • door entry system disabled or locked down • automatic barriers disabled or locked down • CCTV disabled • fire & life safety systems disabled • Air conditioning disabled
  • 10. Air quality and conditioning systems How secure are our security systems? Door entry systems CCTV and monitoring systems Alarm systems some visuals courtesy of freedigitalphotos.net
  • 11. our buildings and our national infrastructure some visuals courtesy of freedigitalphotos.net
  • 12. building cyber threat into Threat Assessments some visuals courtesy of freedigitalphotos.net
  • 13. in summary • our buildings have become smarter creating new threats and vulnerabilities • some threats may not be geographically sensitive – the threat can come from anywhere • our infrastructure is under threat too • our attitude to ‘cyber’ needs to change • we need to secure our security systems • buying secure • protecting them once installed • cyber threat to our infrastructure and built estate has to be included in Threat Assessments
  • 14. thank you The Cyber Threat to the Built Environment www.advent-im.co.uk

Hinweis der Redaktion

  1. So we have established that networked systems create potential vulnerabilities and that traditional geographically based threats have now been augmented with the threat from cyberspace. But what could that look like potentially.? No one goes in no one goes out No vehicles can get through barriers Security systems compromised leaving people and assets vulnerable – CCTV breached or ineffective. Fire alarms or fire prevention such as sprinklers disabled, emergency lighting not working Air conditioning not working and temperature and air quality out of control in a building no one can get in or out of.
  2. Some definitions to help us along the way.
  3. Even if a building was not built to be a ‘smart building’ it can be made into one. Fabulous integrated systems sit all over buildings, controlling our environments, our movements and our safety. As users we rarely consider it (unless we work in FM) and yet it has a massive part to play in everyone’s working day. Frequently these systems will be hooked into a central control unit of some description. This is the cost effective way – integration and remote control of systems.
  4. There is good business logic behind decisions to integrate systems. They can compliment each other and clever use can see things like security adding value to a business. For instance – setting PIRs to report by exception in low usage areas, enabling Aircon and lighting to be turned off or down during trough occupancy. The savings in this area can be huge. The end result is a more efficient building that can be managed from almost anywhere. For instance Air Con that can be accessed remotely over the net by the FM and turned off, turned down or fixed to never go above or below a certain temp. Key to that sentence was, ‘accessed over the web’
  5. So we have a fabulous building with some very impressive kit in both BM and Security. These systems are networked and they are controlling our air quality, our security systems and our access in or out of places. That building and its occupants could be threatened not only by whatever sits in its vicinity, like a nearby animal testing lab that might attract attention from pressure groups, or by location in a high crime area for instance. It’s systems are networked and if they aren't properly protected or were insecure in the first place, the building is now under threat from anyone with a computer, web access and a desire to do some harm.
  6. So our networked building is now a potential target for anyone. You may know all about what your business does to protect it’s systems but what about Building Management? Do you share a building? Do you know what your neighbours do? Could a vulnerability in their systems affect everyone in the building? It could come from anywhere, it could come from the other side of the world or be state sponsored.
  7. So we have established that networked systems create potential vulnerabilities and that traditional geographically based threats have now been augmented with the threat from cyberspace. But what could that look like potentially.? No one goes in no one goes out No vehicles can get through barriers Security systems compromised leaving people and assets vulnerable – CCTV breached or ineffective. Fire alarms or fire prevention such as sprinklers disabled, emergency lighting not working Air conditioning not working and temperature and air quality out of control in a building no one can get in or out of.
  8. So we have a wonderfully capable building but we have by unintended consequence created a hugely vulnerable asset that is open to the whole of cyberspace if we don’t secure it properly and holistically. It’s like putting a door in the middle of cyberspace, its only a matter of time before someone walks through it. If you’re lucky it will be a pen tester.
  9. We know we need to protect our Network, we use anti virus, we patch, we use firewalls and encryption. We educate our users in keeping our network safe. Do we take similar precautions with our networked systems.? We have just seen the speed with which a building can be effectively disabled. That may not be the only threat. The attack may be to take information for future attacks, such as stealing or using CCTV images. Perhaps entry data to find out when target staff members are on site. Or test disable an alarm system for a combined attack across several systems in the future. How did we source our systems in the first place? Some security systems are built insecurely and so the challenge is to buy well in the first place. The objective is security so buy secure and keep it secure, protect, patch and maintain it.
  10. Our infrastructure is coming under the same threats. Satellites, nuclear power plants, mobile phone masts, air traffic control. It might be suppliers to these critical functions that get attacked. It may connected systems or other parts of the supply chain. All organisations have a role to play in our CNI at some point and we have to start by securing our own part of cyberspace that controls our building services.
  11. In order to protect our CNI and our buildings properly we need to look at threat and its treatment, holistically. Virus can be introduced to our systems and we need to be able to protect them properly.