SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1
Don’t Be Left in the
Dark: Secure Critical
Infrastructure
Systems to Defend
Against Cyberattacks
Stephen Schouten l April 17, 2018
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2
@Bomgar
#bomgarwebinar
#securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3
• Security landscape
• The need for a focus on security
• Meeting Industry Regulations: NIS and
NERC
• Tools and solutions for gaining control of
ICS
• Q&A
• Additional Resources
Agenda
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4
• Poorly secured/weak or default
passwords are easy to
compromise
• Credentials and passwords are
the “keys to the kingdom” that
cyber criminals want
• Remote access solutions
continue to be used as attack
pathways in security breaches
Security Landscape
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5
Stolen credentials lead the
way
2018 Data Breach Investigations Report, Verizon
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 6
• 62 % of respondents
think it’s possible or
definite they’ve suffered
a breach through insider
action
• 66% of respondents think
it’s possible or definite
they have suffered a
breach through third-
party access
2018 Privileged Access
Threat Report
https://www.bomgar.com/resources/whitepapers/privileged-access-threat-report
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7
• Old outdated systems are easy to
compromise
• Lack of security features
• Easy to guess credentials
• Vital to running ‘everyday life’ entities
such as water and electrical systems
Why Industrial Control Systems Are So Attractive
To Hackers
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8
Ukraine Power Grid Attack
• Attackers used stolen operator
credentials to launch a
synchronized attack against
operating systems
• The perpetrators gained access
to energy distribution company
systems more than six months
before the Dec. 23, 2015 outage
that temporarily left about
225,000 customers without
power.
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9
Industry
Standards
NERC CIP | NIS Directive
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10
Industry Standards
• NERC CIP
• North American Electric
Reliability Corporation’s
Critical Infrastructure
Protection
• Set or requirements designed
to secure electronic
perimeters and protect critical
cyber assets
• Currently enforced
• NIS Directive
• Networks and Information
Systems
• Goes into effect May 9, 2018
• Improve security of network
and information systems
across the UK, with a
particular focus on essential
services – which, if disrupted –
could potentially cause
significant damage to the
economy, society and welfare
of individuals
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11
NIS
Directive
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12
NIS Directive: Managing Security Risk
• Governance
• Risk Management
• Asset Management
• Supply Chain
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13
NIS Directive: Protecting against cyberattacks
• Service protection polices and
processes
• Identity and access control
• Data security
• System security
• Resilient networks and systems
• Staff awareness and training
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14
NIS Directive: Detecting cyber security events
• Security monitoring
• Proactive security event
discovery
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15
NIS Directive: Minimizing the impact of cyber
security incidents
• Response and recovery
planning
• Lessons Learned
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16
4 Questions to ask
about your
industrial control
systems security
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17
Do I know who is accessing my systems & when?
• Properly managing access for privileged
insiders/employees
• Properly managing access for
vendors/third-party contractors
• Fourth-party (your vendor’s vendors)
• Enforcing least privilege
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18
Do I know where all of my privileged accounts are?
• Identifying all systems and privileged accounts
is important, because every privileged
account is a potential source of risk
• Auto Discovery works on a continuous basis
where changes are detected as they happen
and can trigger automatic enrollment
• Gives admins the ability to see what they
didn’t see before
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 19
Do I have people in place to manage and maintain
ICS security?
• Internal communication towards
security risks
• Prioritize security
• Deploying solutions with a security
focus
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 20
Do I have true cybersecurity polices in place for
the control systems?
• Continuing security education for all
employees
• Phishing
• Malware
• Social Engineering
#bomgarwebinar #securingICS
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22
Bomgar Remote Support
SUPPORT MORE
More devices, more platforms, more people, more locations. Provide
instant remote support to end-users on or off your network using
Windows, Mac, iOS, Android and more.
PROVIDE SUPERIOR SERVICE
Improve service levels and customer satisfaction with seamless,
high-quality remote support for every end-user.
SECURE YOUR BUSINESS
Securing in remote access tools is crucial in protecting your network
from threats and meeting compliance regulations.
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23
Bomgar Privileged Access
PROTECT THE ACCESS
Enable role-based access to specific systems and define session
parameters, such as access timeframes, required approvals, and
permitted functions.
MANAGE ACTIVITY
Actively manage the ongoing operational use of network devices and
hardware on the network.
ANALYZE & AUDIT DATA
Understand what privileged users are actually doing within the
network and audit for misuse, while meeting audit trail requirements.
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24
Lieberman Rapid Enterprise Defense (RED) Suite
SEAMLESSLY INJECT CREDENTIALS
When integrated with Bomgar Privileged Access of Remote
Support, users can directly inject credentials into end servers
and systems without exposing plain text passwords.
ROTATE & DISCOVER AT SCALE
Rotate privileged identities at scale- up to thousands per minute- and
easily randomize local account passwords while continuously
detecting systems, devices and accounts as they come on and off
the network.
MANAGE SERVICE ACCOUNTS
Automatically discover service accounts and their dependencies- both
clustered and individual services- to achieve optimal system uptime.
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 25
• 2018 Privileged Access Threat
Report
• Bomgar Privileged Access and the
NIS Directive (whitepaper)
• Secure Access and NERC CIP
(whitepaper)
• Northumbrian Water Group (case
study)
• Bomgar Compliance Matrix
• Four Pitfalls of Privilege
Additional Resources
©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 26

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (19)

2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
Enterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesEnterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use Cases
 
GDPR Webinar - feb
GDPR Webinar - febGDPR Webinar - feb
GDPR Webinar - feb
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
 
Building a Customer Identity and Access Management (CIAM) Solution
Building a Customer Identity and Access Management (CIAM) SolutionBuilding a Customer Identity and Access Management (CIAM) Solution
Building a Customer Identity and Access Management (CIAM) Solution
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Applying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR SuccessApplying Innovative Tools for GDPR Success
Applying Innovative Tools for GDPR Success
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
CIAM: Conquering the Phygital Battleground with WSO2 Identity Server
CIAM: Conquering the Phygital Battleground with WSO2 Identity ServerCIAM: Conquering the Phygital Battleground with WSO2 Identity Server
CIAM: Conquering the Phygital Battleground with WSO2 Identity Server
 
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA AdoptionCurrent Trends Related to Mobile Network Operators & FIDO SCA Adoption
Current Trends Related to Mobile Network Operators & FIDO SCA Adoption
 
Strong Authentication Trends in Government
Strong Authentication Trends in GovernmentStrong Authentication Trends in Government
Strong Authentication Trends in Government
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 

Ähnlich wie Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend Against Cyberattacks

Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Kehinde Tolude
 

Ähnlich wie Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend Against Cyberattacks (20)

Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
Privilegedaccessinfinancejuly2018bomgarwebinar 180710190904
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Next generation access controls
Next generation access controlsNext generation access controls
Next generation access controls
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_API Security & Fraud Detection - Are you ready?2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_API Security & Fraud Detection - Are you ready?
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
Scrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budgetScrapping for Pennies: How to implement security without a budget
Scrapping for Pennies: How to implement security without a budget
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 

Mehr von Bomgar

Mehr von Bomgar (6)

The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management The 6 Best Practices for Privileged Identity Management
The 6 Best Practices for Privileged Identity Management
 
Post GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote AccessPost GDPR: The Critical Importance of Securing Remote Access
Post GDPR: The Critical Importance of Securing Remote Access
 
10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk Value10 Tips to Increase Your Service Desk Value
10 Tips to Increase Your Service Desk Value
 
Privileged Access in Healthcare
Privileged Access in HealthcarePrivileged Access in Healthcare
Privileged Access in Healthcare
 
Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”Securing Privileged Access “Inside the Perimeter”
Securing Privileged Access “Inside the Perimeter”
 
Your Service Desk is Privileged, Too
Your Service Desk is Privileged, TooYour Service Desk is Privileged, Too
Your Service Desk is Privileged, Too
 

Kürzlich hochgeladen

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Kürzlich hochgeladen (20)

WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 

Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend Against Cyberattacks

  • 1. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Don’t Be Left in the Dark: Secure Critical Infrastructure Systems to Defend Against Cyberattacks Stephen Schouten l April 17, 2018
  • 2. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 2 @Bomgar #bomgarwebinar #securingICS
  • 3. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 3 • Security landscape • The need for a focus on security • Meeting Industry Regulations: NIS and NERC • Tools and solutions for gaining control of ICS • Q&A • Additional Resources Agenda
  • 4. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 4 • Poorly secured/weak or default passwords are easy to compromise • Credentials and passwords are the “keys to the kingdom” that cyber criminals want • Remote access solutions continue to be used as attack pathways in security breaches Security Landscape #bomgarwebinar #securingICS
  • 5. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 5 Stolen credentials lead the way 2018 Data Breach Investigations Report, Verizon
  • 6. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 6 • 62 % of respondents think it’s possible or definite they’ve suffered a breach through insider action • 66% of respondents think it’s possible or definite they have suffered a breach through third- party access 2018 Privileged Access Threat Report https://www.bomgar.com/resources/whitepapers/privileged-access-threat-report
  • 7. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 7 • Old outdated systems are easy to compromise • Lack of security features • Easy to guess credentials • Vital to running ‘everyday life’ entities such as water and electrical systems Why Industrial Control Systems Are So Attractive To Hackers #bomgarwebinar #securingICS
  • 8. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 8 Ukraine Power Grid Attack • Attackers used stolen operator credentials to launch a synchronized attack against operating systems • The perpetrators gained access to energy distribution company systems more than six months before the Dec. 23, 2015 outage that temporarily left about 225,000 customers without power. #bomgarwebinar #securingICS
  • 9. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 9 Industry Standards NERC CIP | NIS Directive
  • 10. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 10 Industry Standards • NERC CIP • North American Electric Reliability Corporation’s Critical Infrastructure Protection • Set or requirements designed to secure electronic perimeters and protect critical cyber assets • Currently enforced • NIS Directive • Networks and Information Systems • Goes into effect May 9, 2018 • Improve security of network and information systems across the UK, with a particular focus on essential services – which, if disrupted – could potentially cause significant damage to the economy, society and welfare of individuals
  • 11. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 11 NIS Directive
  • 12. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 12 NIS Directive: Managing Security Risk • Governance • Risk Management • Asset Management • Supply Chain
  • 13. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 13 NIS Directive: Protecting against cyberattacks • Service protection polices and processes • Identity and access control • Data security • System security • Resilient networks and systems • Staff awareness and training
  • 14. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 14 NIS Directive: Detecting cyber security events • Security monitoring • Proactive security event discovery
  • 15. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 15 NIS Directive: Minimizing the impact of cyber security incidents • Response and recovery planning • Lessons Learned
  • 16. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 16 4 Questions to ask about your industrial control systems security #bomgarwebinar #securingICS
  • 17. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 17 Do I know who is accessing my systems & when? • Properly managing access for privileged insiders/employees • Properly managing access for vendors/third-party contractors • Fourth-party (your vendor’s vendors) • Enforcing least privilege #bomgarwebinar #securingICS
  • 18. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 18 Do I know where all of my privileged accounts are? • Identifying all systems and privileged accounts is important, because every privileged account is a potential source of risk • Auto Discovery works on a continuous basis where changes are detected as they happen and can trigger automatic enrollment • Gives admins the ability to see what they didn’t see before #bomgarwebinar #securingICS
  • 19. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 19 Do I have people in place to manage and maintain ICS security? • Internal communication towards security risks • Prioritize security • Deploying solutions with a security focus #bomgarwebinar #securingICS
  • 20. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 20 Do I have true cybersecurity polices in place for the control systems? • Continuing security education for all employees • Phishing • Malware • Social Engineering #bomgarwebinar #securingICS
  • 21. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 21
  • 22. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 22 Bomgar Remote Support SUPPORT MORE More devices, more platforms, more people, more locations. Provide instant remote support to end-users on or off your network using Windows, Mac, iOS, Android and more. PROVIDE SUPERIOR SERVICE Improve service levels and customer satisfaction with seamless, high-quality remote support for every end-user. SECURE YOUR BUSINESS Securing in remote access tools is crucial in protecting your network from threats and meeting compliance regulations.
  • 23. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 23 Bomgar Privileged Access PROTECT THE ACCESS Enable role-based access to specific systems and define session parameters, such as access timeframes, required approvals, and permitted functions. MANAGE ACTIVITY Actively manage the ongoing operational use of network devices and hardware on the network. ANALYZE & AUDIT DATA Understand what privileged users are actually doing within the network and audit for misuse, while meeting audit trail requirements.
  • 24. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 24 Lieberman Rapid Enterprise Defense (RED) Suite SEAMLESSLY INJECT CREDENTIALS When integrated with Bomgar Privileged Access of Remote Support, users can directly inject credentials into end servers and systems without exposing plain text passwords. ROTATE & DISCOVER AT SCALE Rotate privileged identities at scale- up to thousands per minute- and easily randomize local account passwords while continuously detecting systems, devices and accounts as they come on and off the network. MANAGE SERVICE ACCOUNTS Automatically discover service accounts and their dependencies- both clustered and individual services- to achieve optimal system uptime.
  • 25. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 25 • 2018 Privileged Access Threat Report • Bomgar Privileged Access and the NIS Directive (whitepaper) • Secure Access and NERC CIP (whitepaper) • Northumbrian Water Group (case study) • Bomgar Compliance Matrix • Four Pitfalls of Privilege Additional Resources
  • 26. ©2018 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 26