Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
-
Upload
theanfieldgroup -
Category
Technology
-
view
522 -
download
1
Transcript of Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
© AlertEnterprise Confidential Information 2012Slide 1
Eliminate Silos to Enhance Critical Infrastructure Protection
Jasvir Gill,Founder & CEOAlertEnterprise, Inc.
© AlertEnterprise Confidential Information 2012Slide 2
The “Fire Sale” Is Not Fiction Anymore
© AlertEnterprise Confidential Information 2012Slide 3
AlertEnterprise Delivers a Unique Approach to Addressing Critical Infrastructure and Key Resources
© AlertEnterprise Confidential Information 2012Slide 4
Did you know?
Cybersecurity threats against Utilities have grown dramatically making it the #1 Priority for Utility Executives in 2013.
(U) Key Findings(U//FOUO) Disgruntled current and former utility-sector employees havesuccessfully used their insider knowledge to damage facilities and disrupt site operations.
(U//FOUO) Outsiders have attempted to solicit utility-sector employees to obtain specific information about utility infrastructure site operations and facilities that could be useful in conducting physical and cyber attacks.
© AlertEnterprise Confidential Information 2012Slide 5
Threats • Sensitive Asset Diversion
• Cyber Attacks – Critical Infrastructure
• Bio Terrorism (Food & Beverage)
• Drug Diversion (Pharmaceuticals)
• Theft (Retail, Airlines, Airports etc.)
• Disgruntled employees/contractors
Monitoring both Access and Behavior is a must• Who has access to assets (physical, cyber..)
• Any suspicious behavior or activities
• Monitoring Privileged Users (guarding the guards)
Effective Response, Command and Control• Situational Awareness, Incident Response
Complex/Blended Threats Span Across Many Industries
© AlertEnterprise Confidential Information 2012Slide 6
Traditional Security, Incident Management and Response Hard to Scale, Things Get Missed
Geographically Dispersed assets/locations• Guards with guns – not cost-effective
• Impossible to cover all locations
• Putting staff at risk
3 ring binders approach not effective• Organized and State Sponsored Crime
• Too long to respond
Audit trail of incident management• How incident was handled – learning tool
• Protection during emergency
• Monitoring First Responders
Leveraging investments in technology • Existing security systems
• Existing IT/ERP systems, Physical Security Systems
© AlertEnterprise Confidential Information 2012Slide 7
Main Root Cause: Silos (No one has the Big Picture…)
© AlertEnterprise Confidential Information 2012Slide 8
Silos are Costly, Inefficient: Organizations Respond to Threats in Silos - Attackers Don’t think that Way.
IT Resources
ERP
GRCDirectoryServices
AccessManagement
Compliance Security
IT
Physical Access
AccessManagement
Compliance Security
PHYSICAL
Control Systems
AccessManagement
Compliance Security
SCADA
© AlertEnterprise Confidential Information 2012Slide 9
Bridge the gaps across silos to have a holistic Security Solution and mitigate blended threats
IT Resources Physical Access Control Systems
GRC
Convergence Platform
Identity Risk and Administration
Operational Compliance
Situational AwarenessIncident Response
© AlertEnterprise Confidential Information 2012Slide 10
Unified View of Risk - Unify Logical, Physical and Operational Access Requests in one Screen
© AlertEnterprise Confidential Information 2012Slide 11
Controlling Access to SCADA Operational Systems
OT/SCADA credential management and user provisioning
Active Policy enforcement
Multi-vendor SCADA and OT devices supported
© AlertEnterprise Confidential Information 2012Slide 12
Operational Compliance – Automating NERC Compliance
Pre-loaded compliance framework with current version of standards
© AlertEnterprise Confidential Information 2012Slide 13
Access Governance - Software checks work history, access pattern, analyzes past behavior – returns a risk score
© AlertEnterprise Confidential Information 2012Slide 14
Substation and Control Room Monitoring
© AlertEnterprise Confidential Information 2012Slide 15
Smart Grid Security: Continuous Monitoring of Cyber and Insider Threats to Smart Grid Operations
© AlertEnterprise Confidential Information 2012Slide 16
Customer Example: Smart Grid Security (IT/OT convergence is a must - End Point Relay Attack Alerts)
© AlertEnterprise Confidential Information 2012Slide 17
Key to success: Embed Intelligence (retiring workforce)
© AlertEnterprise Confidential Information 2012Slide 18
Recognized by Gartner ResearchWall Street Journal, May 02, 2013
“The operational technology (OT) associated with the “Internet of Things” ranges from devices to monitor and control power, gas and water systems to ones that monitor and control advanced medical equipment and manufacturing systems.”
“CIOs should ensure that security planning, technology/services procurement, and operations should be integrated and reflect a common IT/OT security program’s vision and mission.”
-Earl Perkins, Vice President, Gartner Research, May 02, 2013
Gartner Magic Quadrant on Identity and Access Governance, 17 Dec. 2012, Earl Perkins:
“Specific industry focus in energy and utilities, transportation, and other industries with OT security requirements have provided AlertEnterprise with early momentum in the market.”
Winner – Most Innovative HANA
Application
© AlertEnterprise Confidential Information 2012Slide 19
Jasvir GillFounder & CEOAlertEnterprise, Inc.
+1 510 798 9613
Mobile vCard