Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

19
© AlertEnterprise Confidential Information 2012 Slide 1 Eliminate Silos to Enhance Critical Infrastructure Protection Jasvir Gill, Founder & CEO AlertEnterprise, Inc.

Transcript of Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

Page 1: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 1

Eliminate Silos to Enhance Critical Infrastructure Protection

Jasvir Gill,Founder & CEOAlertEnterprise, Inc.

Page 2: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 2

The “Fire Sale” Is Not Fiction Anymore

Page 3: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 3

AlertEnterprise Delivers a Unique Approach to Addressing Critical Infrastructure and Key Resources

Page 4: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 4

Did you know?

Cybersecurity threats against Utilities have grown dramatically making it the #1 Priority for Utility Executives in 2013.

(U) Key Findings(U//FOUO) Disgruntled current and former utility-sector employees havesuccessfully used their insider knowledge to damage facilities and disrupt site operations.

(U//FOUO) Outsiders have attempted to solicit utility-sector employees to obtain specific information about utility infrastructure site operations and facilities that could be useful in conducting physical and cyber attacks.

Page 5: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 5

Threats • Sensitive Asset Diversion

• Cyber Attacks – Critical Infrastructure

• Bio Terrorism (Food & Beverage)

• Drug Diversion (Pharmaceuticals)

• Theft (Retail, Airlines, Airports etc.)

• Disgruntled employees/contractors

Monitoring both Access and Behavior is a must• Who has access to assets (physical, cyber..)

• Any suspicious behavior or activities

• Monitoring Privileged Users (guarding the guards)

Effective Response, Command and Control• Situational Awareness, Incident Response

Complex/Blended Threats Span Across Many Industries

Page 6: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 6

Traditional Security, Incident Management and Response Hard to Scale, Things Get Missed

Geographically Dispersed assets/locations• Guards with guns – not cost-effective

• Impossible to cover all locations

• Putting staff at risk

3 ring binders approach not effective• Organized and State Sponsored Crime

• Too long to respond

Audit trail of incident management• How incident was handled – learning tool

• Protection during emergency

• Monitoring First Responders

Leveraging investments in technology • Existing security systems

• Existing IT/ERP systems, Physical Security Systems

Page 7: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 7

Main Root Cause: Silos (No one has the Big Picture…)

Page 8: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 8

Silos are Costly, Inefficient: Organizations Respond to Threats in Silos - Attackers Don’t think that Way.

IT Resources

ERP

GRCDirectoryServices

AccessManagement

Compliance Security

IT

Physical Access

AccessManagement

Compliance Security

PHYSICAL

Control Systems

AccessManagement

Compliance Security

SCADA

Page 9: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 9

Bridge the gaps across silos to have a holistic Security Solution and mitigate blended threats

IT Resources Physical Access Control Systems

GRC

Convergence Platform

Identity Risk and Administration

Operational Compliance

Situational AwarenessIncident Response

Page 10: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 10

Unified View of Risk - Unify Logical, Physical and Operational Access Requests in one Screen

Page 11: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 11

Controlling Access to SCADA Operational Systems

OT/SCADA credential management and user provisioning

Active Policy enforcement

Multi-vendor SCADA and OT devices supported

Page 12: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 12

Operational Compliance – Automating NERC Compliance

Pre-loaded compliance framework with current version of standards

Page 13: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 13

Access Governance - Software checks work history, access pattern, analyzes past behavior – returns a risk score

Page 14: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 14

Substation and Control Room Monitoring

Page 15: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 15

Smart Grid Security: Continuous Monitoring of Cyber and Insider Threats to Smart Grid Operations

Page 16: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 16

Customer Example: Smart Grid Security (IT/OT convergence is a must - End Point Relay Attack Alerts)

Page 17: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 17

Key to success: Embed Intelligence (retiring workforce)

Page 18: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 18

Recognized by Gartner ResearchWall Street Journal, May 02, 2013

“The operational technology (OT) associated with the “Internet of Things” ranges from devices to monitor and control power, gas and water systems to ones that monitor and control advanced medical equipment and manufacturing systems.”

“CIOs should ensure that security planning, technology/services procurement, and operations should be integrated and reflect a common IT/OT security program’s vision and mission.”

-Earl Perkins, Vice President, Gartner Research, May 02, 2013

Gartner Magic Quadrant on Identity and Access Governance, 17 Dec. 2012, Earl Perkins:

“Specific industry focus in energy and utilities, transportation, and other industries with OT security requirements have provided AlertEnterprise with early momentum in the market.”

Winner – Most Innovative HANA

Application

Page 19: Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill

© AlertEnterprise Confidential Information 2012Slide 19

Jasvir GillFounder & CEOAlertEnterprise, Inc.

[email protected]

+1 510 798 9613

Mobile vCard