Professional Documents
Culture Documents
CYBERSECURITY
FOR A DIGITAL AGE
TIMELINE OF KEY EVENTS IN INDUSTRIAL CYBER
December 23, 2015, Ukraine experienced
a blackout . The country's electricity went
out after cyber attacks on the electricity
grid. Hackers (hackers) succeeded in
holding the information system so that
mass blackouts occurred in the
community. 230 thousand people without
electricity for up to six hours.
A few months ago, Venezuela claimed that
its power plant had been attacked by a
hacker, leaving parts of the country,
Trisis/Triton including Caracas, in a five-day outage.
Schneider e.
2
CYBER RISK IS EVOLVING, COMPLEX &
UNCONTROLLED
Desired Outcomes: CHALLENGES STATUS QUO SOLUTIONS
• Prevent incidents across OT-IT 1 Point Solutions
Cost Little/no asset visibility,
• Mitigate cyber risks on grid, wifi Point solutions requiring multiple
s monitoring & alerting interfaces & vendors to meet OT
• Lower cybersecurity labor costs
& • Automation and Orchestration
cybersecurity needs; lack of
Protecting assets, integration reduces time to threat
Risk • Avoid non-compliance fines operations & people detection & increases cost
• BSSN etc( 118 – CISSP in ID )
OT complexity: 2 Limited Visibility
proprietary & legacy Limited visibility into OT assets
• Best in Class showcase increases cyber vulnerabilities &
devices & systems
• Improve productivity risk; lack of cyber expertise expands
• Safely connect operations OT cybersecurity problem
Competitive• Upgrade OT cybersecurity skills skills shortage 3 Site Specific
Advantage Increasing company Existing solutions lack true enterprise
& regulatory OT cybersecurity capabilities; limits
ability to help ensure more consistent
compliance
protection across sites
Central
GIS Email CRM Billing WFM AMS MDMS
Messaging
Energy Manager
ESB
Solar Consumer Customer Program
CUSTOMER
Embedded Heat Portal Management Management
METER COM
& Power AMI HES
Mobile App
Battery Manager
Consumer DERMS
Inverter Manager Reports SYSTEM Meter
Settlement
Operations
Analytics
Management
3RD PARTY IT
Weather
Services Gateway
DEVICES
TRACKING SYSTEMS Broadband
Internet Smart
Command Central Call Center
Thermostat
5
WHY HONEYWELL IND. CYBERSECURITY Demonstrated
Customer Value
9
FRAMEWORK MAPPING
ICS Shield
Cybersecurity
Integrated Software
Security • SMX
Technology • Forge Cybersecurity
HONEYWELL FORGE
CYBERSECURITY PLATFORM
12
HONEYWELL FORGE CYBERSECURITY PLATFORM
• Safely connect to OT assets to improve security and • Safely inventory OT assets to comply and secure
performance across multiple sites • Safely monitor OT networks for cybersecurity issues
• Safely move and use OT-centric data for analytics and more • Safely update OT assets to comply and secure
• Detect threats in files transferred from one location to another • Safely uncover security vulnerabilities to manage risks
Asset Discovery Monitoring & Alerting Software Patch & Risk & Compliance
& Inventory AV Management Management
Safely inventory OT assets Safely monitor OT Safely update OT assets to Measure & manage OT
to comply & secure networks for cyber issues comply & secure cybersecurity risks
• Accurately identify assets: • Proactively manage OT • Reduce vulnerabilities - centrally • Standardize risk status in one view
hardware, software, service networks manage software updates for operations, IT & leadership
configurations • Automate data collection of • Comply with standards - patch • Easily identify related actions to
• Visualize security status and key cybersecurity indicators Windows systems (WSUS) improve ICS security posture
asset characteristics • Automate notifications specific • Control update timing, approach, • Automate and prioritize risk-
• Enforce security policies to your organization and staff configuration to protect uptime mitigating work
• Address non-compliance
WINDOWS MACHINE
Gathers machine inventory using WMI
Gathers the following machine information:
Security Parameters Status Parameters Performance Parameters
Cybersecurity
Integrated Software
Security • SMX
Technology • Forge Cybersecurity
20
Industrial USB Attacks are Increasing
Source: http://www.isssource.com/ics-alert-usb-malware-attack/
90%
Open USB ports Of employees & service providers
28 Contract workers on
site on any given day* 259 in oil refinery rely on removable media
21
22
SMX PROTECTS AGAINST ADVANCED USB THREATS
• A fully featured Linux computer with the ability to execute all Rubber ducky scripts, as well
Bash as more complex attacks leveraging data connections (e.g. Ethernet over USB or
Ethernet control model - ECM)
Bunny
• Can also impersonate mass storage or serial devices
24
The Future is
What we Make It.
Make it Secure.
MORE INFORMATION:
Kelvin.Chin@honeywell.com
25