Tag: critical infrastructure

“The security threats to U.S. critical infrastructure span the digital divide” Presented by Idaho National Labs, October 3/4 Sacramento

The security threats to U.S. critical infrastructure span the digital divide. Resent attacks, like those in the Ukraine, blend the cyber and physical environment to cause confusion within and damage to the production environment. Modern cyber defense requires sophisticated operational tactics and strategies. Although, cyber hygiene is essential for fending off the daily barrage of lower level threats that can impair an organization’s performance, few companies are prepared for a targeted attack on their core operational processes from an advanced adversary.

 

If it can be programmed, it can be hacked. This daunting reality facing our interconnected and digital environments has been described as a battle to be won every day by cybersecurity professionals.

Control systems present unprecedented challenges as they are transitioned to a modern architecture based on digital control systems and increasingly wireless communications systems.  This transition creates a paradox – more efficient, effective operation, but dramatically increased vulnerabilities and attack surfaces.

 

INL’s unparalleled capabilities in nuclear nonproliferation and cybersecurity are fundamentally changing how the nation and world approach complex threats to nuclear assets, energy systems and cyber-physical systems.

 

•       Internationally recognized nonproliferation experts with real-world experience in nuclear facility inspection, physical protection, modeling and simulation, material science, physics and engineering.

 

•       Comprehensive instrumentation and control, cyber and nuclear nonproliferation capabilities with similar nuclear infrastructure and examination equipment found worldwide.

 

•       INL’s full-scale infrastructure includes; isolated, industry scale power grid, water and telecommunication distribution systems to provide an expansive and unique test site that can replicate critical services across a region or municipality.

 

•       Inclusive nuclear security approach that allows for field and laboratory technology evaluation.

 

•       Replication of typical control system network for architecture reviews and system hygiene to support asset owners in securing their systems.

 

•       Protocol analysis, reverse engineering and cybersecurity forensics to advance persistent threat mitigations for the nuclear industry.

 

•       Cyber-informed risk methods and unique engineering methodologies and tools designed to anticipate cyber and physical security risk, and inform investment strategies.

 

•       Frameworks for prioritization of investments and threat indicators to inform and advanced security profile for high-consequence operations.

 

Safeguarding critical infrastructure including the power grid, nuclear materials and facilities is inextricably linked to the cybersecurity of the command and control environment.

 

These environments are complicated by instrumentation and controls that are continuously connected with information technology and wireless communications.

 

An integrated cyber physical security approach is essential to address the resiliency of the power and nuclear installations and continuity of operations.

 

INL’s world-leading cyber and industrial control systems security experts are changing the way the nation and the world meet the unique security demands of operational environments.

 

Why USB devices are still the #1 source of malware in Industrial Control Systems, presented by Honeywell

This September in London and October in Sacramento, we learn from Honeywell why USB devices are still the #1 source of malware in ICS. This discussion will help you understand how USB devices can pose a threat even without malware, including:
o Surprisingly effective HID attacks
o More advanced threats posed by rogue network devices, serial adapters and more
Participants in London and Sacramento will see real examples of the impact these attacks can pose to ICS, plus Eric Knapp, Global Director of Cyber Security Solutions and Chief Cyber Security Engineer for Honeywell Process Solutions asks “Are these really advanced? Do you even have to worry about this?”

This year all critical national infrastructure are invited to join both shows free as an initiative to further cyber resilience in both public and private domains!
Contact Daryl Fig for your free guest pass for your team at daryl.fig@cybersenate.com

4th Annual Industrial Control Cyber Security Europe
Millennium Gloucester Hotel
London United Kingdom
September 19/20th
www.industrialcontrolcyberseceurope.com
Headline Sponsors Leidos
Co Sponsors Honeywell
Associate Sponsor Verve Industrial Protection
Associate Sponsor Airbus

Network and share best practice with leaders from Nuclear, Water, Oil and Gas, Chemical, Automotive and Smart Grid sectors

4th Annual Industrial Control Cyber Security USA Summit
The Sutter Club
Sacramento California
October 3/4
www.industrialcontrolcybersecusa.com
Co-Sponsors
Cyber Ark
Honeywell
Unisys

Associate Sponsors
Attivo Networks

Further events you won’t want to miss from the Cyber Senate:
European Rail Cyber Security Working Group, September 11/12th London
Aviation Cyber Security Summit, November 21/22 London United Kingdom
www.cybersenate.com

IAEA JOIN THE ICS NUCLEAR CONFERENCE AS KEY NOTE SPEAKERS

The Cyber Senate are pleased to announce the IAEA will be joining us as Key Note presenters on the Industrial Control Cyber Security Nuclear conference we will be hosting in Warrington UK, May 24-25th 2016.

For further information see www.industrialcontrolsecuritynuclear.com