8:15 am - 9:00 am ET 12:15 pm - 1:00 pm UTC | SANS ICS Awards |
9:00 am - 9:15 am ET 1:00 pm - 1:15 pm UTC | Opening Remarks |
9:15 am - 10:00 am ET 1:15 pm - 2:00 pm UTC | Keynote
Show More
|
10:00 am - 10:15 am ET 2:00 pm - 2:15 pm UTC | Break |
10:15 am - 10:50 am ET 2:15 pm - 2:50 pm UTC | (IP Only): Deeper Data, Better Protection: Harnessing the Power of Vital OT Endpoint Information for Security, Resilience and Performance Aaron Crow, Chief Technology Officer, Industrial Defender Let's discuss what it takes for OT owners and operators to shift their cybersecurity mindset from "checking items off a list" to one focused on "what actions will enhance business continuity, increase resilience, minimize downtime, and support safety." If you’re attending SANS Summit, you likely already have a good understanding of the leading frameworks and best practices, whether you're required by regulation or not. But how can we go beyond getting a passing grade on any given framework to focus on the safer, more secure outcomes? The key is deeper insights into our OT systems and assets. By gaining a deeper understanding of the state of our operations, we can better identify threats, risks and prioritize a plan to address them. There's a wealth of valuable data available within our OT infrastructure, at the endpoint level, that significantly enhances the maintaining, protecting, and troubleshooting of industrial operations. It eliminates guesswork and prolonged investigations when an issue arises, and shines light on risks so we can proactively avoid them. During this presentation, we'll explore real-world examples of how industrial organizations have advanced their security journey by maturing their OT data management. We'll go beyond “meeting requirements” and discuss the ways that deeper OT asset data play a crucial role in safety, security and resilience across industrial sectors. We'll delve into specific scenarios such as: - Knowing you have an issue in the environment, but not knowing where to go to fix it
- How one operator identified an issue by comparing historical context
- How an operator discovered a highly risky attack surface exposure within an asset that had been overlooked
- How enriched endpoint information can assist SOCs in responding to incidents and aid in forensic investigations.
Show More
|
10:50 am - 11:25 am ET 2:50 pm - 3:25 pm UTC | (IP Only): Establishing your baseline Incident Response in ICS differs from that in traditional IT environments: some investigative techniques are simply not applicable, whereas others might be more effective. This session will explain how to build a database of expected hashes with hashR, then leverage this dataset to speed up forensic analysis, reduce noise, and find relevant data. Attendees will return to their environments capable of utilizing these techniques with open-source software (hashR, Plaso, Timesketch).
Show More
|
11:25 am - 12:00 pm ET 3:25 pm - 4:00 pm UTC | (IP Only): Do we have logs for that? When network traffic analysis falls short. While developing a detection for a new cyber-attack scenario in Bechtel’s OT Cybersecurity Technical Center (Lab), the team encountered a challenge often mentioned with Industrial Control Systems: proprietary protocols. Due to time constraints, several common suggestions for approaching network traffic analysis of proprietary protocols were not feasible for the project. The team had to look for an alternative, which led to the question, “do we have logs for that?” This presentation will review the approach taken to detect the cyber-attack. The key metric needed was tracking logic downloads to a controller from a major Distributed Control System (DCS) vendor. Like the proprietary protocol used in the communication between equipment, the team also had to determine how to work with a proprietary log file format, how to parse the logs, how to send the data to a SIEM, and more. The presenter will also discuss details of the attack used for the Lab’s cyber demo, including mapping to the MITRE ATT&CK framework. This presentation will cover practical experience from both IT and OT Security Engineers in overcoming challenges of systems that use proprietary protocols. Attendees will learn an approach that is not often discussed at ICS conferences, which can supplement network traffic analysis methods for a better security posture of their systems. Finally, during the development of the detection, several other data points were found in available logs that enriched the detection dashboards. The presenter will highlight how these additional data points add more context to a SIEM, allowing for a quicker decision making during an incident response investigation.
Show More
|
12:00 pm - 1:00 pm ET 4:00 pm - 5:00 pm UTC | Lunch |
1:00 pm - 1:35 pm ET 5:00 pm - 5:35 pm UTC | (IP Only): Orlando Utilities Commission Cyber Security and Efficient Management of Grid Edge Devices Project Bob Anderson, Communications Tech III , Orlando Utilities Commission Jim Atkins, Account Manager, Eastern Region North America, SUBNET Solutions Inc. Orlando Utilities Commission's (OUC) namesake is "the Reliable One" due to their ongoing commitment to providing OUC customers with the most reliable electricity supply available. A reliable grid requires strong cybersecurity and OUC has embarked on a project to secure remote engineering access and remote work execution for their substation devices. NERC CIP compliance is required for a small portion of OUC's substation infrastructure but OUC's cybersecurity initiative is to secure all OUC substation infrastructure to these same stringent standards. To reduce NERC CIP audit requirements, OUC will utilize two independent systems so as to manage NERC CIP Bulk Electric System (BES) assets separately from non-BES assets. OUC implements many different vendor's products for their projects and continues to pursue a "best in class" mindset when selecting vendors. OUC needs to be able to do more: To more efficiently manage more devices, from more different vendors, for more grid projects, with more cybersecurity threat vectors to address. OUC's security solution will provide Role Based Access Control (RBAC) and layer on Function Based Access Control (FBAC) to provide the greatest level of security to remote users. RBAC and FBAC security are provided by the user only being granted device access to an authorized device and only provided the access needed within the vendor's software based on their Active Directory credentials. OUC needs their device management system to know that each device has the correct firmware and settings, which allows OUC to baseline all their devices to secure proper grid operation. Password management capability is also part of OUC’s device management and security project and provides for a zero-trust environment where passwords are automatically scrambled after every user’s interface to a grid edge device. OUC needs their projects to also save money and securing remote access to substation devices does just that. Reducing or eliminating the need to travel to the substation is a project goal. OUC was often travelling to a substation to acquire outage information and a reduction in these truck rolls is welcomed. Cost savings are also realized by rapidly acquiring outage information and automatically notifying users versus the very manual and costly efforts OUC had in place for acquiring event data. Now OUC automatically and securely acquires event data within just a few minutes allowing targeting of event location and phase therefore reducing the need to drive the whole line. Overall, the project to secure OUC’s remote engineering access has proven to enhance OUC’s cybersecurity posture, improve OUC’s workforce efficiency, reduce costs, speed outage management and secure grid operations. The presentation will provide details of OUC’s business drivers, technical considerations, project implementation and key benefits realized by this project.
Show More
|
1:35 pm - 2:10 pm ET 5:35 pm - 6:10 pm UTC | (IP Only): Multiverse of Convergence: Charting IT/OT threat overlap Security is defined by the threat (our real world supervillains); resilience is the concrete result of your action (or inaction). And the threat is always changing across your multiverse. Which Spiderperson will you be? The young Peter Parker still building your test capabilities for insights or Mayday Parker (Spider-Girl) beating supervillains with proactive adversary emulation in real world asset owners to measure across IT and OT. Achieving resilience in industrial operations Understanding what an attack against your organization will look like (deconstructing real-world ICS attacks and technical threats) Live attack demonstrations & the defenses needed to stop them Case studies and lessons learned performing security in OT/ICS networks System and organizational investment opportunities that reduce attacker effects.
Show More
|
2:10 pm - 2:25 pm ET 6:10 pm - 6:25 pm UTC | Break |
2:25 pm - 3:00 pm ET 6:25 pm - 7:00 pm UTC | (IP Only): Combating Implicit Trust in West Texas Oil Field As Industrial Control System (ICS) cyber threats continue to grow in scale and sophistication the O&G industry must ensure the unique requirements of the Oil and Gas Unconventional development business are accounted for within cyber security programs which includes both detection and protective measures. Developing and executing cybersecurity and design segmentation strategies must progress together for operating environments in aging Brownfields and Greenfield facilities. Solutions must also consider the large number of external connections that provide key aspects of business operations which also introduces dynamic and mobile threat vectors into the environment. Solutions must ensure a combination of fit-for- risk and cost effective security improvements which will enable business capabilities and meet unique operations requirements. •This presentation will focus on unique challenges of the Unconventional business and ExxonMobil’s journey towards cyber security improvements. Next generation firewalls will be discussed as they were selected for their deep packet inspection technology and centralized management and monitoring capabilities. These expanded technologies increase security and enable centralized cybersecurity support capabilities that were not previously present. We will provide an overview of the architecture and technology capabilities while also highlighting the people and process elements which are all fundamental in protecting the Unconventional SCADA environment. •The intended audiences are industry members interested in secure ICS design and those working through challenges of adding security capabilities in existing operating facilities.
Show More
|
3:00 pm - 3:35 pm ET 7:00 pm - 7:35 pm UTC | (IP Only): Manufacturing Cybersecurity – Boots on the ground and back to the basics Ian Frist, Cybersecurity Compliance Program Director , Corning Manufacturing companies have been left behind as ICS cybersecurity has advanced. The large players in the ICS/OT industry have been working to better secure their environments for years. Those organizations have covered the basics and are working to implement advanced security solutions that help them to identify and respond to threats more quickly and efficiently. Meanwhile, most manufacturing companies have only just recently started to secure their ICS and OT systems. For some, this is driven by regulatory requirements like CMMC, and for others it is due to greater understanding the threats that ICS/OT environments face. Security vendors in the ICS space have developed advanced security solutions that help monitor and prevent threats. These solutions use the latest technologies to help secure ICS/OT environments, but they aren’t a starting point in a cybersecurity program. Instead, these solutions are designed for companies that have covered the fundamentals. Ian Frist will discuss how manufacturing companies need to pause and consider mastering the basics before purchasing a buzzword-heavy product and attempting to automate their way to better security. Sometimes there is no substitute to a boots-on-ground, back to fundamentals approach.
Show More
|
3:35 pm - 3:50 pm ET 7:35 pm - 7:50 pm UTC | Break |
3:50 pm - 4:25 pm ET 7:50 pm - 8:25 pm UTC | (IP Only): A Cross-Sector Methodology for Ranking OT Cyber Scenarios and Critical Entities Critical infrastructure cyber protection correlates 16 different sectors with no way to actually compare a standardized metric from a municipal water facility in Wyoming to a large commercial energy provider in Florida to a rural hospital in Texas to a train operator in New York. Hypothetical scenarios are quickly convoluted with technical contingencies, competing priorities, overlapping authorities, analysis gaps, and a domino effect of potential cascading real world consequences. This complex tapestry of risk is shared by a myriad of stakeholders with a mission to avoid cyber scenarios which cause physical impacts, environmental impacts, and harm or loss of life. This paper, written for the Atlantic Council, discusses the limitations in current standards for prioritization and associated methodology, focusing on operational technology (OT), and outlines a methodology for prioritizing scenarios and entities across sectors and local, state, and federal jurisdictions. This methodology has two primary use cases: 1. A way to rank relevant cyber scenarios to prioritize for a single entity, organization, facility, or site in scope, allowing any entity, organization, facility, or site to choose scenarios to exercise based on analysis beyond cyber incident severity 2. A Standardized Priority Score which can be used to compare different entities, locations, facilities, or sites within a given jurisdiction.
Show More
|
4:25 pm - 5:00 pm ET 8:25 pm - 9:00 pm UTC | (IP Only): TBA
Show More
|
5:00 pm - 5:15 pm ET 9:00 pm - 9:15 pm UTC | Closing Remarks |