New Threat Vectors for ICS/SCADA Networks -- and How to Prepare for Them

  • Tuesday, 27 Jun 2017 1:00PM EDT (27 Jun 2017 17:00 UTC)
  • Speakers: Mike Assante, Phil Neray

Industroyer/CrashOverride malware and the WannaCrypt/WannaCry ransomware are having their immediate effects across industry right now. 'Both help us recognize that sophisticated attackers are constantly building new capabilities to work around security controls to disrupt and damage industrial systems and hold critical operations hostage. 'Don't miss your opportunity to learn what you can do to prepare and better-protect your ICS from these and other cybersecurity threats.

Another key target for cyberattackers is corporate intellectual property. In fact, according to the Verizon DBIR, cyber-espionage is by far the most predominant attack vector in the manufacturing sector -- and trade secrets are the #1 data type breached in manufacturing companies.'sensitive details about proprietary manufacturing processes, product formulas, and engineering designs can often be inferred from HMIs, data historians, and PLC ladder logic. 'In this case, the cyber-adversaries include nation-states and competitors intent on improving their competitive edge, as well as cybercriminal organizations seeking to sell corporate secrets to the highest bidder.

While regular patching is undisputably good advice for IT networks -- as in the WannaCry example -- it's not always that easy for critical infrastructure environments that run 24x7 and rely on legacy systems that have been running without interruption for years.'these systems are also more likely to be vulnerable to non-targeted "nuisance" threats that disrupt day-to-day operations, such as the the 2016 malware infestation at the Gundremmingen nuclear plant. 'Additional threat vectors include single issue activists that target energy, pharmaceutical, chemical, and food production companies (such as eco-hacktivists and GMO activists).

In this educational webcast, we'll explore how to:

  • Evaluate the relative risk to your organization from diverse ICS threat actors including cybercriminals, competitors, and hacktivists
  • Engage effectively with business leaders and OT personnel to help them understand the threats -- and allocate resources to defend against them
  • Implement new risk-based controls that move beyond simple patching to include asset discovery, continuous monitoring, and behavioral-based anomaly detection