Protecting Critical Infastrucutre: Zero Tolerance

Post on 21-Mar-2017

267 views 2 download

Transcript of Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 1

ZERO TOLERANCEWhen it comes to protecting your critical infrastructure,even small failures have huge consequences

©2015 Check Point Software Technologies Ltd. 2[Protected] Non-confidential content

Industrial Control Systems (ICS) Are All Around Us

… and we rely on it every day for our basic functions and needs.

Shipping Traffic ControlFirst Responder Dispatch

Water Treatment Power Transportation

©2015 Check Point Software Technologies Ltd. 3

Impact of Critical Infrastructure Interruptions

Megacities like New York, Tokyo, London, Paris rely daily on their infrastructure:

• Home to 6.7% of world population

• Use 9.6% of global electricity usage

• Produce 12.6% of global waste

Economic impact per day for NYC:

• $3.6 Billion lost revenue

©2015 Check Point Software Technologies Ltd. 44©2014 Check Point Software Technologies Ltd.[Protected] Non-confidential content

Zero Tolerancefor ICS

downtime of any kind

©2015 Check Point Software Technologies Ltd. 5

The Zero Tolerance Environment

SCADA Environments

SCADA Worlds

©2015 Check Point Software Technologies Ltd. 6[Protected] Non-confidential content©2015 Check Point Software Technologies Ltd. 6©2015 Check Point Software Technologies Ltd. 6

Unique ICS Traits

Survival in Harsh Environments

Unique SCADA Languages

Basic Commands

Large Mechanical Controls

Large Scale Deployments

©2015 Check Point Software Technologies Ltd. 7

OT Security BlueprintManagement Facility

Shop Floor Shop Floor

Control & monitor

SCADA Historian

SCADA VPN

PLC1 PLC2 PLC3 PLC4

Main Control Center

ControlMonitor

SmartEvent

[Protected] Non-confidential content

©2015 Check Point Software Technologies Ltd. 8

Full IT-OT Convergence Blueprint

[Protected] Non-confidential content

©2015 Check Point Software Technologies Ltd. 9[Protected] Non-confidential content

Zero Tolerance Means Anticipating Attacks for IT and SCADA/ICS Equipment

Spear Phishing USB/CD Attacks Targeting Contractors

Free USB Stick or Music CD

The ‘Symposium’ Spear Phishing

Vendor Access Credentials

800 Just the IT patches released in first six months of 2015

©2015 Check Point Software Technologies Ltd. 10

How would you grade your Industrial Control Systems

protection?

©2015 Check Point Software Technologies Ltd. 11

Summary

Protecting industrial control systems should mean Zero Tolerance for mistakes

Hardware that can survive is crucial

Protection is all about capacity and depth of coverage

[Protected] Non-confidential content

©2015 Check Point Software Technologies Ltd. 12

ZERO TOLERANCEWhen it comes to protecting your critical infrastructure,even small failures have huge consequences

Download the Report to See How Your Solution Scored