Protecting Critical Infastrucutre: Zero Tolerance
-
Upload
check-point-software-technologies -
Category
Technology
-
view
267 -
download
2
Transcript of Protecting Critical Infastrucutre: Zero Tolerance
©2015 Check Point Software Technologies Ltd. 1
ZERO TOLERANCEWhen it comes to protecting your critical infrastructure,even small failures have huge consequences
©2015 Check Point Software Technologies Ltd. 2[Protected] Non-confidential content
Industrial Control Systems (ICS) Are All Around Us
… and we rely on it every day for our basic functions and needs.
Shipping Traffic ControlFirst Responder Dispatch
Water Treatment Power Transportation
©2015 Check Point Software Technologies Ltd. 3
Impact of Critical Infrastructure Interruptions
Megacities like New York, Tokyo, London, Paris rely daily on their infrastructure:
• Home to 6.7% of world population
• Use 9.6% of global electricity usage
• Produce 12.6% of global waste
Economic impact per day for NYC:
• $3.6 Billion lost revenue
©2015 Check Point Software Technologies Ltd. 44©2014 Check Point Software Technologies Ltd.[Protected] Non-confidential content
Zero Tolerancefor ICS
downtime of any kind
©2015 Check Point Software Technologies Ltd. 5
The Zero Tolerance Environment
SCADA Environments
SCADA Worlds
©2015 Check Point Software Technologies Ltd. 6[Protected] Non-confidential content©2015 Check Point Software Technologies Ltd. 6©2015 Check Point Software Technologies Ltd. 6
Unique ICS Traits
Survival in Harsh Environments
Unique SCADA Languages
Basic Commands
Large Mechanical Controls
Large Scale Deployments
©2015 Check Point Software Technologies Ltd. 7
OT Security BlueprintManagement Facility
Shop Floor Shop Floor
Control & monitor
SCADA Historian
SCADA VPN
PLC1 PLC2 PLC3 PLC4
Main Control Center
ControlMonitor
SmartEvent
[Protected] Non-confidential content
©2015 Check Point Software Technologies Ltd. 8
Full IT-OT Convergence Blueprint
[Protected] Non-confidential content
©2015 Check Point Software Technologies Ltd. 9[Protected] Non-confidential content
Zero Tolerance Means Anticipating Attacks for IT and SCADA/ICS Equipment
Spear Phishing USB/CD Attacks Targeting Contractors
Free USB Stick or Music CD
The ‘Symposium’ Spear Phishing
Vendor Access Credentials
800 Just the IT patches released in first six months of 2015
©2015 Check Point Software Technologies Ltd. 10
How would you grade your Industrial Control Systems
protection?
©2015 Check Point Software Technologies Ltd. 11
Summary
Protecting industrial control systems should mean Zero Tolerance for mistakes
Hardware that can survive is crucial
Protection is all about capacity and depth of coverage
[Protected] Non-confidential content
©2015 Check Point Software Technologies Ltd. 12
ZERO TOLERANCEWhen it comes to protecting your critical infrastructure,even small failures have huge consequences
Download the Report to See How Your Solution Scored