Top Banner
Leveraging Cyber Security Lab Environments To Identify Cyber Threats Robert Alston June 19, 2018
13

Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Feb 27, 2019

Download

Documents

LêKhánh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Leveraging Cyber Security Lab Environments To Identify Cyber Threats

Robert Alston

June 19, 2018

Page 2: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Leveraging Cyber Security Lab Environments to Identify Threats

1

As companies seek to improve their

industrial cyber security maturity

levels, a lab environment can yield

pragmatic risk reduction insights, as

well as help expedite security solution

implementations. Such environments,

however, can be costly to equip and

maintain.

Page 3: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Leveraging Cyber Security Lab Environments

2

• What are cyber lab environments?

• Why are cyber lab environments needed?

• How can a cyber lab help my business?

• To build or buy – That is the question.

Page 4: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

What Are Cyber Lab Environments

3

• An environment which is designed,

operated and staffed with a focus on

cyber security

• Secure environment with dedicated tools

and equipment to simulate actual

environment, support cyber research,

development and training

• Isolated testing facility for cyber threats,

malware and vendor solutions

Page 5: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Why Are Cyber Lab Environments Needed

4

• Provide insight into risk elements

• Safely evaluate security products

• Expedite installation of security solutions

• Raise awareness level of employees on

new technology without exposing

operations to more risk.

Page 6: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

5

How Can a Cyber Lab Help My Business

• Lower cost of implementation of security

solutions

• Eliminate cost of installing the wrong solution

• Prioritize remediation efforts to maximize

benefits

• Increase awareness level of employees

• Optimize cyber security for business or

business unit

Page 7: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Case Studies6

What impact will this network scanner have on my network?- One of the world's largest independent petroleum refiners

Oil & Gas

How vulnerable are my existing security controls?- Large refining, marketing, and transportation company

How can I improve employee awareness of industrial cyber

security?- Large Asian petroleum company

Which firewall will work best in my configuration?- Large agriculture company

Refining & Petrochemical

Agriculture

Page 8: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Cyber Lab Environments7

To build a lab:

• Concept

• Equipment

NFR, Funding, etc.

• Space

• Staff

Where do you find staff?

Would you hire them if you found them?

Can you afford? utilize? retain?

Do they fit in your HR profile?

• How would you calculate ROI?

Page 9: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Cyber Lab Capabilities

8

• Off-production test bed

• Test, discover & remediate

industrial cyber security issues

• Validate third party security

product capabilities

Safely Test Industrial

Solutions

• Real-time attack simulations

• Understand threat vector impact on

a process control network

• Purpose-built Honeywell simulations

integrating global attack knowledge &

domain expertise

Simulated Cyber Attacks

Access Technology & Expertise

• State-of-the-art equipment

• Domain expert collaboration

• Cyber awareness training

• Advanced cyber techniques

What does it Cost to Build a Cyber Lab

• To build out a functional, flexible state of

the art cyber lab costs millions in

Building

Hardware

Staff

Page 10: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

What Is a Cost Effective Solution?

9

Atlanta Dubai

Singapore

Infrastructure:

• Experion, FX2 Virtualization Platform, ControlEdge PLC

• 3rd party PLCs and HMI/SCADA, physical process simulation, RTU

• Extensive security controls (min. 2 vendors per control)

• State of the art security monitoring and detection tools (e.g. SIEM, network monitoring, scanning, firewall

management)

Honeywell

Singapore

Page 11: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Why Honeywell? Complete Industrial Cyber Security Solutions

10

- Whitelisting

- Antivirus

- Next-generation Firewall

- IDS/IPS

- Security Information & Event Management (SIEM)

- Threat Intelligence

- Industrial security program development

- Assessment services

- Architecture and design

- Implementation and systems integration

- Operational service and support

- Compliance audit & reporting

INDUSTRIALSECURITY

CONSULTING

Adaptive

Emergent

Se

curity

Ma

turity

- Secure remote access

- Continuous monitoring and alerting

- Automated patch & antivirus updates

- Incident response & recovery/back up

- Security device co-management

- Hosting, management and operation of ICS Shield®

- OT SOC management & operations

INTEGRATED SECURITY

TECHNOLOGY

CYBER SECURITY

SOFTWARE

- ICS Shield® platform forcyber security operations

- Industrial Cyber SecurityRisk Manager: Enterprise and Site

- Secure Media Exchange (SMX)

- Advanced Threat Intelligence Exchange (ATIX)

- Industrial assessment software & tools

MANAGED SECURITY SERVICES

Page 12: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

Get this Hot Deal at Americas HUG11

Secure Media Exchange systems for $9,999 each and SMX ATIX subscriptions for:

- $7K/year per SMX System – on 1 year agreements- $5K/year per SMX System – on 5 year agreements

Visit the Promotions Center to learn more.

Get details at the Promotions Center or www.hwll.co/HUG18offers. These limited-time discounts and offerings are only available and valid for new inquiries and commitments made at 2018 Americas HUG in San Antonio, TX, June 18-23. Orders must be placed within 90 days of receiving an estimate.

Page 13: Leveraging Cyber Security Lab Environments · Leveraging Cyber Security Lab Environments to Identify Threats 1 ... malware and vendor solutions. ... Do they fit in your HR profile?

Honeywell Confidential - © 2018 by Honeywell International Inc. All rights reserved.

www.becybersecure.com