nis breakfast briefing
play

NIS Breakfast Briefing Secure Your Supply Chain Thursday 6 th - PowerPoint PPT Presentation

NIS Breakfast Briefing Secure Your Supply Chain Thursday 6 th September 2018 Agenda Welcome David Duke, Gemserv An Introduction to NIS Ian Davis, Gemserv Case Study National Energy Generator and Distributor Andy Green, Aprose


  1. NIS Breakfast Briefing Secure Your Supply Chain Thursday 6 th September 2018

  2. Agenda  Welcome David Duke, Gemserv  An Introduction to NIS Ian Davis, Gemserv  Case Study – National Energy Generator and Distributor Andy Green, Aprose  Introducing NIS into ABP Ewan Duncan, Associated British Ports Gemserv 2

  3. Agenda  Welcome David Duke, Gemserv  An Introduction to NIS Ian Davis, Gemserv  Case Study – National Energy Generator and Distributor Andy Green, Aprose  Introducing NIS into ABP Ewan Duncan, Associated British Ports Gemserv 3

  4. NIS Regulation NIS Regulation Breakfast Meeting Ian Davis – Head of Information Security

  5. Agenda  Introduction to NIS  Essential Service Scoping  Extent and complexity of the supply chain  Question and answer session Gemserv 5

  6. Network Information Security Regulation Introduction Gemserv 6

  7. Attacks on the Increase 92% 13% 600% Increase in new Overall increase in Increase in IoT downloader reported Attacks* variants* vulnerabilities* 29% 13% 54% Increase in industrial Overall increase in Increase in mobile control system (ICS) reported malware variants* related vulnerabilities* vulnerabilities* Gemserv *Source: Symantec 2018 Internet Security Threat Report 7

  8. Attacks on the Increase Initial Intelligence Stolen Modify systems Future attack Compromise gather credentials OT Gemserv 8

  9. Attacks on the Increase State and state-sponsored threats  Motivation  Political, diplomatic, technological, commercial, strategic advantage  To cause disruption  Skill  Offensive & destructive cyber capabilities  Highly funded  Covert operations and attacks  Opportunity  24/7 internet connected  Inadequate defences  Social engineering Gemserv 9

  10. Network Information Security Regulation  Raise UK Cybersecurity levels  Protect Critical National Infrastructure Gemserv 10

  11. NIS Timeline OES CAF NIS INCIDENTS OFCOM THRESHOLDS 2018 2019 Apr May Jul Aug Sep Nov Jan May CRITICAL CAF CAF 72 HOURS INCIDENTS CAF SYSTEMS FINDINGS Gemserv 11

  12. Cyber Assessment Framework Indicators of Good Practice in the Indicators of Good Practice tables CAF are: in the CAF are not:  Intended to help inform expert  A checklist to be used in an judgement inflexible assessment process  Examples of what an assessor will  An exhaustive list covering normally need to consider everything an assessor needs to consider  May need to be supplemented in some cases  Guaranteed to apply verbatim to all organisations  Designed to be widely applicable across organisations  Applicability needs to be established Gemserv 12

  13. Cyber Assessment Framework  OES’ will benefit from a mature ISMS  Audit team to complete self- assessment  Expected to take months  Continual improvement Gemserv 13

  14. Essential Service Scope 14

  15. Operator of Essential Service Thresholds 250,000 200,000 10M+ Passengers Providers of TLD 2 billion Consumers Consumers healthcare DNS 2M+ DNS 250,000 IXP 50% Gemserv 15

  16. Scope of Essential Service Thresholds Suppliers Transport IT & OT Essential Other CNI, power, Dependencies on Service water, transport, DSP sector ICS Network Processes Physical People Gemserv 16

  17. Scope of Essential Service - Threats ? OT OT Essential Service Gemserv 17

  18. Scope of Essential Service - Risk Treatment Threat Essential Likelihood Service Vulnerability Impact Asset Gemserv 18

  19. Business Impact Analysis Strategy and priority Objective: essential service Criticality, function and operating within threshold processes level Essential Service Recovery time objective (RTO) Tolerable disruption without Recovery point objective dependencies (RPO) Risk assessment Gemserv 19

  20. Extent and Complexity of the Supply Chain

  21. Extent and Complexity of the Supply Chain Essential Service Gemserv 21

  22. Extent and Complexity of the Supply Chain People  Skills shortage  Supplier culture  Leavers and movers  Physical equipment Essential  Security awareness training Service  Phishing and ransomware serious threat  Background checks  24/7 day and night shift Gemserv 22

  23. Extent and Complexity of the Supply Chain Technology, IT and OT  Network segmentation or air gap  Introduction of IoT  OT expertise with limited people  Incident response / forensics Essential capabilities for OT & IT Service  System and components  Secure engineering principles  Vulnerabilities Gemserv 23

  24. Extent and Complexity of the Supply Chain Cloud Services  Information in transit  Stored information  Physical access  Governance Essential  Background checks, user management Service  Active monitoring and audit records  Remote access, authentication  Privileged access  External interfaces Gemserv 24

  25. Extent and Complexity of the Supply Chain Supplier Security Baseline  Certification  ISO 27001  ISO 22301  Cyber Essentials Plus Essential  Procurement process Service  Security Awareness Training  BS7858 Background checks  Transparency  Contractual agreement  Notification  Incident response Gemserv 25

  26. In summary  The clock is ticking  Clear scope is essential  How exposed are you to risks from suppliers? Gemserv 26

  27. Agenda  Welcome David Duke, Gemserv  An Introduction to NIS Ian Davis, Gemserv  Case Study – National Energy Generator and Distributor Andy Green, Aprose  Introducing NIS into ABP Ewan Duncan, Associated British Ports Gemserv 27

  28. Case Study – National Energy Generator and Distributor Andy Green - Lead Security Consultant

  29. Overview  National Energy Company  Power Generation  Distribution Network Operator  Onward connectivity to other EU Power networks  Operator of Essential Service (OES) with c450k consumers  Need to comply with NIS Directive 29

  30. Organisational Scope  Large fibre network covering entire island  Distribution sub-stations  Interconnector to mainland EU  Head-office and remote offices  Power Stations  Large IT Network  OT Infrastructure including SCADA and ICS 30

  31. Cyber Security Risk Assessment  Risk Assessment followed the ISO27005 framework  Technical Risk Treatment was based the Critical Security Controls Top 20  The CSC20 has ICS alignment guidelines  Further aligned with NIST Cyber Security Framework for cyber resilience 31

  32. EU Funding  In partnership with the Home Office the risk assessment will be used as evidence for CEF funding  Connecting Europe Facility (CEF) is an EU funding programme  Objective 2: Capability development of Operators of Essential Services (OES) and Digital Service Providers (DSP) in line with the Security of Network and Information Systems Directive 32

  33. Agenda  Welcome David Duke, Gemserv  An Introduction to NIS Ian Davis, Gemserv  Case Study – National Energy Generator and Distributor Andy Green, Aprose  Introducing NIS into ABP Ewan Duncan, Associated British Ports Gemserv 33

  34. “Networked and Information Systems Regulations Introducing NIS R into ABP Ewan Duncan Group Head of Security Associated British Ports

  35. NIS R and cyber security. • ABP Context: • UK’s largest Port Operator • Humber to Silloth • Europe’s largest Cruise Liner operations (Southampton) • Reliance upon a variety of networked and information systems • Regulated by the DfT • Physical Security – PFSIs, vetting, annual audit and inspections (ISPS) • Data Protection • www.abports.co.uk 25/09/2018 35

  36. NIS R and cyber security. • We should be doing this anyway, but it’s forced upon us…. • No different to physical security – threat, risk, vulnerabilities. • NIS Regulation. • Alongside GDPR. • Impact upon Risk Management. • It came late…. • DCMS, Guidance, Direction – now ‘live’. • Cyber Security Code of Practice – not mandatory. • How important is it ? • Difficult to secure ‘buy in’. 25/09/2018 36

  37. NIS R and cyber security. • We should be doing this anyway, but its forced upon us…. • No different to physical security – threat, risk, vulnerabilities. • NIS Regulation. • Alongside GDPR. • Impact upon Risk Management. • It came late…. • DCMS, Guidance, Direction – now ‘live’. • Cyber Security Code of Practice – not mandatory. • How important is it ? • Difficult to secure ‘buy in’ – in a commercial environment.. 25/09/2018 37

  38. NIS R and cyber security. Security of Networked and Information Systems • Does this include: • Cyber Security ? • Physical Security ? • Data Protection ? • Risk Management ? • Physical processes ? 25/09/2018 38

  39. NIS R and cyber security. Security of Networked and Information Systems • Does this include: • Cyber Security ? • Physical Security ? • Data Protection ? • Risk Management ? • Physical processes ? …it does within ABP. 25/09/2018 39

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend