What you gonna do when they come for you?
October 23rd, 2019
Tennessee Pollution Prevention Webinar
Being Proactive rather than Reactive for CyberSecurity in the Manufacturing Industry
What you gonna do when they come for you? Being Proactive rather - - PowerPoint PPT Presentation
Tennessee Pollution Prevention Webinar What you gonna do when they come for you? Being Proactive rather than Reactive for CyberSecurity in the Manufacturing Industry October 23 rd , 2019 Ben Bolton Energy Programs Administrator for TDECs
October 23rd, 2019
Being Proactive rather than Reactive for CyberSecurity in the Manufacturing Industry
Ben manages activities related to energy security planning, preparedness, and response, as well as the energy-water nexus. He currently serves as Co-Chair of the National Association of State Energy Officials’ Energy Security Committee and represents Tennessee on FEMA’s Mitigation Framework Leadership Group. Prior to joining the State, he was an environmental scientist providing technical support to public and private sector
from Birmingham-Southern College.
Energy Programs Administrator for TDEC’s Office of Energy Programs
Special Agent Cotter joined TDSHS in 2008 and was promoted in 2012 to Supervisory Intelligence Officer and Co-Director of the Tennessee Fusion Center. He is a graduate of the Naval Post Graduate School Fusion Center Leaders Program, the Southeastern Command and Leadership Academy, and holds a B.S. in Criminal
Marine Corps.
Special Agent, Cyber Operations Program Manager at the Tennessee Department of Safety and Homeland Security (TDSHS).
4
5
Erik Qualman
6
7
▫ Educate, Empower, Enforce
8
9
▫ Cyber affects us all professionally and personally ▫ Interconnectivity – Vulnerability – Liability
– Vehicles, Medical Devices, Appliances, Sensors, etc.
▫ Internet of Things (IoT)
10
11
▫ Phishing, 3rd party hosting, fraud, money laundering – ebooks
▫ National Insider Threat Task Force – The insider threat is a dynamic problem set, requiring resilient and adaptable programs to address an evolving threat landscape, advances in technology, and organizational change.
adaptive and innovative approaches to maneuver and transition in this spectrum; world events
12
targeted system using vulnerabilities, social engineering, or bruteforced passwords, planting malicious software on victims' devices via infected websites, and sending malicious attachments or links by email.
message, link, or attachment is from a trusted source, and then infecting targeted systems with malware, stealing money, or accessing confidential information. (Social Media and Deep Fake)
damage to governments, banks, and cryptocurrency platforms.
13
can be exploited. Takeaway – be mindful of what you are allowed to download on your devices, what kind of data the apps share, and restrict what apps can access on your devices.
Your Account, Copy or Document Copy, Action Required: Pay your seller account balance, AMAZON: Your Order no #812-4623 might ARRIVED. ***Be mindful of Current Events***
14
15
16
17
18
▫ 80% of all confirmed breaches had weak, default, or stolen PWs*
▫ 43% of breaches started on social media*
https://www.shodan.io/
* Verizon 2018 Data Breach Report
19
20
21
22
James Cotter TN Department of Safety & Homeland Security James.cotter@tn.gov
October 23rd, 2019
Eric currently serves as Assistant Director for the Cybersecurity Education, Research and Outreach Center at Tennessee Tech University. Among other duties, Eric leads the cyber risk assessment program conducted in cooperation with the Tennessee 3-Star Industrial Assessment Center at Tennessee Tech University. CEROC focuses on extra-curricular training opportunities in cybersecurity, research across multiple cyber domains, and outreach to K20 students and stakeholders with an
Assistant Director Cybersecurity Education, Research, and Outreach Center Tennessee Tech University
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
https://www.caecommunity.org/content/cae-institution-map
https://www.cybersecuritymastersdegree.org/cybercorps/ - Community College Pathway (1 of 10 in
nation)
■ Tennessee 3-Star Industrial Assessment Center providing cyber risk assessment services for
power assessment clients
■ Academic Alliance Partner with DHS in the STOP. THINK. CONNECT! Initiative
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
Only Program in Tennessee to Offer CyberSecurity Specialization at the Bachelor, Masters and Ph.D. levels K12 Outreach Events supporting cybersecurity awareness and competition
Only NSA-Designated Center of Academic Excellence in Cyber Defense Education Four-Year Program in Tennessee Only DoD Cyber Scholarship Program in Tennessee Active Cybersecurity Club with 3 skill training groups in
CTF First and Largest CyberCorps SFS Scholarship Program in Tennessee Research areas in cyber physical systems, smart grid, vehicular networks, formal methods, graph-based anomalies, risk assessment Only GenCyber Student summer Program in Tennessee Central Region Host
Penetration Testing Competition
CEROC at a Glance
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online. More information can be found at https://niccs.us-cert.gov/national- cybersecurity-awareness-month-
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
The following information is provided by the 2019 Data Breach Investigations Report from Verizon (https://enterprise.verizon.com/resources/reports/dbir/). Consider the following.
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
2019 Verizon Report: “Manufacturing has been experiencing an increase in financially motivated breaches in the past couple of years, but espionage is still a strong motivator. Most breaches involve phishing and the use of stolen credentials.”
disclosures
Espionage represent 71% of the breaches
(20%), multiple parties (6%), and partners (1%)
espionage (27%), grudges (3%), and fun (2%) motives.
credentials (49%), internal (41%), and secrets (36%).
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
Acknowledging that cyber attacks are possible is the very first step to towards dealing with the issue. There are some small companies that still believe that they are not susceptible to attack because “we are just a little company in a rural area… nobody even knows that we are here.” If you are plugged in, they know you are there!
Phishing
demand
address
Supply Chain Attacks
preventatives
Malware
maintenance” systems
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
billions of dollars for its perpetrators.
the second largest affected sector in early 2019.
victims have said enough is enough and did not pay)
found at https://www.us-cert.gov/Ransomware
https://blog.trendmicro.com/wp-content/uploads/2019/07/Capture.png
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
The sky is not falling! All businesses throughout the ages have had to deal with very large problems with the potential to interrupt business process and subsequent
mitigate the issue. Consider the stage coaches of the Old West; one additional driver with shotgun talents could curb some theft threats. Here are some steps!
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
social engineering. Cyber safety at home translates to cyber safety at work. Think that this is not true? How many smartphones enter your workplace everyday?
○ Business Continuity Plan ○ Disaster Recovery Plan ○ Incident Response Plan ○ Internal Bug Bounty Plan/Program
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
○ Employee Onboarding, Offboarding, and Transition Procedures (nerdy version: identification, authentication, authorization) ○ Position-appropriate Technology Training ○ IT and Electronic Device Procurement Procedures ○ Technology Deployment Procedures ○ IT Lifecycle Procedures ○ System Image (software and firmware) and Software Package Management ○ Information Lifecycle Management (archive, backup, restore, and even destroy)
Rule of 3’s – If you perform a activity three or more times the exact same way, create a reproduceable, automated process and document it!
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
infrastructure and processes. Such assessments can provide valuable insights to hidden issues as well as provide a complementary assessment to
partners and not adversaries. Make sure an IT person sits at the C-level meetings.
(penetration test) to internally evaluate vulnerabilities. Create blue teams (protection test) to increase defensive capacities using red team input.
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8183.pdf
○ Volume 1 – General Implementation Guidance - https://csrc.nist.gov/publications/detail/nistir/8183a/vol-1/final ○ Volume 2 – Process-based Manufacturing System Use Case https://csrc.nist.gov/publications/detail/nistir/8183a/vol-2/final ○ Volume 3 – Discrete-based Manufacturing System Use Case https://csrc.nist.gov/publications/detail/nistir/8183a/vol-3/final
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
Systems and Organizations https://csrc.nist.gov/publications/detail/sp/800- 53/rev-4/final
Information Systems and Organizations: Building Effective Assessment Plans https://csrc.nist.gov/publications/detail/sp/800-53a/rev-4/final
Information in Nonfederal Systems and Organizations: Enhanced Security Requirements for Critical Programs and High Value Assets https://www.nist.gov/news-events/news/2019/06/protecting-controlled- unclassified-information-comment-draft-nist-sp-800
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
asiraj@tntech.edu
elbrown@tntech.edu Staff https://www.tntech.edu/ceroc/people/
https://www.tntech.edu/ceroc / @TNTechCEROC / ceroc@tntech.edu
1020 Stadium Dr, PRSC 414 Cookeville, TN 38505 Email: ceroc@tntech.edu Phone: (931) 372-3519 Website: https://www.tntech.edu/ceroc Facebook: https://www.facebook.com/tntechceroc Twitter: @tntechceroc LinkedIn: https://www.linkedin.com/company/tntechceroc
October 23rd, 2019