12
©2015 Check Point Software Technologies Ltd. 1 ZERO TOLERANCE When it comes to protecting your critical infrastructur even small failures have huge consequences

Protecting Critical Infastrucutre: Zero Tolerance

Embed Size (px)

Citation preview

Page 1: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 1

ZERO TOLERANCEWhen it comes to protecting your critical infrastructure,even small failures have huge consequences

Page 2: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 2[Protected] Non-confidential content

Industrial Control Systems (ICS) Are All Around Us

… and we rely on it every day for our basic functions and needs.

Shipping Traffic ControlFirst Responder Dispatch

Water Treatment Power Transportation

Page 3: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 3

Impact of Critical Infrastructure Interruptions

Megacities like New York, Tokyo, London, Paris rely daily on their infrastructure:

• Home to 6.7% of world population

• Use 9.6% of global electricity usage

• Produce 12.6% of global waste

Economic impact per day for NYC:

• $3.6 Billion lost revenue

Page 4: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 44©2014 Check Point Software Technologies Ltd.[Protected] Non-confidential content

Zero Tolerancefor ICS

downtime of any kind

Page 5: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 5

The Zero Tolerance Environment

SCADA Environments

SCADA Worlds

Page 6: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 6[Protected] Non-confidential content©2015 Check Point Software Technologies Ltd. 6©2015 Check Point Software Technologies Ltd. 6

Unique ICS Traits

Survival in Harsh Environments

Unique SCADA Languages

Basic Commands

Large Mechanical Controls

Large Scale Deployments

Page 7: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 7

OT Security BlueprintManagement Facility

Shop Floor Shop Floor

Control & monitor

SCADA Historian

SCADA VPN

PLC1 PLC2 PLC3 PLC4

Main Control Center

ControlMonitor

SmartEvent

[Protected] Non-confidential content

Page 8: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 8

Full IT-OT Convergence Blueprint

[Protected] Non-confidential content

Page 9: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 9[Protected] Non-confidential content

Zero Tolerance Means Anticipating Attacks for IT and SCADA/ICS Equipment

Spear Phishing USB/CD Attacks Targeting Contractors

Free USB Stick or Music CD

The ‘Symposium’ Spear Phishing

Vendor Access Credentials

800 Just the IT patches released in first six months of 2015

Page 10: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 10

How would you grade your Industrial Control Systems

protection?

Page 11: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 11

Summary

Protecting industrial control systems should mean Zero Tolerance for mistakes

Hardware that can survive is crucial

Protection is all about capacity and depth of coverage

[Protected] Non-confidential content

Page 12: Protecting Critical Infastrucutre: Zero Tolerance

©2015 Check Point Software Technologies Ltd. 12

ZERO TOLERANCEWhen it comes to protecting your critical infrastructure,even small failures have huge consequences

Download the Report to See How Your Solution Scored