1 / 10

Maritime Cyber Security: An Overview May 2014

Maritime Cyber Security: An Overview May 2014. What is Maritime Cyber Security?. www.sera-brynn.com | info@sera-brynn.com | 757-243-1257. COMPLEXITY IN MOTION. Systems Support Both Operations and Business Processes Operational Systems Similar to Industrial Control Systems/SCADA

darrin
Download Presentation

Maritime Cyber Security: An Overview May 2014

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Maritime Cyber Security: An Overview May 2014

  2. What is Maritime Cyber Security? www.sera-brynn.com | info@sera-brynn.com | 757-243-1257

  3. COMPLEXITY IN MOTION • Systems Support Both Operations and Business Processes • Operational Systems Similar to Industrial Control Systems/SCADA • Often Stove-Piped, Require Integrations • Maintaining Operations is Paramount • Security May Be A Shared Responsibility Between Commercial and Government www.sera-brynn.com | info@sera-brynn.com | 757-243-1257

  4. THE PERFECT STORM • Lack of Consistent Regulation • Designated Critical Infrastructure in Many Cases • Often Shared Security Responsibility Between Commercial and Government • Competitive Environment • Cyber Security Only Gets Noticed When It Goes Awry www.sera-brynn.com | info@sera-brynn.com | 757-243-1257

  5. CREDIBLE THREATS • Under the Radar No More – Automated Attacks Don’t Discriminate • Kinetic Impact on Critical Infrastructure • Insider Threats and Organized Crime • Lack of Support As Products Age • Liability and Risk Management • 229 Days is Average Time to Discover Advanced Attack • Within a year of STUXNET, U.S. CERT saw a 1,900% Increase In Security Advisories for SCADA/ICS Products www.sera-brynn.com | info@sera-brynn.com | 757-243-1257

  6. What’s the Solution? www.sera-brynn.com | info@sera-brynn.com | 757-243-1257

  7. BEYOND SCARE TACTICS • A compromised network is only valuable when operational. • Visibility Into Network Activity Is Essential • Layered Defenses (Defense-In-Depth) • Disaster Planning • Risk Management www.sera-brynn.com | info@sera-brynn.com | 757-243-1257

  8. SELF ASSESSMENT • If you are responsible for cyber security: • Do you know what, if any, compliance framework applies? • Would an auditor conclude that you were compliant? Or negligent? • Can you justify the operational risk if security trade-offs are made? Who in the organization has accepted the risk? www.sera-brynn.com | info@sera-brynn.com | 757-243-1257

  9. QUESTIONS? www.sera-brynn.com | info@sera-brynn.com | 757-243-1257

  10. THANK YOU Sera-Brynn 5806 Harbour View Blvd. Suite 204 Suffolk, VA 23435 info@sera-brynn.com 757-243-1257 Heather Engel, CISSP Principal | Sera-Brynn Heather.engel@sera-brynn.com 757-358-1164 www.sera-brynn.com | info@sera-brynn.com | 757-243-1257

More Related