Marine Industry Day 2015 Sector Command Center (24 hours): (504) 365-2200 National Response Center: 1-800-424-8802 Website:

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
David A. Brown Chief Information Security Officer State of Ohio
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
The U.S. Coast Guard’s Role in Cybersecurity
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Maritime Cyber Risks – What is real, what is fiction?
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Information Warfare Playgrounds to Battlegrounds.
7 Information Security.
Homeland Security UNCLASSIFIED United States Coast Guard Office of Port and Facility Compliance (CG-FAC) Cyber Security and the Marine Transportation System.
Cyber Security Nevada Businesses Overview June, 2014.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Maritime Cyber Vulnerabilities in the Energy Sector Center for Joint Operations of the Sea ODU Maritime Institute Students Crow, Fresco, Lee.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Information Warfare Playgrounds to Battlegrounds.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
FFIEC Cyber Security Assessment Tool
Security Mindset Lesson Introduction Why is cyber security important?
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Current State of Cyber Security and How to Defend Your Data.
Security Industry Association Presents Keeping Cargo Moving: Maritime Cybersecurity Brett Rouzer, U.S. Coast Guard Cyber Command April Danos, Greater Lafourche.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
UNCLASSIFIED Homeland Security 2016 TRB Annual Meeting Cyber Risk Management CAPT Verne Gifford (CG-5PC) 1.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
October 28, 2015 Cyber Security Awareness Update.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Law Firm Data Security: What In-house Counsel Need to Know
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Information Security Program
Risk management.
Cybersecurity - What’s Next? June 2017
E&O Risk Management: Meeting the Challenge of Change
Public Facilities and Cyber Security
Business Counter-Intelligence
Cyber Security: State of the Nation
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Cybersecurity EXERCISE (CE) ATD Scenario intro
United States Coast Guard
EVOLVING THREATS, VULNERABILITIES AND COUNTERMEASURES
Securing Information Systems
Forensics Week 11.
Cyber Security in Ports Business as Usual?
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Security Essentials for Small Businesses
Keeping your data, money & reputation safe
Anatomy of a Large Scale Attack
Cybersecurity Threat Assessment
Strategic threat assessment
Cybersecurity EXERCISE (CE) ATD Scenario questions
CYBER RISKS IN SECURITIES SERVICES
“Workplace Behaviour: Activating your greatest security asset”
Presentation transcript:

Marine Industry Day 2015 Sector Command Center (24 hours): (504) National Response Center: Website:

2015 Industry Day New Orleans, LA Cyber Risk Management Presenter: LCDR Bob Kinsey Coast Guard Sector New Orleans 2

PRESENTATION OVERVIEW Why worry about Cyber? Real life examples Recommended Tasks & Resources 3

Ships Then

Ships Now

Cargo Operations Then

Cargo Operations Now

The Evolving Threat…Call to Action “Cybersecurity is one of the most serious economic and national security challenges we face as a nation…” - President Obama, February 2013 “Cyber affects the full spectrum of Coast Guard operations…it cuts across every aspect of the Coast Guard. We all have a role in cybersecurity and protection of our networks, and we must treat them like the mission-critical assets that they are.” - Admiral Zukunft, September 2014 “All sectors of our country are at risk…the seriousness and the diversity of the threats that this country faces in the cyber domain are increasing on a daily basis.” - DNI Director Clapper, March 2013 “The loss of industrial information and intellectual property through cyber espionage constitutes the greatest transfer of wealth in history.” - General Alexander, August 2013

Threat Actors Self-inflicted Nation-states Hacktivists Criminals Insiders Natural

Hackers/Intrusion Sets Phishing Social Engineering or Elicitation Malicious Code Mirrored Websites Insider Threat How about accidents? 10 Cyber Threats Social Engineering Phishing Insider Threat Hackers Mirrored Websites Malicious Code Types of Cyber Threats We are Facing

1991 – United States A fired employee of an oil and gas industry's emergency alert network disabled the firm’s alert system in 22 states by hacking into computers During an emergency at the refinery the system could not be used to notify the adjacent community of the release of a noxious substance.

Russia A hacker was able to control the computer system that governs the flow of natural gas through the pipelines. A Trojan program was inserted into SCADA system software that caused a massive natural gas explosion along the Trans-Siberian pipeline. The Washington Post reported that it yielded "the most monumental non-nuclear explosion and fire ever seen from space." The explosion was subsequently estimated at the equivalent of 3 Kilotons. (In comparison, the 9/11 explosions at the World Trade Center were roughly 0.1 kiloton.)

2001 – Port Facility An 18 year old hacker brought the systems of a Port Facility to a halt during a revenge attack on a fellow internet chatroom user. Hacked into the computer server at the Port Facility in order to target a female chatroom user following an argument. The port's web service, which contained crucial data for shipping pilots, mooring companies and support firms responsible for helping ships navigate in and out of the harbor was inaccessible.

Insider Threat – Malware via USB Device What happened? Targeted attack against refinery Disgruntled employee loaded malware on company computers Impact to business systems Remediation required 3 rd party assistance

GPS Spoofing 15 In 2013, a University of Texas team conducted an experiment to take control of auto-pilot function by spoofing GPS The 213-foot White Rose is the US$80M megayacht whose GPS navigational system was spoofed by about $2,000- $3,000 worth of equipment (Photo: U of Texas at Austin)

HOW DO WE GET THESE GROUPS TO WORK TOGETHER ? 16 ITSecurityBusiness

Evaluate your Vulnerabilities –Website: –DHS ICS-CERT offers free training –NIST Cyber Security Framework (voluntary) Evaluate your Resiliency –What would you do if your computers suddenly become paper wieghts ? Create an culture of Cyber Awareness –Cyber is not just the IT staff’s problem Report all Cyber Incidents –Sector Command Center (24 hours): (504) –National Response Center: –DHS US-CERT or https:// –FBI reporting: Recommendations

THANK YOU FOR YOUR TIME! 18