SlideShare una empresa de Scribd logo
1 de 27
Descargar para leer sin conexión
© Copyright 2018 OSIsoft, LLC 1
How Facility Controls
Systems Present
Cybersecurity Challenges
Learn how you can resolve them
Scott Smith
Principal – Facilities and Data Centers
OSIsoft
2018
© Copyright 2018 OSIsoft, LLC
Speaker
2
Scott D. Smith
– OSIsoft
– Industry Principal, Facilities & Data Centers
Perspective
– IT background
• Enterprise system architecture
• System operations
• Disaster recovery and IT security
– 15 Years in IT/OT environments
• Power generation
• Energy trading
• Electric distribution and transmission
– 10 Years in software solutions
© Copyright 2018 OSIsoft, LLC
Objective
As we continue to require the need for such data, serious
cybersecurity risks are brought to light from inadequate
security architecture or lack of process and controls. We
need to be able to identify our risks and develop a
mitigation strategy.
3
© Copyright 2018 OSIsoft, LLC
Lessons
• Discuss how to raise awareness of cybersecurity threats
• Identify the value of IT/OT integration in solving
cybersecurity threats
• List challenges of IT/OT integration
• Describe the value we can receive from IT/OT
integration and the expansion of data sharing
4
© Copyright 2018 OSIsoft, LLC
The Challenge
© Copyright 2018 OSIsoft, LLC
Mission Critical Nature of Facility Operations
6
fa·cil·i·ty
/fəˈsilədē/
Noun - noun: facility; plural noun: facilities
1. a place, that provides particular purpose such as an
office, store or school
2. Mission Critical Infrastructure, the mission may vary
from a hospital who has a live saving mission, a corporate
campus who has a mission to support the core business
operations to a government building that provides
financial, security or social services.
✓ Life Saving
✓ Food Supply
✓ Housing
✓ Security
✓ R&D
✓ Regulatory
✓ Manufacturing
© Copyright 2018 OSIsoft, LLC
The Risk is Real
7
An attack on US retailer Target, in which
millions of customers' credit card
information was stolen, was traced back
to the heating and ventilation system.
Tomorrow's Buildings:
Help! My building has been hacked
In 2013, Google - one of the world's pre-
eminent tech companies - was hacked.
“How a fish tank helped hack a casino”
A 2018 U.S. Department of
Defense (DoD) report to
Congress estimates it could cost
more than $250 million over the
next four years to identify,
register and implement fixes to
vulnerabilities in DoD facility
control systems.
The risk does not have to malicious it could be the
execution of poorly trained or inappropriate resources
© Copyright 2018 OSIsoft, LLC
Driven to Share Information
8
1
2
3
4
5
Situational Awareness
New Technology (IOT)
Operational Efficiencies
Energy Savings
Planning with M&V
© Copyright 2018 OSIsoft, LLC
Center of all process
design, system
integration, and
automation is
SECURITY
Ongoing success of
SECURITY is
measured by your
Situational Awareness
of change
© Copyright 2018 OSIsoft, LLC
5 Challenges to the Cybersecurity Challenge
10
All environments have
unique challenges, we
will discuss 5 core
areas of risk
© Copyright 2018 OSIsoft, LLC
Cybersecurity Today
1. Facility systems installed without security expertise
2. Remote access for 3rd parties
3. Merged control networks and IT networks
4. Lack of multi-layer security
© Copyright 2018 OSIsoft, LLC
Challenge 1 – Separate Data from Control
12
1. Understand future needs and value of data
2. Increase access to data while separating control
3. Use the situational awareness of data to evolve security posture
© Copyright 2018 OSIsoft, LLC
Challenge 2 – Internet Accessible
13
Shodan.io - Shodan is the world's first search engine for Internet-connected devices
In less than 5 minutes identified multiple systems and had broadcast
addresses and log in screens for Johnson Controls, Niagara and Alerton
systems
Search
Result Access
© Copyright 2018 OSIsoft, LLC
Challenge 3 – Remote Access
14
• Commission Process Remote Access
• Outsource Maintenance and
Management
• Accidental - Installer’s lack of security
knowledge
Trends
1. Have you completed a review to understand your
risk and vulnerability from cybersecurity threats
Answer: 46%
2. Are any of your building management systems
under a service contract that allows remote
access?
Answer: 70%
Building Operating Management Survey (2018)
© Copyright 2018 OSIsoft, LLC
Challenge 4 – Lack of Visibility to Best Practices
15
The only time most people even think
about the building systems are when they
are not comfortable.
More times than not your own IT security
team may have no knowledge or
awareness of these control systems.
Leverage the decades of lessons learned on security,
risk assessments, disaster planning and change
control offered by your own IT and OT operations
© Copyright 2018 OSIsoft, LLC
Challenge 5 – Lack of Situational Awareness
16
Baseline + M&V
Contingency Plans
Documentation “AS-IS”
• Monitor set points and configurations settings
• Baseline performance for deviations
• Create alerts to changes
• Develop risk matrix
• Identify operations that require facility services
• Create plans for loss of control
• Export configuration
• Monitor change logs to configuration
• Create a log of changes
© Copyright 2018 OSIsoft, LLC
IT/OT Value
© Copyright 2018 OSIsoft, LLC
IT & OT Convergence Is a Key Answer
18
© Copyright 2018 OSIsoft, LLC
Technology Barriers Have Fallen
19
▪ Common Protocols
▪ Open Standards
▪ Common Operating
Systems
▪ Common Hardware
▪ Shared Services
© Copyright 2018 OSIsoft, LLC
Cultural and Functional Barriers Remain
20
• Different Languages
– Operational Decision Making
– Outage (Control Systems vs IT Systems)
– Maintenance
– System Upgrades
– Security
• Organizational Silos
• Increased Risk – Cyber Security
• Profit –Loss Implications
• Mission Success
© Copyright 2018 OSIsoft, LLC
Security Models
21
Traditional Control Security Model IT Security Model
• No inbound/outbound access
• Barrier of entry
• Insure networks leveraging application password
• Secure Barriers (Inside and Out)
• Centralized security directory
• Security monitoring tools and services
Open protocols
within control
Application
Security
Firewalls Firewalls
Master Controls
Data & User
Segregation
© Copyright 2018 OSIsoft, LLC
A Strategy to Embrace OT IT Integration
22
Define Target/Objective
Define Governance
Separate Data from Control
Data Infrastructure
Secure Unidirectional
Asset or Process Centric
Knowledge Sharing
Heavy Hand of IT Full Scale Integration
© Copyright 2018 OSIsoft, LLC
Define Mutually Beneficial Value
• Identify operational
challenges
• Identify business
challenges
• Identify Security Best
Practices
• Pick the low hanging fruit
© Copyright 2018 OSIsoft, LLC
Business Intelligence
Standard Reporting
Ad hoc Reports
Query Drill Down
Alerts
Statistical Analysis
Forecasting
Predictive Modeling
Optimization
What Happened?
How Many, How Often, Where?
Where exactly is the problem?
What actions are needed?
Why is this happening?
What if these trends continue?
What will happen next?
What’s the best that can happen?
Distance from Operations
ComplexityofIntelligence
Objective: New Enterprise IT
Technologies To Meet Business &
Operational Goals
Operational Intelligence
Thought Process – Identify value of data to process objectives
© Copyright 2018 OSIsoft, LLC
Benefits: Why do we care
• Financial Performance
– Track financial performance of operational decisions
– Optimize asset performance
– Optimize business operations based on market conditions
– Supply chain improvements
• Improved Governance
– Expand the view beyond the context of a single system
– Align to “Chart of Operations/Financial Operations”
• Risk Reduction and Resilience
– Situational Awareness
– Condition Based Maintenance
– Cybersecurity Architecture
© Copyright 2018 OSIsoft, LLC
For more information…
26
…visit our Facilities web page…
…or you can visit the Facilities Cybersecurity page.
You can also go to our PI System Overview webpage to learn more about OSIsoft
and the PI System.
© Copyright 2018 OSIsoft, LLC

Más contenido relacionado

La actualidad más candente

AIOps - Steps Towards Autonomous Operations - AWS Summit Sydney 2019
AIOps - Steps Towards Autonomous Operations - AWS Summit Sydney 2019AIOps - Steps Towards Autonomous Operations - AWS Summit Sydney 2019
AIOps - Steps Towards Autonomous Operations - AWS Summit Sydney 2019Amazon Web Services
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelJohn Weiler
 
The Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoTThe Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoTPeter Nguyen
 
Establishing sustainable GDPR compliance
Establishing sustainable GDPR complianceEstablishing sustainable GDPR compliance
Establishing sustainable GDPR complianceCloudera, Inc.
 
Big Data Techcon 2014
Big Data Techcon 2014Big Data Techcon 2014
Big Data Techcon 2014Samir Lad
 
Data Centers in the age of the Industrial Internet
Data Centers in the age of the Industrial InternetData Centers in the age of the Industrial Internet
Data Centers in the age of the Industrial InternetGE_India
 
AIOps: Your DevOps Co-Pilot
AIOps: Your DevOps Co-PilotAIOps: Your DevOps Co-Pilot
AIOps: Your DevOps Co-PilotDevOps.com
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?Precisely
 
Big data in oil and natural gas industries
Big data in oil and natural gas industriesBig data in oil and natural gas industries
Big data in oil and natural gas industriesVINU KIRAN S
 
Synergize Strategies for Greater Success in Automotive
Synergize Strategies for Greater Success in AutomotiveSynergize Strategies for Greater Success in Automotive
Synergize Strategies for Greater Success in AutomotivePlex Systems
 
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...Enterprise Management Associates
 
Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementHCL Technologies
 
Mind + Machines 2015: Digital Transformation in Internet of Things Era
Mind + Machines 2015: Digital Transformation in Internet of Things EraMind + Machines 2015: Digital Transformation in Internet of Things Era
Mind + Machines 2015: Digital Transformation in Internet of Things EraVMware Tanzu
 
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...TheAnfieldGroup
 
NIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsNIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsi-SCOOP
 
Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...
Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...
Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...Altoros
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firmsaccenture
 

La actualidad más candente (20)

AIOps - Steps Towards Autonomous Operations - AWS Summit Sydney 2019
AIOps - Steps Towards Autonomous Operations - AWS Summit Sydney 2019AIOps - Steps Towards Autonomous Operations - AWS Summit Sydney 2019
AIOps - Steps Towards Autonomous Operations - AWS Summit Sydney 2019
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
 
The Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoTThe Analytics Value Chain - Key to Delivering Business Value in IoT
The Analytics Value Chain - Key to Delivering Business Value in IoT
 
Establishing sustainable GDPR compliance
Establishing sustainable GDPR complianceEstablishing sustainable GDPR compliance
Establishing sustainable GDPR compliance
 
Big Data Techcon 2014
Big Data Techcon 2014Big Data Techcon 2014
Big Data Techcon 2014
 
Data Centers in the age of the Industrial Internet
Data Centers in the age of the Industrial InternetData Centers in the age of the Industrial Internet
Data Centers in the age of the Industrial Internet
 
AIOps: Your DevOps Co-Pilot
AIOps: Your DevOps Co-PilotAIOps: Your DevOps Co-Pilot
AIOps: Your DevOps Co-Pilot
 
What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?What Does Artificial Intelligence Have to Do with IT Operations?
What Does Artificial Intelligence Have to Do with IT Operations?
 
Big data in oil and natural gas industries
Big data in oil and natural gas industriesBig data in oil and natural gas industries
Big data in oil and natural gas industries
 
Synergize Strategies for Greater Success in Automotive
Synergize Strategies for Greater Success in AutomotiveSynergize Strategies for Greater Success in Automotive
Synergize Strategies for Greater Success in Automotive
 
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...
AIOps and IT Analytics at the Crossroads: What’s Real Today and What’s Needed...
 
Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and Management
 
BDPA Cincinnati: 'Big Data - Friend or Foe?'
BDPA Cincinnati: 'Big Data - Friend or Foe?' BDPA Cincinnati: 'Big Data - Friend or Foe?'
BDPA Cincinnati: 'Big Data - Friend or Foe?'
 
Mind + Machines 2015: Digital Transformation in Internet of Things Era
Mind + Machines 2015: Digital Transformation in Internet of Things EraMind + Machines 2015: Digital Transformation in Internet of Things Era
Mind + Machines 2015: Digital Transformation in Internet of Things Era
 
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
 
NIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsNIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitions
 
Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...
Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...
Capturing Data and Improving Outcomes for Humans and Machines Using the Inter...
 
Oil & Gas Fields Get Smart
Oil & Gas Fields Get SmartOil & Gas Fields Get Smart
Oil & Gas Fields Get Smart
 
General Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian FirmsGeneral Data Protection Regulation (GDPR) Implications for Canadian Firms
General Data Protection Regulation (GDPR) Implications for Canadian Firms
 
Digital Twin: A value creator
Digital Twin: A value creatorDigital Twin: A value creator
Digital Twin: A value creator
 

Similar a How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft

Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementAleksey Lukatskiy
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionMike Wons
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefVisal Thach
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsZeshan Sattar
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsSolarWinds
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceChristian F. Nissen
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilienceaccenture
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachKevin Murphy
 

Similar a How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft (20)

Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
Topic11
Topic11Topic11
Topic11
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
It implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-briefIt implement-it-asset-management-executive-brief
It implement-it-asset-management-executive-brief
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
Accenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber ResilienceAccenture Security CG&S Cyber Resilience
Accenture Security CG&S Cyber Resilience
 
Leveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future BreachLeveraging Compliance to “Help” Prevent a Future Breach
Leveraging Compliance to “Help” Prevent a Future Breach
 

Último

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Último (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft

  • 1. © Copyright 2018 OSIsoft, LLC 1 How Facility Controls Systems Present Cybersecurity Challenges Learn how you can resolve them Scott Smith Principal – Facilities and Data Centers OSIsoft 2018
  • 2. © Copyright 2018 OSIsoft, LLC Speaker 2 Scott D. Smith – OSIsoft – Industry Principal, Facilities & Data Centers Perspective – IT background • Enterprise system architecture • System operations • Disaster recovery and IT security – 15 Years in IT/OT environments • Power generation • Energy trading • Electric distribution and transmission – 10 Years in software solutions
  • 3. © Copyright 2018 OSIsoft, LLC Objective As we continue to require the need for such data, serious cybersecurity risks are brought to light from inadequate security architecture or lack of process and controls. We need to be able to identify our risks and develop a mitigation strategy. 3
  • 4. © Copyright 2018 OSIsoft, LLC Lessons • Discuss how to raise awareness of cybersecurity threats • Identify the value of IT/OT integration in solving cybersecurity threats • List challenges of IT/OT integration • Describe the value we can receive from IT/OT integration and the expansion of data sharing 4
  • 5. © Copyright 2018 OSIsoft, LLC The Challenge
  • 6. © Copyright 2018 OSIsoft, LLC Mission Critical Nature of Facility Operations 6 fa·cil·i·ty /fəˈsilədē/ Noun - noun: facility; plural noun: facilities 1. a place, that provides particular purpose such as an office, store or school 2. Mission Critical Infrastructure, the mission may vary from a hospital who has a live saving mission, a corporate campus who has a mission to support the core business operations to a government building that provides financial, security or social services. ✓ Life Saving ✓ Food Supply ✓ Housing ✓ Security ✓ R&D ✓ Regulatory ✓ Manufacturing
  • 7. © Copyright 2018 OSIsoft, LLC The Risk is Real 7 An attack on US retailer Target, in which millions of customers' credit card information was stolen, was traced back to the heating and ventilation system. Tomorrow's Buildings: Help! My building has been hacked In 2013, Google - one of the world's pre- eminent tech companies - was hacked. “How a fish tank helped hack a casino” A 2018 U.S. Department of Defense (DoD) report to Congress estimates it could cost more than $250 million over the next four years to identify, register and implement fixes to vulnerabilities in DoD facility control systems. The risk does not have to malicious it could be the execution of poorly trained or inappropriate resources
  • 8. © Copyright 2018 OSIsoft, LLC Driven to Share Information 8 1 2 3 4 5 Situational Awareness New Technology (IOT) Operational Efficiencies Energy Savings Planning with M&V
  • 9. © Copyright 2018 OSIsoft, LLC Center of all process design, system integration, and automation is SECURITY Ongoing success of SECURITY is measured by your Situational Awareness of change
  • 10. © Copyright 2018 OSIsoft, LLC 5 Challenges to the Cybersecurity Challenge 10 All environments have unique challenges, we will discuss 5 core areas of risk
  • 11. © Copyright 2018 OSIsoft, LLC Cybersecurity Today 1. Facility systems installed without security expertise 2. Remote access for 3rd parties 3. Merged control networks and IT networks 4. Lack of multi-layer security
  • 12. © Copyright 2018 OSIsoft, LLC Challenge 1 – Separate Data from Control 12 1. Understand future needs and value of data 2. Increase access to data while separating control 3. Use the situational awareness of data to evolve security posture
  • 13. © Copyright 2018 OSIsoft, LLC Challenge 2 – Internet Accessible 13 Shodan.io - Shodan is the world's first search engine for Internet-connected devices In less than 5 minutes identified multiple systems and had broadcast addresses and log in screens for Johnson Controls, Niagara and Alerton systems Search Result Access
  • 14. © Copyright 2018 OSIsoft, LLC Challenge 3 – Remote Access 14 • Commission Process Remote Access • Outsource Maintenance and Management • Accidental - Installer’s lack of security knowledge Trends 1. Have you completed a review to understand your risk and vulnerability from cybersecurity threats Answer: 46% 2. Are any of your building management systems under a service contract that allows remote access? Answer: 70% Building Operating Management Survey (2018)
  • 15. © Copyright 2018 OSIsoft, LLC Challenge 4 – Lack of Visibility to Best Practices 15 The only time most people even think about the building systems are when they are not comfortable. More times than not your own IT security team may have no knowledge or awareness of these control systems. Leverage the decades of lessons learned on security, risk assessments, disaster planning and change control offered by your own IT and OT operations
  • 16. © Copyright 2018 OSIsoft, LLC Challenge 5 – Lack of Situational Awareness 16 Baseline + M&V Contingency Plans Documentation “AS-IS” • Monitor set points and configurations settings • Baseline performance for deviations • Create alerts to changes • Develop risk matrix • Identify operations that require facility services • Create plans for loss of control • Export configuration • Monitor change logs to configuration • Create a log of changes
  • 17. © Copyright 2018 OSIsoft, LLC IT/OT Value
  • 18. © Copyright 2018 OSIsoft, LLC IT & OT Convergence Is a Key Answer 18
  • 19. © Copyright 2018 OSIsoft, LLC Technology Barriers Have Fallen 19 ▪ Common Protocols ▪ Open Standards ▪ Common Operating Systems ▪ Common Hardware ▪ Shared Services
  • 20. © Copyright 2018 OSIsoft, LLC Cultural and Functional Barriers Remain 20 • Different Languages – Operational Decision Making – Outage (Control Systems vs IT Systems) – Maintenance – System Upgrades – Security • Organizational Silos • Increased Risk – Cyber Security • Profit –Loss Implications • Mission Success
  • 21. © Copyright 2018 OSIsoft, LLC Security Models 21 Traditional Control Security Model IT Security Model • No inbound/outbound access • Barrier of entry • Insure networks leveraging application password • Secure Barriers (Inside and Out) • Centralized security directory • Security monitoring tools and services Open protocols within control Application Security Firewalls Firewalls Master Controls Data & User Segregation
  • 22. © Copyright 2018 OSIsoft, LLC A Strategy to Embrace OT IT Integration 22 Define Target/Objective Define Governance Separate Data from Control Data Infrastructure Secure Unidirectional Asset or Process Centric Knowledge Sharing Heavy Hand of IT Full Scale Integration
  • 23. © Copyright 2018 OSIsoft, LLC Define Mutually Beneficial Value • Identify operational challenges • Identify business challenges • Identify Security Best Practices • Pick the low hanging fruit
  • 24. © Copyright 2018 OSIsoft, LLC Business Intelligence Standard Reporting Ad hoc Reports Query Drill Down Alerts Statistical Analysis Forecasting Predictive Modeling Optimization What Happened? How Many, How Often, Where? Where exactly is the problem? What actions are needed? Why is this happening? What if these trends continue? What will happen next? What’s the best that can happen? Distance from Operations ComplexityofIntelligence Objective: New Enterprise IT Technologies To Meet Business & Operational Goals Operational Intelligence Thought Process – Identify value of data to process objectives
  • 25. © Copyright 2018 OSIsoft, LLC Benefits: Why do we care • Financial Performance – Track financial performance of operational decisions – Optimize asset performance – Optimize business operations based on market conditions – Supply chain improvements • Improved Governance – Expand the view beyond the context of a single system – Align to “Chart of Operations/Financial Operations” • Risk Reduction and Resilience – Situational Awareness – Condition Based Maintenance – Cybersecurity Architecture
  • 26. © Copyright 2018 OSIsoft, LLC For more information… 26 …visit our Facilities web page… …or you can visit the Facilities Cybersecurity page. You can also go to our PI System Overview webpage to learn more about OSIsoft and the PI System.
  • 27. © Copyright 2018 OSIsoft, LLC