Uploaded by geirmeister

Nettverksikkerhet

advertisement
ICS
SECURITY
DACH
PLOT THICKENS FOR CYBER SECURITY
In 2015, the upper house of the German parliament, the Bundesrat, approved
the IT-Sicherheitsgesetz or IT Security Law.
This act mandated that more than 2,000 “Operators of Critical Infrastructure”
should implement a raft of new information security standards and comply
with notification obligations within a two year period or face severe penalties.
Approaching the half way mark of 2017, that 24 month stay of execution is
almost up. Is industry ready?
Since the passage of the IT-Sicherheitsgesetz, companies that employ
industrial control systems (ICS) as an integral part of their day-to-day
functionality have had a long time to assess their capabilities and weaknesses.
In the run up to our ICS Cyber Security DACH event in Germany, we spoke
with leading ICS Security professionals from across the DACH region to learn
just where they are in their cyber security journey. Some of the answers are
rather disconcerting….
DEFENSIVE CAPABILITY
HOW CONFIDENT ARE YOU THAT YOUR...
current defence mechanisms can handle /
defense mechanisms can handle/detect
detect threats such as hacktivism, cyber
state actors / APTs? (APT=Advanced
crime, cyber espionage and cyber
Persistent Threat)
warfare?
21% 39% 37%
Confident
Somewhat
confident
Not
confident
3%
11%
Do not
know
Confident
31% 58%
Somewhat
confident
0%
Not
confident
Do not
know
ANALYSIS
Whilst 60% of companies are in some way confident that they will be able to deal with the
classic cyber threats of hacktivism, cyber crime, cyber espionage and cyber warfare, almost
the same percentage, 58%, are not confident at all that they can deal with state actors or APTs.
As ICS systems have been targeted by state actors in the past, this is an alarming statistic.
DEFENSIVE ARSENAL
Are you using a firewall to segregate your network and are you confident that it is sufficient
to protect you from all types of cyber attacks?
38%
49%
13%
Yes, I have confidence that
firewalling is sufficient
I have other segregation
methods in place
No, I have not segregated
my network
What controls do you have in place to prevent malicious commands or data being sent to
OT from your IT infrastructure?
60%
42%
38%
16%
2%
Strong
authentication of
employees
permitted to
do this.
Only permitted
from dedicated
selected
workstations not
used for other
purposes.
Only permitted
from selected
physically secured
zones of the office
environment.
The Four-Eyes
principle.
Other
Are you monitoring your network?
18%
56%
27%
9%
38%
11%
No
Yes, we have
network IDS (IDS
= Intrusion
Detection
System)
Yes, we have
host IDS
Yes, we use
honeypots
Yes, we use a
SIEM (SIEM =
Security
Information and
Event
Management)
Don’t know
How visible is what is going on your network to your organisation?
We have a fully operational SOC (SOC = Security Operations Center)
32%
We are using monitoring tools
30%
Our system engineers have this as an additional task
14%
I barely have visibility
13%
I'm unsure
11%
RESPONSE
Does your organisation have an incident
How fast do you think it is necessary to
response plan (IRP) in place?
be able to respond on a (cyber)
security incident?
33% 27%
No
Yes
13%
27%
5%
89%
6%
Yes and we
do dry runs
on a regular
basis
I am
unsure
Within
minutes
Within hours
Within days
ANALYSIS
Although 1 in 3 companies do not have an incident response plan in place, almost 9 out of 10
professionals expect cyber attacks to be addressed within hours. The reality behind the
figures does not add up.
On a scale from 1-100, with 1 being abysmally and 100 being perfectly, how effectively is
your organisation managing the relationship between IT and OT?
62
0
100
How ready do you think your organisation is for Industry 4.0?
INDUSTRY
47%
Ready
4.0
53%
Not ready
THE ICS CYBER SECURITY DACH CONFERENCE
WILL BE TAKING PLACE FROM 5-6 SEPTEMBER 2017 IN GERMANY.
TO RESERVE YOUR PLACE NOW, PLEASE CONTACT US ON:
TELEPHONE: +44 (0) 20 7036 1300
EMAIL: ENQUIRE@IQPC.CO.UK
WEB: HTTPS://ICSCYBERSECURITYDACH.IQPC.CO.UK/.
Download