industrial cybersecurity – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Tue, 09 Sep 2025 07:43:30 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png industrial cybersecurity – Waterfall Security Solutions https://waterfall-security.com 32 32 13 Ways to Break a Firewall (and alternatives for OT security) https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/13-ways-to-break-a-firewall/ Wed, 25 Jun 2025 10:06:43 +0000 https://waterfall-security.com/?p=34010 Explore 13+ real-world OT attack scenarios that firewalls can’t stop—and learn smarter alternatives to protect your industrial systems.

The post 13 Ways to Break a Firewall (and alternatives for OT security) appeared first on Waterfall Security Solutions.

]]>

13 Ways to Break a Firewall (and alternatives for OT security)

Firewalls are a go-to for OT security—but how much protection do they really offer? In this webinar, we explore 13+ real-world attack scenarios that defeat firewalls, show where firewalls fall short, and share smarter, stronger alternatives for securing industrial systems.

Firewalls are almost always the second technical step taken to secure
industrial / OT automation systems. But how much security do firewalls impart?

One way to compare the strength of different defensive technologies and designs is to compare the attacks those designs defeat reliably, vs the attacks they do not defeat. In this presentation, we look at firewalls, at attacks that defeat firewalls, and at mitigations, compensating measures and alternatives for and to firewalls.

And yes, the number “13” is a lucky ‘marketing’ number. We will in fact touch on closer to 18 or 19 kinds of attacks/scenarios.

In this webinar Andrew Ginter takes us through:

arrow red right Which types of cyberattacks firewalls can and can’t stop in industrial environments

arrow red right Real-world examples of firewall failures

arrow red right Practical alternatives that strengthen OT security when firewalls fall short

About the Speaker

Picture of Andrew Ginter

Andrew Ginter

Andrew Ginter is the most widely-read author in the industrial security space, with over 23,000 copies of his three books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post 13 Ways to Break a Firewall (and alternatives for OT security) appeared first on Waterfall Security Solutions.

]]>
Are OT Security Investments Worth It? https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/are-ot-security-investments-worth-it/ Sun, 08 Dec 2024 09:56:23 +0000 https://waterfall-security.com/?p=29186 Spoiler Alert: Yes, investing in OT security is very much “worth it”. It helps prevent financial losses, operational disruptions, and compliance penalties far exceeding initial costs. The average ROI can reach up to 400%, ensuring both protection and operational continuity.

The post Are OT Security Investments Worth It? appeared first on Waterfall Security Solutions.

]]>

Are OT Security Investments Worth It?

Spoiler Alert: Yes, investing in OT security is very much “worth it”. It helps prevent financial losses, operational disruptions, and compliance penalties that far exceed initial costs. The average ROI can reach up to 400%, ensuring both protection and operational continuity.
Picture of Waterfall team

Waterfall team

Are OT Security Investments Worth It?

The Rising Need for OT Security in Industrial Operations

The growing digitization of industrial operations makes safeguarding operational technology (OT) increasingly vital. OT encompasses the hardware and software that detects or controls physical processes, distinct from IT, which focuses on data. One key difference between OT and IT security though, is that a breach of an OT system can have real-world, physically harmful consequences—and those consequences can arise quickly. For example, if a cyberattack gains access to a manufacturer’s OT systems, it could directly (or indirectly) cause an unplanned shutdown of production, damage machinery, or even harm personnel working near the production line.

FACT: 2023 saw a 19% increase in cyberattacks causing physical damage, highlighting the growing threat to OT environments.

One of the major challenges in improving OT security are outdated legacy systems that lack modern security features and complex network architectures that provide many potential entry points for attackers. Another often underestimated factor is the human element.

OT Security factory smog and smokeIn most cases, employees are the first line of defense in cybersecurity efforts. However, inadequate training leaves organizations vulnerable to attacks, as employees are not always equipped to handle the demands of modern cybersecurity operations.

As cyberattacks grow more advanced, all industrial sectors face heightened vulnerabilities. Protecting critical assets is essential, and compliance with regulations alone is no longer sufficient. Comprehensive investment in securing the operational technology that underpins business continuity has become a necessity and is no longer a “nice to have” option.

Neglecting OT security poses significant risks to safety, connectivity, and financial stability. In today’s modern threat landscape, industrial operators understand the need to prioritize security across all processes to safeguard their operations and ensure resilience in the face of growing cyber threats.

Breaking Down the High Costs of OT Security Solutions

The financial burden of securing Operational Technology (OT) is particularly challenging for small and medium enterprises. The expenses include initial investments in hardware and software, as well as ongoing maintenance costs.

“The 2022 Clorox cyberattack inflicted $49 million in damages, underscoring the financial fallout of neglected OT security.”

The secure operation of OT systems is invaluable, as vulnerabilities can threaten worker safety, operational continuity, and system integrity. Research shows that cyberattacks targeting OT environments are on the rise, with a 19% increase in attacks causing physical damage reported in 2023. High-profile incidents, such as the $27 million breach at Johnson Controls, the $49 million damages at Clorox, and the $450 million costs incurred by MKS Instruments, illustrate the financial risks of inadequate OT security.

The factory workers - OT Security Cost Investment AnalysisInvesting in OT security may seem costly upfront, but the risks posed by unprotected legacy systems far outweigh these expenses. Legacy systems, with their outdated protocols, expose both OT and IT networks to attacks due to their interdependent nature. Solutions like advanced anomaly detection, real-time monitoring, and network segmentation are designed to mitigate these risks effectively. By using unidirectional gateways, legacy systems can continue to be used safely and securely, without the need for costly upgrades.

Despite the costs, OT security investments in tools like unidirectional security gateways yield significant returns. Businesses report an average ROI of 400%, primarily through incident prevention. This becomes increasingly critical as cybercriminals evolve their tactics, targeting IT and OT networks to disrupt operations. Robust and proactive security measures are essential to protect organizations from the financial and reputational damage caused by cyberattacks.

Calculating ROI: How OT Security Pays Off

Evaluating the return on investment (ROI) for OT security initiatives involves understanding both tangible and intangible benefits. While traditional business investments aim for revenue growth, security investments focus on risk reduction, helping organizations avoid or mitigate potential losses.

PROTIP: Use the Return on Security Investment (ROSI) formula to compare the cost of security measures versus the reduction in potential losses.

A great method for calculating costs and ROI on OT security investments is to use the ROSI formula, which works like this:

ROSI = (Reduction in potential losses – Cost of safety measure) / Cost of safety measure

For example, a $100,000 security solution that reduces potential losses of $500,000 to $250,000 yields a 150% return. Historical data, such as ransomware incidents costing between $250,000 and $850,000, further supports the financial justification of these investments.

Organizations can refine their calculations by incorporating metrics such as:

  • Single Loss Expectancy (SLE): The financial impact of a single incident.

  • Annual Rate of Occurrence (ARO): The frequency of incidents based on historical data.

  • Annual Loss Expectancy (ALE): The annualized cost of potential incidents, derived from SLE and ARO.

  • Mitigation Ratio: The percentage of incidents prevented by a security measure.

For instance, if a business faces ten annual attacks costing $20,000 each, a $50,000 investment that prevents 90% of these breaches demonstrate clear financial benefits. When using deterministic solutions such as Waterfall’s unidirectional security gateway, the benefit becomes even clearer. See here for more details.

Beyond financial savings, OT security investments safeguard business continuity, customer trust, and reputation. These benefits are critical for companies operating in competitive markets where even minor disruptions can have significant consequences.

Some final words...

Industrial operations today face the dual challenge of addressing increasingly sophisticated cyber threats while managing constrained budgets. Securing OT systems is essential to maintaining a “production-first” approach that underpins modern industrial operations.

OUCH! An unprotected legacy manufacturing machine once allowed malware to move laterally, disrupting operations across an entire company.

Prioritizing resources starts with comprehensive risk assessments. Tools that calculate asset-specific risk scores can help identify critical areas requiring investment. Modernizing infrastructure, such as replacing 10- to 20-year-old equipment, also enhances security by reducing vulnerabilities, but keeping that machine in a way that maintains compliance and enhances security is far more cost effective.

Factory floorCollaboration across OT, IT, and security teams is crucial for cohesive strategies. Cross-functional efforts ensure that cybersecurity measures align with business objectives, resulting in shared ownership of protocols. While moving to proactive solutions like Zero Trust Network Access (ZTNA) enhances security by adhering to the principle of “never trust, always verify.”, it still leaves gaps within OT security. However, a more cohesive approach such as Cyber-informed Engineering, addresses the threats head-on, with a more elaborate solution that saves costs over time by getting OT and IT (and other stakeholders) working together to ensure security from the start, and not as an afterthought.

Investing in OT security, while expensive, is far less costly than the aftermath of a cyberattack. By adopting a risk-based strategy, securing legacy infrastructure, and fostering collaboration, industrial operators can enhance their resilience to cyber threats while maintaining operational efficiency.

Want to learn how to engineer  OT Security into OT systems? Get your complimentary copy of Andrew Ginter’s new book: Engineering-grade OT Security: A Manager’s Guide

FAQs

What is OT security and why is it important for industrial operators?

Operational technology (OT) refers to the systems that control physical processes in industrial operations. Securing OT is essential to prevent breaches that could halt production, damage equipment, or harm workers. As OT systems become prime targets for cybercriminals, protecting them is increasingly critical.

What are some key challenges in implementing OT security?

Common challenges include outdated systems lacking modern security features, complex network architectures with numerous entry points, and human error. Addressing these issues requires securing legacy systems, redesigning network structures, and ensuring employees are adequately trained.

How do cyberattacks affect OT environments in industrial operations?

Cyberattacks on OT systems can cause production downtime, financial losses, equipment damage, and even physical harm to workers.

What are the costs associated with OT security investments?

OT security investments include upfront costs for hardware and software, ongoing maintenance, and compliance expenses. However, these costs are outweighed by the potential financial and operational losses of a cyberattack.

Is OT security investment worth the financial burden?

Yes, the ROI of OT security demonstrates its value. Preventing downtime and damage from cyberattacks saves organizations significant costs, making security investments highly worthwhile.

How can organizations calculate the ROI of OT security measures?

The ROSI formula calculates the financial benefits of security measures by comparing potential losses avoided to the cost of the measures.

What proactive measures can industrial operations take to prioritize OT security?

Industrial operations should conduct risk assessments, secure legacy infrastructure, and adopt strategies like network segmentation between OT and IT. These measures strengthen security and reduce vulnerabilities.

Why is collaboration important for effective OT security?

Collaboration between OT, IT, and security teams ensures aligned strategies and shared ownership of cybersecurity protocols. Approaches such as Cyber-informed Engineering improves communication, fosters cohesive planning, and enhances overall security outcomes.

 

Want to learn how to engineer  OT Security into OT systems? Get your complimentary copy of Andrew Ginter’s new book: Engineering-grade OT Security: A Manager’s Guide

 

Picture of Waterfall team

Waterfall team

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Are OT Security Investments Worth It? appeared first on Waterfall Security Solutions.

]]>
Physical Security Supports Cybersecurity | Episode 114 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/physical-security-supports-cybersecurity-episode-114/ Tue, 07 Nov 2023 10:03:31 +0000 https://waterfall-security.com/?p=13810 Adversaries who can physically touch a target have a huge advantage when it comes to compromising that target. Mike Almeyda of Force5 joins us to look at tools for physical security that support cybersecurity, especially for the North American NERC CIP standards.

The post Physical Security Supports Cybersecurity | Episode 114 appeared first on Waterfall Security Solutions.

]]>

Physical Security Supports Cybersecurity | Episode 114

Adversaries who can physically touch a target have a huge advantage when it comes to compromising that target. Mike Almeyda of Force5 joins us to look at tools for physical security that support cybersecurity, especially for the North American NERC CIP standards.
Picture of Waterfall team

Waterfall team

Podcast Episode 114 with Mike Almeyda

Available on

Mike Almeyda of Force5

Mike Almeyda is a Senior Account Manager at Force 5. Mike’s experience is in enterprise risk management and power utility compliance. He served as a Critical Infrastructure Protection (CIP) Compliance Auditor with SERC Reliability Corporation for two years, where he led audit teams in CIP Compliance Audits and spot-checks for over 25 CIP audits. Mike has particular expertise in NERC/CIP compliance enforcement.

Mike’s extensive experience navigating regulations spans both sides of the regulatory table. At Florida Power & Light, Mike served as Manager of Power Delivery Reliability Standards & Compliance and Manager of Training and Execution Assurance. He provided direct oversight to compliance sustainability and quality assurance for the Power Delivery Business Unit, spanning all NERC Reliability Standards. He also led compliance activities, ensuring full compliance with all legislative and regulatory initiatives, as well as reviewed cyber security and infrastructure protection compliance protocols and procedures, ensuring complete alignment with national and regional regulatory requirements (NERC CIP Standards/FERC Orders). Mike later returned to SERC to serve as Manager of Business Process & Risk Assessment, where he provided strategic leadership and tactical planning for the organization, developed the regulatory risk profile for SERC’s area of responsibility, and implemented continuous process improvement methodologies across the corporation.

“…when you remove that first area of defense and you no longer have a human performing that function. You got to ask yourself the question: Well what can I do? How can I provide oversight protection, safety, and security for my site if I don’t have somebody that’s looking over them?”
Share

Transcript of this podcast episode #114: 
Physical Security Supports Cybersecurity with Mike Almeyda from Force 5

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Hey everybody and welcome to the industrial security podcast. My name is Nate Nelson I’m here with Andrew Ginter the vice president of industrial security at Waterfall Security Solutions. He’s going to introduce the subject and guest of our show today Andrew has it gone.

Andrew Ginter
I’m very well thank you our guest today is Mike Almeyda. Mike is a senior account manager at Force 5 and Force 5 does physical security for electric utilities and physical security is tied into cyber security you you don’t have cyber if you don’t have physical. So he’s going to talk about physical security and and the connection to cyber.

Nathaniel Nelson
All right? Then let’s jump right into it

Andrew Ginter
Hello Michael and welcome for hello Michael and and welcome to the podcast. Um I should say. Thank you here. We go hello Michael and thank you for joining us. Um. Before we get started can I ask you to say a few words about yourself for our listeners and you know talk about the good work that you’re doing at force 5.

Mike Almeyda
All right? Andrew thank you so much for bringing me on your podcast honor to be here. My name is Mike Almeyda I am a senior account manager at force 5 I’ve been with the company for about 5 years altogether in the power utility space I’m entering my thirteenth year in here I had a previous career in the United States army as an officer for a number of years and my career stems from being a sip auditor working for a power utility and now working for a vendor at force five we focus on reducing risk at every. Entry point of a power utilities facility. So thanks again for having me Andrew.

Andrew Ginter
That’s great. Um, and our topic today is physical security interacting with or supporting industrial cybersecurity. You know we’re we’re the industrial security podcast most of what we talk about is cyber security. How does physical security fit with. Cybersecurity.

Mike Almeyda
Sir it’s a great great question Andrew and I’ll I’ll tell you ah at the at the crux of the matter physical security really ensures that you’re keeping the bad actors out of your facilities. You’re doing your best job to validate. That those individuals have a business need that they’ve met your site specific training they meet out your policies before they come on site and it’s important to limit who comes on your site because therein lies the problem right? The first part of any. Type of criminal or bad actor is always looking to circumvent your physical security process and with the right toolset and the right skillset once they get inside your facility without being challenged that gives them the opportunity to get to areas of your facility that house. Critical infrastructure protection components especially when we talk about cyber securityity this could be network cables switches routers. You name it the moment that they get the physical access into your site. Cyber security is just a keystroke away right.

Andrew Ginter
So so in principle that makes sense I mean I I agree with you. Can you give us an example I mean you know how much trouble can we get into.

Mike Almeyda
Yeah, so this actually is ah it brings up a funny story. Not really funny, but a really important story understanding why cybersecurity is so important. So as I mentioned in my introduction I did spend ah a number of years in the military and and I was deployed. This is back in 2008 I got a phone call from my brigade communications officer about two o’clock in the morning and she told me which is this is now a declassified operation but we had to disable. Every single Usb drive across all of the computers in my area of operation and at the time I probably had over 2000 pcs and I was geographically dispersed in 9 locations in Iraq and had 24 hours to do it. My soldiers and I completed the mission. But the reason we had to do that. Is because there was a signature of of a malware that was attempting to send information from our our secret internet protocol to Russia and what we discovered in our after action review was that it appeared that the the. Virus or the the trojan horse originated from a Usb stick that someone had plugged into our network whether it was inadvertently or inadvertently more than likely it was probably a soldier who went to the morale recreational welfare center to go and and talk home contracted the virus on that.

Mike Almeyda
Device and brought it back and put it in it to our secret computers. But the reason I bring this story up and and the importance of it is if you allow just about anybody to come onto your site without properly vetting them and making sure they meet those credentials. They can easily take a jump device. Plug it into one of your network switches or plug it into a computer that controls some of your industrial control systems and Wreak Havoc just like we experience which by the way set us back about a decade in terms of Technology. So I would absolutely consider that something you should look at when. Deciding whether or not you want to let the right people in on your site.

Nathan
you know Andrew when it comes to somebody physically at a plant. It’s not even something that I really associate with cyber I just assume that a cyber attack occurs when some. Remote entity tries to get in through technological systems. Not when somebody’s literally at a plant is this something that happens outside of the context of like Stuxnet and if so are there any defenses against it.

Andrew Ginter
Um, yes you know yes and yes let me give you sort of ah a more mundane example to start with um you know I was working at at industrial offender a long time ago. We were you know. Building software and we had to test it and so we had ah a large test bed and to standardize our testing we would reset the entire test bed to um, sort of a known state between runs. And that meant taking ah you know Linux Cds and we we’d take an image backup. So the hard drive. Basically you know every sector on the hard drive from 0 to as as big as as big as a hard drive was and you know between runs we would just put the image back on the hard drive and start from exactly the same state so we had to do this. And you know I gave the the linux boot cd and all of the the backup cds to one of my colleagues who’d never done this before explained how to do it why away 2 hours later he comes back and he says Andrew do you know that with this linux boot cd I can boot. Any device in the office here and read all of the data off the hard drive you know and I said yes I said welcome to the dark side if you can touch it. It’s yours now this was back in the day.

Andrew Ginter
Before hard drives or flash drives were routinely encrypted so to your answer is it is it real. Is it mundane. Yes, back in the day you boot into linux and you can read it. You know every every bit on the hard drive nowadays. This is why the modern world. Modern equipment is is encrypted. The hard drives are encrypted if you try to do this. You’ll get garbage back? Um, but you know the bad news is that not all of the equipment in industrial control systems is modern, a lot of it’s still older and you know even. Modern equipment is vulnerable if you can touch it. You have a huge advantage so sort of a second example is um chinese intelligence agencies have been accused of doing this to visitors in China people who visit China are encouraged to use throwaway devices and not log into. Any of their important cloud-based systems while they’re visiting why because chinese intelligence agencies have been accused of tapping the hotel on the shoulder you know having you know, tapping tapping the your business partners that that you’re there to visit on the shoulder saying. You know, take this man out for a 3 hour binge somewhere. Um and then tap the hotel on the shoulder get into the hotel room. Ah you know, look at the the laptop figure it out and leave you know, do it again the next day and come back and this time they know exactly what model laptop you have.

Andrew Ginter
They’ve got the tools they take it apart. They insert a device you know a very tiny device between the keyboard controller and the motherboard and now this tiny device is recording all of your keystrokes. They come back at the end of your visit and do the same thing removing the device putting your device all back together again and now they’ve got on that little chip. All of the keystrokes that you’ve entered all of your passwords that you’ve used in the last three days um they log into your systems and you know you’re sunk. So. And in the modern world. This is why many of the cloud systems if you want to log into them have two-factor authentication so to your question. Yes, if you can touch something you have a huge advantage in terms of compromising it and yes this is why. We see two-factor authentication. This is why we see encrypted hard drives. This is why we see a lot of modern technology being applied because this is a real problem

Andrew Ginter
Okay, so so can we talk about you know that’s that’s the problem. Can we talk about the solution I mean um, it it sounds simple. Do we not have is this not why we have guards gates and guns.

Mike Almeyda
You know we we absolutely do Andrew we have guards gates and guns. But I can tell you that with the recent financial economical strains especially on big businesses. It’s becoming more challenging to borrow money and so what I’ve seen recently. Especially one of my large customers is that they’ve made a decision to move away from a contingent guard force because the cost is astronomical at the end of the day they’re beholden to their shareholders and so when you remove that first area of defense and you no longer have a human performing that function. You got to ask yourself the question. Well what can I do? How can I how can I provide oversight protection safety and security for my site if I don’t have somebody that’s looking over them and you know you know this Andrew B in the power utility space power plants are the it’s the bread and butter of how. Power utilities not only make money but allow us to flip a switch and let the lights go on. So if we can’t afford to allow a physical person to do that. We have to do something different. And that’s one of the reasons why at force 5 we we provide solutions for outage management and really help provide internal controls that can vet individuals making sure that they have a proper business need. They’re not on some watch list.

Mike Almeyda
Have your site specific training. So you have confidence knowing that individuals who come on your site. Not only are who they say they are but have the appropriate business need and also meet all the training and policies you’ve set in place to protect your organization in the first place.

Andrew Ginter
And okay and that that makes sense and and I’m going to ask you about more you know more about what you folks do in in a moment but but work with me. You know if if you’ve got organizations that have done away with their guards I mean I mean what happens if. You know worst case, you know someone ignores your your security fence brings a ah saw cuts through the fence cuts through the doors on the way into the plant into the server room I don’t know with a Usb in his hand. Um, do you not need guards at least for incident response I mean what. What do you do? If you don’t have guards and you’ve got a situation like this.

Mike Almeyda
Right? And and this this ties back into your incident response plan as you just mentioned right? So the first thing you have to do is if you know you’re going to move away from a contingent workforce or contingent guards. You have to make sure that your policies and procedures adapt to that right? If you’re not if your policies and procedures say notify a guard and obviously you’re not using guards you need to make sure that there’s something in place to follow and really it boils down to your level of risk tolerance right? Do you really want your employees confronting somebody they think is a bad actor. Or would you probably want them to do something like call 9 1 1 call a security company. Whatever it is and more than likely your sock has probably done both already because they have videos most power utility companies I know have video footage pointing at those critical facilities and so if they see somebody that. That’s not recognizable. They’re they’re probably going to go ahead and start putting in their protective or the the protective controls to make sure that they they do that. But the truth is the the more realistic so situation is somebody finding a way to get into your site. During a major outage so they can blend in with the environment and do things being undetected.

Andrew Ginter
So so that makes sense in principle. You know if if there’s ah, an intruder in the site. There’s no guards you call 9 1 1 you call the authorities your sock might have done that for you but there’s operational. Decisions that have to be made if someone has you know cut into the survey room if someone is wandering around the facility with ah with a hammer in their hand. Um, and you know with clearly malicious intent. They’ve cut their way into the facility. The the authorities aren’t there yet. Do you keep generating power. Do you keep. Producing oil out of the refinery what you know isn’t there a decision point that has to be has to be made about about you know what do we do with someone on on site like that do we have to shut down out of out of safety.

Mike Almeyda
It’s a really really awesome question Andrew and and I guarantee you you’re going to hear different answers from different people but I can tell you you know Mike Tyson had this famous quote and it says you know everybody has a plan until they get punched in the mouth. So when you think about that. At the end of the day your your policies procedures your your your business continuity plan should absolutely have those steps in there and if they don’t really it comes down to the station manager. It’s it’s his decision on what to do in that scenario I guarantee you. Your executives are probably concerned about profitability and are also concerned about making sure that the plant generates money to keep the lights on but in that moment the plant manager might be about safety and security for his employees and so at the at the end of the day I think the responsibility falls on the plant manager whether he. Continues to have operations going or he chooses to shut down and there’s a lot of factors considering in that right? If if they’re in a you know let’s just say this happens in the summertime and it’s at the peak of day and it’s hot and and and you’re at your peak load. You probably don’t want to shut down your site. But if it’s something that happens in the middle of the night where it’s not really a peak load there. There probably will be more considerations to actually have the plant shut down while you deal with the security issue that makes sense.

Andrew Ginter
Well, that makes sense. You mentioned you mentioned Nerrk sip a couple of times. Um I know there are rules in nerc sip about physical security. Can you can you talk about those rules I mean um, oh pause hand. Um, ah okay so something else, you’ve said a couple of times you talked about outages now you know the questions I’ve been asking you I’ve kind of been assuming we’re talking about physical security during operations when there’s you know. The usual complement of people on site when you’ve got power coming out of the the power plant when you got you know gasoline going through the pipeline. You’ve talked about outages a couple of times. Why? Why are you talking about outages. What’s what’s special about them.

Mike Almeyda
So outages are something that that commonly occur for large generation facilities. So if you think about a car every every so often you’ve got to bring your car in for maintenance. So that way it keeps running well power plants run on the same schedule. There are certain components. Those plants that have to shut down for maintenance and so during these times you can have a large contingent workforce coming on site. In fact, there’s ah, there’s a plant that I visited not too long ago produces about three thousand four hundred Megawatts of of generation and at their peak outage. They can have about. 1500 people on site that are contractors that you don’t know them. They don’t know you but they were there to perform a service for a certain period of time and so when you think about having a large group of people you don’t know anything about them all over your power plant. Around your most criscritical assets that creates a security challenge. It also creates a safety challenge because they’ve they’ve probably never been on your site before sometimes they but have to bring vehicles on your site. So now every person in every vehicle that’s on your site creates a liability unless. You find a way to validate them and ensure that they have a proper business needs. So it’s important. This is an important part of the power utility space because if those plants don’t get everything done that they have to get done and outage and they have to extend their outage for any reason it puts strain on the on the bulkal electric systems on the on the interconnects as a whole.

Mike Almeyda
Because now someone’s got to pick up the slack for the power. That’s not being generated so again. Yes, It’s a for profit industry that generates power for dollars but at the same time if you can’t fulfill your obligations how the whole entire landscape is expecting you to then it puts. Unnecessary strain on the system as a whole and that can create issues like rolling Blackouts and whatnot which we all remember from 2003 but that wasn’t due to ah that wasn’t due to a plan outage but the point is we have to make sure that during those outages we’re getting everything done that we have to to keep the system online. And we’re also making sure that safety and security is a focal point of ensuring that none of those contingent workers are going to be in a position where they can do something to sabotage or inhibit your ability to provide services to your customers.

Andrew Ginter
Yeah I mean in theory that makes sense. Um, you know a it’s a lot of people B you know, let’s talk. Let’s talk Nerrksip if we can you know we’re we’re in a you’re you’re giving the power plant example. Um.

Mike Almeyda
Sure.

Andrew Ginter
Let’s say part of the the outage is to expand ah the capacity of the server room so we can put more servers in there to do more stuff you know more predictive maintenance more whatever and so one of the people who’s got to go into the server room is an electrician they’re setting up the new rack. Or 3 with you know, uninterupable power supplies. They’re connecting it to the power they’ve had to add some new breakers they’re in there working for a couple of days doing electrical stuff. Um, but this is the room that contains all of our control system computers. Um. How does that work. You know the plant is down. It’s not producing power. You know, do you just let the electrician in there. What’s the rule.

Mike Almeyda
Yeah that’s ah, it’s a it’s a really important rule and this is this is right in sip 6 when you have somebody you have a critical or you have a physical security perimeter that’s defined in nerc si there’s 2 ways you can do it. Right? If this is a contingent worker that you know that you’ve done ah a personnel risk assessment on you’ve performed a 7 year background check they have a valid business deed to be in that space unescorted you most certainly can give them privileges to go into that space space unescorted. In my history of being not only an auditor but working for power utility this is going to be the exception not the rule and the reason is because this is somebody that’s doing work or service for a small period of time and they’re not going to be back and so you typically want to reserve those types of. Authorized and escorted physical access for people that you trust that are going to be there from a longevity perspective more frequently. What we see is when you have a visitor coming into a physical security perimeter or psp for short, you have to. Escort them at all times within line of sight so you’ve got to make sure you document what their name is who they’re there to see document. What the reason is for them being in there. What time they arrived what time that they left this is typically done manually from but.

Mike Almeyda
Probably say about 80% of utilities. Do it manually. But again that that creates a challenge right? because if you don’t if you have sloppy handwriting or you’re not putting in the correct information and there should be an event then you’re relying on what’s written on that paper to see who is in that space who is the escort to try to decipher what happened. I Can tell you that there’s been a lot of times on the on the physical security side where an incidents happen and when they go back and try to figure out who is in the space. They couldn’t decipher the handwriting. So now they have to go and rely on cameras and and rely on different angles and talk and call up the person who they believes in the video. And as you’re doing that. It’s taking time and the more time you take the more likely whoever it is that was doing the malicious act probably is going to get away with it and and be undetected.

Andrew Ginter
Ah, and you know the standard that’s called sip Zero zero six si double o six talks about physical access control it. It says stuff like you know if you have an important. Ah.

Andrew Ginter
A piece of the electric system that is covered by nercipp that’s medium impact or high impact because there’s sort of 3 categorizations low medium and high in the nercipp if it’s medium or high. You have to have a process that restricts physical access to these systems. It’s usually described you know colloquially as a 6 walls rule. You have to have a floor you have to have a ceiling you have to be sealed floor and ceiling and on 4 walls you have to have a you know a system in place keys or technology or something that prevents random people from walking in. Um, you have to have a way to. They use different words but you have to avoid to clear people who are allowed into it. You know if you let people in whenever they want they have to be trusted people so they need to have background checks. They need training they you know they need to know what they’re doing if you have uncleared people like the electrician who needs access to the space. They have to be supervised constantly by a cleared person. You have to have technology in place to monitor if somebody enters the room who’s not authorized. You have to have alarms in place to detect unauthorized access all of this you know is part of sit. Zero zero six because um to a greater or lesser extent if you can touch a system you can compromise it or you you certainly have ah a tremendous advantage in terms of compromising it pause.

Andrew Ginter
We’re and we’re so so let’s get into the the details about about the good work. You folks are doing at force 5 you have solutions in this space. What do you have? who’s using it. You know how does this work.

Mike Almeyda
So we got started. Ironically, we got started in the si space I actually worked for a utility company and I discovered force five at the at the recommendation of a peer and at the time we’re talking about sip six here. We were in. When there was 8 regulatory regions at the time we were in all of them and so we had manual paper logs at these physical security perimeters and as you can imagine we were. We were getting audited by all 8 regional entities and we would probably get audited every year and it’s something that we consistently had a problem with and so. when when I when I approached force 5 I said hey listen I’m going to make your business requirements. Very simple for you I want an appliance that includes software and hardware I want it all 1 I want something that can easily be used. Regardless of the austerity of any type of environment whether it’s a power plant. It’s a substation. It’s a control room. It’s a corporate lobby I want the look and feel to be the same and I want a dedicated support line I don’t want to have to figure out what the hardware needs to be you figure it out for me. You all all I have to do is pick up a phone or send an email and get help and that’s how gatekeeper was birth and so we we now have an automated solution which is the only escort-d drivenven self-service logging kiosk in the industry today that enforces.

Mike Almeyda
Those policies of nerc sip at your psps and so instead of relying on paper handwritten errors trying to decipher that we have the ability to enforce your policies and procedures. So whoever the authorized escort is he or she is the only person that can use the system and start a visit. Your visitor can’t we put all the onus on the person with the responsibility and that’s how we got our start in nerc sip and then I’d say about a year and a half later we were approached by a plant manager that said hey that’s great. But I don’t care about those requirements I have hundreds of people coming to my site during an outage. They don’t need to be escorted I just need to make sure that they have met all the training. They’re not on some sort of watch list that they have a business need to be there if you can figure that out then I see a path for your solution and so force 5 worked with. With some of the outage coordinators and some of the plant superintendents and and plant managers and that’s how the the evolution of the outage management solution of gatekeeper was birth and so in this scenario we we use full height turns styles we can provide a building or or no building and we. Augment those turns styles with our kiosk to perform access controls and so if you think about what’s important to a plant manager. They want to make sure that this person has the site specific training to enter the site. They want to make sure that they’re not on some sort of watch list or have been terminated or kicked off a plan in the past.

Mike Almeyda
And they want to make sure that they have a valid business need during an outage. So when you you take all those pieces and you assign them to an identity. Our Kios in a quick moment when you use biometrics they can either use their fingerprint or they can use their face. Once they come to the kiosk and identify themselves. The system does all those checks quickly and if you meet all the criteria to enter the site and we fire the turnstiles and if you don’t we deny entry and if you match a watch list. Not only do we not deny entry but we send out emails text messages and robocalls. To interested parties letting them know that somebody that’s a bad actor is at the front gate of your facility.

Andrew Ginter
And you know you mentioned biometrics I mean it’s It’s great. Biometrics are high tech you know are they necessary I mean most places I go they use badges.

Mike Almeyda
Right necessary and and and necessary are are are definitely good questions. So I could tell you that for your trusted environment. Badges are okay and they’re okay because you you you know who the people are and. You know that they they have already been validated by your company when you talk about your untrusted environment which is the the reality here with a conting your workforce in my experience in my career I’ve seen a plethora of things happen. In fact, one time when I was working for utility I happen to be at a plant. And there was a large group of contingent workers with a plant with a leader like there was ah a contingent workforce leader that was overseeing all those people and towards the I’d say after lunchtime this gentleman grabbed all the badges from his staff and let them out. There there was another outage happening not too far away that they had a contract for and the priority for that company was that those staff be there and at the end of the day when he went to go swipe out his badge. Guess what he did he not only swiped out his badge but he swiped out the badge of his entire team and so. For our company. We went up paying for 10 to 12 individuals that left early right? So with badges the the problem with that is all they’re intended to do access control looks at the card serial number make sure that it matches an authorized.

Mike Almeyda
Entry on that list and lets him in when you use biometrics. It’s very hard to fake a face or a finger right? So you have to have something physically that’s unique to you and so what we found is not only is it expedite the process of logging people in. But it also gives you stronger validation knowing that the individual who presented that credential whether it be facial recognition or or biometric fingerprint when you have them presenting that credential. It’s a higher confidence of validation. So you know that they can’t hand their thumb. And they can’t hand their face to somebody else because you can only use it to go in and you could only use it to go out and we this the system is smart enough to know if you’ve went in 1 time we were not going to let that same identity in because it’s already in the system.

Andrew Ginter
Pause. So you know it sounds like that that scenario that that you gave there with the with the badges you know the benefit that the system was was providing the plant is ah. You know is not really a security benefit in the sense that it’s you know, keeping out people who shouldn’t be there. It was kind of an operational benefit and you know in a sense this is this is commonplace a lot of a lot of folks that we have on talking about different approaches to to solving problems in the industrial security space. A lot of the time those approaches have sort of. Ancillary operational benefits. So you know you’ve given us 1 do you have other examples of of ah you know how you can use what appears to be a security tool to you know, just make the plant more efficient.

Mike Almeyda
it’s it’s funny you say that Andrew because one of our our customers recently this year gave us a interesting story I’m going to share with you where they we always tell our clients make sure that you tell your contingent work for. Workforce when you use a solution is for a safety and security perspective because they’ll be more apt to adapt it in everyday routine. But 1 thing that that he shared with me was he’s always used this same scaffolding company for a long period of time and over the years he said he thought he was getting build or overcharge for certain certain type of of activities. They were performing and he could never validate it because for tn m or time and materials contractors. It’s it’s paper based count cards for for time cards time sheets right. So he’d say 50% of the time he’d he’d argue back and he’d win in 50% of the time he’d pay the invoice and so as soon as he leveraged our solution. He got his first invoice from the company and when he looked at it he said ah you know this doesn’t seem right and so he decided on his own Accord. You know what? um. Ah, go into gatekeeper and look at the resources that I got for the week and what he discovered when he put his invoice alongside the the record of who had actually been on the site. The invoice was for nearly double the amount of of individuals he had on the invoice. So let’s just say it was 40.

Mike Almeyda
He only got twenty and they were supposed to work 40 hour shift ah for the week and they only worked 20 hours and so when he went back to this guy. He said hey I got your invoice but I’m not paying it because you overcharge me and the guy’s like come on man you know we always go through this conversation every time we have an outage you know I won’t do that to you. And he said I get it I said but I just pulled my report from the solution that we have for safety and security or gate and I can tell you down to the second who was on my site and I can tell you that I got half the resources on this invoice at half the time. So I’m not paying this invoice and and the gentleman’s like well let me let me look into that and and and. Find out what what the problem is and the next day he calls him back. He goes oh I sent you the wrong invoice I apologize here’s the right one and and and he kind of might my my client kind of chuckled but he said ever since that that scenario happened. He never has gotten overcharged for an invoice because they now look at this as a time sheet. So again, it’s a safety and security solution. But the the contingent workers looking at as a time sheet and in addition to that one of the things he’s been able to discover in using the data that was typically stale written on paper. Now that it’s in a database. He actually can predict whether or not he’s going to have enough resources as I mentioned earlier you know if you you don’t have the resources to meet an outage and you have to extend it that puts some strain on the power system. Well using this solution. He can say well I was supposed to have.

Mike Almeyda
40 resources at 40 hours a week but for the past three weeks I’ve only had 20 resources at 20 hours so there’s ah, there’s ah he can predict predict that he’s going to fall short in that area and maybe do some other other methods to help. Condense that time a little bit shorter or bring in additional resources to compensate for the lost time that that he had because he didn’t get the resources. He was promised so that’s that’s a operational thing and and 1 other story that I want to embellish here for a moment that I think is important is is the security aspect. And I think this is operational because operational risk is something that everybody should consider especially when you have industrial control systems. We had a customer who had a a contractor that that got into an incident with the plant manager and as a result of that incident. He was placed on a wash list and walked off the site and told that he was not allowed to come on that site ever again a few weeks later that contractor decided to go work at a different site for the same company the same utility company just under a different outage and. It just so happened when he arrived the the watch list identified him as being a person that shouldn’t be on the site and that plant manager happened to be there that day because he he worked the zone and so he looked at that that individual says.

Mike Almeyda
Don’t ever come back to one of my plants ever again. You’re not allowed here and as a result of that the company the vendor company he worked for terminated his services because he could not perform it so Lo and behold several weeks go by this individual gets a job at a new vendor company. That happens to have a contract for an outage at the same power utility company and when he showed up for the outage and placed his finger on the reader it detected him regardless of what uniform he wore we were still able to identify that this is the same individual that’s on the watch list. He should not be on site. So. The the customer was extremely happy because there were 3 use cases in a span of 6 weeks where an individual who was someone that should not be on site was caught and was identified prior to allowing that individual to get on site. So. That’s a great example of the robustness of a solution. So safety security financial reconciliation any of those things are important to your plants.

Nathaniel Nelson
Most the ah the point that Mike just made definitely speaks to what’s been sticky in my mind throughout this interview which is that ah the technology that he’s describing seems most useful to me or rather most commonly useful. Not necessarily in that crazy state-sonsored like stuxnet scenario where you’re dealing with spies but where you’re dealing with more run-of-the mill insider threats which I imagine are going to be much more common for customers of his. Um, although it occurs to me as well. I don’t know if I’m misunderstanding the exact nuances. Of the technology here that it might make more sense to have like a list of people who are allowed on a site and then just exclude everybody else by default rather than having like an expressly bad list and then going from there unless there’s a good and a bad list.

Andrew Ginter
Um, in my best understanding and I didn’t quite ask the question this way but in my understanding there are both an allowed and disallowed list. It’s not like you allow everybody except people on the on the the disallowed list. Um, you don’t let any stranger into the site. My understanding is that.

Nathaniel Nelson
Understand.

Andrew Ginter
Before you let someone in they have to be entered into the system you might presumably enter them into the system when they arrive but you know, um, presumably you know assuming they have someone to vouch for them. They’re their host at the site. Um, but even if you have an allowed list. Um, you know the the biometrics I think come into play when you have a disallowed list. You’ve got biometric information for the the people that that are disallowed. You know in the example of of the the worker who changed vendors. They might well have you know I imagine they could have registered with their new employer with a subtly different name using a nickname instead of you know the long spelling of their full name and they show up as a different name a subtly different name working for a completely different employer making their first visit to the site. So. They are on the allowed list. But then the the disallowed list catches them because of the biometrics identify them as the same person with a different name who’s been banned from the site.

<DROP> So yeah far as I know it. It does both of them and it’s ah it’s a little bit complicated.

Andrew Ginter
Cool Some some very convincing use cases. Um, you know, let me ask you? We’ve been talking about about what you folks do um, can you talk about the future. What’s what’s coming in this space.

Mike Almeyda
Well I think and this is kind of ironic because we’ve talked a lot about visitor management and and how we we you know ensure the right folks come on site but more recently there’s been. A lot of shootings at substations. In fact, last year I think it was over 113 shootings at substation. So. It’s definitely got the attention of a lot of executives in the space and as a result of that we’ve we’ve partnered with the company and we’re now we’re now producing what’s called boss. It’s a ballistic overlay shield system and and the the intent of this is to provide enhanced ballistic protection security and resilience for substations and critical assets by reducing those potential attack vectors and threats right? So you think about those. That room that we talked about that hypothetical room with all this network and security equipment being shot at now is ah is a physical threat. But again you damage that equipment. It creates a problem and so we’ve we’ve developed a solution based out of. Poly you’re I think it’s polyethylene is the proper pronunciation but it’s been tested by the us military for over 2 decades but the solution we have now can stop a 7 6 2 round which is typically fired from a 3 ah 8 winchester rifle hunting rifle.

Mike Almeyda
Or an a K 47 So as you look at some of these threat vectors and threat actors that type of caliber lower is probably what they’re going to use to target your your substation whether it’s just a ah disgruntled worker trying to get back or really somebody that’s trying to do Damage. This is a ah ah big threat that we’re seeing that is certainly got. The the attention of many power utility executives and we feel like in our ability to call ourselves a risk company. This certainly fits the bill when we talk about how do we reduce risk from those type of attacks at some of the most critical systems like transformers or whatnot. In the power Utility space.

Andrew Ginter
There you go I mean distressing that this is the world we live in but it is I mean this is I guess this is why we have jobs you know, physical security cybersecurity. They interact. Um you know? Thank you for joining us and providing these insights. Before we let you go can you can you sum up for us. Pause.

Mike Almeyda
So at the beginning Andrew we werere talking about tying physical security and how it relates to cybersecurity right? So if we take cybersec securityity at the crux of it. That’s the place where you can predominantly do the most damage undetected. In your facility and so if you know that that’s one of the higher risk to your facility to your infrastructure you want to make sure that that is protected from a physical standpoint and and taking cyber securityity back to physical if I had a a handful of takeaways here’s what I’d tell you. Understand the risk that you have to your environment and what your tolerance is for it if manual processes like paper you’re willing to accept that risk then this this is probably not for you. But if someone circumventing your security getting to. And ah getting someone like an electrician to a switch room where you’ve got problems where you’ve got critical infrastructure that can get if it gets damage can cause a big problem. You probably want to automate it and when you look at automating it. You want to make sure that you can validate in force and discover things about your organization. Right? So you log the visitor you validate their identity that they have an appropriate business need to do that. You enforce your policies and procedures and you discover trends about the information that you’re getting if this sounds like something that that piques your interest or it’s a need at your power utility.

Mike Almeyda
Visit force five dot com we only work with power utility companies or feel free to reach out to me. You can find me on Linkedin just look up Mike Almeyda the same name you see in the podcast title Andrew. Thanks again for having me on today. It’s been a pleasure.

Nathaniel Nelson
Pause Andrew usually I ask you for a last word here, but this episode has given me a lot to think about. Um I think that the overall takeaway for me is that physical security is. Dovetailed always with cyber security that they are necessarily interlinked and when you don’t have the former. You can’t have the latter and also you know we’ve done over a hundred episode to the show. Ah I think that we sometimes take the physical security side for granted. By talking about you know everything else that happens on the computers as if that is just going to be taken care of but at the end of the day you know you need people like Michael to do that basic assumed implicit work. Um, so that then we can talk about the more sophisticated defenses that we spend all our time on.

Andrew Ginter
Absolutely I mean one of the the principles that you know I talk about at conferences sometimes um, you know we talk about the cyber perimeter a lot of people say oh, but the cyber perimeter is it. You know is there really is it dead because you know there’s experts on the it side say the cyber perimeter is dead. And I come back with yes, but and it might be dead on it. Networks. But you know that’s not the point. The point is that all important industrial facilities have a physical security perimeter all of them. They all have you know. If not guards gates and guns at at at least you know offence and you know a system like force 5 at the turnstile letting people into and out of the site controlling access to the site. There’s always a physical pereter. You don’t let the public walk into a dangerous facility. And you certainly don’t want you know random malicious actors walking into a dangerous facility. So yes, absolutely There’s always a physical perimeter. It’s essential to cybersecurity. You don’t have cybersecurity unless you have physical security so you know good call.

Nathaniel Nelson
Well thanks to Michael Almeyda for speaking about this with you Andrew and Andrew is always thank you for speaking with me this has been the industrial security podcast from waterfall. Thanks to everybody out there listening.

Andrew Ginter
It’s always a pleasure. Thank you Nate.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Physical Security Supports Cybersecurity | Episode 114 appeared first on Waterfall Security Solutions.

]]>
Cybersecurity for Rail Systems – Harder Than it Sounds | Episode 113 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/cybersecurity-for-rail-systems-harder-than-it-sounds-episode-113/ Mon, 30 Oct 2023 15:36:59 +0000 https://waterfall-security.com/?p=13659 From aging equipment to regulators who must approve every patch, securing safety-critical rail systems is hard, but it has to be done.

The post Cybersecurity for Rail Systems – Harder Than it Sounds | Episode 113 appeared first on Waterfall Security Solutions.

]]>

Cybersecurity for Rail Systems – Harder Than it Sounds | Episode 113

In this episode, Miki Shifman, CTO and Co-Founder at Cylus, joins us to talk about the challenges of securing rail systems and what many owners and operators are doing solution-wise.
Episode 113 Cybersecurity for Rail Systems

Available on

Miki Shifman

Miki Shifman is the CTO and co-founder of Cylus and is a veteran leader in the development of complex cyber security projects, with over ten years of experience in software engineering, research, and management.

Prior to co-founding Cylus, Miki served as a cyber researcher and an R&D leader in the Cyber R&D Division of the Israel Defense Force’s Elite Technological Unit. He is noted to have led teams awarded the Israel Defense Prize for exceptional technological breakthroughs and received high military honors for extraordinary achievement and exceptional contributions to national security.

Cylus is a cybersecurity company that provides rail operators with a specialized cybersecurity solution for operational rail technology systems, that helps them ensure service available and safe. Combining deep expertise from both rail and cybersecurity, Cylus has pioneered a comprehensive rail security platform that delivers real-time asset visibility and threat detection & response capabilities across diverse rail technology environments. 

“…someone could potentially just go to (the train’s) toilet, a place that is not monitored at all because there are no cameras, of course, inside a toilet you cannot put them there, and manipulate something inside the train.”
Share

Transcript of this podcast episode #113: 
Cybersecurity for rail systems – harder than it sounds
With
Miki Shifman – CTO & co-founder at Cylus

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Ah, welcome. Everyone to the industrial security podcast. My name is mate Nelson I’m sitting as usual with Andrew Ginter the vice president of industrial security at waterfall security solutions andrew’s going to introduce the subject and guest of our show today. How’s it going.

Andrew Ginter
I’m very well. Thank you Nate our guest today is Miki Shifman he is the chief technology officer and co-founder at Silas and our topic is cybersecurity for rail systems harder than it sounds.

Nathaniel Nelson
Okay, well then without further ado here’s you and Miki

Andrew Ginter
Hello Miki and you know welcome to the podcast. Thank you for joining us. Um, before we get started. Can you say a few words about yourself and about the good work that you’re doing at Cylus.

Miki Shifman
Hey Andrew thank you for having me. It’s a pleasure to be here in the podcast I’m really excited towards it so my name is Miki Shifman and I’m city young co founder at Cylus um, so we founded Cylus at 2017 prior to founding Cylus I served as an officer in a technology unit. In the Israel defense forces and dealt mainly with cyber security communication systems, embedded systems and everything in between within Cylus um overseeing product and technology and so in Cylus our mission is to protect. Railway systems all around the world from cyber threats we’ll explain later on why is it even a topic um and other than my work at Cylus I’m also contributing to various cybersec security working groups in the rail field worldwide. Um, the latest is actually an ic group that’s currently working on developing the latest standard for rail cybersecurity something that should be drafted like sorry published over the next year and we’re looking forward to it. It’s supposed to. Be an important milestone for rail security worldwide.

Andrew Ginter
Railroad switchesThanks for that. Um, and our topic today is trains. It’s rail system cybersecurity. Um, we’ve had a couple of guests on the show some time ago talking about rail systems. Um, you can you remind us. You know what. What is a modern train. How does it work. How is it automated.

Miki Shifman
Yeah, so before digging into how the trains actually work I want to put like a few facts here just for the audience to get more familiar with the operating constraints. So first is that trains can operate in speeds that are over three hundred kilometers per hour and have a stopping distance of one kilometer and more sometimes the reason I’m mentioning that is to explain that only automation can enable that because a normal driver can’t really see in such a distance. And of course in such a speed. You can’t really notice the state of the signal so you need to have something that transmits the information to the cab or makes decisions on your behalf The second thing is that you have more and more services for passengers and that results in. Modern trains and of course the safety constraints and the requirements for high availability trains are now many times have hundreds of connected device in a single train and they communicate with each other through safety critical and nonsafecritical communications. Other than that you have wireless links so a train operator can sometimes have ah a huge wireless network in Europe. It’s gsmr for positive train control. They use many times the two hundred and Twenty Megahertz radios

Miki Shifman
And other signaling systems have other wireless modes of communication such as Cbtc which is used for metro many times uses just wifi and all of them together as a single system. Cause the train to be heavily reliant on technology and this technology is very proprietary and used only in the rail.

Andrew Ginter
Um, let me? yeah, let me jump in here and and give just a bit of background. Um Miki used the word signaling a couple of times. Um in the old days. What was signaling in my. Dim understanding of it. Um, it was an electrical process. Ah if a train was on a segment of tracks. It closed an electrical connection between the two tracks and so you could sense that hey you know there’s a train on the tracks or you know. Suppose a metal bar could have faked it out but you’ve got you’ve got electricity. You know a small amount of it a signal moving from one track to the other and this um told the you know a light at the beginning of that segment of track to go red saying there’s a train on the track you have to stop and it was you know. Similarly electrically connected to the previous segment to track so that the light at the beginning of the previous segment went yellow so that an engineer driving another train sitting in the locomotive um coming up on a segmented track if that engineer saw a green light and I might have the colors wrong. But. Let’s use the the the traffic light you know convention if if the engineer saw a green light knew that the next 2 segments and track ahead of them were you know clear if they saw a yellow light. They knew that the next segment ahead was clear and the one after was not if they saw a red light. It was stop stop now you’ve got something on the tracks ahead of you.

Andrew Ginter
Um, this was old school and it relied on the reflexes and the attention of the engineer nowadays. It’s all been automated and the the buzzword is positive train control. Um you know train control basically means you get a signal from computers saying which tracks are. Are clear which tracks have locomotives on them or you know trains on them and um, the ah the computer in the in the locomotive it brings the the locomotive to a stop if if it needs to um, positive train control means that it’s It’s not a stop signal. That is sent to the locomotive by the the the computers it is a go signal and if the computer and the locomotive ever fails to get a go signal in ah a given amount of time it immediately stops. That’s what the the positive in the positive train control means it means you continue moving. Only if you continue getting a positive signal saying the road ahead E was clear so this is sort of the the modern world that it’s all automated.

Andrew Ginter
Okay, so um, you know these are safety critical environments. There’s there’s challenges in terms of you know, being able to see what’s coming down the track you know, stopping these say these very large very fast trains If if there’s an issue. Um. How does that relate to Cyber Security. You know what? what is sort of the the unique challenges for cybersecurity in the Rail systems.

Miki Shifman
Yeah, so the main aspect of rail system that is quite unique is the long lifecycle. So a train can be operated in 30 years usually I give the analogy of like we can think of what we knew about cyber security thirty years ago and that would approximately be the level of security that exists in many of the current trains that are in operation. The other thing is safety so to achieve this high level of safety and making trains the safest mode of transport. You need to have a lot of constraints. And many times those contrains constraints they come in conflict with security. So just an example in many countries in order to patch a device on a train or a safety critical network. You need the government to sign off the batch and that can take just. Months of approval from the time that you even have the patch are valuable sometimes years sometimes you just don’t touch it because it’s so hard to change and you don’t want to go through this costly process of updating the other is that train manufacturers and the technology is used in trains. There are many times really dedicated for the rail industries. So they’re not used in other industries you have technologies that just have been developed for a single industry and the know-how in the industry doesn’t necessarily contain a lot of cyber security. It’s mainly around safety and operations.

Miki Shifman
Because these used to be the core values of those systems. Other than that you have passengers on those Trains. So Although it’s a critical infrastructure. It has high interfaces with the public and people can be on trains they’re in stations trains are Moving. So. Ah, they’re not in a fixed location that you can kind of like protect or put walls just to protect it and all of those are quite significant challenges that the industry works around in order to improve the security of those systems.

Andrew Ginter
So A clarifying question. Um, you know you it sounds like you’re saying if you know when passengers come into ah ah a transit. Ah you know car or ah, you know, ah a commuter car. Um, it. It sounded like you’re saying some of the computers are are there exposed or are the networks exposed in what sense is this automation exposed to the public and and how big a problem is that.

Miki Shifman
Yeah, so indeed of course not not in all cases in many cases. It isn’t indeed. There are cabinets that are exposed to the public and I can give you a few examples and some of them you can see them in train stations they use just a key that everyone can buy online. Um. And you can see them like monitors on trains and as I mentioned in the stations themselves that are like that and someone could potentially abuse the other example which is a bit more. Let’s call it. Exotic was something that we saw in some trains that apparently the toilet computers or the. Systems that are ah responsible for mentioning the state of the toilet to the passengers like whether they’re occupied or not. They’re connected to the network of the train and they are just communicating in a bus with all the other devices in the network. 1 interesting thing about it is that sometimes either their controller or other controllers. There are architectures in which they are located inside the toilet cabinet for example, behind the mirror and in such cases. Someone could potentially just go to the toilet a place that is not monitored at all because they’re not cameras and of course inside a toilet. You cannot put them there and manipulate something inside the train network. So this is actually a scenario that we’ve seen ah happening at least in.

Miki Shifman
Some attack simulations and it was actually ah executed by the ones who simulated those attacks.

Nathaniel Nelson
So Andrew, I’m thinking through it now and if I’m a cyber attacker who wants to do as much damage as possible in a railway scenario I think what I do is after breaching the network. Turn the bathroom light to occupy the whole train rides that nobody could pay the whole time I think that is the best idea to cause as much pain as possible within the system I’m so confused why this is digitized in the first place.

Andrew Ginter
Um, yeah, so unfortunately, unfortunately there’s there’s far worse scenarios. But um, let me give you just a little background in in my understanding modern passenger trains um have not 1 network automating the train but 3 of them. There is obviously the control network where the the positive train control happens. Um you know and other kinds of control functions on on the on the vehicle there is the entertainment network because a lot of the modern trains have wi-fi they might have an internet connection. You know that you do or don’t have to pay for. They might have movies you can watch on on long rides. Um, and you know of course people are connecting their cell phones and their laptops and their tablets to these these entertainment networks and there’s what’s called a comfort network which is focused on you know automation that involves the comfort of passengers like. Are the the washrooms occupied. Um, what’s the temperature in the cabin you know control the air conditioning you know control the I don’t know the if you’ve got the on the the truly modern cars the you know the opaqueness of the windows so that the sun isn’t blasting in on you. Um. You know the lighting if it’s if it’s at night this kind of thing so and these networks you generally want to see you know you want your passengers to be able to see where you are and you know a very small amount of information that’s coming out of the control network that’s tracking location and and other aspects so you know how are we late.

Andrew Ginter
Um, you generally want passengers to at least be able to see what’s going on Comfortwise so they know you know which ah which restrooms are are available and how many cars they got to hike down to find one? Um, but you know you should at least have firewalls if not you know unit directional communications. Ah, between the more critical networks and the and the the less critical networks certainly in the Entertainment Network Older older systems older rolling stock may not have these distinctions. You know they may have mixed up some of these networks that are more separate on on the newer Stuff. Ah.

Nathaniel Nelson
I got to say Andrew the kinds of trains that I’ve had experience riding. Do not appear at least from the passenger perspective to have all of these comforts and amenities is this common.

Andrew Ginter
It’s It’s a mixed bag out there.

Andrew Ginter
Um I believe it’s common in the newer vehicles. The newer rolling stock. Um, but ah, you know a if it’s not there. You know, sorry for you. It would be nice to have a movie on the ride you know b if it’s not there. It also means you don’t have any of tvhese risks because. It’s not there. So you know it’s a mixed It’s a mixed blessing so nate let me let me explain or not so Nate let me let me yeah dive a little deeper there um in a lot of critical infrastructure.

Andrew Ginter
Wow I mean that’s nasty. Um, it reminds me that very recently we had a scenario in Poland where we saw a bunch of trains like 20 of them I think um suffer emergency stops because of of some hacking attempt. Can you give us the details there. What what happened there.

Miki Shifman
Yeah, so according to what’s known on the public. Um, what basically happened there was that there is a legacy system that isn’t used for ah train communications in Poland and this system is. Receiving or capable of receiving wireless signals and those signals are effectively subtones and a specific sequence of those subtones can make a train stop and that’s by definition by design. So I want to talk about a few points related to this case, 1 of them. Is the user wireless communication. It’s not very trivial that critical infrastructure uses wireless communication. So heavily as rail and that’s a unique attack factor in rail network that should be secured as much as possible. Not necessarily There is a lot of things you can do in such a situation. But. Something to be considered here. Specifically it’s a very old system. But even if it would be replaced with in your system. Ah those systems also rely on wireless communication and these are also digital wireless communication. So it’s even more susceptible to attacks because you can do much more more other things. Many times those wireless communication links are not properly encrypted or using old encryption or no- encryption at all. Um, and these are interfaces. They should definitely be looked at and protocols like Etms or cbtc they’re different.

Miki Shifman
Potential security challenges. There. The other thing is more related to let’s say motivation and that’s something that we’re seeing now along those geopolitical disputes but real systems are high quality target for threat actors and. The people within the rail company The operators. Ah they are responsible for ensuring that the public is secure in those systems and what we are unfortunately seeing here is threat actors are increasing and setting their sites On. Those Rail systems and showing the motivation to attack them. Ah and in my opinion it should be a wakeup call to many people in the industry that not necessarily looking at security not to sell in this case by the way that’s just an example of one company that got targeted none to necessarily even my cyber attackers. But. Over Wireless radios. But in general in the industry I think that we should look at ah the fact that Frat actors are actually looking and inspecting those systems and they can be aware of many of the specifications and these systems definitely should be treated. With security in mind.

Andrew Ginter
So um, let’s talk about about wireless communications for just a minute most heavy industry is deeply suspicious of wireless any kind of wireless. Um, you know why? you know it’s because cell phones are. Walking wireless attack vectors. Among other reasons you know how does that work imagine that you know your pizza delivery guy has downloaded a trojan game you know delivers pizzas into a refinery or a power plant. Um, and the Trojan game. While it’s inside the power plant is scanning for wi-fi networks and reporting their geographic location to a command and control Center Now The bad guys decide. They want to target a particular power plant. Um, they know in their database. They’ve got I don’t know six wi-fi networks in that plant One of them has the name control The other one has you know. Suggestive names they launch a phishing attack. They steal the credentials to log into those those wi-fi networks and now the next time anybody carries the compromised game on their cell phone doesn’t have to be the same pizza. Delivery guy can be anybody carries a compromised cell phone into the site. Um, the bad guys can connect to the cell phone over the cellular Network operate the trojan on the cell phone give the credentials connect to the wi-fi network in the site and you know work their will upon it So you know heavy industry is.

Andrew Ginter
Deeply suspicious of wireless for this attack scenario and and many others the problem with the rail system is that you have no choice. You have to use wireless communications to to communicate with these these you know locomotives that are traveling at three hundred kilometers an hour you know all over the countryside. You have no choice. And so yes, you have to encrypt everything. Yes, you need credentials everywhere and you’ve got to train your people not to leak these credentials because you know there’s just so it’s a hard problem. You have to use wireless but nobody wants to you know. And and so there’s a lot of of you know focus on on wireless security in the rail system policy. So Nate you know, thinking about this um a lot of people might ask? Ah why are we focused on.
-14:46

Andrew Ginter
Okay, so that’s ah you know that’s a distressing picture of sort of constraints and and issues in you know the security and in Rail systems. Um, can you talk about sort of the the what are. What’s the response. What’s the industry doing to address these things.

Miki Shifman
Yeah, sure. So of course the topic of security is quite broad. We know it from all other industries as well and there are a few motions there. 1 of them is securing the install base the other is develop. Products that are trying to be secured by design and also in each one of them you can dig deeper and see the controls that are being used in order to achieve those purposes so there are some controls that are harder to use many times like for example, encryption is unnecessarily being used in. Industry for other reasons can be about latency and potential impacts on the operations. Ah, other than that you have methods of things like segmentation in which we also cooper with waterfall. Um, and solutions like dials or firewalls as such what we’re doing is another thing which is being nonintrusive and trying to be as much easy as possible to deploy. So.

Miki Shifman
As as I mentioned before the main constraint environment is safety so you are trying to secure as much as possible without compromising safety and operations and that’s not such an easy task because in order to secure. Optimally you of course need to make a lot of modifications you would like to maybe change the devices themselves as I mentioned before you might want to introduce encryption wherever it’s possible. But sometimes what we’re seeing is that making those changes is much more expensive. And of a cost than just introducing an external solution that will give you the right? compass any control over the fact that those controls do not exist and when I say expensive I’m mostly mean into the need of recertifying the systems. Passing them for safety approvals upgrading and huge install base etc and our approach in Cylus One was to help operators to be able to meet the best security practices and follow the security frameworks in a way that is tailored for their environment. As well as make sure that all of those processes are indeed aligned with the safety processes and they’re not introducing another risk or a challenge with that regard.

Andrew Ginter
Okay, and you know, um in terms of of solutions in this space. You know Cylus is I mean you folks. Ah you know, have services offerings. You’ve also got technology. You’re selling technology into this space. Um. What are you? What are you producing and and you know how does it work.

Miki Shifman
Yeah, so our solution Cylus One which is the solution that the company develops is what we call a real tech security platform. So a Rail tech security platform is a comprehensive platform that is capable of providing several benefits to. Operators. So The most important thing about this type of a solution is the context that it has so we haven’t invented the space of operation technology monitoring. But I think that the major innovation that we bring in the rail industry and is so much needed in the rail industry is the ability to put context around the information. So our ability to provide operators

Our ability to provide operators with visibility which is precise and is tailored for their Environment. So the ability to differentiate between assets whether they’re safety critical or not whether they’re interlocking light signals. Point machines or things on the onboard such as braking systems and door control units this ability helps them to actually identify their environment understand the exact titles of their security poster.

Miki Shifman
And also remediate security issues as they occur in a much faster pace because they have this context think about it if you could have a network of hundreds of thousands of devices and you don’t really know what’s the role of each device. It’s very hard for you to prioritize. Whether an alert is severe or not ah understand who’s the owner of a specific device and who should treat the security issue understand the context of the device in the broader rail system and whether operations can continue as normal or not and these are all things that our solution brings. So. Broadly speaking our solution helps with visibility with detection the response piece of it which is very important because detection is 1 nice thing that you can do by detecting various sorts of tactics techniques and procedures. But understanding. How should you properly respond under the constraint of the rail environments is part of our secret sauce and part of the value that we’re bringing to the customers to make sure that they’re not just lost and flooded with lots of alerts and also of course compliance because compliance is paramount in the industry. So the ability to comply with rail security frameworks. As well as security. Best practices while meeting the safety constraints. These are all things that you get through our product and it helps you to also of course meet the requirements of all the latest regulations such as the TSA directive.

Miki Shifman
And the us and is two directive in Europe and standards and best practices such as Ts 57 one and ic 6 3 4 5 2 that will be developed that will be released in the future. Sorry and the system of course will also help operators to. Comply with it.

Andrew Ginter
Okay, so that’s ah, that’s a lot of Benefits. You know these are all important benefits of of a solution but you haven’t really said how it works I Mean. If you want to understand sort of the the purpose of each piece of equipment. Do you enter its Ip address by hand and enter the data by hand and now you have it available when an alert comes up or do you discover this stuff automatically or or what I mean. How? how are you gathering this data and and how much of it is sort of of manual how much of it’s Automatic. Can can You can you lift the hood for us.

Miki Shifman
Riverside RailroadSo there are several ways that it works first as I mentioned the purpose is to be as much non-intrusive as possible and the way of doing it is first like. We collect information via network traffic. So we passively connect to the network via tabs or spend ports or diodes what is approved by the customer and collect the information passively for a platform that’s raw network traffic and we extract the context that I mentioned through this raw network traffic. So it starts by analyzing the protocols which is probably the easier part but then it builds out over our algorithms for as a database and anomaly detection and compliance and helping actually to make sense out of this data so that’s one source of data that we treat. The other source of data comes from integrations. Um integrations can be through operational systems that exist in the environment and these operational systems already gather insights about the operational state of the real environment. This can be like maintenance systems for example and our system can seamlessly integrate with them. And by collecting this information users can get a single pane of glass over their operational and security data in the sense that when security data is out there. You can actually correlate it with the operational input that you have in the environment and that usually helps you to spur false positives.

Miki Shifman
And have shorter investigation cycles other sources of information can include asset management databases risk management databases other security solutions that are used in the networks whether in the endpoints or other locations and we collect information from all of those in order to. Put this information into the context that they mentioned before so with this with these capabilities of information Collection. You can actually get a very comprehensive view of your network and very precise view of your environment whether it’s trekside onboard. The operation center or the stations themselves.

Andrew Ginter
So So listening to this you know I think some of our listeners might ask why? The great. Focus on you know, detecting and responding to incidents if cybersecurity is critical to safety then do we need not need to to prevent the incidents. Um, and you know I think I think the answer is partly. Got a lot of legacy equipment out there. It’s weaker than we want it to be and so one of the compensating measures we can put in place is you know a strong detection. It’s It’s not as good as changing the systems to prevent attacks. But you know it’s It’s something that especially in a passive mode. It’s something we can. Very quickly. Add after the fact without without arising the the ire of the of the Regulators. The safety Regulators. You know you might also and don’t don’t don’t get me wrong, you might you might also ask um you know. But if we were able to prevent these attacks by applying security updates by doing better segmentation by whatever um, could we? you know? do we then still need detect respondent recover and you know the answer is yes we need both. You know.

Andrew Ginter
the the nit cybersecurity framework has 5 pillars and you don’t choose between them based on your industry you might prioritize them based on your industry but a robust security program has all of them the most sophisticated um intrusion detection the most sophisticated you know. Detect respondent recover programs that I’ve ever seen are at sites that also have the most sophisticated prevention programs. They they sort of go hand in hand so you know on the one hand. It’s a compensating measure. You can. You can get some of your your assurance back with detect respondent recover and on the other hand. It’s a long term investment. You know we we need it going forward

Andrew Ginter
So you know ah a couple of things that that I I heard you sort of speak to glancingly could I ask you to go maybe a little deeper on um, response playbooks you know if there is something that might be an incident or definitely is an incident.

Miki Shifman
Yeah.

Andrew Ginter
You know it sounds like you have some support for dealing with the incident. So Can you speak to response playbooks and you’ve also mentioned compliance. It sounds like you can compare what you’re seeing to what needs to be there compliance-wise So Can you talk about sort of response playbooks and compliance. How do you?? How do you do that? What does that you know what does that look like under the hood.

Miki Shifman
Sure of course so let’s say we response playbooks so in response playbooks our goal is to have the operator capable of handing our alerts in a way that fits their environment. So it starts actually by helping the operator to get all the relevant context over a specific alert. So it’s the ability of identifying similar alerts very quickly and correlating it with them. Um. The ability of understanding whether maintenance activities took part of a specific on over specific asset. It’s the ability to see what other things this asset has experienced prior to this alert. Um, and it’s basically this and others that create the context. Helps the operator to first understand whether this alert should be there or not whether it’s expected maybe um and it also afterwards helps them to adjust it accordingness or justice in activity of the system and ensure that. They will see more or less of those alerts in the future. Other than that there is the part of by identifying the context of the alert. The context of the asset. The context of the operations understanding. How do you actually should respond to this event.

Miki Shifman
And by responding you can take several elections um some actions will be hard to take over a specific type of systems. Some are more possible. Um, generally speaking. The industry is. Just starting in terms of like the active response Capabilities. So the ability to actually like micro segmentment or do something similar over assets. It hasn’t been the case until now. But we see more and more sparks of it specific and specific systems that are inside the industry. Um, and. This general ability of like providing the operator a context it spares a lot of time something that you can effectively measure by the time that your sock team or your operations team needs to take when it analyzes Alerts and I think that’s an important metric to look at when you’re. Having some sort of a sock and Railil company or you’re setting up this monitoring or detection program inside your company and that’s where context is mostly useful so that’s about the response piece in Nutshell if we go into Compliance So Compliance is a very broad topic. Um, and. Especially in Rail It has a lot of tailwind coming from the different standards that are being developed and the suppliers themselves because the industry is used to develop things that are certified to something and that’s.

Miki Shifman
That’s the stamp that the industry provides to their components. So the general. Let’s say major capability of the major rail suppliers is the ability to have high level of safety and certification and that’s very hard to achieve. So what we’re seeing more and more is that the trend in the industry is to have a similar approach with security so to ensure that there is a baseline of security that is by design in those devices and ensure that is being enforced over those devices and this baseline of security can be a standard like. I c 6 to four free dash free family which is um more of the system integrator side. Um, and it can be something around iis free dash that dash 2 sorry that is coming more of the asset on their side and. All of those together are being embedded into this new set of frameworks that is developed in the industry and what our solution helps with is the ability to first understand your compliance status to some of the requirements as these those that are related to controls. Ah, because many of the requirements are to processes which are not necessarily things that are visible through just monitoring of traffic or analysis of data. Um, and other than that it helps you to understand like your general level of.

Miki Shifman
Complies to specific framework where the system helps you to achieve the goals that you have on specific requirements and that’s something that can also serve potentially as a competent and control for requirements that you don’t have because the truth is. It’s very hard to apply security to especially legacy systems but the term legacy is really stretching the rail domain because it’s thirty years so even if a system was developed like five years ago it’s already legacy and doesn’t necessarily throw security by design and with our product you can actually look at the different parts that you’re not compliant with. And see what coverage you can actually achieve through using the solution. So for example, if you have an unencrypted link. That’s that’s bad like that’s not something that you would like to have but let’s say the second best of like encrypting it or authenticating it would be probably to ensure that. There is no abnormal communication over the link that could potentially compromise you because it’s 1 thing to knowledge you have a risk The other thing is to actually be able to mitigate it or identify whether this vulnerability is being exploited and that’s something that we can definitely help with. The operators that are trying to meet those frameworks even with partial ability to implement controls.

Andrew Ginter
So I’m I’m still a little confused on the compliance side. Can you give me a couple of examples. What what kind of things can you you know, detect on the compliance side and and report on.

Miki Shifman
Yeah, Sure. So Maybe just to Catholic Go back to the previous question and start from there. So. Another important aspect of compliance is what happens the day after a system is being handed over so most of the compliance or most of the Frameworks are focused in complying at a certain point of time which is usually the handover time from the system integrator to the asset owner to the Rail operator. And from that point it’s under the responsibility of the operator but it’s very hard to enforce it over Time. So Even if there is a configuration that took place initially in a good way over the lifespan of 30 years that could be changed so.. For example I mentioned before the idea of vulnerabilities and patches. Um and one of the things that you can potentially do is to actually like through your vulnerability management and patch management Program. You can track the vulnerabilities of your devices. And ensure that the patches that needed to be installed based on your patch manager program which is adjusted to your environment adjusted to the safety constraints are actually being installed and that’s something that is essential because you’re probably not going to end up installing all the patches but you’re going to end up installing at least.

Miki Shifman
Part of the patches that are needed in order to meet your objectives and that’s something that we can actually track automatically so the vulnerability side and also the installation of patches and the software versions of the devices. So that’s 1 thing. The other thing is actually more more exotic examples of like. Systems that haven’t been properly segmented large systems and 1 of the challenges. The operator had that they wanted to kind of like divide the system into security zones and conduits like canbi I c 6 four free terminology. So this requires you effectively to. Install ah, of course some segmentation appliances inside the network. Um and they had them in several location but several occasion and didn’t have so one of the things that we could help with for virtual segmentation. Capability was actually to.

Miki Shifman
Divide automatically or provide a suggestion automatically to security zones and conduits over the environment of that operator and then have the operator kind of ah enforcing policies or policies can be enforced for a product in a way that. If there is aoral communication. One of the Rail application protocols between security zones that should not take place the system will automatically alert on that and help the operator to fix this misconfiguration and that’s something that helped them in order to. Achieve a sort of a compos in control over lack of segmentation, a specific location and later on to properly segment their system using those insights on recommendations was it okay.

Andrew Ginter
Um, thanks for that and and you on the topic of compliance. Still um, you’ve mentioned a few times there are standards that are out there for cybersecurity and in Rail systems. There are standards that are under development. There are standards that are still a gleam in the eye. Ah, can you can you survey for us What what does the regulatory landscape look like for cybersecurity and Rail systems. Okay.

Miki Shifman
Yeah, yeah, of course so I think there are few things to look at like a few dimensions to look at one is frameworks versus regulations. Ah the other is the geographical dimension because different countries have their own. Regulations. So if we start from the regulatory landscape so in the us psa with the help of Csa has published a few security directives that are basically used as regulations ah and from what we know more expected to come in. Europe the regulations are mostly derived from nis and nistu that cover critical infrastructure in general and rail is part of it but part of it is also for the member nations to identify their operations. Operators of essential services and kind of identify. How can they comply with the overall directives and this trend of having the regulation part of the krieka infrastructure regulation something that we see in rail. Because almost every rail operator is part of a critical infrastructure in their country. Other than that there is the landscape of standards. So.

Miki Shifman
The most comprehensive standard that’s currently available only for rail is called technical specification five zero seven oh 1 developed by San Alex and it was published in the end of 2021 and this standard is part of an initiative by both. Operators and suppliers mostly from europe that have taken the IC 6 to four free series and try to identify how rail is different or where rail is different and developed. Sort of like paper or technical specification that includes the different phases in the lifecycle of rail systems and how they should be handled in terms of security. 1 of the interesting parts of the unique parts I think is the interface between safety and security which is. The topic that is generally intention. So this tiny specification it was what is in the end ofstone twenty one served as a basis for another group that I’m actually para of part of and it’s a group ic which is a global standards organization and this group took ps 57 to 1 as well as isis six to form free Syria and is currently working together to establish this de facto global standard that can be used by each individual country to align their security within rail systems.

Miki Shifman
Other than that you have groups like Uatp and apppta in the us that are developing lots of useful papers but things like how should you run a tendering process about maturity programs for railway and transit operators. Both ot visibility detection within Raille and all sorts of very interesting topics that I really recommend for anyone wants to go and deep and dig deeper into the topic to read them and. Gain more understanding of how the rail environment works and what are the best practices to protect it.

Andrew Ginter
Okay, well you know this has been good. Thank you Miki! Thank you for joining us. Um before I let you go ah you know can you sum up for us what what should we take away from what you’ve been telling us here.

Miki Shifman
So thank you Andrew um, so if I could summarize it to a few takeaways of first is that it’s important to notice that rail environments they have unique nature and they’re very evolving in terms of technologies that are being used. Within them. So that’s 1 thing. The second thing is that in order to operate effectively security within the rail environment. You should really understand how operations in rail work and the different principles around safety because without that like I feel like it’s very hard to. Get to proper solutions in securing those environments and I really recommend to every one of you trying to secure them to really talk to your operations people and get more understanding of whats on their mind and what are the risk that they’re seeing. The other thing is that a real tech security platform can really ease your way into securing your environment and the changes that you need to make in order to secure your environment are not as bad as you might think and other than that I just. Encourage you to visit our website at Cylus.com and we’ll be happy to assist you with your journey within rail cybersecurity. We have a lot of experience that I really prefer from others to kind of for others to kind of explore the mistakes that.

Miki Shifman
We’ve seen happening in various places and try to take the shortcut and we’re happy to have you for the journey and help you with our solutions and of course please feel free to connect with me on linked connect with me on Linkedin I’ll be happy to chat with any of you. On the topic and have interesting discussions about it.

Miki Shifman
And of course, thank you very much Andrew it was a pleasure chatting with you today and I really look forward to more up is episode podcast. Thank you.

Nathaniel Nelson
Wait pause. So Andrew that was your interview with Miki. Do you have any final thoughts to take us out with today?

Andrew Ginter
Yeah I mean one of the one of the insights I got from from Miki, um, was that this industry is much more heavily regulated than I realized.

Nathaniel Nelson
Yeah, you know, ah sorry to interrupt you but it does bring me back to a point that we had thought about earlier in the episode I think he mentioned that the government has to approve like every patch in this industry which correct me if I’m wrong that that that kind of sounds crazy right.

Andrew Ginter
I mean in a sense it does but you know it’s all about safety I mean this industry from the very beginning we’re talking you know I don’t know the mid eighteen hundreds or something in my understanding this industry has been focused on safety from the very beginning you know to my understanding the the telegraph was invented in large part because or was deployed you know continent-wide in large part because of the needs of rail systems. Um, you know if ah and I don’t know what Europe but in North America most of the track that crossed the continent. Was single track you could put one train on it. There. There wasn’t a parallel set of tracks. Um except at stations where you know trains had to get by each other or or switchyards and so one of the in my you know in my understanding the history one of the jobs of the engineer the the person who. Ran the engine in in the the freight trains crossing the continent or passenger trains. If for example, the train was not scheduled to stop at a station I was taking the the track beside the station blasting on by not even stopping. 1 of the functions of the engineer 1 of the roles was to stick their arm out. There was a boom that swung out with ah a piece of paper on it. Grab that piece of paper and read it. This is a telegram telling the engineer whether it’s safe to continue on the next section of track or not.

Andrew Ginter
Or if there’s been a delay and you know there’s ah or if there’s been a derailment or something safety has been job one in this industry since the very beginning and you know it it persists to this day to me the real challenge that it sounds like is the the industry is facing is. Is the the dilemma between safety and cybersecurity in the modern world cybersecurity is essential to safety. The threat environment is deteriorating. We urgently need to make cybersecurity changes to these these you know safety critical systems that are the rolling stock in our rail systems. Um. You know this is the dilemma that the entire industry it sounds like they’re struggling with and you know the good news is not all bad. News. The good news is that folks like Silas are rising to the challenge and and they’re coming in with technology and you know not just a set of technology but they continue to to develop and innovate as they’re. Participating in these these industry forums to you know, develop solutions that can be deployed against systems both old and new.

Nathaniel Nelson
…then with that. Thank you to Miki Shifman for speaking with you Andrew and Andrew thank you as always for speaking with me this has been the industrial security podcast from waterfall.

Andrew Ginter
Um, it’s always a pleasure. Thank you Nate.

Nathaniel Nelson
Thanks to everybody out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Cybersecurity for Rail Systems – Harder Than it Sounds | Episode 113 appeared first on Waterfall Security Solutions.

]]>
Demystifying Cyber Jobs – In the Energy Sector | Episode 112 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/demystifying-cyber-jobs-in-the-energy-sector-episode-112/ Thu, 19 Oct 2023 14:39:09 +0000 https://waterfall-security.com/?p=13190 Job seekers say there are no OT security job postings. Hiring managers say nobody is applying to their posts. Amanda Theel and Eddy Mullins of Argonne National Labs walk us through recruiting issues, especially for fresh grads.

The post Demystifying Cyber Jobs – In the Energy Sector | Episode 112 appeared first on Waterfall Security Solutions.

]]>

Demystifying Cyber Jobs – In the Energy Sector | Episode 112

In this episode, Amanda Theel and Eddy Mullins of Argonne National Laboratory walk us through the thought-process that goes into the selection of hiring candidates for Cybersecurity jobs. Their main focus is for the Energy Sector, but most of the information carries over into most other industries.
Demystifying cyber jobs

Available on

Amanda Theel Argonne National LabratoryEddy Mullins is the Workforce Development Project Coordinator and Amanda Theel is the Group Leader for Workforce Development at Argonne National Labratory where she leads the cybersecurity workforce development effort for the Department of Energy (DOE) Office of Cybersecurity, Energy Security and Emergency Response (CESER) where she leads the CyberForce® Program that oversees several collegiate cybersecurity efforts. Additionally, she provides expertise to DOE, the Eddy MullinsDepartment of Homeland Security (DHS), and the Cybersecurity and Infrastructure Security Agency (CISA) as a lead analyst on cybersecurity methodology and cyber guidance. 

“…you’re bringing so much value to, not just the company, but honestly at the end of the day, to the United States.”

Share

Transcript of this podcast episode #112: Demystifying Cyber Jobs in the Energy Sector

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Welcome. Everyone to the industrial security podcast. My name is Nate Nelson I’m here with Andrew Ginter the vice president of industrial security at waterfall security solutions who’s going to introduce the subject and guest of our show today Andrew has gone.

Job InteviewAndrew Ginter
I’m very well. Thank you Nate we have 2 guests today Amanda Thiel is the workforce development group lead at Argonne National Laboratory and Eddy Mullins is the project coordinator at Argonne National Laboratory and they’re going to be talking about jobs the the official title here is demystifying cyber jobs you know they’re focused on the energy sector but you know it seems to me that a lot of what they say applies to all industries. you know, especially you know since we’re talking about jobs and recruiting um and you know. People complain the the employers complain that nobody’s applying to ot cyber security job postings and the um you know the the people looking for jobs are complaining. There are no postings they can’t find them so in a sense. Both of these are the same problem and this is what Amanda and Eddy are going to be talking to us about.

Nathaniel Nelson
All right? then without further ado here is your interview with Amanda and Eddy

Andrew Ginter
Hello Amanda hello Eddy thank you for joining us before we get started. Could you maybe you know give our listeners a ah few words about yourselves and about the good work that you’re doing on the the cyber force project at Argonne National labs

Amanda / Eddy
Sure I’m Amanda feel I’m the workforce development group lead at argon national laboratory and I lead the cyber force program out of the office department of energy’s office of cyber security energy security and emergency response. And I’m Eddy Mullens I am the project coordinator at Argon national laboratory and um I work closely with Amanda. I assist in managing the Cyberforce program and the cyberforce program is the collegiate workforce development effort out of the department of energy that looks. At providing students that operational technology component of understanding how to get themselves into that energy sector job right? after they get out of college.

Andrew Ginter
Okay, so thanks for that. So you know in my understanding Cyber force is training you know, young folk to enter the the cyber security roles in the energy sector. and. You know you I heard you folks speak at at the energy set conference recently. you’ve been running into challenges getting your graduates placed. Can you can you talk about? Ah, you know some of these some of these challenges. What’s what are you running into here.

Amanda / Eddy
Sure so the cyber force program um hosts um a handful of competitions and exercises for collegiate students to kind of better prepare themselves with cyber security skills. And operational technology knowledge. But what we’ve come to really understand is that the terminology that a lot of these students learn at school in their colleges universities even in their quick programs that they take their boot camps. Don’t necessarily translate into the jobs that they’re looking at online and what I mean by that is the terminology that we would necessarily think in a traditional cybersecurity or cyber engineer that they’re looking for in a job. Doesn’t necessarily translate directly in a 1 to one when we get into the energy sector they use slightly different terminology and so these brand new people. Are you know students or folks that are looking to go into the um job market. They’re not fully under. Standing that. Um there’s a different vocabulary that’s out there and so trying to get them to really understand that they have to be look fully into a job description as well as understanding that. Um.

Amanda / Eddy
Their job role is not going to just be cyber when they get into an energy sector job. Yeah, and also one of the other things that we that we noticed you know is we looked at generation and and the way that the modern generation that’s getting into the workforce now the way they look At. The workforce is completely different than what if like a Gen X or a baby Boomer You know like the millennials of the Gen Z’s when they’re reading these job descriptions. There’s a lot more than just the totality of what it is that they’re going to be doing that they’re looking for is. You know they’re focusing so much on what is the general experience of and how does this job and the experience that it’s describing to me how does it fit into my life. You know like our our parents when they were in in the workforce. It was How do we fit to to the workforce Now. It’s kind of like how does the workforce fit for us So You know we’re seeing that. Some of these descriptions and the way that they’re written in the energy sector has been. They’ve been utilized for you know, quite some time. and they’re a little bit outdated to some of the modern tactics and the modern ideals that you know, ah. Current generation student would be looking for and and appealing to apply.

Andrew it seems to me that what you guys are talking about here. It’s ah it’s a common refrain maybe within industrial security but also in just about any line of work. You know. You go to school for all these years you learn Calculus and then you go out into the real world and you don’t know how to do your taxes. Is there anything unique about how we’re applying this to industrial security this problem.

Andrew Ginter
I don’t think so I mean I think it’s ah it’s ah it’s a widespread problem. The specific data points that Amanda and Eddy have are are in the energy sector That’s that’s what they do. But yeah I I see a lot of similarities across industries you know and it’s it’s not just across industries. It’s across. You know time I mean I’m coming up on the end of my career now but I remember you know before I started when I graduated high school I was going to do a sciences degree at the University Of Calgary I show up at the university and I know that to do a sciences degree. You’ve got to take first-year calculus and I had taken. High school calculus and the university had a program saying look if you’ve taken high school calculus you can do a challenge exam if you ace the challenge exam. You don’t have to do the first semester of University Calculus so you know I’m ah full of myself I I say you know I got an I got an a in high school calculus I should be able to do this. Show up for the challenge exam and you know they put the exam paper down in front of me and I don’t understand even 1 question your name goes here I understood that part the rest of it. No idea you know 5 minutes later studying these questions I get up I I hand the paper and I leave. I show up for ah for the the calculus course you know 2 lectures in I figure out that they’re teaching exactly the same thing that I learned in high school only they’re using a different notation and so I looked at these questions and didn’t understand one of them. So yeah, terminology Notation. You know this is stuff that you know what there’s there’s there’s gaps. You know. In this industry. There’s gaps in other industries. There’s gaps over time. This is I think this is a very common problem.

Okay, so you know that sounds like a couple of different problems. Can we can we hit terminology First can you give us some examples What what? you know? what are the what are the gaps that that students are seeing versus you know the the industry is is using.

Amanda / Eddy
Sure So in a lot of positions. We’ll say in the energy sector they tend to look a lot as in a generic post on either an operational security analyst or operational security. Um. Engineer and when they look at those things they tend to think of it as operational meaning less on the cyber side or it’s written more in a sense of um. It sounds like a help desk role rather than them actually working on the cyber side. and it tends to be well use word less flashy for them. So when we think through Cyber they’re looking for. Firewalls and they’re looking for the fact that they’re going to be building a secure backend um and part of that problem is and again it’s the knowledge that some of these students lack in just the general critical infrastructure field is that? um. Energy Sector specifically has been around for obviously so long that our our infrastructure has been there and it’s not changing So a lot of what we need. Security wise is understanding both and a physical type as well as the it that goes with it.

Amanda / Eddy
But it’s not just Cyber. It’s having a multi hatwearing person that understands both an I T infrastructure but also an operational infrastructure which is keeping the grid up and running but we can’t just. Keep the grid up and running by updating and putting updates in place or a firewall. and so they’re looking for those things of I’m going to be managing patching keeping the lights on for things and it’s not as clear as day. for these students and so when they don’t see that in a job posting or even a job title. It tends to be less clear for them if that’s actually what they’re going to be doing or not but when we talk to these organizations. That’s. Ultimately what they’d be doing on some portions of their job and other portions. We’d need them to really kind of help understand what’s the next thing look like for this company. What’s the next generation of energy look like in securing it and. Part of that is still trying to figure out what are we calling things. What are we doing and working through some of that.

Andrew Ginter
Okay, that makes sense. you also mentioned sort of generational challenges. It’s 1 thing to to look at a job posting and say yes, this is the kind of thing I’ve been trained for. but it’s it’s another thing to look at it and say this is what I’ve been trained for and yes, this is what I want to do um it it sounded like you were saying that sort of a lot of the postings that you see out. There are sort of recycling language from ten years ago and really are not appealing to the the young people that. You know the the posting is targeting. Can you talk about about that what you know what? what needs to be in these postings and you know is it just the postings or does. The nature of the job have to change somehow in order to to attract this generation of of workers.

Amanda / Eddy
Yeah I think it’s it’s it’s a little bit of both both not just the the language within the posting and you know also what is the experience that come with it I mean we all know like after 2020, you know and in the modern generation. 1 of the biggest things that you know they look for is flexibility. You know if you look at the baby boomers the gen x like telecommuting never existed. It. It wasn’t an expected um expectation of work where now it’s it’s almost a demanded expectation of work and and and it doesn’t have to do with just telecommuting. Or hybrid work is just the flexibility of hours of scheduling. You know we all we all grew up with the standard 9 to 5 that’s almost kind of going into the older generation where it doesn’t exist now you know the modern generation is looking to be flexible on how it is that. They can work what hours do they work best at and those are some of the things that are simply to add to to a job description that can already emphasize what the job experience would be like you know when they look at. As soon as they start seeing that 9 to 5 yeah like Amanda mentioned earlier it just it doesn’t sound sexy. It’s not appealing and when you talk about the energy sector. Automatically when you think of energy. You think the line workers the boots on ground were.

Amanda / Eddy
The sector in itself already doesn’t have those appealing factors that would be working for a Google and Amazon those big tech companies. So that’s how you you modernize the the positions and the descriptions to provide a little bit of emphasis on the the benefits of of life. We all know that. Working for the energy sector has its own benefits and sometimes the energy sector kind of fails to emphasize those benefits of the the consistency of work those kind of things so it’s a little bit of both when it comes to just the terminology as well as the flexibility of of what they’re looking for.

Amanda
And what we want to see is we’re not emphasizing that job posting should be unrealistic either. at the end of the day like we understand that there’s always going to be jobs that just there’s not much you can change in a job posting to make it sound any better. But when we start looking at the generational differences between each generation and how potentially 1 looks similar to another but then what are their differences you start to kind of notice just in the workforce alone. What does each generation really value and at the end of the day we look at job postings and they tend to be written a lot for the baby boomers those that they really they were wanting a job and it really didn’t I don’t want to say didn’t matter what the job was but they were very.

Amanda / Eddy
They wanted to get in the door. They preferred structured organization at the end of the day and so you see a lot of positions written that way when you look at the gen x they started to be more flexible and wanting to really be able to see the ability to change. as an opportunity grew and so being able to be able to see that ability to grow within an organization started to occur. But then you get to the millennials and again as Eddy pointed out when they started to join the workforce covid hit shortly in the mix of it. And work from home started but equally millennials tend to be very money driven. So at the end of the day when you do a job posting for them. They’re very wanting much wanting to know what is the dollar range that they’re going to be hired within. I’m again, not stating that that’s a good or a bad thing but they kind of have an expectation upfront of understanding where their lifestyle is um within their kind of domain and then you see gen z which is kind of on almost a polar opposite spectrum again not saying that they’re not interested in the dollar value. But they’re really more interested in understanding like how do they bring value to your company but also bring value to their life. They want to make a difference. and that’s a really hard way that you need to think how can I write our job description to show someone.

Amanda / Eddy
The value that they bring to a bigger picture at the end of the day and honestly the energy sector has probably 1 of the biggest areas that you could bring to the gen z of saying like you’re bringing so much value to not just this company but honestly to the end of the day to the United States when you come here and work with us and to Edie’s point like venership brings stability when we think right? just this last year you know we’ve had a lot of those big tech companies having quite a bit of layoffs and so when you think through energy sector companies the like you know you have more stability there. Ah, may not be as flashy of a salary but you have stability and you have something that brings value back to you of I’m actually bringing power electricity something back to either my own house or to people that I know.

Nathaniel Nelson
Yeah, so I am ah millennial technically. But I’m only a few years off of gen z and so I do feel the urge to defend them a bit here. Um I don’t think that what Amanda meant is that ah gen z is you know money hungry or whatever it. Gens z does put ah a focus on the salary numbers because I think that there’s more of an idea of worker empowerment. You know that you don’t just go and work for a company and take whatever they give you but you. You vet them to make sure that they’re going to give you the experience and the compensation that you deserve upfront.

Andrew Ginter
That’s right I mean you know I have a daughter who’s who’s a millennial and you know I might use the word practical um to me, you know it’s it’s not just saying I want to know how much money I’m going to get it’s it’s a bigger picture of and what does that mean for my life. Where am I going to live do I have to drive into work. You know what? how does? How is it affect you know, sort of the the big picture and to me it’s you know it’s more than than the generation with each generation to me. You’ve also got to look at well bluntly how old is the generation and. And what are they up to in a current posting I mean you know to me it’s I see the mistake here. The mistake is old guys like me put a job posting together that would appeal to me when I was fresh out of school. Yeah well a I’m the wrong generation b I’m not fresh out of school b. You know see ah a lot of these folk aren’t fresh out of school either I remember you know when I was a young man I bounced from job to job. The grass was always greener. and then I had my first child and the wife looks at me and says you’re done moving around and I’m going that’s for sure and i. Got me a job I settled down and I stayed there for 15 years Why because I had other fish to fry. Okay I had I had other priorities in life I had other ways to spend my energy if I had spare energy. It went into the kids it went into the the home it went into the family. Not you know, finding the the grasses being our next job so you know.

Andrew Ginter
There’s a lot of variables here. It’s not just the generation but you know where is that each generation at at their point in life in this kind of age group that that you’re trying to appeal to.

Nathaniel Nelson
Right? And of course the conditions that in in which people are looking for jobs now are quite different. You know I can imagine someone in say your position Andrew who’s been at the same company for 15 years or or longer than that and then they post a job for. Maybe the kind of entry level job that they started off with and they have a salary number associated with it that sounds quite good to them. But of course ah houses cost a lot more relative to average salaries these days than they did before and so what might seem like a lot to. Somebody of an older generation now to a younger generation. You know doesn’t quite go as far.

Andrew Ginter
Indeed so lot of variables to take into account.
Um, so that makes sense but you know I want to I want to push back on sort of I heard you use the word remote work saying that you know there’s ah, a generation of of young folks out there that entered the the workforce you know during or shortly before the pandemic that have become accustomed to remote work. Everyone’s expecting remote work. You know I have to push back on that if you are a pipe fitter in a you know a power plant and it’s your job to you know fix stuff that’s broken and you carry a toolkit around all day. This is not something you can do remotely. You know. Is it really true that there’s a whole generation of people out there expecting to do remote work and you know to me that just doesn’t seem possible. Can can you talk about that a bit more.

Amanda / Eddy
Sure So You know you’re right? That’s it’s definitely I think more what I think idie and I were mentioning was more definitely towards the tech field and I think it’s a benefit of tech to be able to be remote. most jobs require you to have your computer and internet line and you know you should be able off to the races most of us figured that one out again unfortunately during a time in which we didn’t really have many options. but to be at home. other unless your job was to be in the office which again not stating that some of these energy companies did require someone to still be in the um office. But the a lot of Ah. We’ll say entry level are folks looking to come into. Um the Job Market. They grew up in what was a remote environment whether that was school whether that was a remote job and so they see ah. Flexibility into them almost a negotiation factor of that ability to be able to work from home and so seeing the tech industry is one of those of the few and again I think everyone looks at that. Ah, it could be a systemic problem moving forward.

Amanda / Eddy
And it could be a benefit dependent on where your organization is um that that is definitely something that we’ve noticed that um the younger generations look for and find as a means of want is their ability to work. From I won’t even say work from home but work from wherever they’re at some of them. It’s they want to be on vacation three hundred and sixty five days a year but work from wherever that places and some of them is they just really enjoy working from home rather than being in an office so they can work in. You know. Be at home and at ah Alaska but work for you know a company on the East Coast whatever makes most sense for them in a comfort environment. But I I agree with you that no not every industry and not every person you know, understands that that’s something that you know is available to them.

Eddy
I mean it’s kind of one of the appeals to come into the tech industry when you think you know the tech industry and you look at California and states you know those those big states. Automatically you you assume 2 things 1 flexibility and 2 you assume high salary and the flexibility especially with tele remotest. Will allow some companies to be able to gain talent outside the scope of their their availability. You know if you look at rural Arkansas and you need a cyber operator in a rural area if if you don’t have that flexibility you limit yourself on.

Amanda / Eddy
How far can somebody be from the office. Are you gonna is somebody gonna be willing to drive 2 hours to go into the office or if you allow the teleremote the hybrid option you can get talent within outside the scope of driving distance which allows you to to operate slightly more efficiently. so that’s this this one. That’s what I was referring to when it comes to the flexibility in in the tech industry. That’s kind of one of the benefits to it.

Nathaniel Nelson
On the subject of remote work I have some notion that there are jobs within an industrial setting that that can be done remotely. You know that is ah maybe a work at a sock or someone who’s. monitoring the plant through some internet connection which is a subject. We’ve talked about before but don’t you need most people to be on premises like what percentage of people are we talking about here with regards to who can be remote.

Andrew Ginter
Um, ah, the short answer is it depends there. There isn’t an an easy number that springs to mind. you know some of the the dimensions of the problem. one is is criticality. if we’re talking about. Ah, you know managing small wind farms or small solar farms. A lot of that’s done remotely. Ah why? Well because the worst case if you get something if you if you get something horribly wrong. What’s the worst that can happen. The the turbine turns off the power stops coming out of you know 3 of your windmills does that affect the grid. Not really is even affect your bottom line. Well it depends how big a utility you are if you only have three windmills. It’s a big deal if you have you know 700 nobody notices. So on the other hand. You know if you’ve got a a large power plant that is you know feeding ah hospitals. It’s feeding the military installations. It’s ah you know it’s a really important asset. You’ve got I don’t know a hydroelecttic dam driving it or you’ve got coal-fired power plant. You know, massive. Boilers and furnaces. There’s more of a push in the the sort of the network engineering world to ah make that not so accessible remotely because all remote access is is potentially ah a threat. Um.

Andrew Ginter
It has to do with the role as well as you pointed Out. There’s a lot of you know if if what you’re doing is is looking at stuff and drawing conclusions about it and sending sort of abstract information back into into decision makers like your your example was a good one. The outsourced security Operations Center These people. Generally don’t have. They’re not trained as incident responders. Okay, they don’t log into the system and start poking around on it. They’re not trained to touch the systems but they are trained to look at the alerts and you know look at circumstances and decide whether something merits. Ah, deeper investigation and then so it over the fence with a lot of information to the incident response Team. So The incident response team might have to fly out to site but you know or might be hosted at the site. but not necessarily the people doing the analysis. So yeah.

It’s a long fancy way of saying it depends.

Okay, so so you know that that all makes sense imagine though that we had a magic wand and we waved the magic wand and all of a sudden. The the job postings people were putting out were you know speaking to the aspects of the job that appeal the most to the you know the current generation of of entry level workers. and you know magically you know use the terminology that that resonated. You know with the entry level worker saying yes this is what I was trained on. This is what I’m I’m able to do if we fix those problems are we done.

Amanda / Eddy
No, unfortunately I don’t think so just yet what we’ve also tended to find and again I’m not nitpicking on the energy sector because I know that this is done in a lot of places but we found that there’s. a use of I’ll use the word conglomerate job postings. So what I mean by that is if I’m looking for a software engineer the job posting will be posted as a software engineer 1 2 3 or senior and while that seems. Very open to anyone to apply? it. The position itself is written for the senior level. So when you read through a job description like that. It comes very um. Unwelcoming to an entry level person looking to apply it doesn’t provide a very clear understanding of are you looking for multiple software engineers. Are you looking for 1 am I as an entry level person who’s applying going to be compared against potentially someone who is a senior level am I going to even have the ability to apply and when you look at the job descriptions. A lot of the preferred experience.

Amanda / Eddy
Is pretty hefty upfront because again, it’s written for a senior level and in talking to a lot of organizations. We’ve found that they do these in essence because it’s a budget and instead of writing out several positions. They pick whatever their max budget may be and the job postings are written to whatever their highest level person they can hire and then they have the discretion to hire people below that so it’s. It’s slightly concerning because if I see a software engineer senior and I’m an entry level person coming right out of college. My first thought is not to think I’m going to try to sell myself as a senior software engineer and if I don’t have contacts at that organization to even begin to ask the questions. Can I even apply for this is it more than 1 position. Do you think that there’s openings for others. It leaves it to be very unopen and unwelcoming even though at the beginning it looks like there’s these 4 potential areas that could. Phil for me. The other thing that we’ve noticed is that in these conglomerate positions sometimes just the lack of ensuring that it’s very clear and not just like grammatically looking that when we copy paste and change experience levels suggestions that we’re being.

Amanda / Eddy
Very mindful that those changes are occurring and just similarly looking at like a software engineer one some of the job postings we found were like they which to me would scream a very close to entry level person people were asking for like. 18 years of work or eighteen months of work experience which is you know a year and a half otherwise they’d take an internship experience but equally so then we need to make sure we’re providing those opportunities out to people in and the meantime.

Eddy
Yeah, and and one of the difficult thing is that you know we we understand a budget at limitations but you know a lot of these companies when they’re looking for secession planning when you write a position and you have multiple levels then competitively. You would think that. The company would take the person with the highest level of experience which is the least amount of training necessary for the person to be able to come in do the job like we always like to say you know, plug and play. But every time you look at the senior level you have individuals with 18-15 years plus of experience where. In the closer years the baby boomer generation the closer years to retirement and what occurs is that when you have these positions like that and all you continuously gain is high senior level members to your company which is good at that time you negate to have the secession planning.

Amanda / Eddy
Because you’re you’re missing out on those entry level positions that are lacking the training to get to senior level. So once you start having the large numbers of retirements and people start to leave. You have no one in the bottom to fill that position in the training. So what occurs is that as your seniors start to leave then you’re starting to. Alter the positions to bring in entry level where now you lack the senior experience to to produce that training to eventually repeat the cycle. So we noticed a lot that a lot of these these students. Because they automatically like a man that was mentioned they automatically presume they’re going to be competing against a senior coming off of college even at a high level of education a masters or a ph d as soon as they say experience required a lot of students look back and say is my education. My projects in school any competition. So is that experience or is experience mean days on the job and a lot of the times they have ah some experience but they sell themselves short knowing that I would possibly be competing with somebody who has 1015 years plus and companies lose a lot of modern innovative talent because of the way these conglomerate positions are being written.

Andrew Ginter
All right? So so you know thinking about this, let me ask you a hard question. we’re talking about people coming out of school or out of university into entry level positions but a lot of the. People I mean I I go to conferences I talk to people a lot of the people that I talk to a lot of people that I see in the ot security space. They they did not come out of school into ot security. They came out of school with you know, an engineering degree or you know some sort of technician certification. They worked 5 years and then looked around and said you know let me take the next step. Let me you know, get some skills in in a new field in addition to what I’ve been doing for the last five years or they come out of it. You know they go to school for it or even it cybersecurity. Ah, they get a few years experience maybe at a help desk maybe in ah you know a sock a security operations center and then they start you know, stepping out of their their sweet spot getting some some extra training getting some extra experience and moving into the ot security space. Um. You know none of these are entry level people. They’ve they’ve all started somewhere else. They have 5 years experience under the belt of some kind and now they’re moving into the ot space is there really such a thing as an entry level ot job.

Amanda / Eddy
That’s a really good question. so I it is one that’s like a definite one. That’s super hard to just jump right into and you definitely need the the mixture of talent I think what. At least it from my point of view and I I would presume Eddy’s as well is what we’re we’re looking to push back I think a bit on is wouldn’t it be great that instead of having and and again I’m not pushing back on just energy sector I think this happens quite a bit is. Organizations look to have someone else pay to build. Someone’s skill set up and then say I’d love for you to come work for us but instead of harvesting that talent as young, fresh green talent and saying. We’re going to build you and we want you to stay with us that provides a lot of people so much more hope that you have actual interest in having them grow and so whether or not I walking in the doors fresh out of college. No. 100 % anything about operational technology if you buddy me up with the right person in your organization whether that’s an informal or formal apprenticeship. Whether that’s an informal formal buddy system internship at the end of the day.

Amanda / Eddy
I’m going to be more loyal to that company because they see value in me of putting forth that time and effort to grow me for their organization and seeing the point of moving me through how they want things to be done by the time five years comes around again. Think people have happened to do it all the time they. Transfer organizations they move whatnot. But you’re starting to already start to see what you’re fixed in somewhat of your ways of how you see things done things and other ways and so we would love to shift the paradigm away from just saying well operational technology is you know. Bob who’s been doing it for 30 something years sooner or later Bob’s going to want to retire and who are we going to look for his protege and at what point in time. Do we start saying instead of looking for the person that’s been there for the last. 15 years that kind of knows what bob does when bob goes on vacation every once in a while. Why don’t we start looking at the younger talent that is interested in helping and start getting them involved. They’re interested and wanting to know equally they have a passion to understand how do these things break. and so instead of just saying we don’t have entry level if that answer is fully true which I agree with you to some you know, aspect on that operational technology side. You know that’s not something that we should be comfortable with actually going out and being able to say is that.

Amanda / Eddy
There’s no such thing as entry level because even 5 years of experience in an engineering program or I t and moving over and cross training to them move into ot technically you’re still a novice You’re not. You know you don’t know it all yet. But we just don’t want to call it entry because. 1 wants to take 5 years of experience and say now you’re an entry level again. so that’s my my push is you know hopefully that at some point you know we work to really start bringing in some of the younger talent and giving them that opportunity of using some of their. Very large brain capacities that they have to think outside of the box of how can we really secure some of our energy sector needs.

You are hiredEddy
Yeah, you know we’ve all heard the saying. It’s not always greener on the other side and like just like you were saying like. When you have somebody who has 5 years in a previous organization. They have a reference point and a standard of what it is that they want to do and how they want to be treated when they’re doing it. So. When you go from it. You have your 5 years of experience. You’re technically still kind of new now into the ot space and you realize this is not for me or I really like this but I don’t like the way this company does it. That’s when you start having large turnover rates and you start having a lot of.

Amanda / Eddy
People who come in do a year and then they want to pursue a higher salary so you spent 1 year training a person you made them a very good ot operator. Thank you very much now they went to another company to pursue another higher salary another experience when you. You take somebody who’s brand new and the only experiences they have is a college dorm and they’re willing to learn because they just spent four years five years learning they don’t have a reference of what another job should be. They don’t have a reference of how this job should be all they know is what you teach them and all they know is that I’m here to learn it. So. You’ll get more time and more effort and experience from this individual who’s really brand new green off of you know the academia side of the house who’s to gonna take the time to learn something than somebody who already can learn it quicker but ultimately say this is not for me I’m gonna go this different path. So. that’s why we’re kind of pushing to for companies to take the chance what we’ll call is take the chance and understand that it can be learned. It can be taught. It’s about taking the time to put them with the right mentorship and taking the. Effort to really get them to be what the company needs.

Andrew Ginter
Cool. Well you know this has been good I’ve I’ve learned stuff. you know before we let you go and well let me thank you first. Thank you both for for joining us before I let you go you know can you can you sum up for us what what should we take away from from these these questions and you know what. What are what are next steps if if we if we want to use the knowledge.

Amanda / Eddy
Sure so I hope that again we were obviously speaking to energy sector that’s who we work with the most um is that you know we really want to be able to bring together those open job positions that we know energy sector has and the. Amazing talent that we also bring from the cyber force program and the collegiate space and even those that have graduated from the program that are still seeking. You know new employment and be able to honestly marry the 2 bringing that talent to the energy sector and be prepared but how do we do that so that. Both sides are happy at the end of the day that both understand and are open to the ideas of what you know each are looking for and understanding really the expectations going forth. You know in future. You know people and work and things that we’re doing and then also really to just understand just from. Generationally and this is not just energy sector specific but all that you know we really need to stop and take a look at how are we? you know when we’re trying to recruit and you know write our positions for the next talent that we’re looking for. We really need to think through like what are the generations that we’re looking for interest. And each you know senior level position could be a very different group than someone when you’re looking for an entry level and we should be working to kind of ensure we’re being inclusive and and writing our positions so it makes.

Amanda / Eddy
The most appropriate sense to who we’re we’re writing it for so other than that I you know we’d love for people to we have the cyber force competition. That’s our main program out of the cyber force. that comes up here in November we would love for people to be able to participate. that’s our red blue exercise with collegiic students if those are interested. They can reach out on our website and that’s cyber force that energy dot gov and we’d love to hear and see people there as soon as possible.

Nathaniel Nelson
Andrew that was your interview with Amanda and Eddy do you have any final thoughts to take us out today.

Andrew Ginter
Yeah I mean the the big thing I got out of the interview was you know concrete ideas for for making job postings appealing to the generation that you’re recruiting, you know for the stage of life that that generation is in and this is something. You know it sounds to me like we have to you know consult with our hr people. These are people who study people not you know recycle a job posting that you know attracted us the old folk to the industry when we were that age many many decades ago. Um. More generally you know what I got was sort of a strong sense of of how important it is to hire young people succession planning you know the energy industry has to think long-term a lot of industries have to think long-term and I’m diverging a bit but you know succession planning can be tricky. That’s something that. Sort of deserves a whole episode if if we can find a guest but let me give you sort of ah just a taste I remember reading a report this was some years ago. it was a a manufacturing company. They brought in a couple of young engineers to replace. You know a technician who’d been with the company for forty odd years and was was approaching retirement and these engineers just couldn’t seem to keep up with the technician they they were together they were they were less productive than the technician was singly.

So they they they brought in ah, an an expert in operations analyst followed these people around for a couple of weeks came back with a report and said here’s what’s happening every time one of these engineers any time anybody goes to this technician and asks a question this person reaches behind his desk pulls on a clipboard with 79 scraps of paper on it.

Nathaniel Nelson
Yeah

Andrew Ginter
You know some of them yellow with age flips through you know answers the question and goes back to work get that clipboard copy it. These are your standard operating instructions. You can’t afford to have them hanging on a clipboard in 1 person’s office so you know. Making things work. Succession wise is is important. It can be difficult. Um and you know hiring young people fresh out of school can make them more loyal but you know in my opinion look even if if people jump around you know like I said in the first ten years of their of their. Career you know the grass is always greener. they bring you know people coming into an organization bring perspectives from outside the organization. you know if someone’s leaving our business. We might be miffed, but we’re probably hiring someone at that level in from another business. So. You know the energy industry has to think and does think sometimes as an industry not just as individual enterprises and as an industry you know we have to be about hiring and training and growing young people. This is something the industry has to do this is something that every utility. In the industry has to do and and here’s some concrete advice to you know, speed that process especially for the ah the the entry level folk.

Nathaniel Nelson
Okay, well thank you to Amanda and Eddy for elucidating that point for us and Andrew thank you as always for speaking with me this has been the industrial security podcast from waterfall. Thanks to everyone out there listening.

Andrew Ginter
It’s always a pleasure. Thank you Nate.

Nathaniel Nelson
Well thanks to Vlad Gabrie Anghel for speaking with you Andrew and Andrew is always thank you for speaking with me this has been the industrial security podcast from waterfall. Thanks to everyone out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Demystifying Cyber Jobs – In the Energy Sector | Episode 112 appeared first on Waterfall Security Solutions.

]]>
“We Need Smarter Ways of Building Data Centers” | Episode 111 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/build-better-data-centers-episode-111/ Wed, 20 Sep 2023 11:12:53 +0000 https://waterfall-security.com/?p=11758 Data centers are critical information infrastructures, with a lot of associated physical infrastructure. Vlad-Gabriel Anghel of Data Center Dynamics Academy walks us through these very recent additions to critical infrastructures, and digs into industrial / OT security needs and solutions for the space.

The post “We Need Smarter Ways of Building Data Centers” | Episode 111 appeared first on Waterfall Security Solutions.

]]>

“We Need Smarter Ways of Building Data Centers” | Episode 111

In this episode, Vlad-Gabriel Anghel of Data Center Dynamics Academy walks us through the industrial OT aspects of data centers, a very recent addition to the growing list of critical infrastructures, and digs into industrial / OT security needs and solutions for the space.
Vlad-Gabriel Anghel of Data Center Dynamics Academy Podcast 111

Available on

Vlad-Gabriel AnghelVlad-Gabriel Anghel is Global Head of Product at DCD>Academy which is helping the entire industry design, build, and operate better data centers across the globe

Vlad Gabriel is a tinkerer at heart and a problem solver by trade, with a deep passion for all things tech, especially computer networks and distributed systems.

“…our needs as a society that is run on digital services are only going to increase. Therefore, we’re going to need more data centers. We need to get smarter at building them, in more efficient and sustainable ways.”

Share

Transcript of this podcast episode #111: We Need Smarter Ways of Building Data Centers

Please note: This transcript was auto-generated and then edited by a person. In the case of any inconsistencies, please refer to the recording as the source.

Nathaniel Nelson
Welcome everyone to the industrial security podcast. My name is Nate Nelson I’m here with Andrew Ginter the vice president of industrial security at Waterfall Security Solutions who’s going to discuss the subject and guest of today’s show Andrew how are you?

Andrew Ginter

Data Center Cybersecurity

I’m very well. Thank you Nate our guest today is About Vlad-Gabriel Anghel. He is the global product manager at Data Center Dynamics Academy or DCD Academy for short. It’s a bit of a mouthful you know, but what he’s going to be talking about is industrial cybersecurity at. Data centers and you know data centers are about more than just protecting the information I mean obviously ah, that’s very important, but it’s also all about physical operations and you know electric power and cooling Vlad develops educational programs that are focused on data centers and. Industrial cybersecurity is a very important topic in the data center space.

Andrew Ginter
Hello Vlad and welcome to the show. before we get started. Can you say a few words about your background and about the good work that you’re doing at data center dynamics.

Vlad Gabriel Anghel
Of course, Andrew first of all thanks thanks for having me on v I’m the global product manager at Data Center dynamics is training arm which is known as DCD Academy um I’ve been around the digital infrastructure industry for about a decade now. And I don’t think that will change anytime soon as I essentially have a deep passion for pretty much everything digital infrastructure and especially data centers. Um I’m a thinker by heart and a problem solver by trade. And as well as that during my high school years I was I became a Cisco certified network associate both in routing and switching and in security. So naturally I now. Put my efforts together to ensure that the next generation of data center professionals are equipped with the knowledge required to run these complex technical facilities. So yeah, in a nutshell that’s me.

Andrew Ginter
Thanks for that. you know our topic today is data centers and and we’ve never had anybody on from the world of data centers. can you you know sort of give us the big picture. What What’s a data center look like physically um and you know what are what are you know. What are the operating priorities I mean at a power plant. Everybody’s worried about safety first you know what’s it. What’s it like working in a data center.

Vlad Gabriel Anghel
Right? I mean ah, as I said it’s ah previously I always whenever whenever I get into this this type of discussion I always I always say what is a data center could be It’s the simplest question but has the most complicated answer in short, it’s a technical facility where a business stores. Processes and disseminates his data now this can look on the outside. They essentially kind of look the same they are warehouses you wouldn’t even be able to figure out that there are that’s a computing warehouse or to say. there are multiple types of date centers. We’re not, we’re not going to cover all of them but they vary based on the business that ah that is using them. right now. because of the advent of the cloud and because because of the avent of internet of things. 5 g and now ai one of the main things that and we’re seeing within the industry is the hyperscale segment. So the cloud providers with essential a cloud services provider. Essentially they do not. They’re not able to to keep up. They’re not able to bring bring these facilities bring these facilities around quick enough and when you add that that when you add into the mix that there is a talent shortage in this industry. The problem becomes quite quite big. one of the main things that the data center always needs to ah.

Vlad Gabriel Anghel
Needs to do is what what we internally within within the industry call needs to be available so availability is paramount when a data center goes down or when the I t load that that data center supports go down. There are a number of repercussions first and foremost there can be contractual repercussions. So definitely a financial. It will take a financial hit and as well as that there can be reputational repercussions. let’s take for example, a classic example of a bank. If the Bank’s Data Center goes down. You’re not going to be able to check your account balance or you might miss a payment that you need to do for your mortgage for example and so on and so forth. So a data center going down has a massive massive impact. on both as I said the reputational and the financial financial outcome of of a business.

Andrew Ginter
That is the picture I have of a data center of you know racks of computers inside and and you know a warehouse-looking thing outside but you know this is the industrial security podcast. Can you talk about? you know what’s on the inside. Um,, there’s obviously computers. But there’s also Infrastructure. What’s what’s that infrastructure look like what’s the automation. On the on the infrastructure side look like and and what are the security concerns.

Vlad Gabriel Anghel
Digital data center OT securityCertainly um I mean to begin with every single data center is going to have um to let what we call spaces within within the industry right? every data center is going to be split into the white space and the great space. Great space. The white space. Is essentially what you can see as the I t room is essentially the place where you store your servers your switches your networking gear and everything in between um and the gray space is everything that keeps this that keeps the white space alive sort to say. I always have an analogy when when presenting this to to some students you need to look as ah, the white space as the brain and the gray space as pretty much everything else in terms of lungs stomach heart and everything else that allows the brain to function when it comes to um. When it comes to what’s what’s inside the gray space because as you said we’re talking industrial security within within the Grayspace. You’ve got the power distribution system. Ah you also have the environmental control system or the koing system simply because um and obviously all the other like control systems and softwares. these are usually managed through through skada instance. Um and because we’ve got because as I said as I said previously hyper scalers for example, but not just that like pretty much every sector within this market cannot build them fast enough. you now end up with.

Vlad Gabriel Anghel
Facility managers that previously were tasked with managing one facility are now tasked with managing 5 or more facilities now in order to be able to do this because you can’t be in the same place 5 times. Um the the whole gray space and the whole equipment within the gray space. It’s. Is now connected to the internet now again as there’s this separation between white space and gray space. So is the separations of the professionals working within these spaces. Ah, you’ll always you’ll almost always find I professionals within the white space that are aware of cybersecurity in general and understand what the what the surface. what what what? the risks are when connecting a device to the internet whereas on the operational technology side or on in. Or within within the gray space. that is not the kind that is not common knowledge so you do risk of having pretty much your whole your whole if if not taken care of. You’ve got your whole ah your whole gray space or your the whole infrastructure that keeps the white space alive. Prone to the same type of attack vectors that you can find within the it space. a classic example, we all know it and I’m sure it’s been talked previously in in in previous episodes. The Stuxnet.

Vlad Gabriel Anghel
Ah, Stuxnet incident was exactly was exactly up was a worm that essentially buried into ah Zimon’s plc and then had a knock-on effect on everything else that those those controls were well controlling for lack of a better word. so the same the same. The same thing can can easily happen within a data center and as we mentioned previously. You do not mention the d work or downtime.

Andrew Ginter
That’s right – in a lot of Jurisdictions data centers and you know similar facilities are considered critical information infrastructure and so when there’s reliability issues at these facilities. It’s not just you know. Financial concerns and contractual concerns. A lot of the time. The government is looking over your shoulder breathing down your neck because this is critical infrastructure when when this kind of infrastructure drops. It’s not just a business that suffers. It is society that suffers it is commerce that suffers. It is you know government that suffers.

Nathaniel Nelson
Yeah, although it occurs to me when you say that that in the Microsoft case the attackers were going after information. It seems like what you’re talking about has more to do with reliability. Of these data centers now I have some vague understanding that there are plenty of data centers out there with huge amounts of competing resources where maybe even if one does go down the load can be transferred but to another or to 3 or 4 others. Is that not the case.

Andrew Ginter
I think generally it is and you know this is this is reaching sort of the borders of of my you know my knowledge here but I do understand that in some jurisdictions certainly the United States I think I think europe as well. Um. In some jurisdictions. you’re not allowed to move customer data out of the country or out of the jurisdiction in the case of the the european union and so that would tend to reduce. The the number of data centers that could serve as your backups for those critical functions. now again I don’t know which jurisdictions in the world have these rules I don’t I don’t track this but you know hypothetically if you had a smaller jurisdiction. They only had. 2 or 3 or 4 data centers in. Let’s say the country and one of them fails. You’ve lost 25% of your processing capacity. You don’t have as many options for some of those critical functions because of the law.

Nathaniel Nelson
Yeah, you know it occurs to me. right now I’m gonna start over it actually reminds me of a a conversation that I was having with some folks at ah, a major software company software as a service provider.

Nathaniel Nelson
We’re talking about Black Friday when everybody is on the internet all at once that whole weekend and it’s sort of like just there’s so much less, resource to go around so they have to solve this massive problem of How do we use the same amount of infrastructure to serve this many people and they were talking about especially because you know these senders can become overloaded and can cause one of them to go down what happens in the worst case scenario you don’t want everybody’s shopping websites to go down all at once and just the sheer. Magnitude of the logistical challenge involved was impressive and intimidating so I get the sense that there isn’t a ton of unused infrastructure available even in the cases where you don’t have those regulations in place.

Andrew Ginter
And that’s certainly true. You know when you know in Black Friday you know certain days or times of the of the day or times of the year where yeah, even if you have a lot of data centers around. There may not be that much spare capacity again. Critical. Information infrastructure is sort of the the message here. It has an impact on the business operating the infrastructure but it also has an impact on society so you know this is this is the new reality.

Nathaniel Nelson
I’m just glad that the Cloud is up right now because our podcasting software uses that for backup files. So thanks to everybody out there doing doing vlads work

Andrew Ginter
Yes, indeed.

Andrew Ginter
Okay, so so you know preventing outages reliability is King but you said you know we’re connecting these things to the internet you’ve got remote teams can we talk about the data what data is moving out to the to the it networks what data is moving out to the internet what are people looking at remotely what are people using remotely why? Why do any of this.

Vlad Gabriel Anghel
That’s a great question and well in a nutshell I would say it’s it’s essentially remote management and ensuring that all the all the operator like ensuring that the facility is within normal operating parameters I’ll give an example. Ah, most of most of outages that happen within our industry are usually related to a power failure but that power failure can happen in many ways it can happen because of human error it can happen because a static transfer switch or an automatic transfer switch failed to. To switch from the utility to the backup generators at our own site. It can be loads of things. when and again we’re talking about mechanical and electrical systems mechanical systems will always be prone to failure. most most data centers right now are still being cold using air. that air obviously needs to be ah needs to be funneled through to the actual servers at a particular temperature and on the particular humidity level should the humidity level surpass the normal operating normal operating operating parameters. You can either get a short circuit on on the board or. Many other things small errors that you would not even be able to assign to I don’t know something like like an old operating system failure or anything like that if 1 thing 1 thing you will always find within a data center is an uninterruptable power supply.

Vlad Gabriel Anghel
The power that comes from the grid. Ah for for a data center while good to have it. It’s it’s not reliable enough and it’s not clean enough in order to feed it directly to a server or a switch for example. So all data centers will connect their utility to the uninterruptable power supply the uninterruptable power supply is essentially a big set of batteries that turns the Ac current that comes in from the grid into Dc current that can be. Eaten up directly by ah by the servers and the switches therefore because as I said there is a skill also skills shortage within within the industry. you do not have enough people to place them across all your facilities to ensure real-time monitoring therefore. 1 of the data that passes through um as as as as you as you pointed it out most of it is going to be related to remote management and again depending on the flavor of data center that is going to be different a collocation data center is going to have totally different requirements to a hyperscale data center. In terms of what needs to be managed and what doesn’t need to be managed. So I would say like in a nutshell to sum up ah most of this data is facility operating parameters and as soon as something goes auri.

Vlad Gabriel Anghel
Someone is able to see it and act upon it before the actual load is lost.

Andrew Ginter
So I’m not sure I understand here. you know you you said you’re you’re looking at this stuff. The the goal is uptime. you’re looking at indicators of you know, potential problems especially with the power supply. Into the future how far into the future. Can you see I mean if there’s a lightning strike and and ah a transformer blows Out. We’re talking near Instantaneous. What what kind of visibility? Do you have into that.

Vlad Gabriel Anghel
Right? It’s not necessarily about utmost the utmost visibility on pretty much everything in in the in the example that you’ve described you might have you might have outside of the gray space. For example, you might have. data being pulled into from a weather station if you’re able to see that the storm is going to come and you know that the utility grid you’re connected to is not that reliable your switching mechanism your power switching gear. For example, will. Detect that there has been a loss of load on the utility and then it’s going to switch that over to the onsite backup generator which is usually diesel. Obviously there are other other other fuels and the industry is is exploring that massively right now. But yeah, um. Another example in here would be. You’re you’re interested in those status changes more more like um if you know that you’re running on the generator for the next 7 hours then you can think about do I have enough fuel to run that generator for 7 hours in order to not lose the load what happens if. That generator fails do I have another generator that I can switch switch the load to and so on and so forth when it comes to the cooling side of things. For example, you’re always interested to keep on to keep the operating parameters in terms of humidity temperature and stuff like that. Ah.

Vlad Gabriel Anghel
Within within quite close ranges in in the in the white space. if humidity drops because your humidifier essentially died and you weren’t notified. Ah you you like the the actual facility manager didn’t receive an honor of that hey. In data hole one. The humidifier is no longer firing. Um that overtime can lead essentially to static discharges that might actually fry the motherboard of a server and you don’t know like in a caucas. Ah, environment. For example, that server is owned by another company that essentially relies on you to keep it alive for them to be able to do business so I would say that’s that that’s kind of it. In the sense that you’re interested in those status changes. You’re interested to get as much data fed into as possible. both from the both from the infrastructure side of things. The server side the the whitespace side of things and as well as that everything else that you can, you can get your hands on as I said there are a lot of data centers that. Are directly directly tied into weather stations so that they are aware of pressure changes coming in the next two weeks wind speeds and so on and so forth. There are other data centers. For example, that might have onsite power generation like a wind turbine and they could technically.

Vlad Gabriel Anghel
Make a conscious decision knowing that hey we’re going to have wind speeds of I don’t know thirteen thirty kilometers per hour next week that essentially means that we can disconnect from the utility and run on ah wind power for x amount of time and we’re going to save x amount of um. X amount of dollars at the end of the day.

Andrew Ginter
Okay, so you know this has been interesting. Thank you for that. coming back to to industrial cybersecurity. you know to me sort of the the Cyber Threat. We worry about you know if if everything’s connected. Well then everything’s exposed. The bad guys can. In principle get in and you know turn off power flows you know interrupt the the operation of the of the the Data Center. so let’s let’s swing back to industrial cybersecurity. How how are we preventing that. What’s the yeah, you know you teach people how to do ot security for for data centers. What do you teach them.

Vlad Gabriel Anghel
I mean essentially I’ve always always said this the answer to this is Education Education education um the the contractors that are going to work within the contractors or engineers that are going to work within within the gray space because they do not have this. Um. This it mindset sort to say or this cyber security mindset. They’re not even aware that that that that might be an issue. Ah so therefore it’s it’s classic stuff. Really It’s stuff like have you checked what the remote login for that particular piece of equipment that you just installed is. Have you changed the default remote login or you haven’t it’s still admin and 1 to 3 4 okay, if for example, you bring a new piece. A new generator in and you do not cover that particular attack attack vector what. You can just imagine someone is even like again and and threats can come in from both directions. They can come in from the inside from a disgruntled employee for example or they can come in from the outside. Um. when it comes to when it comes to as I said like my previous previous example, you just got got the new piece new new generator in but no one changed the um no one changed the default default remote access ah credentials someone could possibly go in put it in maintenance mode.

Vlad Gabriel Anghel
Then something happens to the utility this power switching mechanism tries to switch the utility ah tries to switch the energy from the utility from the utility grid to the onsite power generation and the generators in maintenance mode. So it’s not going to accept the load and you just lost the load.

Vlad Gabriel Anghel
There’s ah end again. It’s like ostensibly ah these professionals are the ones working within within the operational operation operational technology side within the data center. They essentially just need to be aware that hey there’s a play thought off surface. Um.

Vlad Gabriel Anghel
Surface areas of attack. just knowing which ones are going to be immediately available to someone can essentially just just just make just make a total total world of difference. Another thing that we we we strongly strongly enforce him in in our series of eo when it comes to when it comes to cybersecurity is if something like this. if if you realize that hey this is this is a this is a surface area of attack that no one has thought thought through. Raise it up with your manager, go go hire ensure that it is put in a standard operating procedure when installing a new generator ensure that to come back to my previous example, the default um remote access credentials are changed and they’re changed to something that fits with. The Cyber security policy for example of or the password policy if you want um of of the business.

Andrew Ginter
So What strikes me here is that this all sounds very familiar. you know patching Passwords remote access Systems. You know don’t be silly. Don’t leave a default password on the remote access system. and. You know in a sense. Maybe it’s not surprising. It sounds a lot like what I see in other you know standards and regulations like NERC CIP. NERC CIP is you know North American Critical Infrastructure protection for the power grid. Ah, it’s all about ensuring reliability not of the data center but of the power grid. so yeah, very familiar focused on Reliability begs the question if this is critical industrial, not critical, industrial critical information infrastructure. are there regulations in the space are the regulations coming in the space and and this is what I asked Vlad next.

Andrew Ginter
And can we can we talk about regulations I mean other industries the tsa just came down with you know, new rules for for petrochemical pipelines Nine weeks after the colonial incident similar rules just came out from the tsa for rail systems. you know, passenger rail systems um there’s you know been regulations for the power grid in North America forever ah there’s nistu now over in Europe you know is any of this affecting data centers are there are there are there cybersecurity regulations for data centers.

Vlad Gabriel Anghel
They definitely are I’ll say I will say that I mean 1 of our cyber our old cyber security track ah came was born of a need in. Ah, for example in in the Us. if you’re part of the state of New York since 2018 if you have a facility that houses any sort of financial information. The engineers working within that facility are required to demonstrate cyber security training and refreshers every six months. That’s just 1 example when it comes to when it comes to regulations in general um regulations have got ah have gotten kind of like how sha buh this have gone have kicked into gears specifically after the covid pandemic um during the pandemic data center technicians were essentially classified as essential workers and that was kind of the very first time when data centers came to the fore in in the public public mind. they were they were the things that essentially allowed us to continue working working in the conditions like from home and working remotely and keeping in touch with people when we couldn’t physically do that therefore after every after thus settled um a lot of people started realizing? Oh my god.

Vlad Gabriel Anghel
These facilities use a lot of power um without everyone actually thinking I also use a lot of digital services So regulations are now regulations are now coming to the fore in the sense that trying to essentially.

Vlad Gabriel Anghel
From the design stage enforce a sustainable and energy efficient design for legacy data centers. They will be required soon within the European Union. For example, they will be required to share and make. Public The the power usage efficiency of a one of the ah several several metrics actually one of which is power usage efficiency which essentially calculates how much power you need to run the facility versus how much power you need to run just the I T load. The closer. You are to 1 of a Pu E the more efficient you are obviously that doesn’t apply to every single type of Data center because if you are to implement liquid cooling in your data center your Pe is going to go up there but you’re still going to use less resources. So There’s this like. The regulation the regulation landscape in a wake I I feel like Regulators are still trying to map their way through um through the industry but when it comes to cybersec Security Cyber Security regulation Beyond everything that’s already out there when it comes I don’t know to like. Payment processing systems Pc idss and so on and so forth for data centers. There’s all that and then there’s another level and the level that will that level will be dictated by the type of data that you house and store as I started.

Vlad Gabriel Anghel
when I when I asked them this question in New York for example they life simple this is gonna be the law going forward. We need people to be aware that cyber security is something that needs to be of paramount importance front and center into every professional’s mind. Regardless if they work in a mission critical capacity or not now. As time went on other states in the us have also essentially just copied this particular law and we’re seeing it. We’re seeing it spread out as well.

Andrew Ginter
So The regulations are are changing. but you know data Centers. You know, unlike many other kinds of of sort of very conservative industrial processes. Data centers are way out on the bleeding edge of. Almost everything. what else is happening in the Data Center space. What what new is coming down the pipe here.

Vlad Gabriel Anghel
That’s that that again of a very good question and if we go back to to my to my to my introduction is it this. What’s happening is the reason that I’m not going to change industries anytime soon. Because right now we as as as I mentioned previously with the advent of Ai. we need to. We need to find more smarter ways of ah smarter ways of building data centers and more efficient and sustainable ways of building data centers. 1 of the main gripes everyone has with the data center facility is the amount of power they use. Um that is not to say that they are. There aren’t data centers out there. For example that are completely independent of the grid or even better using renewable renewable. Ah, renewable power sources created their own microgroup microgrid that feeds back surplus energy into the grid. We right now we’ve got we’ve got people testing the idea of having small nuclear reactors on site to completely. Um. Disconnect from the utility and not not even rely on the utility per se um we were seeing. We’re seeing more innovative ways of um of handling your cooling system for example, oil and gas oil and gas is a massive massive use user of.

Vlad Gabriel Anghel
Supercomputing and when we’re talking about super computerers. We currently the way we the way we approach supercomp computerers is hey we just put a bunch of computers together and ask them to do the same thing now for better or for worse that is a data center. when it comes to um. Highly intensive processing tasks such as the determining determining the depth and the type of material and the design of an oil. Well for example or where on particular oil oil. Lake or oil field is when it comes to when it comes to going deep underground. These are highly highly intensive tasks and because they are highly intensive tasks. They will require graphical processing units because they require graphical processing units the temperatures that you need to work with go. Go through the roof because a gpu is essentially geared to all to work in normal operating conditions of around ° when you get when you have thousands of these. It becomes a problem. Um air can only can only work. Up to I would say um around 20 kilos per rack if that but then if we look at liquid or dielectric fluids. They can handle much more.

Vlad Gabriel Anghel
So what happened what happened with because within dcd we also have within within the center dynamics. We also have an award series where pretty much everyone from from the industry submits submits their latest and greatest designs and one that really caught my eye was a single phase. Immerstion cooling data center which was built in Texas but it was built by ah by an australian company. Essentially what they did. They took your classic rack that hosts. Um your servers and switches put it on the side and effectively created an immersion top. They filled that immersion tub with dielectric fluid in a closed loop system that diaelectric and and then the servers and well because they they only did it for the servers. The servers were dunked horizontally ah, vertically sorry, not horizontally they go horizontally in a normal rack. Servers were tonked vertically. With absolutely nothing on them. So all the the casing was out the fans were out and the processor was in direct contact with the diaelectric fluid being in direct contact with the direct dielectric fluid. It was able to call it at the much with with much greater efficiencies using way. Way less ah energy in order to achieve those efficiencies. So that’s the thing. It’s like we are in a moment of I would say extreme innovation simply because every single data center professional looks ahead and realizes that.

Vlad Gabriel Anghel
OT security for Data CentersThis is not going to change anytime soon. Simply like our need of as a society of digital services is only going to increase therefore we’re only going to need more data centers. We just need to get smarter at building them in a more efficient and sustainable way. So I’d say that’s. The the main thing going forward with with data centers. Everyone is looking for a paradigm shift in how to build and operate in the most efficient and sustainable way possible.

Andrew Ginter
So you know earlier in the in the episode Vlad was you know I asked him about safety and reliability and and he you know focused in on reliability right? away as sort of the the big priority here. But when we’re talking about. Nuclear generators on site. You know I have to wonder if if you know safety isn’t going to isn’t going to come back into the equation in a big way in the future. you know I worked in not a data center I mean I worked in a the University Data Center full of supercomputers this was thirty years ago back then ah there were safety concerns in the data center I mean obviously when you have large amounts of power. You’ve just got to be careful with what you touch that you you don’t get fried. That’s a safety concern. but you know in some of these data centers and I don’t know if this is still the case but back in the day. Ah, some of the data centers did not have oxygen atmospheres if you were in there when the fire suppressive atmosphere was pumped into it. You’d you’d asphyxiate you had you know you had to have safety training just to set foot in these wretched places because. You know most of the time they were filled with ah an atmosphere that had no oxygen so no fires could start so you didn’t want to be in there when when the oxygen or when the when the atmosphere changed. so you know again, what? what struck me about about the automation and the the cyber security concerns here you know is that.

Andrew Ginter
They seem very familiar and it sounds like in the future might even become you know, even more familiar as as ah, these designs you know, move more towards a ah space where there are additional safety concerns on top of. The the you know the the top of mind reliability concerns that that all critical infrastructures have.

Andrew Ginter
Well, that’s quite the vision for the future of Data centers. It’s It’s obviously a field that’s evolving very quickly. but you know coming back to Cyber security on on the security issue for data centers. What What are the main takeaways. What? what? What should we? What should we be thinking about. For the the industrial side of the Data center.

Vlad Gabriel Anghel
yeah I mean it’s the way the way that I see it. it’s it’s quite quite simple as it’s part of um as data centers are part of of the mission critical. It’s it’s a mission critical industry downtime can downtime needs to be avoided at all costs. so I would say first and foremost is the old adage that we like in this industry is Education Education Education make your professionals make your engineers aware of the fact that this is is even a possibility most of them are not going to be aware. You will protect your id it equipment or your yspace you will protect it from cybersecurity point of view in as as best as you can simply because you’re going to have the people that are able to understand this landscape whereas in the gray space you the the professionals working in there have a totally different background. And therefore are not even aware of that this this this is a possibility so I would say yeah just Education Education education always always ensure that they know this is a possibility they understand the repercussions of this and as well as that. Know what to report if something goes already if something looks odd, they know how to report it up and as I said previously ensure that if an event happens or if something if a particular if a particular cyber security incident has taken place.

Vlad Gabriel Anghel
That the steps to avoid that are embedded into the standard operating procedure of um of that particular facility. And yeah I mean if you’re more curious about the world of data centers just visit our website Data Center at our dot com. that’s where you’re gonna find in-dep features on pretty much every every every subject the subject matter within the industry. That’s where you’re gonna find video interviews. That’s where you’re gonna find the training division which I’m responsible for um and yeah. The world of data centers is a wonderful thing and I wish more people would be aware of it.

Nathaniel Nelson
Andrew clearly education is important in this space. But I’m wondering if there are any other takeaways that you got from this episode.

Andrew Ginter
Yeah, well you know the thing that struck me is that a lot of these systems. A lot of the the concerns about cybersecurity. They’re very familiar to anybody you know involved in any other kind of of industrial cybersec security operation.

In particular with the you know the fact that this is is ah critical industrial or sorry of the critical informational infrastructure and you know there’s such a focus on Reliability I’m I’m reminded of the the Nersip standards. which are also very focused on Reliability. You know some of the measures he talked about. You know teaching people about seemed seemed familiar. There. and unlike you know the the power industry where you know power uses is is increasing a couple of percent per year worldwide. It’s sort of it’s a mature industry unlike that the data center industry strikes me as still in its Infancy. Um. I mean for I don’t know what what is it now 50 years. We’ve been everything has had more and more computers in it. Data centers have sprung up with more and more computers in them more and more data centers. This is a growth Industry. We’re going to continue automating Business. We’re going to continue automating everything. There’s always going to be more computers. There’s always going to be more data centers is what it sounds like and the field needs expertise and experienced Professionals. So yes, we need Education. I’m wondering if there isn’t an opportunity here for industrial cybersecurity people from other industries. For example, the power industry the power sector where it’s you know a mature industry I Wonder if there’s an an opportunity for some of these professionals to switch fields and to make an impact in a growth industry.

Nathaniel Nelson
Well thanks to Vlad Gabrie Anghel for speaking with you Andrew and Andrew is always thank you for speaking with me this has been the industrial security podcast from waterfall. Thanks to everyone out there listening.

Andrew Ginter
It’s always a pleasure. Thank you Nate.

In particular with the you know the fact that this is is ah critical industrial or sorry of the critical informational infrastructure and you know there’s such a focus on Reliability I’m I’m reminded of the the Nersip standards. which are also very focused on Reliability. You know some of the measures he talked about. You know teaching people about seemed seemed familiar. There. and unlike you know the the power industry where you know power uses is is increasing a couple of percent per year worldwide. It’s sort of it’s a mature industry unlike that the data center industry strikes me as still in its Infancy. Um. I mean for I don’t know what what is it now 50 years. We’ve been everything has had more and more computers in it. Data centers have sprung up with more and more computers in them more and more data centers. This is a growth Industry. We’re going to continue automating Business. We’re going to continue automating everything. There’s always going to be more computers. There’s always going to be more data centers is what it sounds like and the field needs expertise and experienced Professionals. So yes, we need Education. I’m wondering if there isn’t an opportunity here for industrial cybersecurity people from other industries. For example, the power industry the power sector where it’s you know a mature industry I Wonder if there’s an an opportunity for some of these professionals to switch fields and to make an impact in a growth industry.

Nathaniel Nelson
Well thanks to Vlad Gabrie Anghel for speaking with you Andrew and Andrew is always thank you for speaking with me this has been the industrial security podcast from waterfall. Thanks to everyone out there listening.

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post “We Need Smarter Ways of Building Data Centers” | Episode 111 appeared first on Waterfall Security Solutions.

]]>
Active Defense in OT – How to Make it Work | Episode 110 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/active-defense-in-ot-episode-110/ Mon, 07 Aug 2023 12:02:50 +0000 https://waterfall-security.com/?p=9166 Active defense or "intrusion prevention" deep into industrial networks has long been thought of as not workable. Youssef Jad - CTO at CyVault - joins us to talk about a new approach to OT active defense that is designed for sensitive OT / industrial environments.

The post Active Defense in OT – How to Make it Work | Episode 110 appeared first on Waterfall Security Solutions.

]]>

Active Defense in OT – How to Make it Work | Episode 110

In this episode, Youssef Jad, the CTO and Co-Founder of CyVault tells us about their Active Defense which provides "intrusion prevention" deep into industrial networks, something that has long been considered as not feasible.
Picture of Waterfall team

Waterfall team

Youssef Jad Podcast 110

Available on

About Youssef Jad

youssef-jad-portrait-1Youssef Jad is the CTO and Co-founder at CyVault where he leads the Cyber Defense operations and novel R&D products. Youssef has over 20 years of experience in IT/OT/ICS/CPS/xIoX/Blockchain cyber defense, keynote speaker, consultant to Fortune 10 compagnies, and boasts impressive accomplishments such as a turnkey cyber solution for the US-Gov/DHS/FBI, offensive initiatives for cyber military units, SME for ICS4ICS, and lead of the global “WannaCry v2 Ransomware” task force.

Active Defense in OT – How to Make it Work

“…common wisdom is that you simply cannot do IPS deep into industrial networks. CyVault proves this common wisdom is outdated…”

Please note that there isn’t a transcript for this episode. Here are some of the highlights from this week’s podcast:

In this episode we look at how network Intrusion Detection Prevention Systems (IPS) can work in OT / industrial environments. An IPS is an IDS with extra functionality. A network IDS looks at each packet in the network or network connection and decides if the packet or stream of packets looks suspicious. If the IDS recognizes what looks like an attack in progress, the IDS an alert – usually to a SEIM to log the event.

An Intrusion Prevention System (IPS) does same thing – and if the attack seems serious enough, the IPS will take actions to interrupt the attack in progress. For example, some IPS systems that watch copies of network traffic on mirror ports will send TCP Reset (RST) packets back into the mirror port, targeting the TCP connection that is being used to propagate the attack. These packets cause the TCP connection to close, interrupting the flow of attack information.

While this seems fairly straightforward for IT networks, the risk of false alarm is a problem historically on OT networks. A false alarm risks shutting down essential communications and causing entire plants into costly unplanned shut-downs as a result.

Youssef Jad digs into the CyVault Dome product that addresses this issue to bring about active defense – IPS – on industrial networks. How can this be done safely? CyVault has tested attack interruption actions with industrial vendors and industrial equipment. The Dome product interrupts attacks in progress only when an engineering study has proven that such interruptions are safe – that they pose no threat to industrial operations. And the system can use old-school TCP RST packets, or more modern methods of interrupting attacks, involving interactions with the hosts and endpoints involved in the attack connections.

And if attacks are ever detected on systems or connections where outright interruption has not been proven safe, the IDS component of the solution still raises high-priority alerts. In this case, CyVault also works closely with engineering teams at the site to walk them through the investigative and restorative procedures involved in diagnosing what’s going on and fixing it.

Again – common wisdom is that you simply cannot do IPS deep into industrial networks. CyVault proves this common wisdom is outdated.

Listen in to get the full scoop.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Active Defense in OT – How to Make it Work | Episode 110 appeared first on Waterfall Security Solutions.

]]>
The Essential Guide To ISA IEC 62443 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/the-essential-guide-to-isa-iec-62443/ Sat, 11 Mar 2023 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/the-essential-guide-to-isa-iec-62443/ The post The Essential Guide To ISA IEC 62443 appeared first on Waterfall Security Solutions.

]]>
Understanding IEC 62443: Cybersecurity for Industrial Control Systems

IEC 62443 is a global cybersecurity standard for industrial automation and control systems (IACS). It defines security requirements for system components, processes, and organizations. The standard helps reduce cyber risks by guiding asset owners, system integrators, and product suppliers on implementing secure-by-design principles and defense-in-depth strategies.

The ISA/IEC 62443 set of cyber-security standards are truly great. They are the world’s most popular, most widely applicable, and most comprehensive standards for securing industrial automation and control systems (IACS or ICS). Created by the International Society of Automation (ISA) and then accepted and co-developed by Europe’s International Electro-technical Commission (IEC), the standards were endorsed by the UN for their Cybersecurity Common Regulatory Framework in 2019. In September 2020, the new Part 3-2 of the standard was released, providing guidance on performing risk assessments on an IACS so that security countermeasures can be identified and applied.

IEC 63443 reflective vestsIn 2021, IEC members voted to make 62443 a horizontal standard, meaning it will form the basis for all future ISA and IEC industry specific industrial security standards and frameworks. Most ICS security standards are narrow in scope and tied to an industry, nation, or government body. It’s very refreshing that 62443 is completely generalized. It would be nice to say that it’s almost perfect, but automation and control technologies are changing fast, and a standard this big does have some confusing spots. This is not lost on ISA’s SP99 technical committee that writes the standard, who are hard at work on a major rewrite of several of the older sections. So, if you’re tasked with implementing IEC 62443, what are the essentials you need to know? What’s confusing, and what’s changing?

 

Speak with one of our 62443 experts  >> Contact Us >>

 

Essential Knowledge for Protecting ICS Networks

IEC 62443 is a multi-part standard, and very broad. I’m assuming that readers here will be asset owners or charged with protecting an industrial site. In that case, relevant sections to get started are:

  • 1-1, Terminology, concepts and models
  • 2-1, Security program requirements for IACS asset owners
  • 3-2, Risk assessments for system design
  • 3-3, Security requirements and security levels

These are outlined in red in the following chart in Figure 1.


IEC 62443 Standards Family Block Diagram
Figure 1: ISA/IEC 62443 Standards most relevant to industrial asset owners & operators

62443 Welder GraphicGetting access to the IEC 62443 standards does cost money, but I highly recommend grabbing the free Quick Start Guide, downloadable from the ISA. Also – membership in the ISA is less than the cost of two or three volumes of the standards, and ISA members get free access to ISA and IEC 62443 standards.

In a nutshell, implementing the standard to secure an ICS site means implementing a security program, described in 62443-2-1. To do so, a risk assessment would be carried out and any changes to the network and security design would be made, based on 62443-3-2. Based on the assessment results and design that exists, that site’s cyber defenses would be categorized into one of five levels, described in the 3-3 document. The level selected determines the degree of requirements needed to complete implementation of the security program, so secure the site to what you have determined is an acceptable level. The higher the security level, the greater the strength of the applied protection. The five levels are summarized in Table 1: IEC/ISA 62443-3-3 Security Levels.

Security Level Definition Means Resources Skills Motivation
SL-0 No special requirement or protection required
SL-1 Protection against unintentional or accidental misuse Simple Low Generic Low
SL-2 Protection against intentional misuse by simple means with few resources, general skills and low motivation
SL-3 Protection against intentional misuse by sophisticated means with moderate resources, IACS-specific knowledge, and moderate motivation Sophisticated Moderate ICS specific Moderate
SL-4 Protection against intentional misuse using sophisticated means with extensive resources, IACS-specific knowledge, and high motivation Sophisticated Extended ICS specific High

Table 1: IEC/ISA 62443-3-3 Security Levels

Effectively, 62443 lays out a roadmap to engineer cyber security defenses, and to iterate between risk assessments and system design until an acceptable level of protection is deployed. IEC 62443 security levels are all defined based on the type of threat – the most capable adversary that the system is designed to defend against. This worst-case attacker is further defined in terms of their means, resources, skills and motivation. While this all sounds great, selecting the appropriate security level is confusing, and it is unfortunately too easy to select the wrong security level as the target level for an automation system or site.

 

Would you like to speak with one of our IEC 62443 experts?  >> Click Here >>

IEC 62443 Part 3-3: Picking The Right Security Levels

Choosing a security level (SL) target is difficult in the current version of IEC 62443 Part 3-3, because in most of the 62443 series of documents, security levels are described in terms of the characteristics of the perceived adversary, and not in terms of the worst-case consequences of compromise.

In a bit more detail, IEC 62443-1-1 states that a target security level should be assigned to every network zone based on a “… consideration of the likelihood and consequences of security of a zone or conduit being compromised.” The problem is that 62443-3-3 (repeatedly) describes security levels as in Table (1) – in terms of the capabilities of the adversaries the zone must be protected against, not in terms of consequence severity. This is not entirely wrong – it is reasonable for example to look at a safety system designed to prevent an environmental catastrophe and say that this safety system deserves the highest degree of protection – SL4. The problem is that many practitioners forget this one paragraph in 1-1 and look at 3-3, where security levels are repeatedly defined in terms of the capabilities of the adversary.

IEC 62443 section 3-3 was released over a decade ago, in 2013. Back then, risk assessments based on the profile of an attacker alone were understood to be a robust method. This might make sense if you are trying to protect the information in your network, where denying access to the information systems would use the most sophisticated defenses to make it very difficult for the attacker. With industrial systems and critical infrastructure, protecting operations is key. Here the goal is to keep operations running safely, continuously, and reliably. The updated way to look at operational cyber risk is to consider that every CPU, at any level of the control system, could be compromised to mis-operate. Then consider what systems and processes pose a health and safety, or operational reliability risk, with consequences too dangerous or costly for the business or operations team to accept. It is important that the process be protected from harm, and not be solely concerned about who or what type of threat would cause that harm.

62443 coil inspectionTake the example of a small-batch distillery, renowned for their gin made from locally sourced ingredients. Being in the mountains, seasons are short and only one batch is produced per year. Any spoilage of the batch by any threat actor could bring unacceptable harm to the business, including bankruptcy. Tampering of the safety instrumented systems on the still could cause a fire, release of steam, or product. But since a very small number of staff generally stay out of the plant, have a regimented safety program, and stay safe behind a sealed door and tempered glass during operations, the greatest concern is losing their precious gin. They are mostly concerned about their local competition and the rise in the threat of criminal ransomware groups, more than they are about sophisticated ‘nation-state’ attackers.

Contrast the gin distillery to the example of a 600 MW natural gas-fed power plant. Here, mis-operation could cause not only loss of power to thousands of downstream customers, but loss of extremely long lead-time assets such as turbines, power lines, transformers and more. Further, the health and safety consequences of out-of-control rotating equipment, electric arcs, would be completely unacceptable. In some cases, a loss of 600 MW can be absorbed by the electric grid with enough excess capacity, but during times of peak demand could instead cause widespread outages over large geographical regions. The ensuing chaos on such a scale significantly endangers the public. Whether an attack is made by an unsophisticated adversary just poking around (a ‘script-kiddie’), or a highly motivated and well-resourced attacker (a ‘nation state’ group) does not really matter. The power company is expected, and mandated by regulations, to prepare their defenses accordingly. A higher security level and stronger security program should be chosen to protect a power plant than for a distillery, because of the nature of the consequences, not because of the nature of the expected adversary.

Into The Future with IEC 62443

The point is that consequences determine the security level, not the nature of the threat or the adversary. A risk assessment asking the wrong questions could lead to a naively applied security level and program. It’s good to know that the ISA is aware of this fact. About a year ago, on the Industrial Security Podcast Episode #73, Eric Cosman, chair of the ISA99 committee which authors the series of standards, mentioned that a revision to 62443 Part 3-3  is in the works, and that security levels were being re-evaluated in light of issues like this that have come up in the course of using the standards this last decade.

62443 It might sound like IEC 62443 has fatal flaws. Far from it. Last year, Alex Nicoll, co-chair of the ISA99 committee, appeared on the Industrial Security Podcast Episode #79. In it, he expressed the committee’s goal to keep up with industry changes, and the understanding that change is occurring quickly in not only automation and control, but in cyber security as well. The committee has largely achieved its goal of creating a general, widely-applicable and accepted framework for improving security in the industrial and critical infrastructure space.  He re-affirmed concerns around Security Levels and Risk Assessments, while also mentioning that new technologies like containerization, virtualization, edge devices and the cloud need to be incorporated. Alex mentioned that the strength of the standard is that it is made up of volunteers and depends on input from those with experience to ensure standard is relevant and applicable to a wide range of businesses. Applying principles is key, as fundamentals haven’t changed in 20-30 years and requires collaborative input and effort from asset owners, operators, integrators, and suppliers.

In short, the series of standards is useful and valuable. Issues have been identified with the series, and are being addressed in new versions of the standard.

 

Speak with one of our 62443 experts  >> Contact us>>

The post The Essential Guide To ISA IEC 62443 appeared first on Waterfall Security Solutions.

]]>
Protecting the GIPL pipeline https://waterfall-security.com/ot-insights-center/oil-gas/protecting-the-gipl-pipeline/ Thu, 08 Sep 2022 08:36:00 +0000 https://waterfall-security.com/?p=4860 Protecting operational data within the gas transmission SCADA system, while enabling safe visibility and exchange of operational data for both pipeline partners.

The post Protecting the GIPL pipeline appeared first on Waterfall Security Solutions.

]]>

Protecting the GIPL pipeline

Waterfall teams with ELSIS TS to reinforce cybersecurity at gas interconnection Poland and Lithuania facilities
Customer/ Partner:

Lithuanian-based ICT and OT company ELSIS TS at GIPL sites

Customer Requirement:

Protecting operational data exchange within the gas transmission SCADA system, while enabling safe visibility and exchange of operational data for both pipeline partners.

Waterfall’s Unidirectional Solution:

Secures control system network perimeters from external threats with Unidirectional Security Gateways, enabling enterprise-wide visibility for operations status and key performance indicators as well as safe ICS network monitoring from a central enterprise SIEM.

Cross border pipeline infrastructure is facing real cyber threats

The Colonial Pipeline incident, Russian actions in the Ukraine, targeted ransomware actors and other threats have raised serious concerns about the cybersecurity of critical national infrastructures. This deployment of Unidirectional Gateways provides the world’s strongest protection from online attacks to this important natural gas interconnection.

The Challenge icon
The challenge

Secure the automation processes of the GIPL pipeline for the safe exchange of operational data between the gas transmission systems of the two countries, without posing risk to reliable, uninterrupted and efficient operation of the complex, transnational pipeline infrastructure. In addition, enable a central dispatch centre to remotely monitor and control process operations.

Waterfall solution - icon
Waterfall solution

Waterfall integrated Unidirectional Security Gateways to unidirectionally replicate gas metering and pressure reduction data between Polish and Lithuanian sites, without posing risk to process control networks. Unidirectional Gateways replicate industrial data to a central dispatch center to enable the safe exchange of data between geographically dispersed sites.

Results and benefits - icon
Results & benefits

Security: Unidirectional Gateways enabled the secure exchange of multisite operational data between countries. OT data replication provides strong assurance that no attack from the IT network can enter the operational network.

Simplicity: Unidirectional server replication makes the gateways easy to use. The unidirectional replicas are realtime participants in both source and destination networks.

Performance: Safe industrial data exchange for international pipeline infrastructure, not only optimizes business efficiencies, but ensures the security of critical resources.

vertical red line
Theory of Operation
Click to enlarge

Waterfall Unidirectional Security Gateways replace firewalls in industrial network environments, providing absolute protection to control systems and industrial control networks from attacks originating from external less-trusted networks. Unidirectional Gateways contain both hardware and software components. The hardware components include a TX Module, containing a fiber-optic transmitter/ laser, and an RX Module, containing an optical receiver, but no laser. The gateway hardware can transmit information from an industrial network to an external network, but is physically incapable of propagating any virus, DOS attack, human error or any cyber attack at all back into the protected industrial network.

This deployment used two Unidirectional Security Gateways to enable safe control-system data exchange, external monitoring, and visibility into operations for the GIPL sites. Unidirectional Gateways replicate servers, emulate industrial devices and translate industrial data to cloud formats. Unidirectional Gateway technology represents a plug-and-play replacement for firewalls, without the vulnerabilities and maintenance issues that accompany firewall deployments.

vertical red line
Unidirectional Security Gateways Benefits

arrow red rightSafe operational data exchange between geographically disparate facilities

arrow red rightSecure monitoring of operational data from less-secure, Internet-based networks

arrow red rightStrongest industrial security for automation processes and systems

arrow red rightSafe replication of critical data to enhance operational efficiencies

vertical red line
Global Cybersecurity Standards Recommend Unidirectional Security Gateways

Waterfall Security is the market leader for Unidirectional Gateway technology with installations at critical infrastructure sites across the globe. The enhanced level of protection provided by Waterfall’s Unidirectional Security Gateway technology is recognized as best practice by leading industry standards bodies and authorities such as NIST, ANSSI, NERC CIP, the ISA, the US DHS, ENISA and many more.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Protecting the GIPL pipeline appeared first on Waterfall Security Solutions.

]]>
Food And Beverage Manufacturing https://waterfall-security.com/ot-insights-center/manufacturing/food-and-beverage-manufacturing/ Thu, 08 Sep 2022 06:47:00 +0000 https://waterfall-security.com/?p=9935 Enabling secure, cloud-based operational equipment effectiveness (OEE) monitoring without introducing any new cyber risks to the OT network.

The post Food And Beverage Manufacturing appeared first on Waterfall Security Solutions.

]]>

Food And Beverage Manufacturing

Protecting Operational Networks In The Food And Beverage Industry From Evolving Cyber Threats
Food And Beverage Manufacturing
Customer/ Partner:

A large, global food and beverage company.

Customer Requirement:

Enable secure, cloud-based operational equipment effectiveness (OEE) monitoring without introducing cyber risk to the OT network.

Waterfall’s Unidirectional Solution:

The Waterfall Unidirectional Cloud Gateway provides the benefits of connections to industrial cloud services, without the risk that cloud or Internet connectivity will “leak” attacks back into protected industrial control systems.

Food & Beverage Manufacturing – Today’s Cyber Threat Environment

Food & Beverage operators have suffered large scale ransomware attacks in recent years, triggering costly production shut-downs. Looking forward, manufacturers are concerned about even worse outcomes – cyber attackers could tamper with production processes to contaminate foodstuffs, with recipes to impair product quality and with batch records to render large volumes of product un-marketable. The threat is compounded when production lines are connected to Internet-based cloud services – a compromised cloud could compromise hundreds or thousands of connected industrial clients, simultaneously.

The Challenge icon
The challenge

Enable safe deployment of the RedZone platform for multi-site OEE monitoring, actionable insights and productivity improvements. In particular, enable safe Amazon AWS cloud connectivity for the RedZone platform, without introducing cyber risk to critical manufacturing networks. Do all this with minimal changes to existing Purdue-Model / ISA 62443 security measures

Waterfall solution - icon
Waterfall solution

The customer deployed Waterfall’s Unidirectional Cloud Gateways at multiple sites. The Gateways replicated OPC servers and their data through unidirectional hardware. RedZone equipment used the replica OPC servers normally, to connect to the RedZone AWS infrastructure. No change to existing control system designs or security systems were needed, beyond installation and configuration of RedZone and Waterfall equipment.

Results and benefits - icon
Results & benefits

Security: No attack from any external, cloud or Internet network can leak back into protected control systems through any Unidirectional Cloud Gateway.

Transparency: Unidirectional Cloud Gateways enable safe cloud connectivity without changes to existing firewalls, networks or security monitoring systems.

Performance: By securely enabling the OEE application, Waterfall’s Unidirectional Cloud Gateway helps the business realize an 8% increase in plant productivity.

vertical red line
Theory of Operation
Click to enlarge

Waterfall Unidirectional Cloud Gateway solutions replace firewalls in industrial network environments, providing absolute protection to control systems and industrial control networks from attacks emanating from external less-trusted networks. Waterfall Gateways contain both hardware and software components. The hardware components include a TX Module, containing a fiber-optic transmitter/laser, and an RX Module, containing an optical receiver, but no laser. The gateway hardware can transmit information from an industrial network to an external network, but is physically incapable of propagating any virus, DOS attack, human error or any cyber attack at all back into the protected industrial network. Unidirectional Cloud Gateway software makes copies of industrial servers. External IT and Internet users connect normally to the replica servers and access data there normally.

At this customer, the Unidirectional Cloud Gateway was deployed to copy a standard OPC-UA server from the industrial network to the IT network where a RedZone RZLogger was deployed. The logger connected to both the OPC-UA replica server and to RedZone services in the Amazon AWS cloud. The deployment was completely safe, because no attack is able to penetrate the Unidirectional Cloud Gateway hardware to reach into the Industrial Network to put physical operations or any data management systems in that network at risk.

vertical red line
Unidirectional Cloud Gateways Benefits:

arrow red rightPhysically prevents cloud/Internet-based attacks from infecting the protected industrial network.

arrow red rightAll the benefits of cloud-connected infrastructure to industrial operations, without the risks of cloud connectivity.

arrow red rightSupports 100+ industrial protocols & applications; from legacy systems to cloud-based platforms.

arrow red rightSafe cloud vendor supply chain integration, big data analysis, cross-site and cross-application analysis, and correlations.

arrow red rightEnables secure deployment of IT and outsourced SIEM, SOC, NOC & security monitoring solutions.

vertical red line
Global Cybersecurity Standards Recommend Unidirectional Security Gateways

Waterfall Security is the market leader for Unidirectional Gateway technology with installations at critical infrastructure sites around the world. The level of protection provided by Waterfall’s Unidirectional Security Gateway technology is recognized as best practice by leading industry standards bodies and authorities such as NIST, ANSSI, NERC CIP, ISA / IEC 62443, the US DHS & CISA, ENISA, TS50701 and many others.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Food And Beverage Manufacturing appeared first on Waterfall Security Solutions.

]]>