TRANSCRIPTEnglish

Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 2 (ICS/OT Cyber Security Overview)

1h 58m 4s17,956 words2,711 segmentsEnglish

FULL TRANSCRIPT

0:00

hello and welcome back we'll go ahead

0:02

and jump into uh unit two or part two

0:05

when we're uh talking about really an

0:08

overview of cyber security in industrial

0:12

control or OT networks now we had the

0:14

introduction the first part where we

0:17

just touched on a few different aspects

0:21

of you know even why we need cyber

0:24

security in OT environment so so

0:26

hopefully from the first section that

0:28

already started to

0:30

make sense and but we're going to dive a

0:32

little bit deeper into it in this

0:35

section and then also start to look at

0:38

how do we start to secure our OT

0:42

environments right how do we protect our

0:44

power plants and our Railways and our

0:47

mines and our manufacturing plants and

0:54

Etc so you can see based off of the

0:56

outline what we're going to look at is

0:58

we're going to first start talking about

1:00

the differences between traditional it

1:02

Network environments and Industrial

1:05

control or OT networks right because

1:07

there are some fundamental differences

1:09

there's a lot of commonalities between

1:11

the two but there's also some some

1:13

fundamental differences that we want to

1:15

to be able to point out and focus on as

1:17

we go throughout our conversation when

1:20

we look at the different ways or really

1:22

the five main ways on how attackers get

1:25

into OT networks that that we'll be

1:28

looking on and that's something that

1:29

will build on as we go throughout the

1:31

rest of the course then we're going to

1:34

look at a basic example of what

1:37

operational technology is using just the

1:41

idea of a a thermostat that you have

1:43

potentially in your house or at the

1:44

office so it's something that probably

1:47

most people are familiar with we just

1:48

don't necessarily think of it as OT or

1:52

operational technology so we'll also

1:55

then evolve that into this idea of well

1:57

what's the difference between OT and

1:59

then IC industrial Control Systems where

2:02

we look at if you want industrial

2:04

strength OT systems right those that

2:08

work in industrial

2:11

environments then we'll get down to the

2:13

nitty-gritty and look at really what

2:15

we're talking about when we say cyber

2:17

security in control system environments

2:21

and then we'll also spend some time

2:22

looking at the history of different

2:26

control system or

2:27

OT incidents over the years so there's a

2:31

there's a handful that we're going to

2:32

focus on primarily in this course and

2:35

we'll we'll reference them continually

2:37

throughout there's a lot more that that

2:40

I could talk on but but there's a a

2:43

there probably you know about 10 that we

2:46

really want to focus in on especially

2:48

there's our top five like when we talk

2:50

about things like stocket and Colonial

2:53

Pipeline and trisis right those are some

2:55

of those top incidents we're going to

2:56

continue to refer to and then we'll talk

3:00

about uh just how do we secure the

3:03

environments at a high level and how do

3:05

we work with the business or the owners

3:06

and The Operators to make that happen

3:09

and then we'll kind of in part three

3:13

moving forward that's where we then

3:15

really get into the nuts and bolts of

3:17

how do we secure our our

3:21

networks so I do like to get started

3:24

when we start talking about cyber

3:26

security in OT environments right this

3:29

idea that there is a substantial

3:31

difference between it where we're

3:34

sitting in a back office right we're

3:36

reading emails we're browsing the

3:37

internet we're maybe working on a

3:40

spreadsheet or we've got an app open or

3:44

we're working on a Word document and

3:47

we're nice and safe and and sound and

3:51

the OT environment especially when we

3:53

think of you know if we're out in a

3:55

plant it's a completely different type

3:58

of environment where there's most

4:01

importantly the biggest difference is

4:02

there's safety issues that's why we

4:04

always talk about the main difference

4:06

between it and OT is that in OT safety

4:10

is always our primary

4:12

consideration it's not is a an attacker

4:15

going to come steal our our sensitive

4:17

information right or are they going to

4:19

be able to manipulate that data right

4:21

where it's stored maybe on a file server

4:23

or an application server right it's is

4:27

is the site safe for for our people

4:30

right the people that are at the

4:31

location so onsight personnel and and

4:34

what about maybe the general public that

4:36

could be in the vicinity of that

4:38

facility are they safe right that's our

4:41

ultimate Mission and priority is to

4:45

protect people and keep them

4:47

safe so two very different types of

4:51

environments one where we're sitting in

4:53

the office you know doing work in a nice

4:56

safe environment in an OT environment

4:58

we're out in that in that plant that

5:01

could potentially you have some type of

5:04

of danger right that's involved in doing

5:07

that job and some of these environments

5:09

are very very

5:15

dangerous another thing to think about

5:17

is in this case we have maybe a chemical

5:21

refinery as defined by mid Journey at

5:23

least the idea is that you we have our

5:26

OT Network that we want to protect right

5:29

we want to make in this case attackers

5:30

don't come in and take control of the

5:33

chemical refinery whether to shut it

5:35

down or potentially cause some type of

5:38

condition that could lead to a safety

5:42

issue so we want to make sure that we

5:44

protect the

5:45

environment the dangers and the risks

5:48

that we really see today is because most

5:52

OT networks have an IT Network that

5:56

they're connected with that they're

5:58

connected with and they're talking

6:00

to so the idea is in this case if I'm

6:03

actually let's say this is a

6:04

manufacturing a certain chemical and

6:07

then I'm packaging it to be sold to the

6:10

general public at

6:11

stores we have to be able to communicate

6:14

to the business how much of that

6:16

packaged chemical have we created so

6:19

they can do things like coordinate

6:21

shipping and

6:22

Logistics so we have the OT environment

6:25

that's creating the the chemical and

6:26

then even potentially packaging it up to

6:29

be sent you or shipped to different

6:32

stores across the country or across the

6:35

world but it's the business it's the it

6:38

side of the network that coordinates the

6:41

logistics for making that that happen

6:44

once we've created the the the packages

6:50

themselves so we see that it and OT

6:54

networks are allowed to talk with each

6:56

other and we've already started to touch

6:58

on the idea that if you're you're in the

6:59

OT environment physically right it's not

7:02

a safe place to be right there's always

7:03

some type of risk there's always some

7:05

type of danger to your physical

7:08

safety in the it environment and that's

7:11

where we're sitting in the office nice

7:12

and safe right and that we have that

7:14

communication between it and ot to allow

7:17

the business to get what it needs

7:21

done but also think where the real risk

7:24

comes from is the it environment is also

7:26

connected to the

7:28

internet when they talk about the great

7:30

thing about the internet is that it

7:31

connects us with everybody in the world

7:33

and of course the bad thing with the

7:35

Internet is it connects everyone in the

7:37

world to us The Good the Bad and and

7:41

everything in between so of course the

7:43

attackers and whether we talk about the

7:44

nation state attackers or ransomware

7:46

group operators which are really the top

7:49

threat that we see targeting both it and

7:51

OT networks

7:54

today idea is that remember that in

7:57

almost all control system environments

8:00

today there's communication between it

8:03

and OT and there's communication between

8:06

it and the internet so if there's

8:09

communication between it and the

8:11

internet and there's communication

8:12

between it and OT then it stands to

8:15

reason an attacker is going to be able

8:17

to get into the IT and network we talk

8:19

about it's not that question of if it's

8:22

just a matter of

8:23

when so an attacker is going to get in

8:26

into the IT environment so if there's a

8:28

path from it into OT then the attacker

8:31

will be able to take that and then have

8:33

that foothold in the OT Network to then

8:36

be able to start to take control over

8:39

that

8:42

environment so we like to and we're

8:45

going to come back and talk more about

8:46

this in the next couple sections

8:48

especially in part four where we get

8:50

into secure network architecture really

8:53

is the number one way to protect our OT

8:56

environments but in this case right we

8:59

have we talked about the OT environment

9:02

is let's say creating this this

9:06

chemical and that we're going to package

9:08

it up and then we're going to need to

9:10

ship that off to be

9:14

sold so the OT environment right is

9:17

creating the chemical even packaging it

9:20

and let's say into different say aerosol

9:24

cans and then it's going to go ahead and

9:29

take those

9:30

chemicals and take the data about how

9:34

many packages we've created and push it

9:38

over to

9:41

it the key is the OT environment is

9:44

going to send that information it's

9:47

going to push that information to it

9:51

it's one-way communication so we're

9:53

going to take the information about how

9:56

much chemical how many packages we've

9:57

created and we're going to push that to

9:59

it so the business knows well they need

10:03

to coordinate Logistics and shipping for

10:05

for you how many cases of this chemical

10:09

product we've

10:13

created we don't want to allow the

10:15

reverse where we don't want to allow it

10:19

to come in to OT to retrieve that

10:22

information as if that path exists in

10:25

the network an attacker right we have to

10:27

assume an attacker is going to to

10:29

eventually get into the IT environment

10:30

today tomorrow a week you know a month

10:33

down the road years down the road an

10:35

attacker is going to get into the IT

10:38

environment no anerus about

10:41

it so assuming that we know an attacker

10:44

is going to get into the IT

10:46

environment we have to make

10:49

sure that an attacker wouldn't have a

10:52

pathway from it to OT the number one way

10:56

to protect our OT environments is to not

10:59

allow it to talk directly with OT right

11:02

we don't allow network communication to

11:04

originate from it I'm jumping ahead but

11:07

I definitely wanted to stress that right

11:09

so the idea is we allow ot to send

11:13

information to it so the business has

11:16

the information it needs to do the job

11:19

it needs to right like coordinating

11:22

shipping

11:24

Logistics we don't allow it to reach

11:27

into the OT Network though because if an

11:29

attacker got into the IT Network then

11:32

they would have the ability to do the

11:34

same to reach into the OT

11:36

Network and then they would use that to

11:39

be able to move throughout the

11:40

environment and take control over it and

11:43

we'll talk about some examples of how

11:46

that happens as we go on throughout the

11:50

course now we also mentioned this idea

11:53

right allowing ot to talk with it and

11:56

that to prevent it from from reaching

12:00

into OT we can place a firewall so that

12:04

way that firewall is that physical

12:07

ideally physical uh Appliance that's

12:10

going to prevent that communication from

12:12

taking place and just kind of a

12:15

highlight of what we're going to talk

12:16

about especially in in part

12:19

four again OT can talk with it let OT

12:22

send data to it so the business can get

12:24

what it needs to get the job done but do

12:27

not allow it

12:29

to reach into OT unfortunately that's

12:32

not possible in all environments but

12:35

it's imposs it is possible in

12:38

some and it's possible in probably more

12:42

than people

12:45

think so then we talked a little bit of

12:48

it and OT and the different networks

12:50

talking to each other we can look at the

12:53

five different ways that attackers get

12:55

into the OT Network so we already

12:57

highlighted one example right think can

12:59

they can they can come from the back

13:00

office right so what if that firewall is

13:03

not there and the idea is if I'm able to

13:07

get access to your it environment maybe

13:09

I hack into one of the web application

13:11

servers that your company is hosting or

13:14

I send an employee a fishing email right

13:17

we get the employee to we trick them

13:18

into clicking on a link or opening up a

13:21

infected attachment that infects their

13:23

computer in turn and gives the attacker

13:26

control over that host that's that in

13:29

foothold that once the attacker is on

13:30

your it Network it will not take them

13:33

long to take control over all of the it

13:36

network and to also find that path into

13:40

the OT Network so remember that's the

13:42

the number one way attackers are going

13:44

to get into your OT network is through

13:46

the it Network just just because the

13:50

fact that it is connected to the

13:52

internet and that's the easiest path for

13:55

attackers to come

13:57

through now now besides coming through

14:00

the it Network to get into OT so we talk

14:04

about in nerp So nerp is the

14:07

certification or standard that's

14:09

required for power generation and

14:12

transmission facilities in the United

14:15

States and Canada so they have this

14:17

fancy term called transitory cyber asset

14:20

so really what they're talking about are

14:23

laptops and USB drives essentially

14:27

anything that could store data though

14:29

and potential process data right and

14:31

that can be brought into the environment

14:34

so smartphones would also uh fall under

14:36

this as well the idea is that uh we

14:39

could have somebody bring in a USB drive

14:42

or bring in a

14:44

laptop and what if that laptop or USB

14:47

drive or phone is infected and if it's

14:50

that asset is plugged in or connected to

14:52

the OT Network now that

14:54

infection is is loose on the network

14:59

and then what happens well that that is

15:02

a big question right it really depends

15:04

on what that infection or that malware

15:06

is designed to do so we'll come back and

15:08

talk about examples like stuck net right

15:11

what happens if an infected laptop gets

15:14

connected to your OT

15:16

Network what happens next so that's the

15:20

second way that attackers could get into

15:22

the environment they're brought in

15:24

physically by USB drive or laptop or

15:27

phone

15:29

now we've seen especially even just the

15:31

last couple weeks several instances that

15:33

have been highlighted where we'll say

15:35

smaller OT environments like water

15:39

authorities have had different systems

15:43

exposed directly to the

15:45

internet and so for whatever reason

15:48

whether somebody thought they were doing

15:49

the right thing or they just didn't know

15:51

better was the idea that they had a PLC

15:55

or an HMI or a Windows Server acting as

15:58

a data historian or any OT asset right

16:02

any asset or system in the OT network

16:05

was connected and exposed directly to

16:07

the Internet so anybody on the internet

16:09

could reach out and touch

16:12

it and they essentially if there is a

16:15

vulnerability or some other way to

16:17

exploit that system then that person

16:20

would have control over that asset from

16:23

from over the internet and then they

16:25

have that foothold that starting point

16:27

on your o

16:29

Network so we do see that and it's

16:31

something that should shouldn't happen

16:34

right we should be monitoring

16:36

continually to make sure that we don't

16:39

have any Internet facing exposed systems

16:42

at least those that shouldn't be there

16:44

not in OT in it maybe you host something

16:48

like a website and you want that access

16:50

accessible by the entire internet right

16:52

that's what it's designed to do but you

16:54

don't want any of your OT systems

16:57

directly exposed to the Internet so

16:59

we'll talk a lot more about

17:01

that you talk about remote access

17:04

capabilities so when you think if I need

17:06

somebody to come into a plant and do

17:08

maintenance on a piece of equipment

17:10

maybe they're going to do a firmware

17:12

upgrade on a PLC let's

17:14

see the idea is that they could

17:16

physically come into the environment but

17:18

that's it's going to take time maybe

17:20

there's travel cost associated with that

17:23

maybe there's a pandemic going on so

17:26

with with covid right the the need and

17:29

the use for remote access just

17:32

skyrocketed but we also had remote

17:34

access in the first place in a lot of OT

17:38

networks because remember our first

17:41

priority in

17:42

OT is about physical safety making sure

17:45

we keep our people safe so if I can

17:48

allow somebody to remotely upgrade the

17:51

firmware or programming on a PLC and I

17:54

they can do it from home it's a lot

17:57

safer

17:59

than if they're actually standing in the

18:01

middle of a

18:03

plant doing that

18:05

work so from a safety from a pure safety

18:09

perspective you know would we rather

18:11

have them working from home or working

18:13

in the plant we definitely rather have

18:14

them working from

18:17

home so that's the idea of yeah remote

18:20

access definitely has its place in the

18:22

OT world we just have to make sure that

18:24

we do it as securely as possible because

18:27

attackers will exploit issues with your

18:31

remote access configuration and use it

18:33

to gain access unauthorized access to

18:35

your OT

18:39

Network and then finally we talk about

18:42

the another way that attackers get into

18:43

the OT network is we give them access

18:46

they're malicious insiders so they're

18:48

somebody that we've hired or maybe

18:50

they're a partner or a vendor and we've

18:53

given them things like credentials and

18:56

access into the environment they're able

18:58

to come on site they're able to plug in

19:00

to the the network they're able to

19:02

remotely

19:03

connect and the idea is that they mean

19:06

to doess

19:08

harm so those are the five ways that

19:11

attackers primarily get into OT networks

19:13

that we're going to talk about as we go

19:15

throughout the

19:17

course most importantly right we're

19:19

always thinking about that relationship

19:21

between it and OT from a network

19:24

perspective attackers being able to move

19:26

into it from the internet and then if

19:29

there's a connection allowed from it to

19:32

OT they will find it and they will use

19:34

it to get into the OT Network so again

19:37

we'll come back and we'll be talking

19:38

about that a lot as we go throughout the

19:41

the rest of the course so just keep that

19:42

in the back of your mind for

19:46

now so one question I get asked a lot is

19:50

well how you know how mature is cyber

19:53

security in OT or how good are we in the

19:56

OT world at Cyber

19:58

security it's a good question it's one

20:01

we don't have a like a ton of metrics

20:03

around in the the first section we

20:05

talked about the reports like the Drago

20:07

year and review where they do a lot of

20:09

the work to highlight you know the

20:10

issues and and you can use that to get

20:12

an idea of well how well are we doing I

20:15

would say you know some some people

20:17

might say 33% some people might say

20:20

50% I supect it's and depending again

20:24

how you look at it we're probably maybe

20:26

somewhere around there um is it

20:29

higher in some AC ways right it's an

20:32

interesting question if we're looking at

20:33

it across the board I think but at the

20:36

end of the day does it really matter how

20:38

we're doing as you know overall what

20:41

really matters is you know your

20:43

organization right how is it doing on

20:47

cyber security in its OT Network right

20:51

it it could be 0% it could be 100% not

20:54

that anything's ever

20:56

100% but I think you get idea right it's

20:59

just going to depend on your environment

21:01

that of course should be the most

21:02

important to

21:05

you but I would say roughly I probably

21:08

maybe

21:10

50% from you the the environments that

21:13

I've got to see and working and you know

21:16

talking with other people outside there

21:19

um you know my day job at floor work

21:20

with some of the largest providers and

21:22

companies in the world and they have

21:24

very strong cyber security programs for

21:27

OT I get to talk with a lot of other

21:29

folks outside of that role and there's a

21:33

lot of environments out there even uh

21:35

very large environments with very little

21:37

to no no cyber security in the OT

21:40

networks right so there's there's

21:42

definitely a lot of concern there's a

21:43

lot of risk right and and we have to

21:46

protect our

21:49

environments so for those of you coming

21:52

from a you probably a more traditional

21:54

it or it cyber security background and

21:57

even just the idea of operational

22:00

technology or what is OT might sound

22:03

very strange at at first I can admit

22:06

that it was very strange for me to try

22:08

to unravel and understand in in the

22:11

beginning but the idea is and I like to

22:13

use the idea of a

22:14

thermostat for this like a thermostat

22:18

I'm looking at the one on my wall right

22:19

now it's literally right in front of my

22:21

face uh that looks almost like this

22:25

one and so we have

22:28

this computer has memory it has a

22:33

processor it has essentially think of an

22:36

operating system it has code that it

22:37

runs right to help it understand it's

22:40

programmed right to do something so it

22:42

has code to tell it you how to think and

22:45

what to do how to

22:47

react it actually has what it calls a

22:50

set point right which is a variable and

22:52

you can even see in the picture it says

22:53

set right cuz for a thermostat we can

22:56

set we can change to any to any value

23:00

guess within a range that we decide

23:02

right that we want the temperature to be

23:05

in the room at any given time so in this

23:07

case we change that variable to 70°

23:11

right we always want the temperature in

23:12

the room to be

23:16

70° so then it's the job of the

23:20

thermostat to make

23:22

sure that the temperature in the room

23:24

stays at the value we place the set

23:27

point a

23:30

so in this

23:32

case right once we've had or we set the

23:36

value one thing to think about is this

23:40

piece of operational

23:42

technology is that it brings in data

23:47

from outside

23:49

sources so we actually have a

23:53

sensor that's continually taking the

23:55

temperature in the room and telling

23:58

the

24:00

computer well how hot or how cold is it

24:03

in the

24:04

room so we're continually taking the

24:07

temperature in the room and feeding that

24:09

into the

24:10

device so that way let's just

24:14

say if the temperature all of a sudden

24:16

goes up to

24:19

72° the logic or the programming

24:24

in the

24:26

thermostat it's going to oh it's getting

24:28

too warm I need to turn on the air

24:30

conditioner so it sends a electrical

24:33

signal Audi wire that's physically wired

24:36

into the air conditioner unit to turn it

24:38

on and then all of a sudden the air

24:40

conditioner is running and we have cool

24:42

air coming into the room so we're going

24:43

to send that signal to the air

24:46

conditioning unit right which is this

24:47

physical system out in the real world

24:51

and we're going to turn it on and make

24:53

it

24:54

run and then as it runs it's going to

24:56

blow cold air

24:59

into the the office or into the into the

25:03

the house or to the room we're in and

25:05

it's going to then lower that

25:07

temperature back so at the same time

25:10

we're still continually taking the

25:12

temperature so that way as the

25:14

temperature goes down and we get back to

25:15

the set point of 70° well then we know

25:20

okay let's go ahead and turn off the air

25:24

conditioner right we're back at our our

25:26

set point we're back where we need to be

25:31

and then the thermostat continually does

25:33

its job of bringing in the the

25:36

temperature right what's the temperature

25:38

what's the temperature what's the

25:39

temperature and then if it's temperature

25:42

goes above the set point we send a

25:44

signal to turn on the air conditioner or

25:46

if oh maybe the temperature goes below

25:48

the set point maybe we need to send out

25:50

a signal to turn on the

25:53

heater but that's the idea of

25:56

operational technology they're

25:59

computers that we use to control

26:03

physical systems out in the real world

26:06

like heaters and air conditioners that

26:10

we have at home or or at the

26:13

offices we can expand that when we talk

26:15

about things like power plants so it's

26:18

not necessarily when we talk about

26:20

things like air conditioning and he

26:22

heating or furnace

26:24

units but where we talk about things

26:27

like turb bines and generators and

26:30

combustion

26:33

Chambers but that's the idea of again

26:36

operational technology in yeah a simple

26:39

example is the idea of the

26:41

thermostat again that not only think of

26:44

it again just remember it's a

26:46

computer that can think and is designed

26:48

and programmed usually to do you one or

26:51

limited number of

26:53

jobs it brings in data from different

26:57

types of sensors and other

27:00

sources and then it can send signals out

27:04

to those other physical systems we have

27:06

in the real world to control them right

27:07

that's the idea of the industrial

27:10

Control Systems right the idea of it

27:12

allows us to control those

27:16

systems and then this whole process it's

27:19

right it's this continual Loop going on

27:23

inside the asset or the computer or the

27:27

the the piece of operational technology

27:30

or might refer to this as a programmable

27:32

logic controller a

27:35

PLC very simple one but at the end of

27:38

the

27:39

day so the idea is again it's this

27:44

continual Loop whether you call it close

27:46

loop or control

27:48

Loop that we just continually go through

27:51

this Loop of logic right what's the

27:54

temperature what's the temperature

27:55

what's the temperature oh it's too warm

27:57

turn on on the heater or turn on the air

27:59

conditioner like oh okay we're back to

28:01

normal turn it off oh it's too cold all

28:04

right turn on the heater oh we're back

28:06

to normal turn it off what's the

28:08

temperature what's the temperature

28:09

what's the temperature so as long as

28:11

that is running right we're continually

28:13

checking the temperature and that's that

28:15

value that we place in the set

28:25

point so when we talk about okay we have

28:28

operational technology and we have this

28:30

thermostat right is there risk

28:32

associated even with the thermostat and

28:34

there is believe it or not and again it

28:37

doesn't matter if it's a thermostat that

28:39

we're going to use to control maybe

28:41

again the air conditioner that I have at

28:43

home or if it's a PLC that I'm using to

28:48

control let's say part of the power

28:53

plant the real risk starts to come when

28:55

I take that

28:59

asset right that

29:01

system and then I give it an IP address

29:04

right because then when I give it an IP

29:06

address it can start to talk with other

29:09

systems and maybe it's not tcpip if you

29:12

give it you know put it on any network

29:14

and give it any networking protocol and

29:16

you allow it to start talking with other

29:17

systems there's a

29:21

danger when you use IP or tcpip right it

29:24

makes it a billion times worse because

29:27

not not only is it communicating with

29:29

all the other assets on the local

29:30

network over IP but if there's internet

29:33

connectivity

29:35

anywhere right tcpip is also the

29:37

protocol and language we use to

29:39

communicate over the

29:41

Internet so not only is that thermostat

29:46

in this case exposed to the local

29:48

network but it's also exposed

29:49

potentially to the

29:52

Internet so here in the example right if

29:55

I do give that thermostat an IP add

29:57

address right it can talk with all the

29:58

other hosts on my local subnet and maybe

30:01

there's my laptop and the Wi-Fi access

30:04

point and printer and U maybe that's a

30:06

gaming laptop I'm not sure I have a

30:08

server at home but I'm not that not that

30:11

hardcore nerdy anymore I used to

30:16

be so when we have you the thermostat

30:20

that yeah it can connect and and talk

30:21

potentially with all these other Assets

30:23

Now by default isn't

30:25

no but it could

30:28

right because it has an IP address and

30:30

again it's just another computer

30:32

essentially again processor

30:35

memory makes calculations it's

30:38

programmed it doesn't have a lot of

30:39

storage space right it's not designed to

30:41

to do things like work with Excel

30:43

spreadsheets and and Word

30:45

Documents but again for the most part

30:48

it's just another computer on the

30:52

network so it's communicating again

30:54

that's where we start to see more risk

30:57

if of course all of our homes are

30:59

essentially going to be connected to the

31:01

internet and then well the attackers are

31:04

sitting there out on the internet just

31:07

waiting so what if the attacker comes in

31:10

and is able to gain access to one of the

31:14

internal host on your

31:18

network well then they would have access

31:21

not only to that host but all the other

31:22

hosts or systems on the network

31:24

including that

31:26

thermostat so sure in this example it's

31:29

an attacker that might turn on your air

31:32

conditioner right and turn it down

31:33

really low to run up your electric

31:36

bill so there's not is there any true

31:38

risk or danger there

31:43

no but what could they do in other types

31:47

of OT environments like a manufacturing

31:50

plant or when think of more industrial

31:52

strength environments like a power plant

31:56

what would an attacker do if they gained

31:59

access and could touch and control that

32:03

asset because if you can control that

32:05

asset then you can

32:07

control those physical systems that the

32:10

asset is connected

32:12

to and that's the concern because then

32:15

it's is that going to introduce some

32:17

type of safety issue right is the safety

32:20

of our people at the site and for the

32:23

public in the area or the vicinity of

32:25

that site are they in danger

32:28

we can also think yes you know we want

32:30

to make sure that uh the this the plant

32:34

or that site stays up and running right

32:36

and it does what it's designed to do of

32:39

course but ultimately our number one

32:42

priority is physical safety followed by

32:44

environmental safety like we mentioned

32:46

in the first part of the course and Then

32:50

followed by the availability of the

32:56

plant so we've touched on these when we

32:58

talk about the difference between it

33:00

where we think of traditional systems

33:03

like yeah like laptops or workstations

33:05

or servers where we're sitting in the

33:06

office

33:07

environment right doing our work and

33:09

Excel spreadsheets in Word documents

33:13

like we we just mentioned the idea is

33:15

that those types of it assets have a lot

33:18

of storage space right we're storing you

33:21

large documents and and spreadsheets and

33:24

we have applications and that are

33:25

storing large amounts of

33:28

data you're talk about operational

33:32

technology that they're not storing

33:35

large amounts of

33:37

data in fact they're processing very

33:40

small amounts of data right bringing in

33:44

let's say data from a sensor determining

33:47

what that value is and then determining

33:49

if there's any other action to be

33:52

taken as that value

33:55

changes it's very very small amounts of

33:58

data that's actually brought in and

33:59

process and we'll actually look at

34:01

behind the scenes what some of that data

34:03

data looks like in the next next

34:08

section so we have it we have OT that

34:11

allows us right to control different

34:13

physical systems in the world and then

34:15

the difference between OT and IC is just

34:17

a matter of the really the size and

34:19

scope of the environment the assets

34:22

realistically do the exact same job if I

34:26

have that thermostat that could actually

34:28

also be hooked up to let's say part of a

34:31

power

34:32

plant and it literally could be the same

34:35

same asset it's just one controls a home

34:39

air conditioner and One controls let's

34:40

say a turbine in in a power plant

34:43

environment and it's actually

34:44

interesting we'll see some cases as we

34:46

go throughout the course that's where

34:49

attackers actually get stuck and a big

34:53

hangup for them when they're trying to

34:55

break into control system and

34:57

environments and this idea that as

35:01

they let's say gain access into a OT

35:06

asset like a

35:07

PLC they don't know what it's connected

35:10

to right on the other side so there's

35:12

been instances where hackers and

35:14

activists have broken into like there

35:16

was a um a activist group that had

35:19

broken into and what they thought was a

35:21

water treatment facility in Israel well

35:25

what it turned out to be was yeah it was

35:28

a water treatment facility in Israel but

35:30

it was basically for a swimming pool at

35:35

a hotel it was not for you know entire

35:38

like tens of thousands or hundreds of

35:40

thousands of people and they drinking

35:42

water but they didn't realize that and

35:46

that's where it's difficult for

35:48

attackers to really know at least

35:52

initially right what type of environment

35:54

are they in by only looking at it from

35:58

certain aspects so yeah I'm jumping

36:00

ahead but that gives you just something

36:02

to kind of keep in the back of your mind

36:04

because that's where really the the

36:08

biggest hurdle for attackers is when

36:11

they get into the OT environment they

36:12

have to map it out they have to figure

36:14

out the different systems and what's

36:16

connected to what and how these

36:18

different processes work and how to

36:20

reverse engineer them to where they

36:22

could even begin to think of doing

36:25

damage and that is not something that is

36:28

easy at all it is not

36:34

trivial so definitely something we'll

36:36

Circle back on but again and you can see

36:38

the last note here we say now IC OT or

36:42

all even say Control Systems because

36:44

that's the term we use at Flor in my day

36:46

job you know we'll say those things all

36:49

interchangeably so yes there are some

36:52

slight differences between OT and IC but

36:56

but we'll say you know again we'll just

36:59

in for the rest of this course if I say

37:01

OT or IC or Control Systems it all means

37:04

the same thing right we have essentially

37:06

computers that are used to control

37:08

physical systems or Assets in the real

37:15

world now I did want to throw out just

37:17

real quickly the idea of Internet of

37:19

things because this does come up in

37:21

different conversations Now The Internet

37:23

of Things has let's say for now

37:26

technically nothing to do with IC or OT

37:31

the idea is a iot device right is

37:35

usually referred to as a consumer device

37:37

something that we're going to have at

37:38

home like I have a Amazon Alexa right

37:42

with a video screen and so I can ask her

37:44

what time it is she can show me menus as

37:46

I'm cooking in the kitchen I can play a

37:49

movie on it which is usually what I

37:53

do but the idea is that that that asset

37:57

itself does not have a lot of computing

38:00

power let alone the functionality it

38:03

needs to do its

38:05

job that consumer device to be able to

38:08

function it has to take data and send it

38:12

to a server Farm out on the internet on

38:16

in the cloud right to be able to be

38:18

processed to have those numbers crunched

38:20

to then have the appropriate responses

38:23

sent back down to the device so the

38:26

device knows then how to respond so if I

38:28

ask it to play copy of the

38:31

Matrix it has to First send out my

38:34

recorded voice to understand what I'm

38:37

asking it to do and then once it

38:40

understands oh I'm asking it to play The

38:41

Matrix then it has to course stream the

38:45

movie well the none of that is stored

38:48

locally on the

38:51

device so there's these very and they

38:54

mention right they're they have very

38:56

limited capability themselves their

38:58

capability comes from these huge server

39:02

farms in the cloud so they have to have

39:06

internet access to be able to function

39:09

no internet access your iot

39:13

devices do not

39:15

function that's kind the pure definition

39:19

of of iot and I know there's some slight

39:21

different differences and this is just

39:24

very general high level but for now

39:27

think of it that way because we're also

39:29

going to come back and talk about the

39:31

industrial internet of things which then

39:33

starts making things even a little bit

39:36

more confusing and definitely less

39:38

secure so we'll talk about

39:43

that another question that comes up when

39:46

we talk about you differences in terms

39:48

so and this was one that was more

39:50

popular like 5 10 years ago uh I

39:53

remember especially when I first got

39:54

into OT cyber security or or IC cyber

39:59

security because nobody used the term OT

40:01

really back then was everybody used to

40:04

say ICS or scada I was like oh well

40:08

what's the what's the difference and I

40:09

remember actually that when Rob Lee

40:11

first mentioned this I was like oh my

40:13

gosh that's that's exactly

40:16

um makes complete sense right was he

40:20

just said that with IC it's how a land

40:22

Works in it and with scada it's how a w

40:26

works in it so if you're Fami you know

40:28

if you have an IT background or if

40:30

you're familiar with the concepts of

40:31

land versus land right the idea is that

40:34

we refer to all the systems in an OT or

40:38

control system Network as is IC if

40:41

they're all at the same physical

40:44

location if they are spread out over a

40:48

geographical region or distance if

40:50

there's some type of distance right

40:51

where we have to communicate over a Wan

40:54

link something like 5G or

40:58

satellite the idea is that's referred to

41:01

as skate

41:03

up so remember yes if everything's

41:06

located if all the systems are located

41:08

at one physical location like at maybe a

41:10

single power plant right that's

41:13

considered

41:14

ICS if you have systems spread out so if

41:18

I'm doing power transmission and I have

41:21

electricity that I'm sending out over

41:24

the lines over my Miles and

41:29

Miles well along those transmission

41:32

lines I have different substations and I

41:34

have systems I have control systems at

41:36

those substations and I communicate with

41:38

those substations over some type of wide

41:41

area link like 5G or

41:46

satellite so in that instance right

41:48

those are considered SC so remember ICS

41:51

all local if they're communicating

41:55

remotely

41:56

that's

41:57

SC then we'll come back and talk about

42:00

yes supervisory control and data

42:02

acquisition but you think really

42:03

ultimately that's what we're doing with

42:05

control systems in general right we have

42:08

an asset that goes out and pulls

42:13

information from a system to understand

42:15

how it's operating right data

42:17

acquisition then it displays it to us in

42:21

some

42:22

fashion and then we can use that

42:24

information to then determine if we need

42:27

to make a change and if we need to yeah

42:30

we control we make a

42:33

change again I know it's kind of high

42:36

level and it's oversimplified but really

42:38

I mean that's that's it at the end of

42:40

the

42:42

day and we do the same thing with IC

42:45

right SK is not anything special it's

42:49

just SK is more when versus L or remote

42:54

versus

42:55

local

42:58

and here's an example just you know

43:00

again IC all local like maybe in our

43:02

house or in this case that's my idea of

43:05

a PLC at

43:08

192.168.1.1 and controlling other assets

43:10

locally like there's a HMI at

43:13

192.168.1.10 so that's essentially a

43:16

control system asset that has a video

43:18

screen that you can interact with versus

43:22

scada maybe we have three different

43:23

sites that are set up in three different

43:26

system cities that are connected over

43:30

some type of white area link maybe it's

43:32

just even regular like you know regular

43:33

old internet

43:35

connections but the idea is that they're

43:37

in completely different cities right

43:39

they're connected over some type of wide

43:41

area

43:43

link that's

43:47

G now one of the terms that I first

43:50

heard when I got

43:51

into OT was this idea of owners and

43:55

operators which probably makes sense

43:58

when you think about it but it was just

44:00

new to me and I didn't know 100% what

44:03

exactly it was so I wanted to make sure

44:05

I included it here and this idea that an

44:10

asset owner is you know essentially it's

44:13

the company that owns that facility so I

44:17

remember the first real project that I

44:20

worked on that actually went on site it

44:22

was a power plant that Flor had built

44:24

for Dominion Energy so in that case

44:27

Dominion Energy was considered the right

44:29

they were the owner they were the asset

44:31

owner for that

44:36

facility now you also have a group of

44:40

people that are asso that are

44:44

responsible for running that

44:47

facility now a lot of times they can be

44:50

the owner and the operator of the same

44:52

company right so at that Dominion Energy

44:56

power plant Dominion Energy employees

44:59

ran the facility so not only were they

45:01

The Operators but yeah they also owned

45:03

the facility so Dominion Energy were or

45:06

was the owner and operator should say is

45:09

the owner and operator for that power

45:15

station some owners you know don't want

45:18

to have that responsibility for for

45:20

whatever reason and so they actually

45:22

hire an outside party to operate the

45:25

facil for them so floor actually does

45:28

some operations work in different types

45:32

of environments including nuclear

45:36

facilities but that's the idea when you

45:38

hear of asset owners and operators and

45:40

I'll talk about owners and operators as

45:42

we go throughout the

45:44

course especially you think it's when

45:47

you think of the leadership of the

45:49

environment because a lot of what we do

45:51

from a cyber security perspective is

45:53

it's working with that leadership to

45:55

help them understand the risk from a

45:58

cyber security perspective in the

45:59

environment and how best to

46:02

protect

46:04

against the different threats and the

46:07

risk that we have in the environment

46:09

right we want to limit that risk as much

46:11

as possible so we have to help them

46:13

understand how to do that especially in

46:15

a way where they're going to give us

46:17

budget to do

46:20

that so that's owners and

46:23

operators so the next section and I

46:26

wanted to mention this this I included

46:28

this in this part because I wanted to

46:31

highlight when we talk about remember

46:34

this idea or the difference between OT

46:37

and IC right it's OT is this general

46:40

term which we use right for computers or

46:42

systems we use to control physical

46:45

systems out in the real

46:48

world and then we can talk about well IC

46:51

is the industrial strength version of

46:54

the so when I think of indust industrial

46:56

strength my mind goes to when we talk

46:58

about critical

47:00

infrastructure right and so critical

47:03

infrastructure critical infrastructure

47:05

sectors are Define defined by your

47:07

country's government so these are the 16

47:10

critical infrastructure sectors as

47:12

defined by the United States government

47:15

they're looking at adding number 17

47:18

which would be space which would cover

47:20

you know security for well just in

47:23

general designate space and especially

47:25

think of things like satellites

47:27

Communications for as uh critical

47:30

infrastructure as specifically as its

47:32

own sector I was talking with somebody

47:35

from India not long ago and the India

47:37

government the government of India sorry

47:40

uh had just assigned Healthcare as a

47:44

critical infrastructure for the country

47:47

right so there's there's a definite

47:49

definite additional

47:51

oversight and there could be additional

47:53

requirements and regulations for

47:56

different uh critical infrastructure

47:58

sectors we still don't see a lot of

48:00

regulation in the United States though

48:02

the main regulation in ic or OT that we

48:05

see in the United States which we

48:08

mentioned a little bit earlier is nerk

48:09

or nerk

48:10

siip which governs how power

48:14

transmission and power generation

48:16

facilities work in the United States and

48:20

Canada and there's a few others that

48:23

we'll talk about so there's some

48:24

additional guidance and regulations from

48:27

the Transport Security Agency or TSA in

48:29

the United States around pipeline

48:31

operators and Railway operators since

48:34

the colonial pipeline

48:37

incident but those are the main ones and

48:40

that's that's about it I mean there's

48:42

some general requirements that we'll get

48:43

into in other areas um but for like true

48:47

cyber security

48:49

regulations there's just there's just

48:51

not a lot in the United States but and

48:54

we'll talk more about that and why that

48:56

is a little bit later on but anyways I

48:58

jump ahead and I digress because I just

49:01

wanted to go through the different

49:03

critical infrastructure sectors just to

49:05

give you an idea when they talk about

49:07

things like the chemical industry right

49:10

so when we're actually I was talking

49:13

about that example earlier where we have

49:14

that that chemical refinery that maybe

49:17

we're producing uh some type of of asset

49:21

that we're going to package and then

49:22

turn around and and sell maybe even if

49:24

it's just something like glass

49:29

cleaner but chemicals play a very

49:32

important part in society and that's

49:35

really where we talk about critical

49:36

infrastructure right what part do they

49:39

play in society and our uring our daily

49:44

lives I think yes we could all live

49:47

without glass cleaner if we absolutely

49:49

had to but right there's other chemicals

49:52

that we use on a daily basis even if you

49:56

just think of something like pesticide

49:59

and we use that for spraying the fields

50:01

for agriculture right which we use to

50:04

feed

50:05

people so you'll see there's a lot of

50:09

interconnectedness between the sectors

50:11

as well so commercial facilities is an

50:13

interesting one and this is one where

50:16

pretty much where anybody or large

50:18

groups or can can gather in public so

50:22

whether like a sports arena like you can

50:23

see see here or a shop mall would also

50:26

be considered a commercial facility um

50:29

so of course there's definitely

50:31

different protections that that come to

50:34

mind we're probably less concerned about

50:36

cyber

50:37

attacks you know creating physical

50:40

safety issues in these types of

50:42

environments rather than like a chemical

50:45

facility but uh Communications which is

50:49

important so of course it it provides

50:53

essentially the foundation for Society

50:56

these days um when we talk about what

50:59

would we do if we lost the

51:01

internet society would would would just

51:05

simply cease to function I think even if

51:07

we had power we we'd still probably

51:09

cease to function if we had no no

51:12

internet connectivity right we weren't

51:14

able to to communicate and our phones

51:17

you know didn't work any longer so uh we

51:20

weren't able to text or get on to uh

51:22

social media but uh critical

51:25

manufacturing so we're not talking about

51:27

just creating Widgets or maybe the the

51:30

glass cleaner right but when you think

51:32

of you know I think of like floor had

51:35

created um the we have built designed

51:37

and built the largest insulin

51:39

manufacturing plant in the world right

51:41

that's that's a that would be considered

51:44

critical manufacturing because if that

51:45

facility went down right then there's a

51:49

supply shortage of insulin that people

51:52

need right people with diabetes need to

51:55

live right their lives and so there's

51:58

there's

52:00

definitely uh an impact there so there's

52:03

different types of manufacturing so when

52:04

we talk about especially critical

52:06

infrastructure right critical

52:10

manufacturing we talk about

52:12

dams uh so that they actually are set up

52:15

as their own critical infrastructure

52:17

sector it's another one where not a lot

52:20

of risk usually is associated with dams

52:22

from a cyber security perspective but

52:25

but could be we'll actually talk about a

52:26

few few damn related

52:30

stories there's the defense industrial

52:32

base this is

52:34

for different essentially really

52:36

companies that act as contractors to the

52:39

United States government so floor where

52:41

I work in my day job is a you know part

52:44

about 15% of our company is acting as a

52:48

government contractor so we run you some

52:50

national uh labs for for the United

52:53

States government we were a big part of

52:56

you know different um efforts like in

53:00

Afghanistan in Iraq uh and and many

53:03

other efforts that we do for for the US

53:06

so so we would definitely be considered

53:08

part of the defense industrial

53:11

base we look at emergency services so

53:14

police fire other First Responders like

53:17

like uh EMS right paramedics so they

53:21

would also fall under critical

53:23

infrastructure uh in energy is probably

53:26

the you know the the most important

53:30

critical infrastructure sector it gets

53:32

the most attention I think because so

53:36

many other of the sectors they need

53:40

electricity to to run and operate

53:43

without the power right they're they

53:45

essentially don't exist and so they

53:47

think that's why why energy gets as much

53:50

attention as it

53:52

does you there's I don't think there's

53:54

there's any other um sector that gets

53:59

even probably a hundredth of the

54:01

attention that that energy does it's

54:03

also why especially again in in the

54:05

United States and Canada where we have

54:07

nerk or n nerk sip we have the cyber

54:09

security requirements all right for

54:13

energy generation and

54:18

transmission we have uh financial

54:20

services so I think of banks stocks

54:22

stock markets and such right it's

54:25

definitely an important part of the

54:27

economy and any nation's overall

54:32

security talk about and we already

54:35

mentioned a little bit earlier right

54:36

food and agriculture right so we need to

54:39

make sure we have not only things like

54:41

pesticides from the chemical sector but

54:44

we also have to have water to of course

54:48

irrigate the fields we have to have

54:50

electricity to be able to to

54:53

um sometimes you know deliver different

54:56

uh services like

54:58

water in some

55:00

cases there's government facilities so

55:04

okay and then of course Healthcare as

55:07

well the final four that we're going to

55:09

talk about so there's big informational

55:13

technology I think of of course for me I

55:15

go to immediately think of data centers

55:18

which is why I included this picture so

55:20

the large data centers that we use to

55:21

host essentially all right all the cloud

55:23

functionality that we all need in our

55:25

daily lives to to be able to operate so

55:29

so there's nuclear reactors so they do

55:31

break out traditional energy from

55:32

nuclear because there's definitely a lot

55:36

of additional especially safety

55:38

considerations when we work move into

55:40

nuclear so you can see whether nuclear

55:42

reactors of course we have to be able to

55:44

store safely nuclear material before we

55:47

use it and after when it's waste so

55:51

there's definitely a big part of the

55:52

conversation there how do we do this

55:55

securely we talk about I jumped around

55:58

like this but we mentioned water

56:01

everything from agriculture to the

56:02

drinking water to you know the water

56:05

coming out of our tap you every day you

56:07

know a lot of things that that we take

56:10

for

56:11

granted and then you know Transportation

56:13

Systems as well so rail I get to do a

56:15

lot of work in in rail these days which

56:17

actually is really fun and and exciting

56:20

it's just a different type of OT

56:22

environment it's a different critical uh

56:25

infrastructure sector but the idea is

56:28

when you think about again this the

56:29

intent behind critical infrastructure

56:32

sectors is this

56:34

idea that these are services that we

56:38

need in our daily lives right we've come

56:41

to rely on them the vast majority of

56:43

people take them for granted every day I

56:46

mean I still do even though I try to not

56:50

but when I started just to get into OT

56:53

cyber security and started asking those

56:55

questions and oh how does you cyber

56:58

security work at a power

57:01

plant right it gets into those questions

57:03

that we started to touch on a little bit

57:05

earlier was well what happens if that

57:07

power plant goes down for a couple of

57:11

hours okay we can live without power for

57:13

a couple hours not a

57:15

problem but what if it's you know a day

57:18

or a couple of days that's a a big

57:21

difference let alone a couple of days

57:24

becomes a week or a couple of weeks and

57:27

then you start to think of how right the

57:30

different the impact right can just

57:33

exponentially grow the longer right we

57:36

no longer have access to that facility

57:38

or whatever that facility is

57:41

designed to generate for

57:46

us so what happens if we lost healthare

57:49

or drinking water or our data centers in

57:53

the cloud right it's it's that's where

57:56

we get in I think of like The Walking

57:58

Dead right we get into Walking Dead

58:00

territory and the breakdown of

58:05

civilization again I did want to include

58:07

the critical infrastructure sectors just

58:09

to be able to highlight especially when

58:11

we get into these conversations of OT

58:13

versus IC and what do we really mean by

58:16

industrial well this is you know these

58:18

are some examples of true industrial

58:22

environments anything in critical

58:24

infrastructure would be considered

58:26

industrial or industrial

58:29

strength so hopefully that helps and

58:32

we'll talk about it more as we go

58:34

throughout the course and we'll talk

58:36

about some other examples to hopefully

58:38

help it you know really kind of sink in

58:41

and we'll start to see what's going on

58:49

there so let's talk about cyber security

58:54

in the the OT world so the idea

58:58

is and it's it's interesting because it

59:00

can mean different things to different

59:03

people but the idea is when we think of

59:06

an OT Network again we're going to use

59:08

the the main example in this course of a

59:11

power plant and so I think of that power

59:15

plant and in that power plant it has

59:17

computers and those computers are

59:20

networked right they're they're

59:22

communicating amongst each other and

59:24

those computers are used to control the

59:27

the power plant that generates

59:28

electricity that the world around it

59:31

depends

59:33

on so it's very similar to cyber

59:36

security and it where we're trying to

59:39

protect the environment against hackers

59:42

against compromise in this case we're

59:45

trying to protect the power plant

59:47

against an attacker or or compromise

59:50

again it's can be different things that

59:53

we're protecting against cuz in it we're

59:55

usually worried about an attacker coming

59:57

in and stealing our data versus an

60:00

attacker coming in and turning off the

60:02

power or potentially blowing up the

60:05

facility which would be the worst case

60:09

scenario but in OT environments this is

60:11

where we we talk about the different

60:13

types of assets which is a very

60:15

fascinating World these days because you

60:17

have traditional

60:18

OT assets like programmable logic

60:21

controllers or plc's or hmis that human

60:24

management interfaces or when we talk

60:27

about data

60:28

historians but then we also have these

60:31

other computers that are they look and

60:34

they are just like the uh it traditional

60:37

assets that we have like laptops running

60:40

Windows and servers running Windows

60:43

which are for data historians and

60:46

Engineering workstations and we could

60:47

have other you know laptops that

60:49

technicians use to do maintenance or

60:52

they could have tablets probably running

60:55

Windows you know maybe sitting in the

60:57

plant on

60:58

Wi-Fi so there's a lot of different

61:01

attack vectors from a cyber perspective

61:04

right anytime we have computers and

61:06

those computers especially are network

61:08

together and that's where then we go

61:11

back of course to where the real risk is

61:13

today because not only is it that we

61:16

have these computers in the OT

61:18

environment and they're networked over

61:19

tcpip but they're probably connected to

61:22

the it Network in sh some way shap per

61:24

form over tcpip which and then is in

61:27

turn connected to the internet over

61:31

tcpip so our OT Network in some way is

61:35

probably connected to the OT whether we

61:38

realize it or

61:42

not you mentioned cyber attacks can have

61:45

very real world consequences in in OT

61:49

and and in it as well I don't I don't

61:51

want my company getting compromised and

61:54

being shut down for 10 days to where you

61:57

people are going to lose jobs that's

61:59

that's the last thing I would want but

62:01

the the consequences are much more

62:03

serious when we talk about OT

62:06

environments and what if that power

62:08

plant went offline for 3 months what

62:11

would be the impact to

62:13

society what if that largest

62:16

manufacturing facility for

62:19

insulin was offline for six months what

62:22

would the impact be right there's

62:24

there's much more stronger conse

62:27

consequences in the OT World especially

62:29

when we talk about critical

62:32

infrastructure now one of the most

62:34

overlooked aspects of cyber security in

62:38

the OT world and in it is this idea of

62:41

physical security because remember if

62:43

you can walk into an environment it

62:45

doesn't matter if it's a power plant or

62:46

if it's an office building but if you

62:48

can walk into an environment and you can

62:50

touch an asset you can almost always

62:52

completely control it there's some way

62:54

to you know reset an admin password or

62:57

there's some switch that you can use to

63:00

gain access or you can even at least you

63:03

know set it to factory defaults to where

63:06

you have control over that asset the

63:09

control has been lost by the the real

63:12

owners of the

63:13

organization so physical security is

63:16

very important and we'll talk a little

63:18

bit more about it as we go throughout

63:19

the course but it is one of those most

63:22

overlooked over L looked aspects of

63:26

cyber security because most cyber

63:27

security people just don't think of it

63:30

as their job or their

63:32

responsibility but again think if an

63:35

attacker can get into an environment and

63:37

touch the system they can own it and

63:39

they can do whatever they want or what

63:40

if they can come in and and just plug in

63:43

their laptop maybe running something

63:44

like C Linux into your network and then

63:47

be able to start scanning the network

63:49

for host and in vulnerabilities that

63:51

they could exploit to take control over

63:53

the networ

64:00

Network so we already started to

64:03

highlight right the differences between

64:04

it and OT and and the differences

64:07

between it and OT cyber security right

64:12

much different environments our goals

64:14

are much different remember in

64:17

OT our primary concern is always

64:20

ensuring physical safety of on-site

64:23

personnel and then sure the general

64:25

public that live in the area but we want

64:26

to make sure everybody on site goes home

64:28

at the end of the

64:30

day there's environmental safety right

64:32

we want to make sure the the environment

64:35

in which the site sits right is is

64:40

safe and

64:42

then we worry about or we're concerned

64:45

with the availability of the site right

64:46

making sure it stays up and running and

64:49

delivering what it was designed to do

64:51

and if I have that power plant I want to

64:52

make sure that the power plant stays up

64:54

and running generating electricity if I

64:56

have uh a Subway that I'm concerned with

65:00

right I want to make sure that the the

65:01

subway is moving people from point A to

65:04

point B safely and on on

65:08

Time those are the primary requirements

65:11

in in

65:12

OT when we talk about it cyber security

65:15

this is where we should talk about CIA

65:17

or confidentiality integrity and

65:20

availability right with confidentiality

65:22

we talk about and this is where you know

65:24

our main goal in it cyber security is to

65:27

prevent unauthorized disclosure or

65:30

access of our data we want to make sure

65:34

that an attacker that unauthorized party

65:37

does not gain access to our information

65:41

that's our number one goal by

65:43

far we also worry about or are concerns

65:47

in part with Integrity so making sure an

65:49

attacker doesn't come in and change

65:52

information to some something that in

65:56

some unauthorized fashion to change it

65:58

to something that it shouldn't be I just

66:00

think of the example if I'm Amazon I

66:02

don't want somebody to come in and

66:03

change the price of a $50 product to 5

66:06

cents and then allow somebody to buy a

66:08

thousand of

66:10

them that would violate the Integrity of

66:13

the

66:15

platform and then

66:18

availability right so we want to make

66:19

sure our system stay up and running so

66:22

the company can keep doing what theany

66:27

does a lot of people in it cyber

66:30

security Dirty Little Secret don't

66:31

really think of availability as their

66:34

job but when you think about it the

66:36

number one threat against it and OT

66:38

networks today is

66:41

ransomware and ransomware a big or a

66:44

significant part of its impact is

66:46

availability if it infects all of your

66:48

it and potentially all of your OT at

66:50

least your windows-based assets in the

66:52

OT Network

66:55

it has substantially impact the

66:57

availability of not only your it Network

66:59

and your business but also the OT

67:02

Network as well to where your your OT

67:04

environment is going to be shut down

67:05

it's going to be

67:07

offline and that is very much a cyber

67:10

security

67:15

responsibility in OT we talk about our

67:19

three primary concerns physical safety

67:22

environmental safety and then

67:24

availability of the

67:25

plant and then we can talk about

67:27

integrity right we want to make sure

67:29

that attackers aren't able to come in

67:31

and change or manipulate what we call

67:33

Process data so we're going to come back

67:34

and talk about the different control

67:38

processes and how we

67:40

generate data and we store it on data

67:43

historians we don't want an attacker to

67:45

be able to come in and change that data

67:47

whether it's on a control system asset

67:50

or if it's sitting stored on a data

67:52

historian

67:54

now many OT environments might not be a

67:58

a requirement might not be a concern

68:00

just like

68:02

confidentiality many OT environments

68:04

don't necessarily have confidentiality

68:07

concerns when it comes to their OT data

68:09

now if I have a propri proprietary

68:12

formula that I use to create let's say

68:14

some type of special

68:17

Fuel and only I have that formula I

68:21

definitely confidentiality is definitely

68:23

going to be very important for me and

68:25

we'll talk about how that factors into

68:27

OT cyber security but a lot of OT

68:29

environments maybe it's in manufacturing

68:32

and if someone was able to come in and

68:33

steal their information that shows how

68:35

many units of widgets they created for

68:38

the day they're probably not necessarily

68:41

concerned with somebody having access to

68:43

that

68:47

information so one thing to think about

68:50

or focus on is every OT environment is

68:55

different every OT environment is

68:59

unique we can say every it environment

69:02

is different but yeah every it

69:04

environment they're roughly kind of the

69:05

same right 95 probably percent of the

69:08

same as you go from it environment to it

69:10

environment OT environments are very

69:13

different so to truly understand what's

69:17

important you have to understand that

69:19

environment and you have to work with

69:20

the owners and The Operators to

69:22

understand what makes that environment

69:24

unique that's a big part of what we're

69:26

going to be talking about as we go

69:29

throughout the

69:32

course so just keep that in mind right

69:34

every OT environment is unique we'll

69:36

talk about some of those differences as

69:38

as we move along

69:41

but so the next part of the section

69:43

let's talk about the different types of

69:46

attackers

69:47

targeting OT

69:50

environments and we use or I at least

69:54

for myself I go back to the Colonial

69:56

pipeline breach that happened in

69:59

2021 the idea is before Colonial

70:02

pipeline we were

70:04

only the vast majority of the time

70:07

99.99% of the time we were worried about

70:10

nation state adversaries we were worried

70:13

about Russia we were worried about China

70:16

we were worried about the Americans or

70:19

the North Koreans or the Iranians or the

70:21

Israelis right breaking

70:25

in to our OT environments because it was

70:29

only the nation states that had the

70:31

capabilities and the want or the desire

70:34

to break into those environments for

70:37

whatever their their motives were we'll

70:40

talk about some of those in a few but

70:43

before Colonial pipeline before

70:45

2021 again the vast majority of the time

70:47

we were only worried about nation state

70:49

attackers or advanced persistent

70:52

threats so a lot lot of OT environments

70:55

they didn't worry about cyber security

70:57

before

70:59

2021 because they didn't see themselves

71:01

as targets by nation state actors and

71:06

and that could have been

71:09

true but today it's very different right

71:13

with Colonial pipeline remember it

71:15

wasn't a nation state adversary that

71:18

came into the OT Network and took the

71:21

United States largest gasoline pipeline

71:23

offline for 10

71:25

days it was a ransomware group and the

71:28

ransomware group wasn't targeting the

71:30

pipeline they were just sending out

71:32

emails to everyone in the

71:34

world to try and get someone to click on

71:37

a link or open up an attachment to

71:38

infect their computer and spread

71:40

ransomware within the it Network at

71:42

their company so that way they could get

71:44

paid for a ransom and they could move on

71:46

and then make more money somewhere

71:50

else so when Colonial pipeline happened

71:55

it was this watershed moment where all

71:58

of a sudden you have all the different

71:59

types of attackers out in the world

72:05

realizing that they could Target OT

72:09

environments and that they weren't as I

72:12

think you know

72:14

mysterious as they were kind of seen to

72:20

be that they weren't I mean they're not

72:23

not anything necessarily

72:26

special and that they look very much

72:29

like it

72:30

networks in fact you could like in the

72:33

colonial pipeline example you can infect

72:35

all the

72:36

it systems and it would have an impact

72:39

on the OT

72:41

Network that's this idea of it and OT

72:44

convergence right how we allow those

72:46

environments to talk to each other

72:48

because for the business and the

72:50

environment to function it needs that

72:52

communication

72:54

part of that communication goes down

72:56

then so does your OT environment that

72:58

that happens in a lot of examples we'll

73:00

talk about but like recently in the port

73:03

of ngoya which is the largest port in

73:06

Japan their it environment just like in

73:08

colonial pipeline became infected it

73:11

goes down their Communications went down

73:13

well with Communications down then your

73:16

OT Network goes down and you can't have

73:19

ships moving around you can't coordinate

73:21

things like um you movement of different

73:24

containers everything has to shut

73:27

down that's very true in in a lot of OT

73:30

environments no

73:31

Communications everything has to shut

73:33

down for safety purposes most

73:37

importantly so again in colonial

73:39

pipeline in 2021 it wasn't a nation

73:42

state that took down the largest

73:45

gasoline pipeline pipeline in the US it

73:47

was a ransomware group that they didn't

73:49

even know what they were

73:52

doing but since then every type of

73:55

attacker out there right understands

73:58

that they can Target OT environments and

74:00

that again they're not that difficult to

74:02

have an

74:05

impact now to get in an environment and

74:08

have some like real control or to even

74:11

potentially get to where you could cause

74:13

some type of explosion or kill somebody

74:16

that is extremely to almost you

74:19

impossible to pull off but to have an

74:22

impact where you shut down the

74:24

environment let's say for a week and a

74:26

half like with Colonial pipeline that's

74:28

easy to do we've we we've seen it we've

74:30

seen it multiple times even just over

74:32

the last year in very large OT

74:36

environments around the

74:38

world so now not only do we still have

74:41

to be concerned with the nation state

74:43

adversaries if we work in an environment

74:45

that could potentially be a

74:48

Target but we do we do worry about all

74:51

the other hackers

74:54

or attackers that are out there like the

74:56

ransomware groups and activists right

74:58

the the level of activity from activist

75:01

these days is at an all-time

75:03

high because when we look at things like

75:06

the current Russian invasion of the

75:08

Ukraine or now the conflict between

75:11

Israel and

75:14

Palestine not to mention the other

75:16

activist activity that we saw before

75:18

that including you know Iran Iranian

75:21

Alliant activist targeting

75:25

Israel and we'll talk about some of

75:27

these others like talk about cyber

75:29

mercenaries or lone wolves I think of

75:31

you know especially the nation state

75:32

actors that retire right they get out of

75:34

the military then what are they going to

75:36

do are they going to go into cyber

75:38

security and work for the forces of good

75:40

or are they going to go out on their own

75:42

and keep doing what they were doing for

75:44

their government but for the forces of

75:48

evil and script kitties are we use it as

75:51

a term for anyone that doesn't have any

75:56

cyber security or experience knowledge

75:58

or experience but they can go online

76:01

they can download a free tool they can

76:03

you know play around with it and maybe

76:06

launch an attack against an asset that

76:09

you might have exposed to the internet

76:11

accidentally and and they might get

76:13

lucky that's the idea of a a script

76:15

Kitty but you have there's there's also

76:18

a lot of people interested in hacking OT

76:20

environments today I mean this just has

76:23

exponentially ramped up even in just the

76:26

last few weeks not the last few

76:29

months so now as we come to the close

76:31

right now this is November

76:34

2024 or 2023

76:38

sorry right I I suspect in in another

76:41

year it's it's just going to be off the

76:44

charts it'll be a completely different

76:46

discussion when I uh re-record this for

76:49

next

76:50

year but keep in mind again it's up

76:53

until like two and a half years ago we

76:55

just worried about nation state actors

76:57

where now we have to worry about all of

76:59

the different types of attackers and

77:02

where that's partly important is up

77:05

until recently most owners and operators

77:07

never thought that their environments

77:09

were targets it's not going to happen to

77:11

us why bother we're not going to you

77:14

know we don't have to invest in cyber

77:16

security because no one wants into our

77:19

environment they don't want what we

77:21

have and that's some that's a big hurdle

77:24

that we have to get over working with

77:28

these environments and helping them

77:30

understand that we do need to implement

77:32

cyber security we do need to protect

77:34

these environments and you are an

77:36

attacker you might not be an attack you

77:39

know a target for Russia or China or the

77:42

Americans but you're a target from

77:45

activists or ransomware groups you're

77:48

definitely a tar everybody's a target of

77:51

ransomware groups

77:53

so just keep that in mind so the number

77:56

of attackers has

77:58

just exponentially gone up over the last

78:01

couple of

78:03

years now we'll start to see and this is

78:06

my

78:07

abbreviated version of OT cyber security

78:11

history or some of the big events that

78:13

have you know impacted OT networks over

78:17

the

78:19

years there's a lot more there's

78:21

probably 20 or 30 I could probably we

78:23

talk about but since you we only have so

78:26

much time I did want to at least make

78:28

sure to hit the the

78:31

highlights and so when we talk about for

78:34

me the first one I thought was of the

78:36

most interest even though some of these

78:38

can go back literally to the I think

78:42

1970s but we look at SQL Slammer was a

78:48

worm or virus that was designed to

78:51

infect micros moft SQL Server which is

78:54

an application that runs on Microsoft

78:56

Windows it's a it's a database

78:58

application and so if you didn't have

79:00

your database server patched and it was

79:03

connected to the

79:06

internet other infected systems would

79:09

hit it and then it would in turn become

79:11

infected and then it would try to spread

79:13

to other systems and infect those right

79:16

that's the idea of a worm it it

79:18

self-replicates by infecting other hosts

79:20

which then in turn infect other

79:22

vulnerable host and so on and so

79:26

forth and so it's what we call it's

79:29

built for a Windows based application or

79:32

operating system so it's what we call

79:34

commodity malware right it's a operating

79:37

system or application we see in every it

79:40

environment out there

79:42

everywhere we did not typically see them

79:45

as much in OT networks back then most

79:48

definitely today and we did see some and

79:50

obviously in this case they had a data

79:53

historian running Windows and SQL server

79:56

in the Davis Bessy plant right and

79:58

windows and and SQL servers the most

80:01

popular combination you see for data

80:03

historians where we store processed data

80:05

the data about what's happening inside

80:08

the plant come back and talk more about

80:11

that but in this case right we had

80:15

inside a power plant at Davis Bessie the

80:18

data historian had gotten infected with

80:22

this

80:23

commodity malware that was running

80:25

around the internet and the the big

80:27

kicker is Davis Bessy was a nuclear

80:29

power plant and so with nuclear power

80:32

plants this is where we talk about the

80:33

idea that nuclear environments are air

80:36

gapped the idea is that an air gapped

80:39

environment means that it is not

80:41

connected to any network at all not the

80:44

internet not a contractor network not a

80:48

remote vendor Network nothing there are

80:51

no network connections to anything

80:54

outside of the local

80:56

plant well then how did this worm from

81:00

the internet get into this nuclear power

81:03

plant that was supposedly air gapped

81:05

well obviously it was not air gapped

81:07

this is why you always hear a lot of

81:09

people talk about in OT there is no such

81:11

thing as an air gap because even if you

81:13

think you are you're

81:15

not in the case of Davis Bessie the one

81:20

of the contractors I think it was the

81:22

one that was responsible for running the

81:23

data historian they ran a T1 line they

81:26

ran a data line from the inside the

81:29

power plant to their office so when

81:32

their office which was connected to the

81:33

internet became infected with SQL

81:35

Slammer the worm came in over that T1

81:39

over the power plant and infected the

81:41

data historian and I think one or two

81:43

other systems so they had to take them

81:46

offline I don't think they actually had

81:47

to take off the take the plant offline

81:50

they just had to take a couple Systems

81:52

off off line for I think six seven or

81:54

eight hours rebuild them and they were

81:57

good to go so there were there were no

81:59

no safety issues there were no

82:01

availability or production issues

82:03

but I still find it absolutely

82:06

fascinating because we had a nuclear

82:08

power plant impacted by commodity

82:12

malware running around the internet

82:13

right that should never happen but

82:17

obviously it did and that was 20 years

82:19

ago and unfortunately we still see the

82:22

same thing happening 20 years

82:24

later so conficker which was a very

82:28

similar uh worm running around the

82:31

internet like SQL Slammer so you can see

82:34

in 2009 so that that happened as well

82:36

again I'm still very fascinated when you

82:38

have commodity malware designed for

82:40

Windows environments that's infecting OT

82:44

networks from over the internet right it

82:45

should not happen but it does it does

82:50

when we have poor cyber security

82:54

controls so we'll talk about in part

82:57

four right how do we protect against the

83:01

impact of SQL Slammer and conficker and

83:04

other commodity

83:06

malware now 2010 this this was the big

83:10

Watershed movement and it was for me

83:13

because at that point I had already been

83:15

working in it cyber security for the

83:18

better part of what 15 20 years but I

83:21

had never really and I quite sure I had

83:23

thought a little bit about OT cyber

83:26

security and I had heard about it a

83:28

little

83:31

bit but at the same time it it wasn't on

83:34

my

83:35

radar and then stuck it happened and I

83:38

was just in awe

83:41

of the Wonder right the techn

83:44

technological Marvel that that stuck net

83:46

was and still is

83:48

today and the idea is with Stu net you

83:52

know the United States government along

83:54

with the Israelis created stet to Target

83:56

the Iranian nuclear program right their

83:59

nuclear arms

84:00

program and that back in the the Bush

84:02

Administration the ideas was well we can

84:05

drop physical bombs on this Nan facility

84:10

where the Iranians had their nuclear

84:14

enrichment suer fuses right they would

84:16

enrich the uranium for to be able to

84:21

build nulear

84:23

bombs and so they could drop the bombs

84:26

on the facility and potentially kill

84:29

innocent civilians and scientists or

84:33

well what if we create a piece of

84:35

malware that can go in and destroy the

84:40

centrifuges behind the scenes and nobody

84:42

knew it so nobody would die but we would

84:47

still destroy the centrifuges which

84:49

would still set back the Iranians in

84:52

Ambitions for nuclear weapons for you

84:54

know 5 6 7 8 9 10

85:00

years so the United States and Israelis

85:03

built stuck net and stuck net was still

85:08

a technological Marvel for many reasons

85:11

but one of the things that it had done

85:12

was once it was brought into the

85:15

environment that not only did it you

85:18

move across Windows machines kind of

85:21

rather blindly because it wasn't being

85:23

remotely controlled because the

85:25

environment was air

85:27

gapped but once it was on the Windows

85:29

systems it found the controllers the

85:33

actual OT systems that were responsible

85:37

for controlling the Cent fusiones right

85:39

turning them on turning them off

85:40

spinning them up and making sure that

85:42

they spin at the the proper

85:46

speed I know I'm oversimplifying it but

85:49

you get the

85:50

idea and

85:53

so it would take control over these

85:57

controllers

85:59

and couple things that it did one was it

86:02

would record the Telemetry data of how

86:07

the centrifuges would normally operate

86:09

so what does a centrifuge look like when

86:12

it's operating

86:16

normally so that way when Stu net

86:20

started to tried to physically break

86:24

down the craes by spinning them up and

86:26

spinning them down and spinning them up

86:28

and spinning them down right it's using

86:30

physics against the the the assets

86:33

themselves right they would just

86:34

physically break down over

86:38

time what it would do was it made it

86:42

appear to the people sitting in the

86:45

control room that everything was fine so

86:48

people are sitting in the control room

86:49

watching a big screen with lights for

86:51

all the the centrifuges and all the

86:53

lights said oh everything's

86:55

good but behind the scenes the

86:58

centrifuges are spinning up and spinning

86:59

down and spinning up and spinning down

87:01

they're breaking down and they couldn't

87:03

figure out what was going on for months

87:05

and

87:06

months I still not sure people weren't

87:10

you know either going to jail or

87:12

potentially executed for for not

87:14

figuring this out in Iran

87:18

but I should laugh about

87:21

that

87:23

but so you have the operators in the

87:24

control room sitting there watching the

87:27

control screen and everything's

87:29

good but really behind the scenes right

87:32

everything's breaking down so that's

87:33

what we call a loss of visibility from a

87:36

cyber security perspective in OT we

87:38

can't see what's going on we think we

87:40

can but we can't it's like in the the

87:43

heist movies like I always think of you

87:44

like in Oceans 11 or other heist movies

87:47

where the thieves break into an

87:49

environment they tape right the the

87:52

video segment of um you know

87:57

CCTV and then they play it back so the

88:00

security guard who was watching the the

88:02

playback or the screen right everything

88:04

looks fine but behind the scenes right

88:06

the thieves are probably in the van The

88:08

Vault stealing the

88:09

money so it's the same thing stuck net

88:12

actually did that right he recorded the

88:14

Telemetry of how the cuses normally work

88:17

and played that back for the operators

88:19

so that way everything in the control

88:21

room looked perfectly fine when it

88:24

wasn't that was one of the beautiful

88:28

things about it but again it violated

88:31

right that that loss of

88:34

visibility and then there was also an

88:36

idea I think a loss of control right

88:38

because well we didn't even know

88:39

anything was wrong but if we did would

88:41

we even be able to make a change or

88:44

control those

88:46

cuses but the main focus there was that

88:48

that loss of visibility so we'll come

88:50

back and talk more about loss of

88:51

visibility and and loss of control but

88:55

high level that's that's stucks

88:58

net and that's what got me interested

89:00

into OT cyber security and started

89:04

asking you know a lot more

89:07

questions so we'll talk more about that

89:09

as as we go on so in 2015 so you see it

89:12

was five years I mean there again

89:14

there's some other things that happen

89:15

but not really any big events so in 2015

89:19

this is where the Russians

89:23

had gone in and turned off the power for

89:25

the ukrainians and so I should go back

89:28

to stuck it because this is one aspect

89:31

that we didn't talk about was this was

89:33

the first known case of you know one

89:36

nation state attacking another station

89:38

nation state with a cyber weapon and so

89:43

at the time it was really seen as

89:44

Crossing the Rubicon right or or the

89:47

idea that it was the the point of no

89:49

return because you had the Americans and

89:53

Israelis launch this against Iran I

89:55

think it was pretty obvious at the time

89:58

who the attackers were because of who

90:00

the target was and then you had other

90:04

nation states like Russia and China now

90:06

that you realize well the Americans and

90:09

Israelis can attack Iran and nothing

90:11

happens to them so okay well we'll do

90:14

that too and they also realized that wow

90:16

stet really was impressive and they

90:18

really needed to step up their

90:20

game think those were the the two big

90:23

things that

90:25

happened that's just me right I I was

90:28

not in the military or nor the

90:30

government so I'm sure there are a lot

90:31

of other layers there as well

90:34

but so stet was this first known case of

90:38

a cyber weapon used You by One Nation

90:41

State against another nation

90:43

state so then fast forward 2015 and this

90:46

is where the Russians had designed ICS

90:49

specific malware to go into a Ukrainian

90:54

power generation a power

90:56

plant and essentially infected a Windows

90:59

machine that was used to control the

91:00

breakers for power and Gotto the Windows

91:03

machine and used it to flip the breakers

91:07

off literally just turn the breakers off

91:09

turn the power off and then they wiped

91:11

the the machine so it had to be rebuilt

91:14

if you're going to try to turn the power

91:16

on again using the

91:18

computer but they did this they turned

91:21

the power off in the middle of the night

91:22

in the middle of winter in Kiev for you

91:25

hundreds of thousands of people and I

91:27

can only imagine what it was like being

91:29

if I was a father with little kids or

91:31

you know in the middle of winter in the

91:33

middle you know that's that would be

91:35

very concerning to say the

91:37

least but the ukrainians did recover

91:40

they actually fell back to manual

91:42

operations which means right instead of

91:44

being able to use computers to control

91:47

the the power generation and and

91:49

transmission they have to send people

91:51

out into the to the side and into the

91:54

field to manually flip Breakers so it's

91:57

not ideal right it's there's danger

91:59

there's risk that's you know associated

92:01

with that but at the same time they gots

92:05

power back on after I like six or seven

92:07

or eight hours and they ran on manual

92:09

operations I think the story goes by for

92:11

about six months before they were

92:12

comfortable enough to go back to

92:14

computer computerized

92:19

operations in 2016

92:22

the the Russians did the same thing to

92:24

the

92:25

ukrainians a year to to the date

92:28

essentially um slightly different uh

92:31

entity um so it wasn't the same uh Power

92:35

Generation facility but when in and turn

92:37

the power off you know less less people

92:39

you know same idea they went back to

92:41

manual operations but in the middle of

92:44

the night in the middle of winter just

92:46

to just to prove that they could do

92:49

it and allegedly maybe I heard you know

92:53

that maybe it happened also in 2017 as

92:55

well but it was much smaller scale and

92:58

nobody really wanted to talk about it

92:59

because it was such smaller scale and

93:03

that didn't want to make the ukrainians

93:04

look like oh it happened again so um

93:08

yeah definitely ukrainians have been an

93:11

understatement now these days I've

93:12

always said you know for the last

93:14

probably 15 or 20 years about Russians

93:16

picking on Ukraine obviously yeah vast

93:18

understatement these days with the

93:20

invasion

93:24

now in 2017 we also had what they call

93:28

the tcis or Triton

93:32

incident and so with the tcis incident

93:36

this is where the Russians had

93:39

compromised the sis or the Safety

93:42

instrumented Systems of a prochemical

93:44

facility run by Saud ramco in the Middle

93:48

East the Safety instrumented Systems

93:50

which we'll talk more about in the next

93:52

section but the idea is the sis is

93:54

access the fail safe backup for your

93:59

facility so if there's ever any type of

94:02

fault

94:04

condition from an engineering or a cyber

94:07

perspective that could Impact Physical

94:10

safety or environmental safety or the

94:13

availability of the plant that the sis

94:16

would shut down part of or the entire

94:19

facility to protect life and the

94:22

environment and and the plant

94:26

itself in the case of tcis that the

94:29

attackers had come in and they had taken

94:31

control they of the sis well they had

94:34

taken control like

94:38

99.99% over the trionics controllers

94:41

which is why it's called tcis by

94:45

dros and

94:48

that they had taken control like said 99

94:51

99% over control over the the

94:54

controllers and they had made one little

94:58

programming

95:01

mistake and because of that programming

95:04

mistake the sis just crashed and then

95:06

the operators realized something was

95:09

wrong so they brought in the vendor the

95:10

vendor realized something else much

95:13

nefar more nefarious was going on and

95:16

realized uh this this looks like a Cyber

95:19

attack you need to bring in you Dr goes

95:21

and mandian and and other OT cyber

95:24

security companies to investigate which

95:26

is what happened so the interesting

95:28

thing was I was actually taking Rob Le's

95:30

course at sanss the week this was

95:33

happening so as his you know as his team

95:37

was on the ground in the Middle East

95:41

doing this investigation and we were

95:43

kind of getting the the the play byplay

95:46

of of what was happening which was

95:48

really fascinating and really

95:50

interesting so but I share a lot of his

95:53

stories that he shares openly with the

95:56

class there's some that he um didn't

95:59

share is openly so do obviously I don't

96:01

share out of respect but um you know

96:04

we'll definitely talk a lot about some

96:06

other you know really interesting Rob

96:08

stories but you can imagine it was

96:10

pretty fascinating to be able to kind of

96:12

get that play byplay of what they were

96:14

finding as they were doing the tcis

96:17

incident uh response uh because and at

96:21

the time that I think everybody in the

96:24

OT cyber security Community was looking

96:26

at this is going to be the incident

96:27

that's going to make the world wake up

96:30

and they're going to understand that we

96:33

need to do something about securing our

96:36

OT environments from a cyber perspective

96:38

this is the one that's going to get us

96:39

all the budget and the support that we

96:41

need to secure our networks and it never

96:44

it never

96:45

happened but as rob you know likes to

96:48

focus on and he still talks about this

96:50

and a lot of his key notes and speeches

96:52

that he does and like when he goes to

96:53

talk in front of Congress and the United

96:55

States and other places like the world

96:57

economic forum and so he's you know well

97:00

on the global stage you know focus on

97:03

the only reason why an attacker would

97:06

take control over the sis is to kill

97:08

somebody or this idea that it's you're

97:12

going to blow up the plan which in turn

97:15

is is going to kill

97:17

people you that's and so it's still a

97:20

very serious

97:22

scenario or incident that occurred and

97:25

it just it doesn't it's not taken as

97:27

seriously as it should be

97:33

unfortunately so since tcis a lot has

97:36

happened actually uh even in just the

97:39

last six months when I'm recording this

97:41

at the end of

97:42

2023 but we do mention 2021 right in May

97:46

was colonial

97:48

pipeline so Colonial pipeline was an in

97:51

inent where it did make a lot of people

97:54

in OT stand up and realize o pay

97:57

attention right we need we need to do

97:59

something about cyber security which

98:01

which is amazing right so it was really

98:04

good um we still have a long way to go

98:07

and there still are some environments

98:08

out there that still have little to no

98:10

cyber security but many if not most

98:13

today are they're trying at least I

98:17

would say so they're not ignoring the

98:19

problem any longer which is

98:22

good so we talked a lot about Colonial

98:25

Pipeline and we'll talk about it some

98:26

more but for now uh 2022 you can see

98:30

also was interesting there's some other

98:33

things that happened as well but the big

98:35

one was pipe dream that was discovered I

98:38

think this was ideally probably designed

98:40

by the Russian nation state or

98:42

contractor working for the nation state

98:44

as this automated framework for

98:47

targeting and compromising OT networks

98:50

so if you're if you're familiar in the

98:52

IT world with Metasploit which is a

98:55

automatic framework to essentially you

98:58

point and click in a way to take control

99:02

over it machines right if an IT machine

99:05

is vulnerable it allows you to pretty

99:07

easily take complete control over those

99:10

systems pipe dream is kind of the OT

99:14

equivalent of metas

99:16

spit at a high level uh it's really

99:20

fascinating it's really these three main

99:22

components to it and uh we'll talk a

99:24

little bit about it as we go throughout

99:26

the course but but definitely a

99:28

Fascinate I wish I could actually see

99:30

what it looks like but dros doesn't

99:32

shown any any screenshots maybe someone

99:35

has some somewhere but um really

99:39

fascinating they've done some

99:40

demonstrations of showing you know using

99:42

it to take over some mocked up uh OT you

99:46

know lab environments like you know kind

99:48

of a simulated I think like a water

99:49

treatment facility if I remember

99:51

remember right was one and and there was

99:52

a couple others that they had uh talked

99:54

about at Defcon last year but um so it's

99:58

one of those to just to highlight the

100:00

different types of attack tools that are

100:02

out there and that nation state

100:04

attackers are still out there and they

100:06

are creating these tools and yeah this

100:10

one is is really devastating because it

100:12

really makes it very easy for an

100:15

attacker to get into an OT environment

100:18

and essentially take full control of

100:21

over that environment and the processes

100:23

running in the facility there's still

100:25

some work that they have to do

100:26

undoubtedly but it makes it so much more

100:30

easier on them and and there's really

100:33

interesting aspects to we'll talk again

100:34

we'll talk about later as we get into

100:37

into the course

100:39

but so this is a slide though that the

100:43

marketing team at Flor actually put

100:45

together and actually used it in one of

100:46

my presentations I did for the company

100:49

which is up on YouTube which I put on

100:50

the the link there in case anybody

100:52

interest interested so I talk about the

100:54

top 10 ways really the top five ways to

100:57

protect our OT

100:59

environments but the idea behind this

101:01

slide was that over time right and you

101:06

can see since 2010 there's been eight

101:09

known specific pieces of malware written

101:13

to Target control system environments

101:15

right they're not written for Windows

101:18

right they're not it's not commodity

101:19

malware it's you it's going to be a

101:21

nation state attacker with tremendous

101:23

resources riding malware that's

101:25

specifically designed to infect a

101:27

control

101:29

system

101:31

itself so we see stuck net back in 2010

101:34

and then over time you can see havocs in

101:37

2013 we talked about our Ukrainian

101:41

blackouts and so black energy 3 in

101:44

Destroyer which was also called crash

101:46

override so for all the hacker movie

101:48

fans out there uh we talked about tcis

101:52

right the safety instrumented system the

101:54

the fail safe

101:56

backup and then we see in Destroyer 2

101:59

which was where the Russians had

102:01

deployed malware in the Ukraine prior to

102:04

the current Invasion to cause a blackout

102:08

the idea was that they were I think the

102:10

idea or the thought is that the Russians

102:13

were going to turn off the power just as

102:15

the Russian tanks were rolling into the

102:18

country to launch the the current

102:20

invasion

102:22

well thankfully I think the ukrainians

102:23

and the Americans and you know other

102:26

parties realized this was going to

102:27

happen because that's pretty typical for

102:29

the Russians over the years so they went

102:32

and found the malware where it was

102:34

implanted before The Invasion started

102:38

and they removed it so they essentially

102:40

got it out of the environment so there

102:42

was no uh blockout in the current

102:48

Invasion

102:49

or so we

102:51

thought so actually last week mandian

102:56

had announced and shared that there was

102:58

a different blackout in

103:01

2022 uh so just as Russia was dropping

103:04

bombs on critical infrastructure they

103:07

did use malare to turn off well actually

103:11

I misspoke they did not use malare but

103:14

the Russians did turn off the power

103:15

using computers they actually used what

103:17

they call living off the land technique

103:19

so they didn't have to design

103:21

any specific malware to break into those

103:24

specific types of systems actually we're

103:26

just using the commands and the

103:28

functionality already built into those

103:30

operating systems so whether it was

103:32

Windows and moving from it to OT and

103:35

moving across those windows machines and

103:38

then they moved into this actual OT

103:40

specific system called micro skada that

103:43

was used to control essentially the

103:46

power and and they were able to use

103:48

those commands just to log in and and

103:51

turn the power off and then they wiped

103:53

the it environment again which is very

103:55

very Russian uh to

103:58

do but so there there was a power out it

104:02

so long story short um so there was

104:05

another piece of ICS malware in 2022

104:08

ended up not being used which was good

104:11

there still was a power outage uh but

104:13

didn't require IC malare which has its

104:15

own other applications which we'll talk

104:17

about again later we talked about that

104:19

pipe dream uh framework which is like

104:22

metas in the IT world and then there was

104:24

also 2023 where we found cosmic energy

104:27

which was a probably a tool designed by

104:30

a Russian government contractor more as

104:32

a training

104:34

utility um in part of you know cyber

104:38

operations against you can see Power

104:40

Generation and and

104:42

transmission why I what I was trying to

104:44

highlight with this slide is that

104:46

there's only been eight known pieces of

104:49

specific IC malare

104:51

in history that again that we know about

104:56

and the occurrences right as time goes

104:59

on they become more and more frequent

105:01

and the idea is that things are

105:03

escalating things are escal escalating

105:07

exponentially I think this is my

105:08

LinkedIn post for tomorrow because again

105:11

we've had more incidents and stories in

105:14

the last couple months let alone the

105:16

last couple weeks now a lot of them are

105:18

you know minor water treatment fac

105:20

facilities and pipelines that are

105:23

compromised and so the overall impact is

105:26

minimal but it's telling the

105:30

story that and it's just going to build

105:34

until unfortunately it's going to take

105:36

somebody dying or multiple people dying

105:38

before a lot more environments take it

105:41

as seriously as they should I hate

105:43

saying that but it's

105:46

true pisses me off for having to say it

105:49

honestly

105:53

but that's the kind of the point of this

105:55

slide right things are

105:57

escalating the need for cyber security

106:00

in OT is only escalating we cannot wait

106:04

our owners and operators cannot wait if

106:07

we want to ensure not only the safety of

106:10

the people at the facilities and in the

106:13

general public and the environment but

106:15

also you the availability of those

106:17

environments to make sure they continue

106:19

to do what they need to do

106:21

let's continue generating power and

106:24

let's continue moving the trains and our

106:26

minds dig gold out of the ground and our

106:28

hospitals still function and we're still

106:31

producing our our our glass

106:38

cleaner so the next part of the section

106:41

we're going to look at is it really it

106:44

kind of transitions to well how do we

106:46

start to protect our

106:48

environments so Isa

106:51

62443 is a

106:54

standard that was created by there's an

106:57

international group and we'll talk about

107:00

IEC and then Isa which is if you want

107:03

for now the American version of IEC

107:05

essentially right they came up with this

107:07

standard that helps explain how to

107:09

create a cyber security program for your

107:12

OT networks which we're going to and

107:14

we're going to talk about this and there

107:16

there are some other standards as well

107:17

so there's nist

107:19

882 now now this is a government that SP

107:23

or is a entity in the United States

107:26

that's essentially sponsored by the

107:27

United States government so it's very

107:30

well regarded if you're in the United

107:33

States but maybe not so much if you're

107:36

in Russia or China or you know in other

107:38

countries so I think most people

107:41

internationally look at

107:43

62443 really as the standard for how do

107:46

we build a cyber security

107:48

program for o versus nist but they both

107:53

have their their positives and their

107:56

their negatives undoubtedly and we'll

107:59

talk about both of them as we go

108:00

throughout but if you want you can start

108:03

looking at isa.org which is a um

108:06

Association for of

108:08

Engineers that you can join I think it's

108:11

like

108:12

125 us uh a year now and you can gain

108:16

access to the standards by being a

108:18

member um and and access to to some

108:20

other resources that that are great

108:22

we'll also talk well we talked about the

108:24

certification courses that they have in

108:26

the first section as well and we'll talk

108:28

more we'll definitely be talking a lot

108:30

more about 62443 as we go throughout but

108:33

you know for now at least that it it's

108:35

out there and it's that standard or it's

108:37

that that guideline if you want well

108:40

technically it's a standard but you can

108:42

use it as a guideline or framework to

108:45

build a cyber security program for your

108:47

OT Network for your OT environment

108:53

now I also am a big fan you and I've

108:56

mentioned that I come from an IT cyber

108:58

security background I've been working in

109:00

it cyber security for 25

109:03

years and so when we look at how do we

109:07

build a cyber security program or how do

109:09

we protect our it networks one of the

109:13

really one of the best things that I

109:15

thought when it first came out was

109:17

called the critical security controls

109:19

that some of you might be famili with

109:21

the idea is that the critical security

109:23

controls which was initially started by

109:24

the Sans

109:26

Institute basically came about by Sans

109:28

sending out you know a survey really to

109:31

a couple thousand cyber Security

109:32

Professionals and saying hey tell us

109:35

what you do to protect your network and

109:38

what you feel has the most impact to

109:41

reducing risk right what's going to have

109:43

the most

109:44

value in protecting your environment

109:47

don't tell me a hundred things tell me

109:48

like the top five or tell me the top 10

109:51

and tell me which ones of those right

109:53

which gives you the most value right the

109:55

idea is well what should I do

109:57

first and so they took all the the

109:59

responses back and they built out the

110:01

top 20 at the time critical security

110:06

controls and so the idea was you had

110:10

this

110:12

framework that had all these 20 controls

110:15

which is now down to

110:18

18 but you had this list of controls It

110:21

Was Written in really you know

110:24

straightforward easy to understand terms

110:26

even my 76y old mother could understand

110:29

it right so I was really impressed with

110:32

it from that perspective right so it's

110:33

really accessible and open to

110:36

people and then also it was a prioritize

110:39

list so you knew where to start and

110:42

where to go to next so if you had no

110:46

program today start at one and then go

110:48

to two and go to three or you you might

110:50

be working on one two and three all at

110:51

the same time and then you would go to 4

110:54

five6 or as time and resources like

110:58

money permit you would you do do more

111:00

and more but the idea is that the number

111:04

one item would have the most benefit in

111:08

reducing risk in the network so you want

111:13

to start there and what you would often

111:16

see the nice thing is that the less

111:20

expensive controls were also the ones

111:23

that reduce risk the most which is

111:27

awesome that's why when you look at

111:29

something like penetration testing which

111:31

is usually always at the bottom it's

111:33

because will it help you reduce risk yes

111:36

but not a lot it's really expensive so

111:40

relatively speaking I'm going to invest

111:42

my money elsewhere because I

111:45

get more for my

111:48

dollar right it's much better investment

111:51

right that return on investment like I

111:53

want to spend my money where I get the

111:55

most reduction in Risk

111:57

first so I created a version of this for

112:02

OT this is part of that that webinar I

112:05

had done for the office that's where the

112:06

screenshot comes from actually slightly

112:08

updated these so I probably should

112:10

update this slide but and I have 20

112:13

controls but you can see 10

112:16

here a lot of what we're going to talk

112:17

about going through the course but is

112:20

emulates this cuz the number one control

112:23

which we've already talked about earlier

112:24

in this part was the best way to reduce

112:28

risk the vast majority of risk that you

112:30

have from a cyber security perspective

112:32

in your OT environment is secure network

112:36

architecture remember allow ot to send

112:40

data to it do not allow it to reach into

112:43

the OT Network though to get

112:45

it because if you do an attacker will

112:47

find that path and they'll use it

112:49

against you

112:51

if it is not allowed to talk with OT

112:54

you've just reduced the vast majority of

112:57

risk in the

112:58

environment not all of the risk but the

113:01

vast majority of

113:03

risk and Rob Lee has stressed that I've

113:06

talked with you know nation state

113:08

attackers from the American side of

113:11

course that also have they don't say

113:14

anything but like they'll nod or shake

113:16

their head to kind of indicate if I'm on

113:19

the right track or

113:20

know cuz I want to know well what's like

113:22

the one thing I can do that would really

113:26

you know either stop or deter or piss

113:28

off right a nation state attacker don't

113:31

allow it to talk with you know OT it's

113:35

as easy as that even though again it's

113:37

not as easy as that because you just

113:40

can't Implement that in every

113:41

environment

113:43

unfortunately but that's the idea of you

113:46

taking this approach okay I want a

113:49

simple list but I want to prioritize

113:51

list to where do I start and build it

113:53

from

113:56

there so to wrap up a couple of last

113:59

things and these are some great

114:00

resources that come from from Rob Lee so

114:04

one and this was all taken to

114:07

consideration when I created you know my

114:09

my format for the program there and this

114:12

goes back to they talk about the sliding

114:14

scale of cyber security and there's you

114:17

can see you can get the the paper from

114:18

Sans well worth and it's not a long read

114:22

but this idea that again let's look for

114:25

what controls we can Implement in the

114:27

environment what gives us the most risk

114:31

reduction right what's going to give us

114:33

the best benefit what's going to stop

114:35

the attackers more effectively than

114:37

anything else and let's start there

114:40

right so we start with secure network

114:41

architecture again we'll have an entire

114:43

section on

114:46

that and then build from there and then

114:50

we can talk about things like passive

114:52

defense right where we deploy things

114:54

like intrusion

114:55

detection and then active defense where

114:57

we have analysts that respond to

115:01

alerts and then we can invest in things

115:03

like cyber thread intelligence which can

115:06

help us reduce risk it's just very

115:09

expensive and then things like

115:11

offensive capabilities like penetration

115:13

testing again is there risk reduction

115:16

yes but it's not as much as the other

115:18

categories and it could be just as

115:22

expensive if not a lot more

115:25

expensive he's not saying don't do these

115:27

things it's just do these things last do

115:30

the basics first do the fundamentals

115:33

first to protect the

115:36

environment to reduce the risk as much

115:38

as possible and then we just keep

115:40

improving over time we just keep doing

115:42

more as time and money and other

115:45

resources allows us

115:48

to

115:51

and then here's a different look at that

115:53

we're building in the the cost right

115:56

because I always focus on where do I

115:58

bring value to the organization where do

116:00

I bring you know whether it's at floor

116:04

in my day job or with the other clients

116:06

I have outside of that or anything I do

116:09

right where's the value where am I

116:10

bringing value and if I have the choice

116:13

between doing two different things and

116:15

one brings a tremendous lot amount of

116:17

value and one brings a little amount of

116:20

value well I need to be focused on the

116:21

thing that brings the most

116:27

value and so that's you know kind of

116:29

this idea of looking at yeah where's the

116:31

return on investment let's focus on

116:33

those things that bring the most value

116:35

which means that bring us the most risk

116:38

reduction what's going to cause the most

116:39

trouble for the attackers again this is

116:42

where the beautiful thing in OT is we

116:45

talk about secure network architecture

116:47

brings the most risk reduction

116:50

and it also has the least amount of

116:52

cost so that's a win-win that's a

116:57

not I want to say it's an easy sell to

116:59

the owners and operators doesn't always

117:02

mean you're going to get budget but when

117:05

you can talk about the vast majority of

117:07

risk you can reduce by investing the

117:11

smallest amount possible as compared to

117:14

all these other types of

117:17

controls then yeah why not not that's a

117:20

pretty straightforward case to be able

117:22

to make and actually get some budget to

117:26

to be able to do some

117:29

things and I could talk a couple more

117:32

hours on that but with that we'll uh

117:35

we'll wrap up this section so that

117:37

wrapped up it was good you know two

117:39

solid hours for this part so I

117:41

appreciate everybody for tuning in uh if

117:43

you did like this if you can do me a

117:45

favor and like it on YouTube or

117:47

subscribe I would appreciate it gives me

117:49

a little bit better understanding of how

117:51

people are taking it and I will see you

117:55

uh shortly for part three all right take

118:00

care

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.