a steven briggs story - sans institute · a steven briggs story. power operations cyber security...

14
A Steven Briggs Story

Upload: others

Post on 21-May-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other

A Steven Briggs Story

Page 2: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other
Page 3: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other
Page 4: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other

Power Operations Cyber Security Risk Profile• Nation States Highly Skilled Hackers

• Insider Threats Trusted VendorsAttackers

• Establishing external connectivity Compromised machine

• Removable Media Combined physical and cyber Means

• Destroy capabilities Degrade capabilities

• Publicity Customer impactMotive

• Insider Threat Outside Connections Process Failures

• Unstaffed sites VisitorsOpportunity

• Cause loss of life Damage our assets Security protections gap Impacts reputation Difficult to regain control Regulatory failureBusiness Impact

MitigationsLimited External Connections Security Conscious Staff Engaged System Owners

Regulatory Controls Security Monitoring Service Security Assessments

Physical Security Protections Diversity in hardware/software Customized configurationDocumented repeatable processes Built in security checks and balances Fear

Page 5: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other

Define

Identify / Locate

Classify

Document

Protect

Review

Power Operations Data Protection Process

Page 6: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other

Automating your reoccurring items

Page 7: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other

Plants will work with out computers

Computer Remote Analysis Programs

Page 8: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other

Learn the system geography and site importance

http://emilygrubert.org/wp-content/uploads/2019/01/eia_860_2017_map_upload.html

Page 9: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other

Learn the network configuration

Page 10: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other

Develop a long term plan

Page 11: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other

Bring your knowledge of helpful IT appsRules!

• The current process works.

• Technology doesn’t always work given the conditions in the field.

• Understand the business function that is going on before you suggest tech.

• Approach in a supportive manner.

Page 12: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other

Go back and tell your friends

Page 14: A Steven Briggs Story - SANS Institute · A Steven Briggs Story. Power Operations Cyber Security Risk Profile •Nation States Highly Skilled Hackers ... Gathering Support From other

Questions

Steven BriggsSenior Program Manager I&C systems Generation Cyber SecurityTennessee Valley Authority• E-mail: [email protected]• Twitter: @tnvolsfan29