When the OT network was connected to the IT network, safety online became a serious concern for any organization using the same controllers found in power plants and electric grids.
Whether it’s the CIO of a large pipeline manufacturer, an award-winning SCADA/Automation leader for a major US city, the CISO of one of the largest cement producers in EMEA or the head of automation for one of Washington State’s power and water utilities, it’s vital that we all understand the new threats that have emerged for critical infrastructure and the ways to own, secure and protect against them.
Indegy, a leader in industrial cyber security, and a new Finalist in the 2019 ‘ASTORS’ Homeland Security Awards Program, in an effort to support this education, is releasing a series of videos in October that supports National Cybersecurity Awareness Month (NCSAM), an initiative launched in 2004 by the National Cyber Security Alliance & the U.S. Department of Homeland Security.
(Hear directly from John Roosa, CIO at Stupp Corporation. Own OT. Secure OT. Protect OT. Courtesy of Indegy and YouTube. Posted on Oct 1, 2019.)
Indegy is dovetailing with NCSAM’s theme “Own IT. Secure IT. Protect IT.”, by releasing a series of videos featuring industrial cyber security executives who are pioneering new approaches to “Own OT. Secure OT. Protect OT.”
These leaders are paving the way for Industrial Cybersecurity as a means of protecting their very critical assets and constituents.
(Hear from Roy Shalev, CISO at Nesher Cement Enterprises and he shares his insights. Own OT. Secure OT. Protect OT. Courtesy of Indegy and YouTube. Posted on Oct 8, 2019.)
“Once OT networks were connected to IT networks, the traditional air gap, or safety by obscurity model was irrevocably broken,” explained Barak Perelman, CEO of Indegy.
“We need to recognize that the same controllers found in power plants and electric grids are also used in virtually every industrial sector — automotive, pharmaceutical, transportation, food and beverage, building management systems, and many others.”
“Therefore a malware campaign that targets these devices could have devastating impacts for every industrial sector and ultimately impact society.”
This is a great opportunity to hear from the front lines of OT cyber security, as industry leaders share their insights on the new threats to critical infrastructure and the steps they are taking to own, secure and protect against them.
(Steve Worley, SCADA Security Manager at the City of Raleigh, NC shares his insights. Own OT. Secure OT. Protect OT. Courtesy of Indegy and YouTube. Posted on Oct 15, 2019.)
Indegy Industrial Cybersecurity Suite
The Indegy Industrial Cybersecurity Suite is powered by patented technology that arms both IT security and operations teams with full visibility, security and control of ICS activity and threats.
The Indegy Suite combines hybrid, policy-based monitoring and network anomaly detection with unique device integrity checks to provide real-time situational awareness and visibility into ICS networks, along with behavioral anomaly detection with policy based rules for comprehensive threat detection and mitigation, and unique visibility into asset inventory.
Indegy also completely interoperates with common IT security products such as industry leading NGFWs, SIEM, NAC and other products to create an ecosystem of trust that spans both IT and OT environments, many of which are in the process of converging.
Indegy was awarded patent #10,261,489 from the USPTO for proprietary software technology that is able to detect misconfigurations and hostile attacks in industrial control networks using active querying.
This patented invention is part of the Indegy Industrial Cybersecurity Suite, and is now the first product that can provide both active and passive detection of threats in ICS based environments.
(Indegy brings all of the best elements of your IT cybersecurity tools into the OT environment. When it comes to choosing a winning strategy for protecting your critical infrastructure, you can’t settle for less. Courtesy of Indegy and YouTube. Posted on Apr 10, 2019.)
While most solutions can provide passive-only detection, Indegy’s unique combination of both active and passive threat detection provides complete visibility into all operational network activity, including changes made directly on control devices that elude competitive approaches.
The Indegy Industrial Cybersecurity Suite automatically discovers all controllers on ICS networks, monitors all access and changes in real-time, and validates their integrity ensuring no unauthorized changes go undetected.
It also provides end-to-end network threat visibility across multiple sites with centralized management to enable organizations to protect their operations anywhere in the world.
The level of visibility, security and control provided by Indegy is more accurate and would take months of man hours to achieve using current approaches, which are largely manual.
The Indegy Industrial Cybersecurity Suite identifies cyber threats faster by understanding proprietary protocols and by combining active device integrity checks and behavioral anomaly detection with policy-based rules.
Unlike competitors, Indegy provides comprehensive visibility into asset inventory, even identifying dormant and off-line devices, which is essential for quickly identifying affected assets when a vulnerability is discovered.
The Indegy Suite identifies and validates changes, whether they are made locally on a device or over the network and provides rich context for cyber threats and a comprehensive audit trail.
(See this short video, the first in a series of OT Security lessons, on the top threats to Industrial Control Networks, produced by Indegy. And go to https://www.youtube.com/channel/UCkTjnf23HG8mFro1NWQUlnQ to See More in the series. Courtesy of Indegy and YouTube. Posted on Jul 23, 2019.)
The Indegy Industrial Cybersecurity Suite can be delivered as an all-in-one turnkey appliance (VM optional) that plugs into a centrally located switch in the ICS network.
This simplified, agentless deployment model enables lower total cost of ownership and quick implementation with zero-impact to the network and no operational disruptions.
The platform features out-of-the-box integration with third-party enterprise solutions as well as an extensive and easy-to-use RESTful API, allowing users to extend security and incident management practices across IT and OT environments.
Optional Indegy Sensors support complex multi-segment network architectures, using compact rack mount or DIN-rail mount form factors.
Finally, Indegy Enterprise Management provides multi-site support for enterprise-wide visibility and control.
Winners to be Announced at the ‘ASTORS’ Awards Banquet/Luncheon at ISC East – Register Today
The Annual ‘ASTORS’ Awards Program is specifically designed to honor distinguished government and vendor solutions that deliver enhanced value, benefit and intelligence to end users in a variety of government, homeland security and public safety vertical markets.
The highlight of the 2019 AST Homeland Security Awards Program will be the ‘ASTORS’ Awards Presentation Luncheon at ISC East, November 20, 2019 in the Jacob Javits Exhibition Center, from 12:00pm – 2:30pm, featuring keynote address by Bill Bratton, former police commissioner of the NYPD, BPD, and former chief of LAPD.
The 2018 ‘ASTORS’ Awards Program drew an overwhelming response from industry leaders with a record high number of corporate and government nominations received, as well as record breaking ‘ASTORS’ Presentation Luncheon Attendees, with top firms trying to register for the exclusive high – end luncheon and networking opportunity – right up to the event kickoff on Wednesday afternoon, at the ISC East registration!
Over 130 distinguished guests representing National, State and Local Governments, and Industry Leading Corporate Firms, gathered from across North America, Europe and the Middle East to be honored among their peers in their respective fields which included:
- The Department of Homeland Security
- The Federal Protective Service (FPS)
- Argonne National Laboratory
- The Department of Homeland Security
- The Department of Justice
- The Security Exchange Commission Office of Personnel Management
- U.S. Customs and Border Protection
- Viasat, Hanwha Techwin, Lenel, Konica Minolta Business Solutions, Verint, Canon U.S.A., BriefCam, Pivot3, Milestone Systems, Allied Universal, Ameristar Perimeter Security and More!