Critical Infrastructure Protection & Resilience Europe

NHS cyberattack: NCSC warns ‘significant’ ransomware attack could hit as UK returns to work

The NHS cyberattack that hit hospitals across the UK is said to have been part of the biggest ransomware outbreak in history, according to Mikko Hypponen from F-Secure, and it could ramp up again this week as people return to work.

Hypponen said the Wanna Decryptor attack was unprecedented, while cyber security expert Varun Badwhar said it gave a glimpse of what a “cyber-apocalypse” would look like.

“We’ve never seen something spread this quickly in a 24-hour period across this many countries and continents,” explained Badwhar. “So it’s definitely one of those things we’ve always heard about that could happen and now we’re seeing it play out.”

The NHS hack was said to be “creeping” across the UK over the weekend with reports of the ransomware attack hitting a range of other organisations in as many as 99 countries. It then appeared to start slowing down on Saturday after a security researcher says he “accidentally” hit the kill switch on the ransomware.

READ MORE

Responding to UN Security Council call to protect ‘critical infrastructure’ from terrorist attacks

The UN Security Council recently urged joint measures to protect ‘critical infrastructure’ from terrorist attacks

Given the importance of critical infrastructure for a country’s prosperity and security and against the backdrop of increasingly diverse physical and cyber threats from terrorist groups, the United Nations Security Council underlined the need for international collaboration – both domestically and across borders – to ensure their protection.

In a resolution adopted unanimously the 15-member Security Council reiterated “the need to strengthen efforts to improve security and protection of particularly vulnerable targets, such as infrastructure and public places.”

Attacks against objects and sectors such as banking and finance, telecommunications, emergency services, air, maritime and rail transportation, and energy and water supply – perceived as ‘attractive targets’ for terrorist groups – can result not only in civilian casualties, but also damage property on a large scale, disrupt proper functioning of public services, and create chaos in societies.

It called upon UN Member States “to share information […] to prevent, protect, mitigate, investigate, respond to and recover from damage from terrorist attacks on critical infrastructure facilities, including through joint training, and use or establishment of relevant communication or emergency warning networks.”

Critical Infrastructure Protection and Resilience Europe conference and expo will take place in The Hague from the 9th to 11th May 2017, and has launched its Preliminary Conference Programme, discussing the hot topics and issues facing the industry.

The event is Europe’s leading conference where CIP professionals from across Europe and beyond will gather once again to discuss and collaborate on securing Europe’s critical national infrastructure.

The Preliminary Conference Programme and further event details can be downloaded at www.cipre-expo.com.

The event is supported by The Hague Security Delta, the Municipality of The Hague, the International Association of Critical Infrastructure Protection Professionals (IACIPP), Organisation for Security & Cooperation in Europe (OSCE), Institution of Engineering & Technology, European Network for Cyber Security (ENCS), National Security & Resilience Consoirtium, Confederation of European Security Services, Security Partners Forum and International Security Industry Organisation.

Registration is now open where delegates can benefit from the Early Bird Savings. Register online at www.cipre-expo.com/onlinereg.

Heighted Security Threat at Airports and Nuclear Power Stations

According to a report in the UK’s Sunday Telegraph, Britain’s airports and nuclear power stations have been told to tighten their defences against terrorist attacks in the face of increased threats to electronic security systems.

This comes as no surprise to those charged with securing critical infrastructure. Airports are constantly under threat but a successful attack on a nuclear power station is a threat of a whole new order. And targeting nuclear power is not just a threat, because we already have an example in last years foiled attempt to infiltrate Belgium’s Doel nuclear power plant.

Terrorists have the time, the resources and the element of surprise, when it comes to choosing a potential target. And when it comes to nuclear power, they only have to be successful once and they could devastate half of Europe for generations.

Next month some of the leading voices in critical infrastructure will gather again in The Hague to discuss the emerging and future threats and how to counter them at Critical Infrastructure Protection and Resilience Europe (CIPRE) 9-11 May.

Also on the agenda will be convergence in CIP and CIIP, critical infrastructure interdependencies, public private partnership, successful risk management and resilience, transport and energy security & building in resilience and enhancing preparedness and response capabilities.

CIPRE has unique two-track conference programme delivered by a leading line up of international experts to discuss securing Europe’s critical infrastructure, from both physical and cyber perspectives.

Critical Infrastructure Protection
With much focus on convergence, the CIP track of the programme delivers discussions to review the potential threats to critical infrastructure, smart construction and building in security resilience, and a focus on ‘Transport, Energy & Telecomms Infrastructure’, three key elements of a countries economic activity.

Critical Information Infrastructure Protection (Cyber)
With the ever-increasing threat from cyber-attacks on critical infrastructure, the information and data stored and used by CNI systems and operators can be more crucial than the system itself. CIIP is becoming ever more important as part of the cyber security strategy of an organisation or CNI operator.

Speakers confirmed include keynote presentations from Dr. Timo Hauschild, Head of CIP section of the Federal Office for Information Security (BSI), Germany and Colonel (GS) Wolfgang Paulik, Director of the Civil-Military Cooperation Centre of Excellence

Latest speakers also include:

  • Ms Michèle Coninsx, President, Eurojust
  • Per Brekke, Deputy Director, The Norwegian Directorate for Civil Protection
  • Catherine Piana, Director General, CoESS – Confederation of European Security Services
  • Drew Williams, Principal Security Solutions Architect, Leidos (formerly Lockheed Martin), USA
  • Philip Rydén, Chief Security Officer, E.ON Sverige AB
  • Gonzalo Martin de Mercado, Studies manager, Integrated Applications, ESA – European Space Agency
  • Konstantinos Moulinos, CIIP Project Manager, ENISA
  • Ben Govers, Senior Advisor / Project Manager, Dutch Ministry of Security and Justice, Netherlands
  • Jaya Baloo, CISO, KPN, Netherlands

For the full programme, list of speaker and registration visit: http://www.cipre-expo.com/

Cyber Weapon Market to Expand at 4.4% CAGR from 2015 to 2021, Need to Safeguard Critical Information Propels Market

Cyber Weapon Market is driven by rising demand for advanced cyber warfare techniques, North America leads the global cyber weapon market, cyber weapon market is attributed to increasing need for security in critical infrastructure and utilities including national defense system.

This press release was orginally distributed by SBWire

Identifying zero day vulnerabilities is of utmost importance for governments to prevent them from being used by extremist groups for infiltrating a nation’s critical infrastructure. This is a primary factor fuelling demand from the global cyber weapon market, states Transparency Market Research (TMR). Cyber weapons developed by hackers are aimed at exploiting confidentiality. However, depending on the method of use, they can be classified as either defensive or offensive cyber weapons. Both these market segments are presently gaining from the increasing demand for identifying zero-day vulnerabilities.

When used for offensive purposes cyber weapons can lead to mass destruction. Due to growing threats associated with cyber weapons, various international organizations have described them as malicious codes. Stringent regulations are thus being implemented to curb their use against the human race. This factor is likely to inhibit the market’s expansion to an extent. Nevertheless, in regions such as North America, governments are proactively investing in the development of advanced cyber weapons to protect their critical utilities. This will create new opportunities for growth for the market in the near future.

According to TMR, the global cyber weapon market was valued at US$390 bn in 2014. Exhibiting a CAGR of 4.4%, the market is expected to reach US$521.87 bn by the end of 2021.

Demand from Defensive Cyber Weapon Segment to Increase due to Rising Cases of Cyber Espionage

Based on type, the global cyber weapon market has been fragmented into defensive and offensive cyber weapon segments. In terms of revenue, the defensive cyber weapon held the larger share of 73.8% in the market in 2014. The increasing cases of cyber espionage have compelled governments and private organizations to focus on technologies to safeguard their critical infrastructure. Since information technology is integral to industries such as manufacturing, defense, and aerospace, they are more vulnerable to cyber thefts. The demand for defensive cyber weapons is therefore expected to continue to surge through the forecast period.

The offensive cyber weapons segment is currently at a premature stage. However, TMR expects the cyber weapons market to gradually shift from defensive to offensive weapons. Nations around the world are strengthening their offensive cyber capabilities due to the emergence of cyber as new platform for warfare. However political and legal issues associated with offensive cyber weapons have compelled governments to implement stringent regulations to ensure non-proliferation of offensive cyber weapons. This has a negative impact on the segment.

Rising Cyber Attacks Compelled Governments in North America to Invest in Cyber Weapons

From the geographical standpoint, North America dominated the global cyber weapons market with a share of 36% in 2014. TMR forecasts the region to maintain its dominance in the market through the forecast period. The Internet is the backbone of critical infrastructure such as industrial control, air traffic control systems, and military defense in the U.S. The country has witnessed several attacks on its critical infrastructure in the past. Its government is therefore investing in developing novel technologies to prevent future cyber-attacks on such critical utilities. Such developments will significantly aid the expansion of the cyber weapons market in North America.

In 2014, Asia Pacific was another key market for cyber weapons. The rising demand from countries such as India, China, North Korea, Australia, South Korea, and Japan will boost the cyber weapons sales in the region. Furthermore, the increasing investment by China in the development of advanced cyber warfare technique will significantly aid the market’s expansion in Asia Pacific.

Critical Infrastructure Protection Market worth 144.82 Billion USD by 2021

According to a new market research report “Critical Infrastructure Protection Market by Security Technology (Network, Physical, Radars, CBRNE, Vehicle Identification, Secure Communication, SCADA, Building Management), by Service, by Vertical & by Region – Global Forecast to 2021”, The critical infrastructure protection market size is estimated to grow from USD 102.47 Billion in 2016 to USD 144.82 Billion by 2021, at an estimated CAGR of 7.16% from 2016 to 2021.

Government regulations & practices and increasing number of cyber threats are driving the implementation of CIP solutions and technologies. Organizations, whether public or private, are adopting technologies to protect their critical infrastructure against malicious objects, make quick response to block suspicious activity, and safeguard both cyber & physical systems.

Physical security technology to play a key role in the critical infrastructure protection market

Physical security technology is expected to have the largest market share in the critical infrastructure protection market during the forecast period as threats to physical assets, incidence of terrorist attacks, and government regulations have made it mandatory. Also, there has been increased budget allocation to implement physical security systems and technologies to secure properties, resources, and society.

Sensitive infrastructure and enterprises vertical contributes the maximum market share

The sensitive infrastructure and enterprises vertical which includes Banking, Financial Services, & Insurance (BFSI), government facilities & defense establishments, stadiums, holy places & public places, communication systems, and chemical & manufacturing sectors is expected to contribute the largest market share in the critical infrastructure protection market. As these subsegments are major contributors to a nation’s infrastructures and the most critical assets present, the vertical has the largest share in the critical infrastructure protection market. The CIP solution allows such sensitive infrastructures to provide security and safety to their customers.

North America expected to contribute the largest market share; Middle East and Africa to grow the with the highest rate

North America is expected to hold the largest market share in the critical infrastructure protection market from 2016 to 2021, due to strong government regulations and best practices building many associations to take care of critical infrastructures, for example the North American Electric Reliability Corporation (NERC). Middle East and Africa is the fastest-growing region for the global critical infrastructure protection market due to growth in the number of sensitive infrastructures and organizations in the region. This in turn leads to high growth rate in security needs for their critical infrastructure so as to have resilience against cyber attacks or block unauthorized access and threats/attacks.

Critical infrastructure protection market report categorizes the global market by security technology as network, physical, radars, CBRNE, vehicle identification, secure communication, SCADA, building management, by service, by vertical and by regions.

READ MORE 

 

Istanbul Ataturk airport attack: 41 dead and more than 230 hurt

A gun and bomb attack on Istanbul’s Ataturk airport has killed 41 people, at least 13 of them foreigners, and injured more than 230, officials say.
Three attackers arrived in a taxi and began firing at the terminal entrance late on Tuesday. They blew themselves up after police fired back.
PM Binali Yildirim said early signs pointed to so-called Islamic State but no-one has so far admitted the attack.
Recent bombings have been linked to either IS or Kurdish separatists.

READ MORE >>

Imagining the worst for Europe’s riskiest assets

Dams are designed and built to withstand any natural disaster, but since Fukushima Europe’s researchers have been looking more closely into the risks for our vital installations.

Take a hydroelectric dam in Switzerland. It is 83 meters high and classed as “critical” infrastructure. In other words, it is essential for the proper functioning of society. It has been designed to be as safe as possible, with integrated security monitoring. This kind of large dam has never failed, but nonetheless zero risk does not exist.

READ MORE >>

The Cyber Attack on the Ukrainian Electrical Infrastructure: Another Warning

For some time, security experts have warned that critical services – for example, electricity and water supplies – can be attacked through cyberspace. The assumption is that such action requires sophisticated capabilities in cyber intelligence, technology, and operations, and possession of such capabilities is usually attributed to countries that have invested heavily in their development. Until now, even if in possession of such capabilities, most countries have shown restraint in using cyber tools to materially disrupt essential services and critical infrastructure in enemy countries. Events in Ukraine, however, question whether this assumption of restraint is still valid.

On December 23, 2015, malfunctions were reported in portions of the electrical network in western Ukraine, after the operations of 27 distribution stations and three power plants were disrupted, causing the electricity supply system to crash. Many homes were cut off from the network. This was not a routine power outage: the Ukrainian authorities believe that a cyber attack originating in Russia caused the malfunction, and the Security Service of Ukraine (SBU) has blamed Russia specifically for the power outages.

It is difficult to prove with certainty who was behind the attack, but presumably the relevant authorities in Ukraine, with the help of Western agencies, will ultimately uncover the attacker’s identify. The Ministry of Energy in Kiev has appointed a committee to investigate the affair. Thus far assessments concerning the party responsible for the attack are based on forensic examinations carried out on the damaged computers, which indicates that components in them were previously used by Russian groups. Furthermore, not surprisingly the technological capabilities point to a Russian element.

READ MORE >>

UK and Israel to extend cyber defence co-operation for national infrastructure

The U.K and Israel are to extend their co-operation in defending national infrastructure installations from cyber attack, the government has revealed.

Minister for the Cabinet Office Matt Hancock MP made the announcement this week during a visit to Israel, led by UK Israel Tech Hub, in which he said idea-sharing between academics from both countries would start this summer.

“The UK’s world-class companies and universities combined with Israel’s cutting-edge technology and entrepreneurial culture is an unbeatable combination,” said Hancock. “I welcome this opportunity to forge ever-closer links in the field of cyber security with our Israeli partners.”

Israel and the UK have dedicated more time and effort to countering the cyber threat in recent years, as countries’ critical infrastructure systems grow increasingly complex and interconnected, making them vulnerable to cyber attack.

READ MORE >>

Cambridge Pixels VSD Security Software Aids Threat Detection at Airports & Coastal Facilities

pr-vsd_2Cambridge Pixel has unveiled a security and surveillance display application, called VSD, designed to improve target detection at airports, airbases and coastal facilities such as harbours and naval bases.

The sensor-independent VSD software runs on a standard Windows PC and integrates and displays data from multiple radars and up to 16 daylight/thermal cameras. It also incorporates radar/video tracking technology, track fusion as well as support for ship (AIS) and aircraft (ADS-B) transponders to filter out authorised targets and thereby speed threat detection.

David Johnson, CEO of Cambridge Pixel, said: “VSD has been designed as an intuitive front end to a sophisticated multi-sensor surveillance system with key features including automatic radar slew-to-cue, video tracking, and transponder technology built-in.”

VSD’s ability to combine or fuse primary radar tracks with secondary data from transponders fitted to commercial/military aircraft (ADS-B or Automatic Dependent Surveillance – Broadcast) and marine vessels (AIS or Automatic Identification System) is an important feature in Cambridge Pixel’s software.

“This capability allows an operator to quickly differentiate between real threats and legitimate movements,” added David Johnson. “This is essential to avoid real incursions becoming ‘lost in the noise’, particularly the growing ‘backdoor’ threat posed by terrorists, smugglers and pirates at commercial airports and seaports as well as at military airbases and harbours.”

A key feature of the VSD application is its ability to control a camera to follow a selected radar track automatically. This capability is known as slew-to-cue and is further improved in VSD by the built-in video tracking function. Video tracking uses analysis of the camera video imagery to determine the target motion. Once a track has been designated within the radar display, video tracking can provide more accurate camera positioning for enhanced slew-to-cue.

“Video tracking is significantly more accurate than radar tracking, due to the higher update rate of at least 30fps and superior resolution of the sensors,” added David Johnson. “This enables VSD to predict and follow the target’s movement and maintain it in the video frame.”

VSD has been designed with touchscreen devices in mind and provides a clear display of the camera video in a main window, with picture-in-picture and thumbnails of all available video feeds for rapid selection. The radar portion of the display provides a geographic overview of the situation, showing all of the available radar videos, tracks and secondary data, overlaid on a clear tiled map.