Lockheed Martin Cyber Weekly

isgs-cyber-blog-banner

    Drilling Down: How to Secure the Oil & Gas Industry (Part 2 of 3)

    November 20, 2014 12:06 PM by Chandra McMahon

    On May 29, 2009, the President of the United States gave a speech on securing our nation's
    cyber infrastructure. Despite the fact that we were in the height the great recession at the time, the importance for cyber security prompted immediate attention and awareness by the Executive office.

    When recounting, then recent attacks that led to the need to address cyber security, President Obama remarked, “In one brazen act last year, thieves used stolen credit card information to steal millions of dollars from 130 ATM machines in 49 cities around the world -- and they did it in just 30 minutes. A single employee of an American company was convicted of stealing intellectual property reportedly worth $400 million. It's been estimated that last year alone cyber criminals stole intellectual property from businesses worldwide worth up to $1 trillion.”

    One trillion dollars! Wow. Even if a fraction of that figure is accurate, the loss is still shocking. In reading the speech over, the one area of cyber security that the President’s points did not address is the vulnerabilities that cyber-attacks exploit, specifically within our Energy and Utilities space.

    Recently, I discussed how a virus in 2012 impacted two of the largest oil companies in the world.  This week, I want to dive deeper into the oil and gas sector to discuss how the integration of Information Technology (IT) and Operational Technology (OT) present one of the largest vulnerabilities for this sector.

    Operational Technology is hardware and software that a company uses to monitor or control an environment. OT commonly detects, measures, and in some cases executes a change, or event, within a given physical area. Most commonly associated with physical access devices or within manufacturing, OT has increasing become integrated within the IT backbone of many organizations. This integration is most commonly associated with the introduction of network devices for remote access, and the integration of ‘off-the-shelf’ or common technologies.

    By making OT live on a network, organizations are placing that intellectual property (IP) in a place that could be discoverable during a successful attack. In the oil and gas industry, OT is a conduit for much of the Intellectual Property produced. From volume, velocity and variety readings to geophysical equations, the data that flows throughout every part of an upstream, midstream, and downstream company is as varied as it is sacred to the present and future health of each organization.

    The real potential danger in merging these two types of technology comes with adding off-the-shelf technology, such as desktop machines running common operating systems, with OT. In technology, we often classify IT and off-the-shelf tech as designed with confidentiality, integrity and availability (CIA) at its core. This means that IT prioritizes the protection of data before making it accessible. OT is the opposite. OT was built with Accessibility at its core, followed closely by Integrity and finally Confidentiality (AIC).   

    With these two technologies seemingly at odds, you can start to understand how something as seemingly trivial as patching a desktop connected to an OT device could have negative results on the OT device itself.

    The challenge in protecting IP in oil and gas is the accessibility of data crucial to the complete operation of the industry. To enhance exploration and production, for example, IP is being used not only to find new sources of oil and gas, but to reduce the non-productive time (NPT) of assets by predictive maintenance of critical components such as ESPs (electric submersible pumps). IP is even being used to help reduce the Health, Safety and Environment incidents within drilling and production, and provide end-to-end views of hydrocarbon reservoirs and advanced pattern detection.

    In refining and manufacturing, IP is used to reduce the NPT of assets through the predictive maintenance of critical components such as rotary equipment. IP can also include the data used to improve asset performance management through real-time metrics across different subsystems.

    IP provides the competitive advantage that sets each company part from the other in a highly-integrated industry. It also helps oil and gas companies better understand the current environment to deliver better future results.

    The challenge with IP in the oil and gas sector is determining how to best keep the IP safe, yet accessible to those that need it. Industrial Defender and Lockheed Martin, its parent company, have approached this challenge by successfully combining the IT and OT landscapes. The result is a robust solution towards IT and OT security that includes people (e.g. training), the processes (e.g. policy and procedures) and the technology to address modern security challenges.

     

    isgs-blog-twitter-cta

    Drilling Down: How to Secure the Oil & Gas Industry (Part 1 of 3)

    November 6, 2014 3:38 PM by Chandra McMahon

    Cybersecurity is a gigantic topic. It’s more than just technology. It’s a careful mixture between art and science. Understanding the mechanics behind protecting, identifying and thwarting attacks, although crucial to the science of cybersecurity, represents only one side of the coin. Knowing your enemy, understanding the sociopolitical nuances of your environment, and predicting where you’re most likely to get attacked, that’s art.

    Enveloping these two sides of the coin is your knowledge of your industry; not just the cogs you make and sell, but where you sell them, how you make them and how they’re used. All these input go into creating a sound cybersecurity infrastructure. These next several blogs are dedicated to understanding the industry aspect of cybersecurity, starting with a look at the oil and gas sector.

    Read More »

    Three Ways to Make a Difference in Cyber Security

    October 31, 2014 10:53 AM by Chandra McMahon

    We are wrapping up October, which is National Cyber Security Awareness Month, so today I want to share the ways citizens can help to support and build greater cyber resiliency.  

    The purpose of National Cyber Security Awareness Month is to engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cyber security.  According to the Department of Homeland Security, Cyber Awareness Month aims to increase the resiliency of the nation in the event of a cyber incident.

    The role of citizens is growing by leaps and bounds as it relates to thwarting and potentially curbing cyber attacks.  In my mind, this role can be bolstered by the following three actions.

    Read More »

    Securing the Air: An Approach to Hybrid Cloud Security

    September 24, 2014 11:34 AM by Chandra McMahon

    A hybrid cloud is a consolidation of a private cloud and a public cloud. The reason for their growing popularity stems from their ability to offer multiple deployment models at once. Gartner predicts that globally, almost half of all large enterprises will have deployed hybrid clouds by the end of 2017.  That means we are in a defining moment wherein companies will begin planning to move away from private into hybrid clouds.

    The challenge, though, is how to interconnect multiple clouds to work as a seamless whole. You don’t want a cloud for e-mail, another one for content management and development, and yet another for collaboration; especially if the clouds lack the capability to interact with one another. More importantly, the complexity between hybrid clouds introduces a new paradigm of cybersecurity vulnerabilities. But with a careful implementation of standards concerning how to perform governance and implement IT systems to protect data, securing the hybrid cloud becomes possible.

    Read More »

    Crystal Ball: The Virtues of Outcome-Based Cyber Security

    September 18, 2014 2:02 PM by Chandra McMahon

    Recently, Hold Security, a firm in Milwaukee, announced that a Russian crime ring had stolen 1.2 billion user credentials and 500 million e-mail addresses from 420,000 websites.  According to an article by the New York Times, if true, the cyber-heist would be the largest in history.

    Hold Security did not name the victims of the attack, citing nondisclosure agreements with victim companies.

    In the face of attacks like this, it would be nice if Chief Information Security Officers (CISOs) had a crystal ball to keep their networks safe. But that's not really necessary. Attacks like this are as defendable as they are inevitable with the use of emerging tools including threat intelligence and outcome-based cybersecurity.

    Read More »

    The Growing Minority: Women in IT & Cyberspace (Part II)

    September 10, 2014 3:02 PM by Chandra McMahon

    Last week, we took a look at the current landscape of minorities in cybersecurity and IT with a particular emphasis on women in those fields. Both personally and professionally, I feel that diversity is an important aspect of an effective cybersecurity approach, and can help fill the gap managers have to meet the demands for more talented cyber-professionals in today’s IT environment.

    A couple of years ago, Frost and Sullivan released a study that shows that information security discipline is not evolving fast enough:

    “…women represent just 11% of this profession [IT Security]. Placed in the context of women in the general workforce and women in professional and managerial roles—where women are at near parity with men in both of these measurements in developed countries—this 11% is alarming.

    Furthermore, this low percent of women in the information security profession has been stagnant despite double-digit annual increases in this profession. In 2012 alone, the global information security workforce grew by 306,000 and is on pace to increase by another 332,000 in 2013.”

    Read More »

    The Growing Minority: Women in IT & Cyberspace

    August 27, 2014 1:54 PM by Chandra McMahon

    One emotion few of my peers experience is the feeling of walking into a room and being the only woman - and it didn't matter whether I was visiting a Security Operations Center (SOC), attending a Chief Information Security Forum or meeting with Information Security leaders in various industries.  Meeting after meeting and at all levels, I have concluded that the low numbers of women and minorities working within cybersecurity and across the IT discipline is a concern from a personal standpoint and a business risk that I feel few recognize.

    The cybersecurity industry continues to grow at an incredible rate. A recent study by the organization Women in Cybersecurity found that security professionals worldwide are expected to increase to nearly 4.2 million by 2015. Although women hold 56 percent of all professional jobs in the U.S. workforce, only 25% of all IT jobs are held by women.

    Read More »

    Checkmate: Planning for the Future of Cyber Security (Part II)

    August 13, 2014 11:25 AM by Chandra McMahon

    Last week, we talked about how cyber security is like Chess. In order to be effective, you have to prepare and anticipate your opponent’s moves and styles of attack before they happen. Today we will look at the other side of the cyber coin: attackers. What future capabilities do we think they will have, and what can we do to start preparing for them?

    There are about three major capabilities that future Advanced Persistent Threats (APT) and attackers will have:

    Read More »

    Checkmate: Planning for the Future of Cyber Security

    August 6, 2014 1:34 PM by Chandra McMahon

    Cyber security is like Chess. You have to prepare and anticipate your opponent’s moves and styles of attack before they happen. The more moves and scenarios you can plan for in the future, the stronger your security will be, and the greater your chance of success.

    Like Chess, effective cyber security is also about making assumptions on present trends and looking back at the past to anticipate the future. But unlike Chess, your tools and technologies constantly evolve for you and those seeking to harm your networks. In 20 years, a pawn will still be a pawn, but continuous monitoring or incident response will look and feel completely different. In some possible scenarios, they may not even exist anymore.

    Read More »

    Neighborhood Watch: Protecting Your IP with the Cyber Ecosystem

    July 16, 2014 4:36 PM by Chandra McMahon

    Whenever your kids go outside to play, it’s a great feeling to know that they are safe. Here at Lockheed Martin, we feel the same about your intellectual property (IP). Most enterprises work very hard to maintain the safety and integrity of their intellectual property. IP is the heart of every company. IP is the very data that makes each one of our organizations unique and valuable entities.

    Even though most enterprises work hard to make sure their IP is protected, without careful consideration of the cyber ecosystem, this protection might only be halfway effective. Identifying threats is hard enough within the cyber walls of your corporate enterprise, but as you well know, your IP and your company’s data moves outside those walls all the time. Where it goes, who it interfaces with and what it interfaces with – that is what we mean by the cyber ecosystem.

    Read More »

    Risky Business: The role of Risk Management in Cyber Security

    July 10, 2014 12:06 PM by Chandra McMahon

    One of the most common terms in any large organization is Risk Management. Risk Management has grown from a vertical role shared by multiple organizational executives into a separate horizontal practice in which a series of professionals can often dedicate entire careers. But what exactly is Risk Management? What is IT Risk Management? What is a Risk Management Framework? And why is it a vital component of an effective cyber security platform? For me, Risk Management is a rigorous business discipline that if applied and communicated correctly can ensure a business continues to achieve a strategy for profitable growth. It’s also the language of executives and one that cyber security executives should be extremely well versed in.

    Originating as a business discipline, Risk Management is the process of understanding what could possibly impact your company in a negative way, and having an action plan for each possible threat. Risk Management is about mapping and understanding the likelihood of these financial threats to your organization in a manner that looks at probability and severity.

    Read More »

    Responding to Incident Response: What is it and why do so many organizations have it?

    June 25, 2014 2:41 PM by Chandra McMahon

    Imagine this scenario. You’re awoken late at night by phone call. You answer, but before you can say “hello” you hear a familiar voice, “We’re so sorry to call you this late but...we’ve detected a system-wide breach in our network.” I’m willing to bet most CISOs (Chief Information Security Officers) think about that happening in some way, shape, or form before going to bed at night. I know I have. And can you blame us? Just a couple of months ago a report from the Government Accountability Office on Information Security showed that the number of cyber incidents reported by all Federal Agencies rose this past year by over 10,000 incidents. That’s about a 35 percent increase in one year!

    A system-wide breach can cost an organization millions of dollars in reparations and infrastructure-loss. Just as critical, a large breach can cost an organization even more in reputation. All too common, however, managers feel that simply having incident response (IR) services are enough to keep their organization from suffering a major attack.

    Read More »

    Proactive Protection: Lockheed Martin’s Blog Dedicated to Cyber Security

    June 13, 2014 9:04 AM by Chandra McMahon

    Welcome to the new cyber blog!  Every Monday, you can rely on this blog to give you detailed analysis and reporting about cyber security programs at Lockheed Martin. More than just news and more than just opinion, the blog is a thought-provoking examination of multiple levels of cyber security. And we'd welcome your feedback and suggestions as we forge ahead with this new endeavor.

    For a little information about your host, for more than 25 years, I've been at the forefront of the information technology industry. Recently, as Lockheed Martin’s Chief Information Security Officer, I was responsible for information security strategy, policy, security engineering, operations and cyber threat detection and response. Currently, I lead Lockheed Martin's unique cyber security capabilities and associated portfolio of information technology solutions including Cloud, Big Data and Mobility for our commercial clients.

    Few areas of technology change as aggressively or have as much impact as cyber security. Managing the risk of IT within an organization, therefore, often relies on a solid understanding of what cyber security is in the first place. How has it changed? And more importantly, where is it headed?

    Read More »
isgs-mcmahon-2014

Chandra McMahon, Vice President, Commercial Markets

As Lockheed Martin's former Chief Information Security Officer, I now lead our team in delivering a portfolio of cybersecurity and information technology solutions and services for financial, utility, oil and gas, health and life sciences, telecommunications and high-technology customers.


header-data-cyber