• Request Info

Attack Intelligence for Energy & Utilities

Energy and utility companies, along with standards organizations, are taking extreme measures to protect critical infrastructure devices, SCADA networks, and critical application servers from threats. An order was issued by the President to improve critical infrastructure security, resulting in a Cybersecurity Framework from the National Institute of Standards Technology (NIST) that is to be used along side existing regulations such as North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP).

The Cybersecurity Framework calls out several areas of importance including:

  • Identifying and documenting asset vulnerabilities
  • Identifying internal and external threats
  • Understanding the business impact and likelihood of these threats
  • Development and implementation of a vulnerability management plan

Traditional security solutions are reactive, relying on incident detection or sifting through mountains of vulnerability data to manage threats. This results in unnecessary risk. Energy and utility companies need to be proactive and focus on the most likely threats based on the combination of vulnerabilities, attack patterns, and known exploits. Attack intelligence allows investigation of multi-staged attacks that pivot across systems, devices and applications, revealing how chains of exploitable vulnerabilities open paths to your organization’s mission-critical systems and data.

The Core Attack Intelligence Platform helps you:

  • Narrow down the number of vulnerabilities for remediation
  • Leverage dynamic attack paths to understand exactly how an adversary can reach your critical assets
  • Prioritize remediation efforts for systems that are on attack paths
  • Automate vulnerability validation

SCADA Security Testing with Core Security

The need to test SCADA (supervisory control and data acquisition) systems has become critical. SCADA systems are best known for controlling complex industrial processes, for example nuclear based power generation where by a significant number of people benefit from the product of these systems. It’s the sensitive nature of these systems combined with the complexity they manage effortlessly that make SCADA systems high value targets of Advanced Persistent Threats (APTs) and other destructive malware that looks to cripple these systems.

Core Security is partnering with ExCraft labs, a Core Secured Partner, that has created numerous exploits specifically for SCADA systems. To learn more about this offering please download the data sheet and list of SCADA exploits.

Next Steps

Request Info

SHARE