OT world- The Problem

  • Today there is no defense against attacks in the OT field
  • There is a fear of updates /changes in the controllers
  • Regulating obliges mainly to identify / detect
  • The attacks in the OT field have a greater significance than in the IT field

OT Attacks

  • Cyber attack on water system (opening dams and flooding)
  • Disruption of traffic lights
  • Damage to energy infrastructure
  • Attack on atomic reactors (Iran)
  • Locking rooms in a hotel (See-Hotel, Austria)

Cyber 2.0 SOLUTION FOR OT

  • The only system that provides prevention
  • No need to install over the controller
  • Easy to operate
  • Works in unconnected networks
  • Does not slow down the network
  • Does not require any updates

Marking approved programs

The IT manager:
Marks approved programs (1-2)
that are allowed to access to network resources (the programs that operates the controller)

Not approved programs:
Every software that was not marked as an approved programs (including every new and unknown programs)

Chaos Engine

#

FULL PROTECTION

IN A CLOSE ENVIRONMENT

FULL PROTECTIONIN

A WIDESPREAD ENVIRONMENT

Organization network topology

Station remote controller

Technician Remote

Technician with cellular modem, static IP and permission to APN