Tripwire Industrial Visibility (TIV) Demo
Zane Blomgren, Industrial SE Manager
August 12, 2021
Tripwire’s Security & Compliance Portfolio
Active Detection:
USB Detection
 Previous situation
o TIV didn’t detect USB devices connected to OT
assets (like PLCs).
o Unauthorized USB devices can re-configure
or disrupt OT assets, creating risk
 What the feature does
o Provides view of USB devices which are
plugged into assets
o New “Insight” indicates the number of assets
discovered that have USB devices plugged into
them.
o New report shows the distribution of USB
devices in the OT environment
 What’s the value
o TIV can monitor USB insertion actions on OT
assets
o Hygiene score and trend will reflect activity
associated with USB device usage.
Active Detection: Physical
Connections
 Previous situation
o We weren’t able to display the information
regarding physical connections between assets
 What the feature does
o New table lists all the assets that are physically
connected to a particular asset
o This information is available via Asset View and
Layered Graph
 What’s the value
o The user can view the physical connections for a
specific asset
DNS Artifact – Threat Hunting
Previous situation
o We had limited ability to display DNS
information. DNS is important to monitor for
possible compromise.
What the feature does
o This feature provides visibility of DNS behavior
from the TIV user interface
 Dedicated page
 Asset pages
 Dashboard
What’s the value
o We can now visualize DNS activity and detect
possible compromise in the environment
6
Network Session Analytics
 Previous situation
o TIV did not provide visibility into communication
patterns between all network devices
o TIV did not provide information about physical network
health and possible issues
 What the feature does
o Provides list of sessions currently open or seen
recently
 Includes data such as traffic volumes and
retransmissions
 Includes graphical representation of
retransmissions over time
 What’s the value
o TIV can more easily identify physical networking issues
(equipment, cabling, etc) in the OT environment
o TIV can easily see the communications patterns within
their network
Process Value View
Previous situation
o Trying to identify situations where a PLC is
mis-configured (via a mistake or an attack)
was challenging.
 Manual tuning required
What the feature does
o Monitors network communication to PLCs
o Baselines the “normal” range of values for
PLC configuration parameters
o Identifies situations where a parameter is
change to an “abnormal” value.
What’s the value
o Provides more detailed visibility of process
changes that may indicate a mistake or
malicious compromise.
o Aids in both threat hunting, and in driving
OT system availability
Reveal
• Asset Discovery
• Security Posture
• Network Hygiene
• Process and Change
Visibility
Connect
• Audit & Compliance
• SOC Monitoring
• Optimize Staff
• Architecture
Protect
• Risk and Vulnerabilities
• Risk Prioritization
• Zero Trust
• Remote Access Control
Detect
• Known Threats
• Advanced Unknown Threats
• Insider Threats
• Hunt and Investigation
• Mitigate and Respond
Starting Your Industrial Cybersecurity Journey
First Step
People / Organization
Infrastructure Complexity
• Limited visibility to determine risk
• Poor segmentation
• IoT cloud based devices
Security
• Team collaboration (IT vs. OT)
• Different tech stack for different BUs
• Multiple teams with different needs;
competence in IT or OT often limited
• Limited site resources
• Legacy / Unmanaged switches
• Air-gapped networks
• Outsourced infrastructure
Common Challenges
Barriers to Your Industrial Cybersecurity Journey
Easy Deployment No Network Changes
Quick Time-to-
Value
No Hidden Costs
Risk & Vulnerability
Data Correlated to Asset
Data
Non-disruptive to
Operations
Comprehensive Visibility:
IT/OT/IoT
Overcoming Your Industrial Cybersecurity Challenges
Solution Requirements
11
A Simple, Easy-to-Use Solution That Delivers 100% Visibility into Industrial Networks in
Minutes
Windows-Based
Edge Collector Cloud or On-Prem No Network Changes
Introducing TIV Edge
Risk & Vulnerability
Management
Full OT/IoT/IT Asset Discovery
HARDWARE CONFIGURATION
DISRUPTIVE
Fast & Easy: Run Any Time, Anywhere
Windows-based edge collectors run on-prem or via SaaS
1. Run standalone executable on “interesting” hosts
2. Collect host and surrounding devices’ information
○ Host information
○ ICS project files
○ Subnet discovery / Active
3. Send information back to CTD
Launch Point
TIV Edge: How it Works

More Related Content

PPTX
Tripwire Energy Working Group: Keynote w/Patrick Miller
PPTX
Lisa Guess - Embracing the Cloud
PPTX
SANS Critical Security Controls Summit London 2013
PPTX
Bil Harmer - Myths of Cloud Security Debunked!
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
PPTX
The Subversive Six: Hidden Risk Points in ICS
PPTX
Vulnerability Testing Services Case Study
PPTX
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Tripwire Energy Working Group: Keynote w/Patrick Miller
Lisa Guess - Embracing the Cloud
SANS Critical Security Controls Summit London 2013
Bil Harmer - Myths of Cloud Security Debunked!
NIST Cybersecurity Framework (CSF) on the Public Cloud
The Subversive Six: Hidden Risk Points in ICS
Vulnerability Testing Services Case Study
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds

What's hot (20)

PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PPTX
Jack Nichelson - Information Security Metrics - Practical Security Metrics
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PDF
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
PDF
MT 117 Key Innovations in Cybersecurity
PDF
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
PDF
RSA ASIA 2014 - Internet of Things
PDF
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
PPTX
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
PPTX
The Top Cloud Security Issues
PDF
Kofax Document Security
PPTX
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
PPTX
Reasoning About Enterprise Application Security in a Cloudy World
PDF
Cloud security: Accelerating cloud adoption
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
PPTX
4.5.cloud security
PDF
Ariel Litvin - CCSK
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Jack Nichelson - Information Security Metrics - Practical Security Metrics
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
MT 117 Key Innovations in Cybersecurity
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
RSA ASIA 2014 - Internet of Things
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Advanced Persistent Threat - Evaluating Effective Responses
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Multi-Cloud, Multi-Network Cyber Awareness, Monitoring and Management by Fran...
The Top Cloud Security Issues
Kofax Document Security
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
Reasoning About Enterprise Application Security in a Cloudy World
Cloud security: Accelerating cloud adoption
Automating Critical Security Controls for Threat Remediation and Compliance
4.5.cloud security
Ariel Litvin - CCSK
Ad

Similar to Tripwire Energy Working Group: TIV Demo (20)

PPT
Lumeta IPsonar Aligned to ITIL v3
DOCX
Observability A Critical Practice to Enable Digital Transformation
PPTX
Cybersecurity - Jim Butterworth
PPTX
Extending Cisco Technologies Thru Solar Winds Network Management
PDF
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
PDF
Milestone 2.pdf
PDF
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
PPTX
Detect Threats Faster
PDF
IT Network Asset Discovery & Inventory
PDF
Iot presentation and hand on building tools
PPTX
Introduction to Information Systems (Overview)
PPTX
Network Forensics Intro
PPTX
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
PDF
A rede como um sensor de segurança
PDF
SplunkLive! London - Splunk App for Stream & MINT Breakout
PPTX
Discrete MFG IoT Factory of the Future
PDF
Cisco Analytics: Accelerate Network Optimization with Virtualization
PDF
SFBA Splunk Usergroup Meeting, August 14, 2024
DOCX
Addressing security and privacy in io t ecosystem v0.4
PPTX
Lumeta IPsonar Aligned to ITIL v3
Observability A Critical Practice to Enable Digital Transformation
Cybersecurity - Jim Butterworth
Extending Cisco Technologies Thru Solar Winds Network Management
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
Milestone 2.pdf
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
Detect Threats Faster
IT Network Asset Discovery & Inventory
Iot presentation and hand on building tools
Introduction to Information Systems (Overview)
Network Forensics Intro
Interoperability Flexibility and Industrial Design Requirements in IoT Devices.
A rede como um sensor de segurança
SplunkLive! London - Splunk App for Stream & MINT Breakout
Discrete MFG IoT Factory of the Future
Cisco Analytics: Accelerate Network Optimization with Virtualization
SFBA Splunk Usergroup Meeting, August 14, 2024
Addressing security and privacy in io t ecosystem v0.4
Ad

More from Tripwire (20)

PDF
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
PDF
Data Privacy Day 2022: Tips to Ensure Data Privacy
PDF
Key Challenges Facing IT/OT: Hear From The Experts
PPTX
Tripwire Energy Working Group Session w/Dale Peterson
PPTX
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
PPTX
Tripwire Energy Working Group: Customer Session with Chase Cole
PDF
World Book Day: Cybersecurity’s Quietest Celebration
PDF
Tripwire Retail Security 2020 Survey: Key Findings
PDF
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
PDF
The Adventures of Captain Tripwire: Coloring Book!
PDF
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
PDF
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
PDF
Tripwire 2019 Skills Gap Survey: Key Findings
PDF
A Look Back at 2018: The Most Memorable Cyber Moments
PPTX
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
PDF
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
PPTX
Defend Your Data Now with the MITRE ATT&CK Framework
PPTX
Defending Critical Infrastructure Against Cyber Attacks
PPTX
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
PPTX
Hunting for Cyber Threats Using Threat Modeling & Frameworks
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Data Privacy Day 2022: Tips to Ensure Data Privacy
Key Challenges Facing IT/OT: Hear From The Experts
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: Customer Session with Chase Cole
World Book Day: Cybersecurity’s Quietest Celebration
Tripwire Retail Security 2020 Survey: Key Findings
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
The Adventures of Captain Tripwire: Coloring Book!
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
Tripwire 2019 Skills Gap Survey: Key Findings
A Look Back at 2018: The Most Memorable Cyber Moments
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Defend Your Data Now with the MITRE ATT&CK Framework
Defending Critical Infrastructure Against Cyber Attacks
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Hunting for Cyber Threats Using Threat Modeling & Frameworks

Recently uploaded (20)

PPTX
2018-HIPAA-Renewal-Training for executives
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPT
Geologic Time for studying geology for geologist
DOCX
search engine optimization ppt fir known well about this
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PPTX
Configure Apache Mutual Authentication
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Consumable AI The What, Why & How for Small Teams.pdf
2018-HIPAA-Renewal-Training for executives
A review of recent deep learning applications in wood surface defect identifi...
sustainability-14-14877-v2.pddhzftheheeeee
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
1 - Historical Antecedents, Social Consideration.pdf
Architecture types and enterprise applications.pdf
A comparative study of natural language inference in Swahili using monolingua...
Geologic Time for studying geology for geologist
search engine optimization ppt fir known well about this
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
Configure Apache Mutual Authentication
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
UiPath Agentic Automation session 1: RPA to Agents
Getting started with AI Agents and Multi-Agent Systems
Consumable AI The What, Why & How for Small Teams.pdf

Tripwire Energy Working Group: TIV Demo

  • 1. Tripwire Industrial Visibility (TIV) Demo Zane Blomgren, Industrial SE Manager August 12, 2021
  • 2. Tripwire’s Security & Compliance Portfolio
  • 3. Active Detection: USB Detection  Previous situation o TIV didn’t detect USB devices connected to OT assets (like PLCs). o Unauthorized USB devices can re-configure or disrupt OT assets, creating risk  What the feature does o Provides view of USB devices which are plugged into assets o New “Insight” indicates the number of assets discovered that have USB devices plugged into them. o New report shows the distribution of USB devices in the OT environment  What’s the value o TIV can monitor USB insertion actions on OT assets o Hygiene score and trend will reflect activity associated with USB device usage.
  • 4. Active Detection: Physical Connections  Previous situation o We weren’t able to display the information regarding physical connections between assets  What the feature does o New table lists all the assets that are physically connected to a particular asset o This information is available via Asset View and Layered Graph  What’s the value o The user can view the physical connections for a specific asset
  • 5. DNS Artifact – Threat Hunting Previous situation o We had limited ability to display DNS information. DNS is important to monitor for possible compromise. What the feature does o This feature provides visibility of DNS behavior from the TIV user interface  Dedicated page  Asset pages  Dashboard What’s the value o We can now visualize DNS activity and detect possible compromise in the environment
  • 6. 6 Network Session Analytics  Previous situation o TIV did not provide visibility into communication patterns between all network devices o TIV did not provide information about physical network health and possible issues  What the feature does o Provides list of sessions currently open or seen recently  Includes data such as traffic volumes and retransmissions  Includes graphical representation of retransmissions over time  What’s the value o TIV can more easily identify physical networking issues (equipment, cabling, etc) in the OT environment o TIV can easily see the communications patterns within their network
  • 7. Process Value View Previous situation o Trying to identify situations where a PLC is mis-configured (via a mistake or an attack) was challenging.  Manual tuning required What the feature does o Monitors network communication to PLCs o Baselines the “normal” range of values for PLC configuration parameters o Identifies situations where a parameter is change to an “abnormal” value. What’s the value o Provides more detailed visibility of process changes that may indicate a mistake or malicious compromise. o Aids in both threat hunting, and in driving OT system availability
  • 8. Reveal • Asset Discovery • Security Posture • Network Hygiene • Process and Change Visibility Connect • Audit & Compliance • SOC Monitoring • Optimize Staff • Architecture Protect • Risk and Vulnerabilities • Risk Prioritization • Zero Trust • Remote Access Control Detect • Known Threats • Advanced Unknown Threats • Insider Threats • Hunt and Investigation • Mitigate and Respond Starting Your Industrial Cybersecurity Journey First Step
  • 9. People / Organization Infrastructure Complexity • Limited visibility to determine risk • Poor segmentation • IoT cloud based devices Security • Team collaboration (IT vs. OT) • Different tech stack for different BUs • Multiple teams with different needs; competence in IT or OT often limited • Limited site resources • Legacy / Unmanaged switches • Air-gapped networks • Outsourced infrastructure Common Challenges Barriers to Your Industrial Cybersecurity Journey
  • 10. Easy Deployment No Network Changes Quick Time-to- Value No Hidden Costs Risk & Vulnerability Data Correlated to Asset Data Non-disruptive to Operations Comprehensive Visibility: IT/OT/IoT Overcoming Your Industrial Cybersecurity Challenges Solution Requirements
  • 11. 11 A Simple, Easy-to-Use Solution That Delivers 100% Visibility into Industrial Networks in Minutes Windows-Based Edge Collector Cloud or On-Prem No Network Changes Introducing TIV Edge Risk & Vulnerability Management Full OT/IoT/IT Asset Discovery HARDWARE CONFIGURATION DISRUPTIVE
  • 12. Fast & Easy: Run Any Time, Anywhere Windows-based edge collectors run on-prem or via SaaS 1. Run standalone executable on “interesting” hosts 2. Collect host and surrounding devices’ information ○ Host information ○ ICS project files ○ Subnet discovery / Active 3. Send information back to CTD Launch Point TIV Edge: How it Works