Our partners from KTH, got their paper entitled “Towards an Ecosystem of Domain Specific Languages for Threat Modeling” accepted at the 33rd International Conference on Advanced Information Systems Engineering (CAiSE’21). The abstract is as follows:

Today, many of our activities depend on the normal operation of the IT infrastructures that supports them. However, cyber-attacks on these infrastructures can lead to disastrous consequences. Therefore, efforts towards assessing the cyber-security are being done, such as attack graph simulations based on system architecture models.

The Meta Attack Language (MAL) was previously proposed as a framework for developing Domain Specific Languages (DSLs) that can be used for the aforementioned purpose. Since many common components exist among different domains, a way to prevent repeating work had to be defined. To facilitate this goal, we adapt taxonomy building by Nickerson and propose an ecosystem of MAL-based DSLs that describes a systematic approach for not only developing, but also maintaining them over time. This can foster the usage of MAL for modeling new domains.

Energy Shield Consortium is inviting you to attend online workshop “Trends, opportunities and choices in designing cyber resilient EPES infrastructure” on the 15th of April starting at 10.00 CET.  

Media Kit:

Targeted audience: If you are an EPES value chain stakeholder, critical infrastructure and/or cyber security expert, researcher, scientist or domain enthusiast, please register here

 

Event structure & objectives:

EnergyShield online workshop aims at engaging different stakeholders in cross-domain topics via:

  • Opening sessions approaching standardization efforts and policy updates impacting critical infrastructures and cyber security.
  • Demonstration of Energy Shield toolkit.
  • Two panel discussions  about the impact of the home working on energy and IT infrastructures and on how the lasted incidents targeting critical infrastructures are reshaping technologies, businesses and policies landscape.

Active participation:

  • During the event, you will be able to address questions via chat and discuss with the other participants.
  • Prior the event, you can fill two panel related surveys to provides insights, propose questions or launch topics of discussion (Panel 1 and Panel 2).
  • After the event, a report will be issued and all the topics an question will be addressed.

Help us spread the word!

While deciding… please watch a video presentation of the Energy Shield project https://youtu.be/AtSUmkrp1Dw

Looking forward to seeing you at the event!

EnergyShield Consortium is inviting you to join us in an online workshop engaging different stakeholders in cross-domain topics on the 15th of April 2021 starting from 10:00 CET.

Register here to the online workshop on Trends, opportunities and choices in designing a cyber resilient EPES infrastructure organized by EnergyShield Consortium. 

Five interesting presentations and two panels elaborating on actual opportunities for security in the energy domain are scheduled during the event. .

After a short introduction, the EnergyShield project officer will talk about recent policy developments in cybersecurity for critical infrastructure protection. Presentations on different aspects ranging from ENISA’s activities in the energy sector, over cyber security in the EPES sector, to standardization efforts to assess cyber security in UK will follow.

The workshop will be concluded by two exciting panel discussions, equipped with high profiled experts from the field. The first will elaborate on the effect of work from home on energy and IT infrastructures, while the second addresses latest incidents targeting critical infrastructure.

Do not miss the chance to participate in the workshop and register for this event!

Follow us to meet the speakers and to find out how you can contribute to this event. 

By today February 26, our colleagues from NTUA have published a new article with the title “Working from home during COVID-19 crisis: a cyber security culture assessment survey” in the Security Journal of Springer Nature. The abstract is as follows:

This paper aims to evaluate the cyber security culture readiness of organizations from different countries and business domains when teleworking became a necessity due to the COVID-19 crisis. We have designed a targeted questionnaire and conducted a web-based survey addressing employees while working from home during the COVID-19 spread over the globe. The questionnaire contained no more than 23 questions and was available for almost a month, from 7th April 2020 until 3rd May 2020. During that period, 264 participants from 13 European countries spent approximately 8 minutes to answer it. Gathered data were analyzed from different perspectives leading to evolutionary findings regarding information security readiness and resilience of both individuals and organizations. In this paper, results are being presented and discussed in detail while focusing on future scientific routes and research paths that need to be explored. It concludes on a number of cyber security recommendations addressing both the emerged vulnerabilities and the need for security culture evolution.

The entire article can be found here.

The year starts successfully for the EnergyShield project and our partners from the NTUA, who got their publication “Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis” published by The International Journal of Network Security and Its Applications (IJNSA). The article proposes a concrete use case for the SBA tool developed within our project. The abstract is as follows:

The paper at hand presents the design of a survey aiming at the cyber-security culture assessment of critical infrastructures during the COVID-19 crisis, when living reality was heavily disturbed and working conditions fundamentally affected. The survey is rooted in a security culture framework layered into two levels, organizational and individual, further analyzed into 10 different security dimensions consisted of 52 domains. An in-depth questionnaire building analysis is presented focusing on the aims, goals, and expected results. It concludes with the survey implementation approach while underlining the framework’s first application and its revealing insights during a global crisis.

If you are interested in the entire paper, you can read it on the website of the journal.

Our colleagues from KTH and foreseeti, got another paper published on “coreLang” that provides common assets that are needed for modelling IT environments in their Meta Attack Language. The abstract is as follows:

Cyber-attacks on IT infrastructures can have disastrous con-sequences for individuals, regions, as well as whole nations. In order torespond to these threats, the cyber security assessment of IT infrastruc-tures can foster a higher degree of safety and resilience against cyber-attacks. Therefore, the use of attack simulations based on system ar-chitecture models is proposed. To reduce the effort of creating new at-tack graphs for each system under assessment, domain-specific languages (DSLs) can be employed. DSLs codify the common attack logics of theconsidered domain.

Previously, MAL (the Meta Attack Language) was proposed, which servesas a framework to develop DSLs and generate attack graphs for mod-eled infrastructures. In this article, we propose coreLang as a MAL-basedDSL for modeling IT infrastructures and analyzing weaknesses related toknown attacks. To model domain-specific attributes, we studied existingcyber-attacks to develop a comprehensive language, which was iterativelyverified through a series of brainstorming sessions with domain modelers.Finally, this first version of the language was validated against knowncyber-attack scenarios.

Interested in reading more? You can read the pre-print here.

Our partners from KTH got their article on “powerLang: a probabilistic attack simulation language for the power domain” accepted at the Open Access Journal of Energy Informatics. The abstract is as follows:

Cyber-attacks these threats, the cyber security assessment of IT and OT infrastructures can foster a higher degree of safety and resilience against cyber-attacks. Therefore, the use of attack simulations based on system architecture models is proposed. To reduce the effort of creating new attack graphs for each system under assessment, domain-specific languages (DSLs) can be employed. DSLs codify the common attack logics of the considered domain.Previously, MAL (the Meta Attack Language) was proposed, which serves as a framework to develop DSLs and generate attack graphs for modeled infrastructures. In this article, powerLang as a MAL-based DSL for modeling IT and OT infrastructures in the power domain is proposed. Further, it allows analyzing weaknesses related to known attacks. To comprise powerLang, two existing MAL-based DSL are combined with a new language focusing on industrial control systems (ICS). Finally, this first version of the language was validated against a known cyber-attack.

Our colleagues from NTUA managed to publish their article “A Cyber-Security Culture Framework for Assessing Organization Readiness” in the Journal of Computer Information Systems. The abstract is as follows:

This paper presents a cyber-security culture framework for assessing and evaluating the current security readiness of an organization’s workforce. Having conducted a thorough review of the most commonly used security frameworks, we identify core security human-related elements and classify them by constructing a domain agnostic security model. We then proceed by presenting in detail each component of our model and attempt to quantify them in order to achieve a feasible assessment methodology. The paper thereafter presents the application of this methodology for the design and development of a security culture evaluation tool, that offers recommendations and alternative approaches to workforce training programs and techniques. The model has been designed to easily adapt on various application domains while focusing on their unique characteristics. The paper concludes on applications of our instrument on security-critical domains, and its contribution to current research by providing deeper insights regarding the human factor in cybersecurity.

Interested in reading more? You can get the complete paper here.

On November 12, NTUA presented their SBA tool at the Cyberwatching.eu webinar. It was a really nice webinar with some key points and actual project results being showcased during the webinar. We managed to gather 88 live participants (out of 120 registrants) from 16 countries across the globe.

In the webinar DEFeND, EnergyShield, SDN-microSENSE and SealeGRID projects participated. Majority of the attendees came from 16 countries around the globe: 15 EU and 1 Non-EU/global. For the EU, Greece is by far the most represented country (33), followed by Belgium and Italy (8), Spain and Romania (6), and France and Germany (5). The majority of them are educational institutions (36%), followed by Small and Medium Enterprises (SMEs) (25%), Large Enterprises (14%), government and public administrations (10%) and non-profit organisations (8%).

If you did not manage to attend the webinar, you can get the slides here.

Finally, here is a video from the presentations:

On October 22nd, EnergyShield objectives, tools and pilots were presented as part of the final day of the international congress BioBioEnergia https://biobioenergia.com/). The congress is annualy organized by the BioBio Region in Chile and gathers experts, professionals, enterprises and academia from Chile, Latin America and other continents. The consortium was represented by dr. Ana-Maria Dumitrescu (SIMAVI) with her intervention (Smart meters and cybersecurity in energy. European initiatives and examples from Romania (Medidores inteligentes y seguridad cibernética en energía. Iniciativas europeas y ejemplos de Rumania, in Spanish). The Congress was available to the public through several platforms (e.g. tvenerg.com) and had a total audience of almost 675.000 persons in its four days.