Substation Hardening, Security and Monitoring Strategies For Critical Asset Protection, a PNM Case Study Thursday, 7-8AM
|
|
- Loren Sullivan
- 8 years ago
- Views:
Transcription
1 Substation Hardening, Security and Monitoring Strategies For Critical Asset Protection, a PNM Case Study Thursday, 7-8AM Brian Arellano, Project Manager for Advanced Technology & Strategy Department Public Service Company of New Mexico (PNM) Jeffery Fiske, Sr. Systems Integrator TRC Stan Torvik, Senior Engineer TRC 2013 Utilities Telecom Council Transforming Critical Infrastructure
2 Why are we having this discussion? Trust my word and a handshake
3 Advancements in Technology
4 Ready or not the waves are coming
5 ! PNM! Owns and Operates over 3,000 miles of transmission and over 11, 000 miles of distribution.! Over 200 distribution substations! Serving over 500, 000 homes in New Mexico! Generation capacity of more than 2,530 megawatts with a balance of coal, natural gas, nuclear, wind and solar generation! Active participation in research! Cyber Security, Distributed Generation, Station Security, Energy Storage, etc.
6 ! Station Security Project Team! PNM! Brian Arellano, PNM Project Manager, Advanced Technology Group! PNM SME Participating Organizations! Corporate Security! Telecommunications! Business Technology Services! Enterprise Architecture! Environmental Services! Crafts Substation! NERC Compliance! Regulatory Compliance
7 ! Station Security Project Team (continued)! TRC Engineers, Inc. (100 offices, 3000 resources)! Richard Johnson, TRC Infrastructure Project Manager, Principal Engineer! TRC Albuquerque, New Mexico Office! Jeff Fiske, TRC Technology Project Manager, Systems Integrator! TRC San Antonio, Texas Office! TRC Subcontractors! NextGen Security, Inc.! Systems With Intelligence, Inc. (SWI)! Totus Lighting, Inc.! Valmont Structures, Inc.! Purcell Systems, Inc.! Prime Electric, Inc.
8 ! Project Scope! Focus of this project is on Physical Security! Cyber Security is being addressed by separate PNM Team! Project Team acknowledges the critical importance of both! Security Equipment configured to comply with PNM Standards! Engineering, Procurement, and Construction (EPC)! One Stop Shop - Accountability! Flexibility of Pilot environment! Work thru problems with eye to the future! Build vendor relationships! Facilitate Integration of technology real customer input
9 ! Business Case! Critical Infrastructure Electric Utility! National Focus on Critical Infrastructure Protection! Regulatory Imperative NERC CIP V5, NISTIR 7628! Presidential Directive #21 Critical infrastructure and Resilience! Utility Stewardship - Operational Continuity! Utility Asset Protection! Exposure and Damage to Long Lead Time assets! Cost to fix and/or replace is very high! Safety of Employees and Community! Loss of function or physical parts can create hazardous conditions! Compromise of electrical network assets
10 You may not be able to see the top but you have to start somewhere
11 ! Security Technology & Physical Hardening Deployed What do we consider? Physical Hardening! Chain Link vs 10 Concrete vs hardened mesh! Concertina wire! Reinforced Gates and fencing! Gate designs (coordinate with security technology)! Neighborhood proximity/conditions! Security Technology! Components need to be substation hardened! Interoperability Need to work with system architecture! Enable proactive detection not reactive! Local site deterrence such a smart lighting and audio
12 ! Technology Deployed (continued)! Access Control ready! Chains and locks! RFID access control! Card and Biometric Control! NERC sign in/out logs! Wired vs wireless control! Database validation/expiration! Rapid changes required to defeat vindictive actions
13 ! Technology Deployed (continued)! Digital Video Recording Server! Computing power to process analytics and controls! Interface flexibility! Interoperability standards - secure protocols! Digital Video Management System! Central Security Operations (Enterprise or Operations Center)! Report by exception (save back-haul bandwidth)! Real-time Query! Archive Server! Permanent record! Legal Trail
14 ! Technology Deployed (continued)! Video Cameras - benefits! Thermal detection (personnel vs asset monitoring)! Motion detection! Infrared detection! Analytical features asset protection! Full motion pan, tilt, zoom! Overlapping coverage! Connection to lighting controllers! Video storage (Local and Central Archive)! Silent transmissions backhaul limits! Event transmissions backhaul capacity
15 ! Technology Deployed (continued)! Lighting! Daylight Quality (improve picture quality)! Controllable (variable intensity)! Down-tilt shields for neighborhood protection! LED vs Sodium vapor vs incandescent! Surprise flash patterns! Dynamic for event highlight! Perimeter vs Interior Lighting
16 ! Technology Deployed (continued)! Sound! Loud alarms/sirens! Voice messages from God! Synchronized with lighting! Audio Analytics
17 ! Lessons Learned! Standards! NERC CIP Standards vs future (goal is make ready for V5)! Customer Relationships! Pilot allowed for flexibility! Cross-functional team members! Executive Sponsorship! Consultant Relationships! Full Accountability! Transparent sharing of information! Vendor Relationships! Show me the money! Build trust and accountability! Deliver on commitments
18 ! Lessons Learned (continued)! Supportive Tools are no guarantee for success! Policies! Procedures! Execution of Duty! Training (change management)! Entire Workforce! May require additional steps to daily work patterns! Teamwork (changed responsibilities)
19 Questions? Brian Arellano PNM: Jeff Fiske TRC: Stanford Torvik TRC:
Wireless Remote Video Monitoring
February 2010 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase Plant Safety Comply with Regulations Scalable Reduced Cost Secure and Reliable Communications Full
More informationProducts. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION
Products. Technology. Services. Delivered Globally. PROTECTING CRITICAL INFRASTRUCTURE SOLUTION THE ANIXTER DIFFERENCE Organizations responsible for building and maintaining critical infrastructures face
More informationEFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013
EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 1 AGENDA Why Cybersecurity? A Few Helpful Cybersecurity Concepts Developing Expertise:
More informationGoing Critical. How to Design Advanced Security Networks for the Nation s Infrastructure. w w w. G a r r e t t C o m. C o m
Going Critical How to Design Advanced Security Networks for the Nation s Infrastructure Going Critical: Networks for Physical Security Increasing concerns and market growth Asset protection Public safety
More informationWireless Remote Video Monitoring
October 2014 Page 1 An Emerson Smart Solution brings visual information into your control room. Increase plant safety Comply with regulations Scalable Reduced cost Secure and reliable communications Full
More informationSite Surveillance, Project Management and Communications System for Remote Locations in High-Risk Environments
Updated Sept 29, 2011 SITE MAST-R MOBILE SECURITY/TELECOM Site Surveillance, Project Management and Communications System for Remote Locations in High-Risk Environments A major problem in providing security
More informationVideo Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance
S O L U T I O N PA P E R Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance Table of Contents Fixed Video Surveillance: The Big Three... 3 Wireless
More informationMore than Just Monitoring - A Virtual Technician
Next Generation Monitoring of Substations More than Just Monitoring - A Virtual Technician C. Harper Anderton Contents Introduction... 1 Smoke signals vs fiber optic... 1 Standard response vs smart response...
More informationDocument ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
More informationNetwork Infrastructure Considerations for Smart Grid Strategies By Jim Krachenfels, Marketing Manager, GarrettCom, Inc.
Network Infrastructure Considerations for Smart Grid Strategies By Jim Krachenfels, Marketing Manager, GarrettCom, Inc. The Smart Grid is having a decided impact on network infrastructure design and the
More informationIEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
More informationSymphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
More informationCyber Security. Doug Houseman Doug@Enernex.com. Engineering Consulting Research. Modeling Simulation Security. The Practical Grid Visionaries TM
Cyber Security Engineering Consulting Research Modeling Simulation Security Doug Houseman Doug@Enernex.com The Practical Grid Visionaries TM Warnings The costs given are based on prior projects They may
More informationSCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
More informationExtreme Networks Solutions for Microsoft Skype for Business Deployments SOLUTION BRIEF
Extreme Networks Solutions for Microsoft Skype for Business Deployments SOLUTION BRIEF EXTREME NETWORKS SOLUTION BRIEF Extreme Networks Automated Quality of Service and Analytics Solution for Microsoft
More informationThe Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution
More informationDESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
More informationOctober 2014. Field Area Communication Networks for Digital Oil and Gas Fields
October 2014 Field Area Communication Networks for Digital Oil and Gas Fields The digital oil and gas field The challenge More wells More area More monitoring and control More information The old SCADA
More informationCyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
More informationTASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
More informationUtility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008
Utility Telecom Forum Robert Sill, CEO & President Aegis Technologies February 4, 2008 1 Agenda Asked to describe his job, Mike Selves, director of Emergency Management and Homeland Security in Johnson
More informationGE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
More informationCan I Cost-Effectively Monitor Critical Remote Locations?
WHITE PAPER Can I Cost-Effectively Monitor Critical Remote Locations? The Technical and Business Cases for Solar-Powered, Wireless Remote Video Surveillance 2015 MicroPower Technologies, Inc. Introduction
More informationHow to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework Jacques Benoit, Cooper Power Systems Inc., Energy Automations Solutions - Cybectec Robert O Reilly, Cooper
More informationWhat Is a Smart Building? p. 1 Brief History p. 1 What Is a Smart Building? p. 3 The Foundations of a Smart Building p. 7 Overview p.
Preface p. xiii What Is a Smart Building? p. 1 Brief History p. 1 What Is a Smart Building? p. 3 The Foundations of a Smart Building p. 7 Overview p. 7 The Framework for Referencing Integration p. 8 Physical
More informationPortable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
More informationCisco Incident Response and Workforce Enablement for the Utility
Cisco Incident Response and Workforce Enablement for the Utility Over the next ten years, it is predicted that aging energy infrastructure and utility industry workforce will undergo their greatest transition
More informationCyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
More informationData Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationAD11-6-000 FERC Technical Conference February 8, 2011 Statement of Ron Litzinger. President, Southern California Edison Company
AD11-6-000 FERC Technical Conference February 8, 2011 Statement of Ron Litzinger President, Southern California Edison Company Good afternoon, Chairman Wellinghoff, Commissioners, and FERC staff. I am
More informationEnabling the SmartGrid through Cloud Computing
Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from
More informationIntroduction. Along with consulting, I previously. developing regulatory policy initiatives
1 Customer Data Privacy in AMI Applications Will McNamara Sr. Manager, Energy & Utilities West Monroe Partners 2 Introduction Will McNamara, Senior Manager, and Lead for WMP s Regulatory Support & Stakeholder
More informationTechnology & Security Advances. Presented by: Tommy Thornton Director of Technology
Technology & Security Advances Presented by: Tommy Thornton Director of Technology Security Risk in Healthcare Security Risk in Healthcare 2014 International Healthcare Security & Safety Foundation Study
More informationLessons Learned from AMI Pioneers Follow the Path to Success
welcome Lessons Learned from AMI Pioneers Follow the Path to Success Joe Cummins, PCIP UTC TELECOM May 2010 394 Simcoe Street South Oshawa, ON L1H 4J4 (905) 404-2009 2 outline security risks in smart grid
More informationChallenges and Opportunities for Aligning the Power System Cybersecurity and Reliability Objectives
Challenges and Opportunities for Aligning the Power System Cybersecurity and Reliability Objectives for Mexico, US and Canada Ameen H. Hamdon SUBNET Solutions Inc. hamdon@subnet.com +1 403 270 8885 Cuernavaca,
More informationSummary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
More informationTotally Wireless Video Security
Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and complexity has limited deployment
More informationPreparing for the Meter Data Deluge An Intelligent Utility Reality Webcast
Preparing for the Meter Data Deluge An Intelligent Utility Reality Webcast 10/15 10/29 June 2, 2011 1/28 Join the conversation on Twitter using #IUWebcasts and follow Intelligent Utility on Twitter @IntelUtil
More informationIBM Enterprise Asset Management
IBM Enterprise Asset November 14 th, 2012 Daniel STAN Tivoli Software Sales, IBM Romania IBM Tivoli 2012 Strategic Capabilities VISIBILITY CONTROL AUTOMATION See and understand your business in real time
More informationHow To Improve Your Energy Efficiency
Conquering Data and Analytics Obstacles in Smart Utilities Copyright 2010 SAS Institute Inc. All rights reserved. The Panel Kate Rowland Editor-in-Chief of Intelligent Utility Magazine Energy Central Alyssa
More informationSecurity in the smart grid
Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationMeeting NERC CIP Access Control Standards. Presented on February 12, 2014
Meeting NERC CIP Access Control Standards Presented on February 12, 2014 Presented By: CyberLock The leading supplier of key-centric access control systems Based in Corvallis, Oregon James T. McGowan Technology
More informationHow To Protect Your Business With Cms.Com
Security and Workforce Solutions Assurance and Security for a De-Perimeterised World IP-based digital cameras and Analytics are revolutionising the security and surveillance market. They help in detection
More informationOpen Enterprise Architectures for a Substation Password Management System
CIGRÉ Canada 21, rue d Artois, F-75008 PARIS (154) Conference on Power Systems http : //www.cigre.org Toronto, October 4-6, 2009 Open Enterprise Architectures for a Substation Password Management System
More informationWireless Systems. Make Non-traditional Measurements Possible
Wireless Systems Make Non-traditional Measurements Possible Sponsored by From Process and Environmental Monitoring to Asset Management and Safety, Apprion s Wireless Solutions Can Save Lives, Increase
More informationDubai Internet City, Building # 11, Office 408. Tel: 04-454 2122, Fax: 04-454 2123, Mob: +971-50-421 9691, P.O.Box-500466 US21 Inc.
Dubai Internet City, Building # 11, Office 408. Tel: 04-454 2122, Fax: 04-454 2123, Mob: +971-50-421 9691, P.O.Box-500466 US21 Inc. A commitment to support our clients wherever and whenever they may need
More informationManage Utility IEDs Remotely while Complying with NERC CIP
Manage Utility IEDs Remotely while Complying with NERC CIP Disclaimer and Copyright The information regarding the products and solutions in this document are subject to change without notice. All statements,
More informationPreparing for Distributed Energy Resources
Preparing for Distributed Energy Resources Executive summary Many utilities are turning to Smart Grid solutions such as distributed energy resources (DERs) small-scale renewable energy sources and energy
More informationCyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
More informationBEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA ) ) ) ) ) )
BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA Order Instituting Rulemaking on the Commission s Own Motion to Improve Distribution Level Interconnection Rules and Regulations for Certain
More informationvisit us on the web at: www.strategicsecuritycorp.com
CAMERAS & ALARMS Closed Circuit Television (CCTV) / SMART Home Structured Wiring & Systems Commercial and Residential Alarm Systems / Central Monitoring Integrated Access Control Systems (Proximity Cards,
More informationSecure Ports Solutions
Solutions Grupo Revenga is a leading provider of telecommunications and information technology solutions, electronic security and energy efficiency. The company offers comprehensive end-to-end solutions
More informationfuture data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
More informationAsset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure
Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure Presentation to the U.S. Department of Energy by the IEEE Joint Task Force on QER Trends: Resilience
More informationCHOOSING A WIRELESS IMPLEMENTATION STRATEGY AND APPLICATIONS
WHITE PAPER CHOOSING A WIRELESS IMPLEMENTATION STRATEGY AND APPLICATIONS Sachin Gupta, Sr. Wireless Consultant WHAT S INSIDE: 1. Introduction 2 2. Key Considerations before Selecting a Wireless Solution
More informationSecure Wireless Infrastructure
Secure Wireless Infrastructure Greg Burns Invensys Process Systems Collaborating to Advance Control System Security Secure Wireless Infrastructure Wireless Technologies Applications Case Studies Concerns
More informationThe College Business Model of Colorado Springs Utilities Utilities
The College Business Model Colorado Springs Utilities Todd Thomas 1. Background Information Colorado Springs Utilities Colorado Springs Utilities is a 4-service municipal utilities company located at the
More informationWireless Video Best Practices Guide
Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager
More informationSFPUC s Automated Water Meter Program San Francisco s meter deployment and customer engagement July 21, 2015. Heather Pohl, AWMP Program Manager
SFPUC s Automated Water Meter Program San Francisco s meter deployment and customer engagement July 21, 2015 Heather Pohl, AWMP Program Manager 1 Presentation Points SFPUC & Automated Water Meter Program
More informationi-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
More informationWhat Risk Managers need to know about ICS Cyber Security
What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 joe.weiss@realtimeacs.com ICSs What are they
More informationServer Monitoring & Management Services
Server Monitoring & Management Services Monitor and manage your applications and servers under enterprise-class monitoring solutions, and protect your business from planned and unplanned downtime. ITI
More informationUtility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
More informationSMART ENERGY. The only cloud that speeds up your. cloud services. broadband for smart grids. Last Mile Keeper
SMART ENERGY cloud services broadband for smart grids Last Mile Keeper The only cloud that speeds up your Energy Management System Introduction Smart Grids are the result of the merging between power and
More informationSMART ENERGY SMART GRID. More than 140 Utilities companies worldwide make use of Indra Solutions. indracompany.com
SMART GRID Solutions More than 140 Utilities companies worldwide make use of Indra Solutions indracompany.com SMARt ENERGY SMART GRID Solutions Integrated Solutions for Smart Grid Management Electrical
More informationKeeping the Lights On: Security Priorities for the 21 st Century. Harvard Energy Policy Group June 13, 2014 Tamara Linde Vice President Regulatory
Keeping the Lights On: Security Priorities for the 21 st Century Harvard Energy Policy Group June 13, 2014 Tamara Linde Vice President Regulatory The PSEG Companies PSEG Fast Facts Assets: $32.5 billion
More informationIP Video Door Stations
White paper IP Video Door Stations Enhancing video surveillance with communication and entry control Table of contents 1. IP to keep an eye at the door 3 2. New technology, new possibilities 4 3. Benefits
More informationSolutions and IT services for Oil-Gas & Energy markets
Solutions and IT services for The context Companies operating in the Oil-Gas & Energy sectors are facing radical changes that have a significant impact on their business processes. In this context, compliance
More informationWhat are cloud services?
Stay Connected: Leveraging the Cloud and Mobile Applications for Enhanced Security Jumbi Edulbehram, Next Level Security Systems Kevin Dailey, Unified Physical Security What are cloud services? Delivery
More informationManufacturing Control Systems {SCADA} Vulnerability and RFID Technologies
Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies DR. O. GEOFFREY EGEKWU and JIM RIDINGS Institute for Infrastructure and Information Assurance (IIIA) James Madison University Functions
More informationCisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable
More informationUrban School District Centralizes Physical Security Systems
Customer Case Study Urban School District Centralizes Physical Security Systems Memphis City Schools implemented high-definition IP-based video surveillance cameras and physical access controls. EXECUTIVE
More informationWhite Paper. Choosing a Wireless Implementation Strategy and Applications. What s Inside:
White Paper Choosing a Wireless Implementation Strategy and Applications Author: Sachin Gupta, Sr. Wireless Consultant What s Inside: 1. Introduction 2. Key Considerations before Selecting a Wireless Solution
More information1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
More informationSTREAM PRIVATE DATA CENTER SAN ANTONIO MARKET WESTOVER HILLS. 2001 Ross Avenue, Suite 2800 Dallas, Texas 75201. www.streamdatacenters.com 866.301.
STREAM PRIVATE DATA CENTER SAN ANTONIO MARKET WESTOVER HILLS 2001 Ross Avenue, Suite 2800 Dallas, Texas 75201 www.streamdatacenters.com 866.301.0901 2 SECURE INDEPENDENT EFFICIENT SECURE Concrete roof,
More informationOPERATIONS CAPITAL. The Operations Capital program for the test years is divided into two categories:
Filed: September 0, 00 EB-00-0 Tab Schedule Page of OPERATIONS CAPITAL.0 INTRODUCTION Operations Capital funds enhancements and replacements to the facilities required to operate the Hydro One Transmission
More informationKeeping the Lights On
Keeping the Lights On Fundamentals of Industrial Control Risks, Vulnerabilities, Mitigating Controls, and Regulatory Compliance Learning Goals o Understanding definition of industrial controls o Understanding
More informationSWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
More informationNERC Cyber Security Standards
SANS January, 2008 Stan Johnson Manager of Situation Awareness and Infrastructure Security Stan.johnson@NERC.net 609-452-8060 Agenda History and Status of Applicable Entities Definitions High Level of
More informationCyber Security Response to Physical Security Breaches
Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically
More informationSecurity Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
More informationCDW PARTNER REVIEW GUIDE WIRELESS INFRASTRUCTURE
CDW PARTNER REVIEW GUIDE WIRELESS INFRASTRUCTURE DIRECTION OF THE WIRELESS MARKET AND THE INFRASTRUCTURE THAT SUPPORTS IT As mobile devices become more common in the workplace, IT managers must prepare
More informationIs backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure
Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure The LTE backhaul challenge Communication Service Providers (CSPs) are adopting LTE in rapid succession.
More informationIn 1995, the first company in the history of voice over internet protocol put a product on the market.
VoIP HOW VOIP STARTED Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol networks, such as the Internet.
More informationSTREAM PRIVATE DATA CENTER
STREAM PRIVATE DATA CENTER SAN ANTONIO 75,840 SF stand-alone hardened Private Data Center 30,000 SF of raised floor data center space Three (3) Private Data Center Suites 1,200 KW critical load per Private
More informationDan T. Stathos, CPA* Associate Director
Dan T. Stathos, CPA* dstathos@navigant.com Austin, Texas Direct: 512.493.5415 Professional Summary Dan Stathos, an in NCI s Austin, Texas office, has been involved with electric, gas, water and telephone
More informationCyber security measures in protection and control IEDs
Cyber security measures in protection and control IEDs K. Hagman 1, L.Frisk 1, J. Menezes 1 1 ABB AB, Sweden krister.hagman@se.abb.com Abstract: The electric power grids and power systems are critical
More informationUtility Modernization Cyber Security City of Glendale, California
Utility Modernization Cyber Security City of Glendale, California Cyber Security Achievements Cyber Security Achievements (cont) 1. Deploying IT Security Awareness training program Q4 2012 2. Purchased
More informationBank of America s RFID Data Center Inventory Project
Bank of America s RFID Data Center Inventory Project Tim McGee, VP, Technical Project Team Manager, Global Data Center Program Luke Rennells, VP and Sr. Consultant II, Data Center Program One of the world
More information2012 Smart Grid Peer Review Meeting San Diego, CA. Los Angeles Department of Water and Power Smart Grid Regional Demonstration Program
2012 Smart Grid Peer Review Meeting San Diego, CA Los Angeles Department of Water and Power Smart Grid Regional Demonstration Program Mukhles Bhuiyan Program Director June 8, 2012 Smart Grid Regional Demonstration
More informationData Centers. Defense in depth. Network video protection for data centers.
Data Centers Defense in depth. Network video protection for data centers. We ve got your Just like all effective security systems, yours depends on depth. On layer upon layer of protection, with your critical
More informationSupporting our customers with NERC CIP compliance. James McQuiggan, CISSP
Supporting our customers with NERC CIP compliance James, CISSP Siemens Energy Sector Energy products and solutions - in 6 Divisions Oil & Gas Fossil Power Generation Renewable Energy Service Rotating Equipment
More informationClimbing the renewables O&M learning curve
www.pwc.com/cleantech Climbing the renewables O&M learning curve Lessons from utilities and telecom for solar and wind asset managers March 2013 As the pace of renewables installations continues to accelerate,
More informationReliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
More informationBuildings Business. Chris Curtis President & CEO Buildings Business Schneider Electric. June 2009
Buildings Business Chris Curtis President & CEO Buildings Business Schneider Electric June 2009 We help the best buildings in the world get that way. Schneider Electric Buildings Business 2009 2 Agenda
More informationSecuring the Electric Grid with Common Cyber Security Services Jeff Gooding
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding TCIPG Seminar April 4, 2014 Southern California Edison (SCE) is committed to safely providing reliable and affordable electricity
More informationIndustrial Cyber Security 101. Mike Spear
Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security Mike.spear@honeywell.com Responsible for the Global Delivery of Honeywell
More informationNext Generation Compliance: Strategic Plan 2014 2017
Next Generation Compliance: Strategic Plan 2014 2017 U.S. Environmental Protection Agency Office of Enforcement and Compliance Assurance Washington, DC 20460 October 2014 US Environmental Protection Agency
More information