Consulting International
|
|
|
- Joy Johnson
- 10 years ago
- Views:
Transcription
1 NIST Cyber Security Working Group (CSWG) NISTIR 7628: NIST Guidelines for Smart Grid Cyber Security Frances Cleveland Xanthus Consulting International Xanthus Consulting International
2 Topics NIST Cyber Security Activities NISTIR 7626 Guidelines for Smart Grid Cyber Security CSWG Standards Subgroup: Assessment of Information Exchange Standards CSWG Privacy Subgroup: Addressing privacy issues for the Smart Grid
3 NIST Cyber Security Activities NIST established the Cyber Security Working Group (CSWG) in 2009 Originally called the CSCTG Has over 500 members Has established many (>12) very active Subgroups, including High Level Requirements, Vulnerabilities, Bottom-Up, Architecture, Standards Assessment, and Privacy Established liaisons with NERC, and influenced their next CIP versions CSWG Goal: Develop an overall cyber security strategy for the Smart Grid that includes a risk mitigation strategy to ensure interoperability Include prevention, detection, response, and recovery Developed the NIST Interagency Report (NISTIR) 7628
4 NISTIR 7628: Guidelines for Smart Grid Cyber Security Volume 1: Smart Grid Cyber Security Strategy Architecture High Level Requirements Key Management Volume 2: Privacy Volume 3: Vulnerabilities Bottom-Up Issues Research and Development Other supportive material
5 NIST Cyber Security Strategy All-Hazards Approach Deliberate attacks Inadvertent compromises Natural disasters Recognition of Key Requirement: Power System Reliability Use of IT security measures: role-based access, key management Use of existing power system engineering and applications for reliability Extend and upgrade engineering and applications Newer Area: Confidentiality and Privacy Privacy for customer-related personal information particularly related to Smart Meters Confidentiality for market, financial, corporate, and other sensitive information Defense in depth: policy, prevention, detection, notification, coping, recovery, auditing
6 NIST High Level Security Requirements Security Architecture based on FERC diagrams that identified key interfaces Security Requirements Analysis is based on a number of components: Diagrams of logical interfaces between actors in the Smart Grid Interface Categories that allow the hundreds of logical interfaces to be organized and categorized Smart Grid Catalog of Security Requirements applied to Interface Categories Excellent checklist for security requirements!
7 NIST Architecture Diagram (Spaghetti Diagram) (an example of why the NISTIR needs interpretation )
8 NIST Security Interface Categories Interface categories are used to organize and categorize the hundreds of logical interfaces Logical interfaces are drawn between actors in the diagrams Attributes of these logical interfaces were used to develop 22 Categories. Examples include: 1 4 cover communications between control systems (typically centralized applications such as a SCADA master station) and equipment as well as communications between equipment, with different availability and media constraints 5 6 cover the interfaces between control systems either within the same organization or between organizations 10 covers the interfaces between control systems and noncontrol/corporate systems 14 covers the interfaces between systems that use the AMI network with high availability requirements, such as for Distribution Automation
9
10 NIST Catalog of Smart Grid Cyber Security Requirements Excellent Checklist! Ref. SG.AC SG.AT SG.AU SG.CA SG.CM SG.CP SG.IA SG.ID SG.IR SG.MA SG.MP SG.PE SG.PL SG.PM SG.PS SG.RA SG.SA SG.SC SG.SI NIST Smart Grid Security Requirements Families Access Control Security Awareness and Training Audit and Accountability Security Assessment and Authorization Configuration Management Continuity of Operations Identification and Authentication Information and Document Management Incident Response Smart Grid system Development and Maintenance Media Protection Physical and Environmental Security Strategic Planning Security Program Management Personnel Security Risk Management and Assessment Smart Grid System and Services Acquisition Smart Grid System and Communication Protection Smart Grid System and Information Integrity
11 CSWG Standards Subgroup Mission Identify and assess the cyber security contained within standards that are commonly used in smart grid applications to ensure adequate cyber security coverage is included Where adequate coverage is not included, to recommend changes that should be made to the standard or other standards that should be applied Have assessed 5 IEC standards and submitted them to FERC Have just finished assessing 9 standards from the NIST Priority Action Plans (PAPs) 11
12 Important Note: Assess Standards at their Appropriate GWAC Stack Layer
13 Five IEC Interoperability Standards Reviewed by NIST for Cyber Security Gaps, then Passed to FERC IEC (better known as ICCP) Security provided by IEC (TLS over TCP/IP) and -4 (for MMS) IEC (Common Information Model (CIM) for transmission wires modeling) Abstract Semantic Model so no security needed in the standard IEC (CIM for distribution, AMI interfaces, asset management) Abstract Semantic Model so no security needed in the standard Recognition that security for CIM implementations is still lacking IEC (for substation automation, distribution automation, and Distributed Energy Resources (DER) Security provided by IEC (TLS over TCP/IP), -4 (for MMS), and -6 (for GOOSE) IEC Cyber Security Series (1-8)
14 One Security Standard Assessment: IEC Mapping of TC57 Communication Standards to IEC Security Standards IEC Part 1: Introduction IEC Part 2: Glossary IEC TASE.2 IEC over MMS IEC GOOSE, GSE, SMV IEC & DNP3 IEC & Serial DNP IEC Part 3: Profiles Including TCP/IP IEC Part 4: Profiles Including MMS IEC Part 5: IEC & Derivatives IEC Part 6: IEC IEC Part 7: Objets for Network Management IEC Part 8: Role-Based Access Control (RBAC) WG15 Status May
15 Nine Standards Released by NIST Priority Action Plans (PAPs) PAP 0: Meter Upgradeability Guidelines addressed cyber security appropriately and mostly completely PAP 1: Internet Protocol Suite IPsec and TLS. Recommended improved network and system management by combining SNMP and NetConf PAP 2: Wireless identified cyber security measures at individual equipment level, but not at wireless system level PAP 4: Scheduling ws-calendar is an abstract model, so no need to address cyber security in the standard PAP 5: Metering identified some security issues with ANSI C12.xx
16 Nine Standards Released by NIST Priority Action Plans (PAPs) PAP 10: Energy Usage the NAESB Energy Usage models are abstract, so no need to address cyber security in the standard PAP 11: Plug-In Electric Vehicles 3 standards Two SAE standards were acceptable from a cyber security perspective with some recommendations (electrical charger connections and PEV Use Cases) Mapping of CIM PEV messages to SEP 2.0 has serious cyber security and design problems (partially since SEP 2.0 does not exist yet)
17 Next Standards Assessment Efforts Next standards to be assessed will be the AMI Standards, including the ANSI C12.xx series In the works --- PAP 7: Energy Storage and Distributed Energy Resources (ES-DER) defined in IEC and being mapped to both SEP 2.0 and DNP3 PAP 8: Distribution Management Use Cases being defined in IEC (interactions with field devices) and in CIM (application-to-application interactions) PAP 12: Mapping between IEC and DNP3 (being used in PAP 7)
18 CSWG Privacy Subgroup NISTIR 7628 contains a very general discussion of privacy issues and concerns Clarifies the distinction between Confidentiality (business, market, safety concerns) and Privacy (personal information). Regulators will ultimately be responsible for stating privacy requirements. Need support to understand the privacy implications of certain types of energy-related information CSWG has on-going work to try to understand what types of data should be private, and to what degree/level (e.g. aggregated data is less private than individual data) Including new areas of PEVs, distributed generation, customer reactions to demand response requests, etc. Privacy team consists primarily of privacy experts Need utility expertise, particularly those involved in AMI, demand response, DER management, and customer interactions Need better understanding of what types of privacy policies may be mandated or need to be addressed by regulators and policy makers
19 Questions? Frances Cleveland Xanthus Consulting International
McAfee Application Control Change Control Integrity Control
PNNL- 21313 Technology Security Assessment for Capabilities and Applicability in Energy Sector Industrial Control Systems: McAfee Application Control Change Control Integrity Control Philip A Craig Jr
Cyber Security for DER Systems
Cyber Security for DER Systems Version 1.0 July 2013 National Electric Sector Cybersecurity Organization Resource (NESCOR) Cyber Security for DER Systems Version 1.0 July 2013 Authors: Frances Cleveland,
Secure Machine to Machine Communication on the example of Smart Grids
Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
1. OVERVIEW: IEC TC57 WG15 SECURITY FOR POWER SYSTEM COMMUNICATIONS... 1 2. DUAL INFRASTRUCTURES: THE POWER SYSTEM AND THE INFORMATION SYSTEM...
IEC TC57 WG15: IEC 62351 Security Standards for the Power System Information Infrastructure Frances Cleveland, WG15 Convenor Xanthus Consulting International Contents 1. OVERVIEW: IEC TC57 WG15 SECURITY
NIST Coordination and Acceleration of Smart Grid Standards. Tom Nelson National Institute of Standards and Technology 8 December, 2010
NIST Coordination and Acceleration of Smart Grid Standards Tom Nelson National Institute of Standards and Technology 8 December, 2010 The Electric Grid One of the largest, most complex infrastructures
Cyber Security Working Group
Cyber Security Working Group National Institute of Standards and Technology U.S. Department of Commerce 1 Energy Independence and Security Act In the Energy Independence and Security Act (EISA) of 2007,
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security
Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security The Smart Grid Interoperability Panel Cyber Security Working Group September 2010 Table of Contents Table of Contents...2 1. Introduction
Security Issues for the Power Automation Industry in Central/South America. Juan Esteban Hoyos Pareja Timothy X. Brown Mark Dehus
Security Issues for the Power Automation Industry in Central/South America 1 Juan Esteban Hoyos Pareja Timothy X. Brown Mark Dehus 1 2 A Practical Attack on Cyber-infrastructure University of Colorado
Xanthus. Consulting International. Frances M. Cleveland President & Principal Consultant, Xanthus Consulting International. Key Qualifications:
Xanthus Consulting International 369 Fairview Ave, Boulder Creek, CA 95006 Phone 831 338-3175; Cell 831 229-1043 Email: [email protected] Web: xanthus-consulting.com Key Qualifications: Frances
Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
Using Architecture to Guide Cybersecurity Improvements for the Smart Grid
Using Architecture to Guide Cybersecurity Improvements for the Smart Grid Elizabeth Sisley, Ph.D. 1 Agenda Context US Smart Grid 7 Domains Logical Reference Model Cybersecurity requirements ConfidenCality,
ZigBee IP Stack Overview Don Sturek Pacific Gas and Electric (PG&E) 2009 ZigBee Alliance. All rights reserved. 1
ZigBee IP Stack Overview Don Sturek Pacific Gas and Electric (PG&E) 1 Presenter Background Pacific Gas and Electric Company Northern and Central California Gas and Electric Utility Company (including San
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
Appropriate security measures for smart grids
1 Appropriate security measures for smart grids Guidelines to assess the sophistication of security measures implementation [2012-12-06] 1 Copyright TenneT Appropriate security measures for smart grids
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
Communication Security Measures for SCADA Systems
Communication Security Measures for SCADA Systems Ron Farquharson, MV Consulting, DNP User Group Jim Coats, Triangle MicroWorks, DNP User Group Joe Stevens, Triangle MicroWorks 23 September 2014, Raleigh,
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
Cyber Security Working Group
Cyber Security Working Group Guidelines for Smart Grid Cyber Security (NISTIR 7628) National Institute of Standards and Technology U.S. Department of Commerce 1 Today s Electric Grid Markets and Operations
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Guide to Developing a Cyber Security and Risk Mitigation Plan
NRECA / Cooperative Research Network Smart Grid Demonstration Project Guide to Developing a Cyber Security and Risk Mitigation Plan DOE Award No: DE-OE0000222 National Rural Electric Cooperative Association,
National Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair [email protected] 1 The National Institute of Standards
Cyber Security Practical considerations for implementing IEC 62351
1. Introduction Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB [email protected] Switzerland Two trends are currently changing
ISO/RTO Council Comments on National Institute of Standards and Technology Proposed Smart Grid Interoperability Standards
ISO/RTO Council Comments on National Institute of Standards and Technology Proposed Smart Grid Interoperability Standards Pursuant to the Notice posted in the Federal Register on June 9, 2009, the ISO/RTO
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure
Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure Presentation to the U.S. Department of Energy by the IEEE Joint Task Force on QER Trends: Resilience
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
Testing Intelligent Device Communications in a Distributed System
Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) [email protected] United States Smart Grid systems
Help for the Developers of Control System Cyber Security Standards
INL/CON-07-13483 PREPRINT Help for the Developers of Control System Cyber Security Standards 54 th International Instrumentation Symposium Robert P. Evans May 2008 This is a preprint of a paper intended
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3
What Risk Managers need to know about ICS Cyber Security
What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] ICSs What are they
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
NERC CIP Tools and Techniques
NERC CIP Tools and Techniques Supplemental Project - Introduction Webcast Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs [email protected] (843) 619-0050 October
Flexible Plug & Play Smart grid cyber security design and framework. Tim Manandhar
Flexible Plug & Play Smart grid cyber security design and framework Tim Manandhar Agenda Cyber security for smart grids Smart Grid cyber security framework FPP project approach on Cyber security Conclusions
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding TCIPG Seminar April 4, 2014 Southern California Edison (SCE) is committed to safely providing reliable and affordable electricity
IEEE Standards Activities in the Smart Grid Space (ICT Focus)
This document contains supplemental information referenced by the European Rolling Plan for ICT Standardisation IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview IEEE, through the
Cyber Security. Smart Grid
Cyber Security for the Smart Grid Peter David Vickery Executive Vice President N-Dimension Solutions Inc. APPA National Conference June 21, 2010 Cyber Security Solutions For Cyber Security
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework Jacques Benoit, Cooper Power Systems Inc., Energy Automations Solutions - Cybectec Robert O Reilly, Cooper
How Much Cyber Security is Enough?
How Much Cyber Security is Enough? Business Drivers of Cyber Security Common Challenges and Vulnerabilities Cyber Security Maturity Model Cyber Security Assessments September 30, 2010 Business in the Right
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System
CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System Purpose CIP-005-5 R2 is focused on ensuring that the security of the Bulk Energy System is not compromised
INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT
Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
Cyber Security Health Test
ENERGY Cyber Security Health Test Robin Massink 20-05-2014 1 DNV GL 2013 2014 20-12-2013 SAFER, SMARTER, GREENER Cyber security issues facing the utility industry We are moving from IEC60870-5-101/ DNP3
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
Cyber security measures in protection and control IEDs
Cyber security measures in protection and control IEDs K. Hagman 1, L.Frisk 1, J. Menezes 1 1 ABB AB, Sweden [email protected] Abstract: The electric power grids and power systems are critical
Testimony of Patrick D. Gallagher, Ph.D. Deputy Director
Testimony of Patrick D. Gallagher, Ph.D. Deputy Director National Institute of Standards and Technology United States Department of Commerce Before the Committee on Energy and Natural Resources United
How To Protect Your Network From Attack
Liste von ausgewählten Cybersecurity-Normen, -Standards und -Richtlinien mit Smart-Grid-Relevanz: Advanced Security Acceleration Project Smart Grid (ASAP-SG): Entwicklung von Security Anforderungen für
Redefining MDM for a Smart Grid Enabled
Redefining MDM for a Smart Grid Enabled Enterprise Florida Power and Light Radha Swaminathan Director, AMI Information Technology, MDM and its future in a smart grid enabled enterprise A key component
DIN/DKE Roadmap GERMAN
DIN/DKE Roadmap GERMAN S TA N D A R D I Z AT I O N R O A D M A P I T- S E C U R I T Y Ve r s i o n 2 Ve r s i o n 1 Contents Contents 1 0 Foreword to 2 nd edition 2 1 Introduction 2 1.1 General 2 1.2 IT
Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1
APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Cyber Security Seminar KTH 2011-04-14
Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid [email protected] Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon
Guide to Developing a Cyber Security and Risk Mitigation Plan Update 1
NRECA / Cooperative Research Network Smart Grid Demonstration Project Guide to Developing a Cyber Security and Risk Mitigation Plan Update 1 DOE Award No: DE-OE0000222 National Rural Electric Cooperative
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
Overview of broadband powerline communications
January 23, 2015 Overview of broadband powerline communications Jean-Philippe Faure, CEO Progilon Senior consultant at Panasonic System Networks Director Technology Standards at HD-PLC Alliance Biography
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
THE FUTURE OF SMART GRID COMMUNICATIONS
THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
Cyber Security Compliance (NERC CIP V5)
Cyber Security Compliance (NERC CIP V5) Ray Wright NovaTech, LLC Abstract: In December 2013, the Federal Energy Regulatory Commission (FERC) issued Order No. 791 which approved the Version 5 CIP Reliability
Energy Cybersecurity Regulatory Brief
Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Dr. György Kálmán [email protected]
COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán [email protected] Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
Open Enterprise Architectures for a Substation Password Management System
CIGRÉ Canada 21, rue d Artois, F-75008 PARIS (154) Conference on Power Systems http : //www.cigre.org Toronto, October 4-6, 2009 Open Enterprise Architectures for a Substation Password Management System
1. Security Requirements for Human Users and Software Applications Which Interact with Automation Systems
Suggestions for What Security Topics to Include in Standards and Specifications Frances Cleveland ([email protected]) 1 1 1. Security Requirements for Human Users and Software Applications
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE COMMITTEE ON ENERGY AND NATURAL RESOURCES UNITED STATES SENATE
Redesigning automation network security
White Paper WP152006EN Redesigning automation network security Presented at Power and Energy Automation Conference (PEAC), Spokane, WA, March 2014 Jacques Benoit Eaton s Cooper Power Systems Abstract The
Facilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
Implementation Plan for Version 5 CIP Cyber Security Standards
Implementation Plan for Version 5 CIP Cyber Security Standards April 10September 11, 2012 Prerequisite Approvals All Version 5 CIP Cyber Security Standards and the proposed additions, modifications, and
Lessons Learned from AMI Pioneers Follow the Path to Success
welcome Lessons Learned from AMI Pioneers Follow the Path to Success Joe Cummins, PCIP UTC TELECOM May 2010 394 Simcoe Street South Oshawa, ON L1H 4J4 (905) 404-2009 2 outline security risks in smart grid
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
SMART ENERGY SMART GRID. More than 140 Utilities companies worldwide make use of Indra Solutions. indracompany.com
SMART GRID Solutions More than 140 Utilities companies worldwide make use of Indra Solutions indracompany.com SMARt ENERGY SMART GRID Solutions Integrated Solutions for Smart Grid Management Electrical
