ISA99 Working Group 5 ISA99 Working Group 5
|
|
- Jonathan Hubbard
- 8 years ago
- Views:
Transcription
1 Date: May 14, 2015 Time: 11:00 ET US Lead: E. Cosman Notes: E. Cosman Distribution: ISA99 committee and stakeholders ISA99 Working Group 5 ISA99 Working Group 5 ISA 67 Alexander Drive PO Box Research Triangle Park, NC Telephone 919/ Fax 919/ Name Affiliation Group Present Ayman Al-Issa WG1 Eliana Brazda ISA Staff P Eric Cosman OIT Concepts LLC Chair P William Cotter 3M PI&CS WG6 P John Cusimano AE Solutions WG7 Jim Gilsinn Kenexis WG2 Andrew Ginter Waterfall WG1 Tom Good DuPont WG2 Vic Hammond Argonne National Laboratory WG12 P Dennis Holstein Opus Consulting Group WG12 Lee Neitzel Consultant TC65 WG10 Johan Nye ExxonMobil WG4 Tom Phinney Consultant TC65 WG10 Jeff Potter Emerson Process Management WG3/4/7 P Charley Robinson ISA Staff P Ragnar Schierholz ABB WG3 Kevin Staggs Honeywell Corporate Research WG4 Herman Storey Consultant WG9 P Donovan Tindill Honeywell WG6 Joe Weiss Applied Control Solutions WG11 P P Present; p Partial attendance; D Declined or Unavailable Page 1 of 5
2 1. Old Business 1.1 Action Items The following are pending from previous meetings:- ID Action Item Responsibility Status Comments 12 Work with Jake Jackson on the process for embedding writers in the work and task groups. 24 Develop a single timeline that shows projected milestones for each of the work products. 32 Have WG4 discuss how to address supply chain, including manufacturing requirements for cybersecurity. 34 Poll WG5 members about the possibility of rescheduling these calls. Eric Suspended Eric has opened an dialog with Jake. The first step is to describe the role. Charley, Eric Closed The timeline tool is in place. Now we have to keep the data current. Johan N. Open Eric C. Closed Eric sent a note to WG5 to get feedback. Add link to milestone plan to minutes, as well as the Wiki. 2. New and Continuing Business In addition to regular work group updates the following specific topics will be addressed in this meeting. Face to face meeting plans Insurance Interest 3. Working Group Updates 3.1 WG1: Technologies (From April 30): Ayman reported that the meeting this week was well attended by the group; the discussion covered authentication methods, VPNs, industrial cybersecurity, etc. There was no report from this group. 3.2 WG2: Security Program (From April 30): Jim G. noted that he should have the draft of ISA by Monday, a cleaned up version with material that updates the requirements from the 2009 edition. Jim has posted the latest draft of ISA on the portal. 3.3 WG3: Concepts and Models (From April 30): There was no report from this group. This group met on Monday. The primary topic discussed was the relationship between the various life cycles used in the series. The group agreed that the general model developed by Pierre and Ragnar and the more focused model offered by John Cusimano are complementary. 3.4 WG4: Technical Requirements (From April 30): This group did not meet this week. The WG4 leaders did not meet his week. Page 2 of 5
3 3.5 WG6: Patch Management (From April 30): Jim G. has completed ISA-TR and is getting the IEC version cleaned up and should be done with it today or tomorrow. He will be ready to go with publication of ISA-TR shortly. The final documents are complete (ISA and IEC versions). WG6 is conducting a survey about next steps. This group has no plans to meet in Frankfurt. 3.6 WG7: Safety & Security (From April 30): ISA84 met and there was discussion about the safety & security technical report. Jim is continuing his work with that group, along with other members of WG7. TG1 met in the regular WG12 time slot. They are waiting for revisions to ISA Based on comments from Hal Thomas, Vic Maggioli and other ISA84 members it appears that ISA84 and ISA99 are aligned with respect to the security and safety topic. Dennis Holstein will be providing a summary of status at the planned meeting of the IEC ad-hoc group in Vienna. 3.7 WG8: Communication and Outreach (From April 30): There was no update from this Work Group. There was no update from this Work Group. Our recent difficulties in getting the news out about our Frankfurt meeting point out the need to focus more on communications. 3.8 WG9: Wireless and Security JWG (From April 30): There was no report from this group. Herman was asked to give a talk at the ISA Analysis Division Symposium in Galveston, Texas. The stated theme was remote access, but it developed more into a security topic, related to third party (vendor) remote access. There was good discussion but no formal follow-up. Jeff said that his experience has been that best practices involve a single portal maintained by the customer that provides an entry point for all vendors. It is important to make sure that remote access is secure during assembly, commissioning, FAT, etc. This is more of a topic for ISA99 than ISA100. Specific guidelines are required. This is a possible use case for ISA WG11: ISA99-ISA67 JWG on cyber security for nuclear plants (From April 30): Joe submitted comments on the TC45A CD. There is an IAEA meetings in the first week of June. Joe will be presenting, as well as participating on a panel on standards WG12: Metrics (From April 30): The group is on schedule for a mid-june circulation of the draft for comment; the draft document has gone through several edits. The charter for WG12 was approved by ISA99, unanimously approved. The group is working to rebuild in accordance with the charter. This group is working on a Draft for Comment (DC) which is planned for the end of June. This group will be meeting in Frankfurt. All comments from previous review are being addressed IEC TC65 WG10, ISO/IEC JTC1/SC27, and Other International Liaisons (From April 30): Joe W. submitted comments on the draft SC45A CD on nuclear pipeline security. Jim G. submitted the ISA99 liaison report to ISO/IEC JTC1/SC27 prior to their meeting in May. There was no report on this topic. Page 3 of 5
4 4. Committee Planning and Direction 4.1 Committee Work Product Roadmap Once we have confirmed the content of this document we will add a link to the committee wiki. The working copy is available in the Shared library: 4.2 Face to Face Meeting Planning (From April 30): WG12 has asked for a ½-day meeting in Frankfurt. Dennis H. expressed concern that there is no finalized agenda yet for the meeting. He thinks there may limited US participation in the meeting given that getting authorization from companies would require a more detailed agenda. Ayman expressed concern that the agenda and logistics need to be finalized in order for him to apply for his Visa to Germany. Charley confirmed that Lee will be in Frankfurt. We will schedule the lessons learned sessions in sequence on Thursday afternoon. Eric will send a note to the committee tomorrow with a copy of the agenda document. 4.3 WG5-TG1: Editors task group (Jim G.) Eliana will take care of reconciling the IEC and ISA versions of Once this has been completed there will be a quick default ballot to give voting members a chance to look at the final copy and confirm their previous votes. 5. External Initiatives Joe has spoken with representatives of insurance companies who are considering (or offering) cybersecurity related policies. They are trying to determine what has to be considered with respect to IACS. DHS has a Cyber Incident Data and Analysis (CIDA) working group that is looking at this and has asked for SME input from AF. Eric is offering input with Steve Mustard and Leo Staples. It is not clear that we need any more formal structure in the committee. Jeff suggested that someone should also try to determine if asset owners want this too. 6. Liaison Activities 6.1 Discussions with IEEE about cyber related activities There was no update on this topic. 6.2 Cybersecurity in Field Bus communications There is a meeting of the FieldComm group scheduled for Toronto in June. Jeff and Ragnar will attend. Security is one of the topics. Ragnar is chairing a security subgroup. The exact scope has to be defined, followed by specific tasks and objectives. Herman volunteered to help. Page 4 of 5
5 7. Membership and Recruitment There was no update on this topic. 8. Conferences and Events (From April 2): The next ICSJWG meeting is scheduled for the same week as the Frankfurt meeting. Ayman asked about an ISA conference planned for the end of May in the Middle East. He will provide more details. The ICS cyber security conference will be held in Atlanta on October Other Committee Business / Issues (From April 30): The most recent ISA99 Overview presentation that Jim G. could find on the ISA99 SharePoint, dated January 22, 2015, is available at: There were no additional items mentioned. 10. Meeting Close The meeting adjourned at approximately 12:00 ET US Action Item Update ID Action Item Responsibility Status Comments Next call / Adjourn The next WG5 call is scheduled for May 28, 2015 at 11:00 ET US. Page 5 of 5
ISA-99 Industrial Automation & Control Systems Security
ISA-99 Industrial Automation & Control Systems Security Jim Gilsinn National Institute of Standards & Technology (NIST) Engineering Laboratory ISA99 Committee Addresses Industrial Automation and Control
More informationFOR REVIEW PURPOSES ONLY!
FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT
More informationISA Security. Compliance Institute. Role of Product Certification in an Overall Cyber Security Strategy
ISA Security Role of Product Certification in an Overall Cyber Security Strategy Tom Culling Chevron Andre Ristaino ASCI Kevin Staggs - Honeywell John Cusimano exida 1 ISA Security Agenda Who is the ISA
More informationISA Security Compliance Institute ISASecure IACS Certification Programs
ISA Security Compliance Institute ISASecure IACS Certification Programs This paper describes how international industrial cybersecurity standards and complementary conformance certification programs should
More informationProcess Control Systems Forum (PCSF)
Process Control Systems Forum (PCSF) Michael Torppey Technical Manager, PCSF Senior Principal, Mitretek Systems Collaborating to Advance Control System Security Background Department of Homeland Security
More informationRethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group bmick@arcweb.com 1 Rethinking Cyber Security We Now Have Years of Experience - Security
More informationFOR REVIEW PURPOSES ONLY!
FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT
More informationIAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD
IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD A NEW IEC STANDARD FOR CYBERSECURITY FOR NUCLEAR POWER PLANTS: IEC 62645 - REQUIREMENTS FOR SECURITY PROGRAMS FOR COMPUTER-BASED
More informationFOR REVIEW PURPOSES ONLY!
FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT
More informationProcess Control System Cyber Security Standards an Overview
INL/CON-06-01317 PREPRINT Process Control System Cyber Security Standards an Overview 52nd International Instrumentation Symposium Robert P. Evans May 2006 This is a preprint of a paper intended for publication
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationDoes Aligning Cyber Security and Process Safety Reduce Risk?
Does Aligning Cyber Security and Process Safety Reduce Risk? How can we align them to protect Operational Integrity? Schneider Electric September 15, 2015 Hosted by Greg Hale, Founder & Editor of Industrial
More informationDr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT
Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT December 3, 2013 slide 1 A global leader in power and
More informationISA Security Compliance Institute
ISA Security Compliance Institute Johan Nye Chairman ISCI Governing Board 1 ISA Security Compliance Institute agenda topics About ISA Security Compliance Institute (ISCI) About ISA 99 Standards 2013 ISCI
More information1 ISA Security Compliance Institute
1 ISA Security Compliance Institute Internationally Accredited Conformance Scheme ISASecure certification programs are accredited as an ISO/ IEC Guide 65 conformance scheme and ISO/IEC 17025 lab operations
More informationRebecca Massello Energetics Incorporated
Cybersecurity Procurement Language for Energy Delivery Systems Rebecca Massello Energetics Incorporated NRECA TechAdvantage February 25, 2015 Talking Points What is this document? Who can use this document
More informationFederal Highway Administration Director, Office of Transportation Management
Federal Highway Administration Director, Office of Transportation Management Transportation Systems Cyber-Security Framework A process to Monitor Alert Advise Owner/Operators of ITS deployments From just
More informationADPH Accreditation Project Meeting Minutes
ADPH Accreditation Project Meeting Minutes Public Health Accreditation Board (PHAB) Accreditation Leadership Team Meeting Minutes Initial Planning Meeting for Prerequisites Meeting Arrangements: Date:
More informationA New Standards Project on Avoiding Programming Language Vulnerabilities
A New Standards Project on Avoiding Programming Language Vulnerabilities Jim Moore Liaison Representative from IEEE Computer Society to ISO/IEC JTC 1/SC 7 Liaison Representative between ISO/IEC JTC 1/SC
More informationIndustrial Cyber Security 101. Mike Spear
Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security Mike.spear@honeywell.com Responsible for the Global Delivery of Honeywell
More informationRoadmaps to Securing Industrial Control Systems
Roadmaps to Securing Industrial Control Systems Insert Photo Here Mark Heard Eastman Chemical Company Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL McCormick
More informationOlav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB
More informationCyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division
Cyber Security focus in ABB: a Key issue 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security in ABB Agenda ABB introduction ABB Cyber
More informationRecommendations to align safety and security for industrial automation control systems ISA99 WG7 TG1. 30 January 2015
Recommendations to align safety and security for industrial automation control systems ISA99 WG7 TG1 Dennis Holstein (US), Virgil Hammond (US), Joe Weiss (US), Ajay Mishra (US), Andrew Ginter (US), Robert
More informationCybersecurity Guidance for Industrial Automation in Oil and Gas Applications
Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications February 17, 2015 Agenda Agenda Introductions Agenda Introductions Discussion of the current state of Cybersecurity for Controls
More informationCSMS. Cyber Security Management System. Conformity Assessment Scheme
CSMS Cyber Security Management System Conformity Assessment Scheme for the CSMS Certification Criteria IEC 62443-2-1:2010 Cyber Security Management Syste 1 Purpose of the CSMS Conformity Assessment Scheme
More informationCybersecurity & the Water Sector
Cybersecurity & the Water Sector NAWC Water Summit October 6, 2013 San Diego, CA Kevin Morley, AWWA How to deal with Cyber Threat? How would our operations change if we did not have SCADA working? How
More informationABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?
ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? Agenda Threats Risk Assessment Implementation Validation Advanced Security Implementation Strategy
More informationPROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving
More informationWhich cybersecurity standard is most relevant for a water utility?
Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:
More informationVoluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, nadya.bartol@utc.org. 2014 Utilities Telecom Council
Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, nadya.bartol@utc.org 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations
More informationThis is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
More information1. CALL TO ORDER/ROLL CALL John Zoglin, Chair 4:00 4:01. John Zoglin, Chair 4:01 4:02 2. POTENTIAL CONFLICT OF INTEREST DISCLOSURES
AGENDA Special Meeting of Investment Committee El Camino Hospital Board Thursday, May 28, 2015, 4:00 p.m. Conference Room E, Ground Floor 2500 Grant Road, Mountain View, California MISSION: The purpose
More informationAustralia/New Zealand General Insurance Program Activity and Implementation Report
Australia/New Zealand General Insurance Program Activity and Implementation Report (PAIR Report) July 2015 ACORD is a non-profit membership standards development organization (SDO) which develops and maintains
More informationIEC 62443: INDUSTRIAL NETWORK AND SYSTEM SECURITY
IEC 62443: INDUSTRIAL NETWORK AND SYSTEM SECURITY Standards Certification Education & Training Publishing Conferences & Exhibits Tom Phinney Honeywell Integrated Security Technology Lab Tom Phinney 40+
More informationANNUAL MEETING OF THE INTERNATIONAL NUCLEAR SECURITY EDUCATION NETWORK (INSEN) IAEA Headquarters, Vienna, Austria 10-12 August 2015.
ANNUAL MEETING OF THE INTERNATIONAL NUCLEAR SECURITY EDUCATION NETWORK (INSEN) IAEA Headquarters, Vienna, Austria 10-12 August 2015 Chairman s Report Report by Mr Guido Gluschke Chair of the International
More informationRE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
More informationAn International Perspective on Security and Compliance
UNIDIRECTIONAL SECURITY GATEWAYS An International Perspective on Security and Compliance ICSJWG Fall Conference 2014 Lior Frenkel, CEO and Co-Founder Waterfall Security Solutions Andrew Ginter, VP Industrial
More informationBoard of Directors Meeting ASCD Headquarters Alexandria, Virginia July 21-23, 2014 MINUTES
Board of Directors Meeting ASCD Headquarters Alexandria, Virginia July 21-23, 2014 MINUTES Attending Nancy Gibson, President (IL); Becky Berg, Immediate Past President (WA); Marie Adair (NJ); Susie Carr
More informationPES Stationary Battery Committee (Technical Committee)
PES Stationary Battery Committee (Technical Committee) Meeting Minutes October 6, 1999 Call to order at 1:10pm. Harthorn Suites / Chattanooga, TN 1. Opening introductions conducted by Jim McDowell of all
More informationM I N U T E S PLANNING COMMITTEE WEB MEETING
American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. M I N U T E S PLANNING COMMITTEE WEB MEETING Monday, April 25, 2011 11:00 am 1:00 pm Note: These draft minutes have not been
More informationRole Based Access Control for Industrial Automation and Control Systems
Role Based Access Control for Industrial Automation and Control Systems Johan B. Nye ExxonMobil Research and Engineering Co. Kevin P. Staggs Honeywell ACS Advanced Technology Labs 27 October 2010 abstract
More informationUpdate on ISO TC 265 Transportation and
Update on ISO TC 265 Transportation and Tim Dixon IEA GHG R&D Programme CSLF Technical Group, 17 June 2015 Update on ISO TC 265 Transportation and 5th meeting was 26-30 January 2015 in Birmingham Alabama
More informationINDUSTRIAL ADVISORY COMMITTEE (IAC) ELECTRICAL ENGINEERING TECHNOLOGY PROGRAM DEPARTMENT OF TECHNOLOGY, COLLEGE OF ENGINEERING, SIUC
AGENDA INDUSTRIAL ADVISORY COMMITTEE (IAC) ELECTRICAL ENGINEERING TECHNOLOGY PROGRAM DEPARTMENT OF TECHNOLOGY, COLLEGE OF ENGINEERING, SIUC April 26, 2011, 10:00 am -4:30 pm, Wabash Room, SIUC Student
More informationSCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
More information7:00 p.m. Regular Meeting April 9 12
7:00 p.m. Regular Meeting April 9 12 HELD AT: CALL TO ORDER: PLEDGE OF ALLEGIANCE: ROLL CALL: ATTENDANCE: Berlin Township House, 3271 Cheshire Rd., Delaware, OH Ron, Trustee Chairman The Pledge of Allegiance
More informationHow To Understand And Understand Cyber Security
Special Sessions on Cybersecurity Research for Critical Infrastructure Thursday, February 12, 2015 In Oceans 12 Session 1, 8:30 10:00, Oceans 12 Michael Siegel Principal Research Scientist, and Associate
More informationCybersecurity..Is your PE Firm Ready? October 30, 2014
Cybersecurity..Is your PE Firm Ready? October 30, 2014 The Panel Melinda Scott, Founding Partner, Scott Goldring Eric Feldman, Chief Information Officer, The Riverside Company Joe Campbell, CTO, PEF Services
More informationINCOSE Healthcare Working Group Charter
1 PURPOSE 2 GOAL To improve healthcare delivery in the world by bringing together systems engineers and systems thinkers in healthcare system to identify, develop, and tailor best practices for the improvement
More informationAustralia/New Zealand General Insurance Program Activity and Implementation Report
Australia/New Zealand General Insurance Program Activity and Implementation Report (PAIR Report) March 2015 ACORD is a non-profit membership standards development organization (SDO) which develops and
More informationProposed Task Group: Electrical Cable and Condition Monitoring Codes and Standards for Nuclear Power Plants
Proposed Task Group: Electrical Cable and Condition Monitoring Codes and Standards for Nuclear Power Plants Dr. Stephanie Watson Engineering Laboratory, NIST Cables in NPPs Categories Medium voltage power
More informationFOR REVIEW PURPOSES ONLY!
FOR REVIEW PURPOSES ONLY! THIS DOCUMENT IS A WORKING DRAFT OF AN ISA99 COMMITTEE WORK PRODUCT. IT MAY NOT BE ACCURATE OF COMPLETE AND IS SUBJECT TO CHANGE WITHOUT NOTICE. IT IS PROVIDED SOLELY FOR THE
More informationCyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
More informationThursday, Minutes. David Young II. Commissioner Young. III. FORUM IV. PUBLIC. Project. He believes. crossing. all the traffic of after the
TRANSPORTATION COMMISSION Thursday, June 23, 2011 Council Chambers, 1175 East Main Street Minutes Attendees: Eric Heesacker, Shawn Kampmann, Steve Ryan (Chair) Julia Sommer, Colin Swales, and David Young
More informationWalter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this field.
27, IT Security Techniques An Interview with Walter Fumy, Chairman of ISO/IEC JTC 1/SC Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this
More informationPolicies and Procedures Communications Quality & Reliability (CQR) Technical Committee
Policies and Procedures Communications Quality & Reliability (CQR) Technical Committee http://www.comsoc.org/~cqr/index.html Issued on August 28, 2003. Revised on August 29, 2003 based on one comment.
More informationISA Security Compliance Institute. ISASecure Embedded Device Security Assurance Certification
ISA Security Compliance Institute ISASecure Embedded Device Security Assurance Certification Introduction The ISASecure program has been developed by an industry consortium called the ISA Security Compliance
More informationFaculty IT Advisory Committee Monday March 3, 2014 12:00pm 1:30pm
Faculty IT Advisory Committee Monday March 3, 2014 12:00pm 1:30pm Committee Members Present: Kevin Brown, Andrew Carlos, Grant Kien, Aline Soules, Mitch Watnik, Jessica Weiss, Nancy White, Jiming Wu Committee
More informationIT-014 Health Informatics Committee
IT-014 Health Informatics Committee Australian Delegation Action Items HL7 International Working Group Meeting Version: FINAL Date Issues: N/A Author: Kylie Sugar, Standards Australia With Input from Australian
More informationOPENKONSEQUENZ WORKING GROUP CHARTER
OPENKONSEQUENZ WORKING GROUP CHARTER CONTENTS Contents...1 Goals and Vision...4 Scope and Core Domains...5 Governance and Precedence...5 Applicable Documents and Processes...5 Collaboration...6 Working
More informationCommunication Security Measures for SCADA Systems
Communication Security Measures for SCADA Systems Ron Farquharson, MV Consulting, DNP User Group Jim Coats, Triangle MicroWorks, DNP User Group Joe Stevens, Triangle MicroWorks 23 September 2014, Raleigh,
More informationAgenda: Workforce Development for ICS Security
Workforce Development for ICS Security Cross cutting challenge shared by asset owner & supplier Item Spans 1 professional training to simple awareness Item 2 No identified pipeline to recruit from and
More informationSecurity Levels in ISA-99 / IEC 62443
Summary Assessment of the security protection of a plant A Security Protection Level has to be assessed in a plant in operation A Protection Level requires both: The fulfillment of the policies and procedures
More informationM I N U T E S PLANNING COMMITTEE CONFERENCE CALL
American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. M I N U T E S PLANNING COMMITTEE CONFERENCE CALL Tuesday, May 28, 2013 11:00 am 1:00 pm EDT Note: These draft minutes have
More informationCritical Manufacturing Sector Government Coordinating Council Charter
1. Official Designation The official designation of this Council is the "Critical Manufacturing Sector Government Coordinating Council," hereinafter referred to as the "GCC" or the "Council." 2. Governance
More informationArticle IV Membership and Member Representatives
Commercial Facilities Sector Coordinating Council Charter Article I Official Designation This organization shall be known as the Commercial Facilities Sector Coordinating Council, hereinafter referred
More informationFrequency Asked Questions Information Security Management System (ISMS) Standards Version 3.0 May 2005
Frequency Asked Questions Information Security Management System (ISMS) Standards Version 3.0 May 2005 The following are a set of frequently asked questions that relate to new developments regarding ISO/IEC
More informationEnergy Storage Safety Plan Implementation Kickoff
Energy Storage Safety Plan Implementation Kickoff Web Meeting July 8, 2015 Hosted by DOE-OE Energy Storage Program Sandia National Laboratories Pacific Northwest National Laboratory SNL Document Number:
More informationBy: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
More informationProgram Overview. BOSC Homeland Security Subcommittee Meeting August 25, 2015
1 Program Overview BOSC Homeland Security Subcommittee Meeting August 25, 2015 2 Tuesday, August 25 8:00 Welcome Mr. Thomas Tracy, Designated Federal Official 8:15 Introductions and Review of Charge Questions
More informationCWSS-SCM Annual Business Meeting Thursday, November 20 th, 2014 Fairmont The Queen Elizabeth Montreal, Québec
CWSS-SCM Annual Business Meeting Thursday, November 20 th, 2014 Fairmont The Queen Elizabeth Montreal, Québec Call to Order 1.0 Approval of the agenda (Beckie) 2.0 Call for Resolutions (Sapsford) 3.0 Acceptance
More information2016 CHAPTER OFFICERS & COMMITTEE ROLES
2016 CHAPTER OFFICERS & COMMITTEE ROLES REGIONAL CHAIR - OFFICER One year with the option to serve a second year in same position. Two-year consecutive term maximum. 3-4 hours/month The regional chair
More informationAssociation Executives
Association Executives 360 Calls - State and local Association Executives engage in a monthly conference call to discuss various association topics and issues and to create solutions and programs. The
More informationNIST Cybersecurity Framework. ARC World Industry Forum 2014
NIST Cybersecurity Framework Vicky Yan Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy
More informationFacilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
More informationWhere Smart Data meets Data Security Siemens Cloud for Industry powered by SAP HANA. April 2015
Where Smart Data meets Data Security Siemens Cloud for Industry powered by SAP HANA April 2015 Think of a Number! 13642916 Page 2 Prologue: Nineteenth-century Data Overkill Page 3 Prologue: Your Brain
More informationISA Security Compliance Institute
ISA Security Compliance Institute Andre Ristaino, Managing Director, ISCI 28 May 2013 CSSC 1 ISA Security Compliance Institute agenda topics About ISA Security Compliance Institute (ISCI) About ISA 99
More informationTeleTrusT Bundesverband IT-Sicherheit e.v.
TeleTrusT Bundesverband IT-Sicherheit e.v. TeleTrusT-Workshop "Industrial Security" 2015 München, 11.06.2015 Einführung Industrial Security anhand des IEC 62443; Bedrohungslage für Betreiber von ICS (Industrial
More informationInformation Security Management System Information Security Policy
Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been
More informationAn AFSCME Guide. chair. How to. a meeting
An AFSCME Guide chair How to a meeting 1 Call to Order Start Your Meeting on Time. Rap your gavel and say: I call this meeting to order. Wait for quiet, and then begin the meeting. 1 1 Call to Order 2
More informationWorking Group 5 Identity Management and Privacy Technologies within ISO/IEC JTC 1/SC 27 IT Security Techniques
Working Group 5 Identity Management and Privacy Technologies within ISO/IEC JTC 1/SC 27 IT Security Techniques Joint Workshop of ISO/IEC JTC 1/SC 27/WG 5, ITU-T SG17/Q.6, and FIDIS on Identity Management
More informationFramework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 8 April 2015 cyberframework@nist.gov Agenda Mission of NIST Cybersecurity at NIST Cybersecurity Framework
More informationStandardizing contactless communication between ticketing equipment and fare media Transport Ticketing 2014
Standardizing contactless communication between ticketing equipment and fare media Transport Ticketing 2014 Par délégation d'afnor / On behalf of AFNOR Bureau de normalisation des transports, des routes
More informationKevin Staggs - CISSP February 2, 2009. Patch Management
Kevin Staggs - CISSP February 2, 2009 Patch Management Topics Our philosophy Advice to our customers Patch qualification and management How we support our customers Industry needs Resources Summary 2 Our
More informationCall to Order: Jeff Dumermuth, President called the meeting to order at 10:05 AM
IEMSA Board of Directors Meeting March 18, 2004 ATTENDEES Board Members: Evan Bensley, Cheryl Blazek, John Copper, Jeff Dumermuth, Roger Heglund, Cindy Hewitt, John Hill, Brian Jacobsen, Ric Jones, Kay
More informationEnergy sector control centers across the nation, such as this one at Kansas City Power & Light, benefit from the system security assessments
Energy sector control centers across the nation, such as this one at Kansas City Power & Light, benefit from the system security assessments performed through National SCADA Test Bed industry partnerships.
More informationIncident Standard Service Request Information Request. IT Request. Minor/Low Impact Change to Existing Service. Capture and refine the idea
Incident Standard Service Request Information Request IT Request Idea Capture and refine the idea Determine the type of work Minor/Low Impact to Existing Service Mgmt. Work with customer, management to
More information1 Call meeting to order Jon Aubart, Chair. 2 Establish Quorum and Adopt Agenda Jon Aubart, Chair
Meeting Agenda Tuesday, November 6, 2012 at 4:00 p.m. 1 Call meeting to order 4 Approve Minutes from September 20, 2012 Meeting 5 Review Departmental Budget 6 Discuss and Take Action on Departmental Transition
More informationAG E N D A O C T O B E R 27 30, 2 005 WO R K I N G G R O U P M E E T I N G W V W 0 1. M 2 0 0 5-0 0 1. Ve r s i o n 1. 1
AG E N D A O C T O B E R 27 30, 2 005 WO R K I N G G R O U P M E E T I N G W V W 0 1. M 2 0 0 5-0 0 1 O c t o b e r 2 6, 2 0 0 5 Ve r s i o n 1. 1 DOCUMENT HISTORY Version Date Status 1 October 16, 2005
More informationISO/IEC/IEEE 29119 The New International Software Testing Standards
ISO/IEC/IEEE 29119 The New International Software Testing Standards Stuart Reid Testing Solutions Group 117 Houndsditch London EC3 UK Tel: 0207 469 1500 Fax: 0207 623 8459 www.testing-solutions.com 1 Stuart
More informationOrganization for Transformative Works. Volunteers & Recruiting Annual Report
Organization for Transformative Works Volunteers & Recruiting Annual Report 2013 TABLE OF CONTENTS Summary... 4 Committee Membership... 5 Committee Operations... 6 Requested Tasks... 6 Recruiting... 8
More informationCritical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Critical Infrastructure Cybersecurity Framework Overview and Status Executive Order 13636 Improving Critical Infrastructure Cybersecurity Executive Order: Improving Critical Infrastructure Cybersecurity
More informationNIST Cybersecurity Framework Manufacturing Implementation
NIST Cybersecurity Framework Manufacturing Implementation Keith Stouffer Project Leader, Cybersecurity for Smart Manufacturing Systems Engineering Lab, NIST Manufacturing Cybersecurity Research at NIST
More informationThe State-of-the-State of Control System Cyber Security
The State-of-the-State of Control System Cyber Security Prepared for HTCIA September 19, 2012 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 joe.weiss@realtimeacs.com Summary Control systems are
More informationH 2 USA Update. Department of Energy Annual Merit Review Panel Hydrogen Infrastructure Thursday, June 19, 2014
H 2 USA Update Department of Energy Annual Merit Review Panel Hydrogen Infrastructure Thursday, June 19, 2014 H 2 USA Mission Statement The mission of H 2 USA is to promote the commercial introduction
More informationFundamental Issues: Nuclear Generators Lead Cyber Security
power eng.com http://www.power eng.com/articles/npi/print/volume 8/issue 5/nucleus/fundamental issues nuclear generators lead cybersecurity.html Fundamental Issues: Nuclear Generators Lead Cyber Security
More informationPreparing yourself for ISO/IEC 27001 2013
Preparing yourself for ISO/IEC 27001 2013 2013 a Vintage Year for Security Prof. Edward (Ted) Humphreys (edwardj7@msn.com) [Chair of the ISO/IEC and UK BSI Group responsible for the family of ISMS standards,
More informationGlobal Industrial Cyber Security Professional GICSP
Global Industrial Cyber Security Professional GICSP A certification for Engineers, ICS Security Professionals, and ICS Technology Specialists ARC Industry Forum, Feb 10, 2014 SANS ICS Resources Control
More information