ISA99 Working Group 5 ISA99 Working Group 5
|
|
|
- Jonathan Hubbard
- 9 years ago
- Views:
Transcription
1 Date: May 14, 2015 Time: 11:00 ET US Lead: E. Cosman Notes: E. Cosman Distribution: ISA99 committee and stakeholders ISA99 Working Group 5 ISA99 Working Group 5 ISA 67 Alexander Drive PO Box Research Triangle Park, NC Telephone 919/ Fax 919/ Name Affiliation Group Present Ayman Al-Issa WG1 Eliana Brazda ISA Staff P Eric Cosman OIT Concepts LLC Chair P William Cotter 3M PI&CS WG6 P John Cusimano AE Solutions WG7 Jim Gilsinn Kenexis WG2 Andrew Ginter Waterfall WG1 Tom Good DuPont WG2 Vic Hammond Argonne National Laboratory WG12 P Dennis Holstein Opus Consulting Group WG12 Lee Neitzel Consultant TC65 WG10 Johan Nye ExxonMobil WG4 Tom Phinney Consultant TC65 WG10 Jeff Potter Emerson Process Management WG3/4/7 P Charley Robinson ISA Staff P Ragnar Schierholz ABB WG3 Kevin Staggs Honeywell Corporate Research WG4 Herman Storey Consultant WG9 P Donovan Tindill Honeywell WG6 Joe Weiss Applied Control Solutions WG11 P P Present; p Partial attendance; D Declined or Unavailable Page 1 of 5
2 1. Old Business 1.1 Action Items The following are pending from previous meetings:- ID Action Item Responsibility Status Comments 12 Work with Jake Jackson on the process for embedding writers in the work and task groups. 24 Develop a single timeline that shows projected milestones for each of the work products. 32 Have WG4 discuss how to address supply chain, including manufacturing requirements for cybersecurity. 34 Poll WG5 members about the possibility of rescheduling these calls. Eric Suspended Eric has opened an dialog with Jake. The first step is to describe the role. Charley, Eric Closed The timeline tool is in place. Now we have to keep the data current. Johan N. Open Eric C. Closed Eric sent a note to WG5 to get feedback. Add link to milestone plan to minutes, as well as the Wiki. 2. New and Continuing Business In addition to regular work group updates the following specific topics will be addressed in this meeting. Face to face meeting plans Insurance Interest 3. Working Group Updates 3.1 WG1: Technologies (From April 30): Ayman reported that the meeting this week was well attended by the group; the discussion covered authentication methods, VPNs, industrial cybersecurity, etc. There was no report from this group. 3.2 WG2: Security Program (From April 30): Jim G. noted that he should have the draft of ISA by Monday, a cleaned up version with material that updates the requirements from the 2009 edition. Jim has posted the latest draft of ISA on the portal. 3.3 WG3: Concepts and Models (From April 30): There was no report from this group. This group met on Monday. The primary topic discussed was the relationship between the various life cycles used in the series. The group agreed that the general model developed by Pierre and Ragnar and the more focused model offered by John Cusimano are complementary. 3.4 WG4: Technical Requirements (From April 30): This group did not meet this week. The WG4 leaders did not meet his week. Page 2 of 5
3 3.5 WG6: Patch Management (From April 30): Jim G. has completed ISA-TR and is getting the IEC version cleaned up and should be done with it today or tomorrow. He will be ready to go with publication of ISA-TR shortly. The final documents are complete (ISA and IEC versions). WG6 is conducting a survey about next steps. This group has no plans to meet in Frankfurt. 3.6 WG7: Safety & Security (From April 30): ISA84 met and there was discussion about the safety & security technical report. Jim is continuing his work with that group, along with other members of WG7. TG1 met in the regular WG12 time slot. They are waiting for revisions to ISA Based on comments from Hal Thomas, Vic Maggioli and other ISA84 members it appears that ISA84 and ISA99 are aligned with respect to the security and safety topic. Dennis Holstein will be providing a summary of status at the planned meeting of the IEC ad-hoc group in Vienna. 3.7 WG8: Communication and Outreach (From April 30): There was no update from this Work Group. There was no update from this Work Group. Our recent difficulties in getting the news out about our Frankfurt meeting point out the need to focus more on communications. 3.8 WG9: Wireless and Security JWG (From April 30): There was no report from this group. Herman was asked to give a talk at the ISA Analysis Division Symposium in Galveston, Texas. The stated theme was remote access, but it developed more into a security topic, related to third party (vendor) remote access. There was good discussion but no formal follow-up. Jeff said that his experience has been that best practices involve a single portal maintained by the customer that provides an entry point for all vendors. It is important to make sure that remote access is secure during assembly, commissioning, FAT, etc. This is more of a topic for ISA99 than ISA100. Specific guidelines are required. This is a possible use case for ISA WG11: ISA99-ISA67 JWG on cyber security for nuclear plants (From April 30): Joe submitted comments on the TC45A CD. There is an IAEA meetings in the first week of June. Joe will be presenting, as well as participating on a panel on standards WG12: Metrics (From April 30): The group is on schedule for a mid-june circulation of the draft for comment; the draft document has gone through several edits. The charter for WG12 was approved by ISA99, unanimously approved. The group is working to rebuild in accordance with the charter. This group is working on a Draft for Comment (DC) which is planned for the end of June. This group will be meeting in Frankfurt. All comments from previous review are being addressed IEC TC65 WG10, ISO/IEC JTC1/SC27, and Other International Liaisons (From April 30): Joe W. submitted comments on the draft SC45A CD on nuclear pipeline security. Jim G. submitted the ISA99 liaison report to ISO/IEC JTC1/SC27 prior to their meeting in May. There was no report on this topic. Page 3 of 5
4 4. Committee Planning and Direction 4.1 Committee Work Product Roadmap Once we have confirmed the content of this document we will add a link to the committee wiki. The working copy is available in the Shared library: 4.2 Face to Face Meeting Planning (From April 30): WG12 has asked for a ½-day meeting in Frankfurt. Dennis H. expressed concern that there is no finalized agenda yet for the meeting. He thinks there may limited US participation in the meeting given that getting authorization from companies would require a more detailed agenda. Ayman expressed concern that the agenda and logistics need to be finalized in order for him to apply for his Visa to Germany. Charley confirmed that Lee will be in Frankfurt. We will schedule the lessons learned sessions in sequence on Thursday afternoon. Eric will send a note to the committee tomorrow with a copy of the agenda document. 4.3 WG5-TG1: Editors task group (Jim G.) Eliana will take care of reconciling the IEC and ISA versions of Once this has been completed there will be a quick default ballot to give voting members a chance to look at the final copy and confirm their previous votes. 5. External Initiatives Joe has spoken with representatives of insurance companies who are considering (or offering) cybersecurity related policies. They are trying to determine what has to be considered with respect to IACS. DHS has a Cyber Incident Data and Analysis (CIDA) working group that is looking at this and has asked for SME input from AF. Eric is offering input with Steve Mustard and Leo Staples. It is not clear that we need any more formal structure in the committee. Jeff suggested that someone should also try to determine if asset owners want this too. 6. Liaison Activities 6.1 Discussions with IEEE about cyber related activities There was no update on this topic. 6.2 Cybersecurity in Field Bus communications There is a meeting of the FieldComm group scheduled for Toronto in June. Jeff and Ragnar will attend. Security is one of the topics. Ragnar is chairing a security subgroup. The exact scope has to be defined, followed by specific tasks and objectives. Herman volunteered to help. Page 4 of 5
5 7. Membership and Recruitment There was no update on this topic. 8. Conferences and Events (From April 2): The next ICSJWG meeting is scheduled for the same week as the Frankfurt meeting. Ayman asked about an ISA conference planned for the end of May in the Middle East. He will provide more details. The ICS cyber security conference will be held in Atlanta on October Other Committee Business / Issues (From April 30): The most recent ISA99 Overview presentation that Jim G. could find on the ISA99 SharePoint, dated January 22, 2015, is available at: There were no additional items mentioned. 10. Meeting Close The meeting adjourned at approximately 12:00 ET US Action Item Update ID Action Item Responsibility Status Comments Next call / Adjourn The next WG5 call is scheduled for May 28, 2015 at 11:00 ET US. Page 5 of 5
ISA-99 Industrial Automation & Control Systems Security
ISA-99 Industrial Automation & Control Systems Security Jim Gilsinn National Institute of Standards & Technology (NIST) Engineering Laboratory ISA99 Committee Addresses Industrial Automation and Control
FOR REVIEW PURPOSES ONLY!
FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT
ISA Security. Compliance Institute. Role of Product Certification in an Overall Cyber Security Strategy
ISA Security Role of Product Certification in an Overall Cyber Security Strategy Tom Culling Chevron Andre Ristaino ASCI Kevin Staggs - Honeywell John Cusimano exida 1 ISA Security Agenda Who is the ISA
ISA Security Compliance Institute ISASecure IACS Certification Programs
ISA Security Compliance Institute ISASecure IACS Certification Programs This paper describes how international industrial cybersecurity standards and complementary conformance certification programs should
Process Control Systems Forum (PCSF)
Process Control Systems Forum (PCSF) Michael Torppey Technical Manager, PCSF Senior Principal, Mitretek Systems Collaborating to Advance Control System Security Background Department of Homeland Security
Rethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group [email protected] 1 Rethinking Cyber Security We Now Have Years of Experience - Security
FOR REVIEW PURPOSES ONLY!
FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT
IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD
IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD A NEW IEC STANDARD FOR CYBERSECURITY FOR NUCLEAR POWER PLANTS: IEC 62645 - REQUIREMENTS FOR SECURITY PROGRAMS FOR COMPUTER-BASED
FOR REVIEW PURPOSES ONLY!
FOR REVIEW PURPOSES ONLY! THIS EXCERPT FROM AN ISA99 COMMITTEE WORK PRODUCT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF THE FURTHER DEVELOPMENT OF OTHER COMMITTEE WORK PRODUCTS. THIS DOCUMENT
Process Control System Cyber Security Standards an Overview
INL/CON-06-01317 PREPRINT Process Control System Cyber Security Standards an Overview 52nd International Instrumentation Symposium Robert P. Evans May 2006 This is a preprint of a paper intended for publication
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Does Aligning Cyber Security and Process Safety Reduce Risk?
Does Aligning Cyber Security and Process Safety Reduce Risk? How can we align them to protect Operational Integrity? Schneider Electric September 15, 2015 Hosted by Greg Hale, Founder & Editor of Industrial
Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT
Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT December 3, 2013 slide 1 A global leader in power and
ISA Security Compliance Institute
ISA Security Compliance Institute Johan Nye Chairman ISCI Governing Board 1 ISA Security Compliance Institute agenda topics About ISA Security Compliance Institute (ISCI) About ISA 99 Standards 2013 ISCI
1 ISA Security Compliance Institute
1 ISA Security Compliance Institute Internationally Accredited Conformance Scheme ISASecure certification programs are accredited as an ISO/ IEC Guide 65 conformance scheme and ISO/IEC 17025 lab operations
Rebecca Massello Energetics Incorporated
Cybersecurity Procurement Language for Energy Delivery Systems Rebecca Massello Energetics Incorporated NRECA TechAdvantage February 25, 2015 Talking Points What is this document? Who can use this document
Federal Highway Administration Director, Office of Transportation Management
Federal Highway Administration Director, Office of Transportation Management Transportation Systems Cyber-Security Framework A process to Monitor Alert Advise Owner/Operators of ITS deployments From just
ADPH Accreditation Project Meeting Minutes
ADPH Accreditation Project Meeting Minutes Public Health Accreditation Board (PHAB) Accreditation Leadership Team Meeting Minutes Initial Planning Meeting for Prerequisites Meeting Arrangements: Date:
Industrial Cyber Security 101. Mike Spear
Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security [email protected] Responsible for the Global Delivery of Honeywell
Roadmaps to Securing Industrial Control Systems
Roadmaps to Securing Industrial Control Systems Insert Photo Here Mark Heard Eastman Chemical Company Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL McCormick
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB
Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division
Cyber Security focus in ABB: a Key issue 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security in ABB Agenda ABB introduction ABB Cyber
Recommendations to align safety and security for industrial automation control systems ISA99 WG7 TG1. 30 January 2015
Recommendations to align safety and security for industrial automation control systems ISA99 WG7 TG1 Dennis Holstein (US), Virgil Hammond (US), Joe Weiss (US), Ajay Mishra (US), Andrew Ginter (US), Robert
Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications
Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications February 17, 2015 Agenda Agenda Introductions Agenda Introductions Discussion of the current state of Cybersecurity for Controls
CSMS. Cyber Security Management System. Conformity Assessment Scheme
CSMS Cyber Security Management System Conformity Assessment Scheme for the CSMS Certification Criteria IEC 62443-2-1:2010 Cyber Security Management Syste 1 Purpose of the CSMS Conformity Assessment Scheme
ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?
ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? Agenda Threats Risk Assessment Implementation Validation Advanced Security Implementation Strategy
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving
Which cybersecurity standard is most relevant for a water utility?
Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:
Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, [email protected]. 2014 Utilities Telecom Council
Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, [email protected] 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
1. CALL TO ORDER/ROLL CALL John Zoglin, Chair 4:00 4:01. John Zoglin, Chair 4:01 4:02 2. POTENTIAL CONFLICT OF INTEREST DISCLOSURES
AGENDA Special Meeting of Investment Committee El Camino Hospital Board Thursday, May 28, 2015, 4:00 p.m. Conference Room E, Ground Floor 2500 Grant Road, Mountain View, California MISSION: The purpose
Australia/New Zealand General Insurance Program Activity and Implementation Report
Australia/New Zealand General Insurance Program Activity and Implementation Report (PAIR Report) July 2015 ACORD is a non-profit membership standards development organization (SDO) which develops and maintains
IEC 62443: INDUSTRIAL NETWORK AND SYSTEM SECURITY
IEC 62443: INDUSTRIAL NETWORK AND SYSTEM SECURITY Standards Certification Education & Training Publishing Conferences & Exhibits Tom Phinney Honeywell Integrated Security Technology Lab Tom Phinney 40+
ANNUAL MEETING OF THE INTERNATIONAL NUCLEAR SECURITY EDUCATION NETWORK (INSEN) IAEA Headquarters, Vienna, Austria 10-12 August 2015.
ANNUAL MEETING OF THE INTERNATIONAL NUCLEAR SECURITY EDUCATION NETWORK (INSEN) IAEA Headquarters, Vienna, Austria 10-12 August 2015 Chairman s Report Report by Mr Guido Gluschke Chair of the International
RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
An International Perspective on Security and Compliance
UNIDIRECTIONAL SECURITY GATEWAYS An International Perspective on Security and Compliance ICSJWG Fall Conference 2014 Lior Frenkel, CEO and Co-Founder Waterfall Security Solutions Andrew Ginter, VP Industrial
Board of Directors Meeting ASCD Headquarters Alexandria, Virginia July 21-23, 2014 MINUTES
Board of Directors Meeting ASCD Headquarters Alexandria, Virginia July 21-23, 2014 MINUTES Attending Nancy Gibson, President (IL); Becky Berg, Immediate Past President (WA); Marie Adair (NJ); Susie Carr
Role Based Access Control for Industrial Automation and Control Systems
Role Based Access Control for Industrial Automation and Control Systems Johan B. Nye ExxonMobil Research and Engineering Co. Kevin P. Staggs Honeywell ACS Advanced Technology Labs 27 October 2010 abstract
Update on ISO TC 265 Transportation and
Update on ISO TC 265 Transportation and Tim Dixon IEA GHG R&D Programme CSLF Technical Group, 17 June 2015 Update on ISO TC 265 Transportation and 5th meeting was 26-30 January 2015 in Birmingham Alabama
INDUSTRIAL ADVISORY COMMITTEE (IAC) ELECTRICAL ENGINEERING TECHNOLOGY PROGRAM DEPARTMENT OF TECHNOLOGY, COLLEGE OF ENGINEERING, SIUC
AGENDA INDUSTRIAL ADVISORY COMMITTEE (IAC) ELECTRICAL ENGINEERING TECHNOLOGY PROGRAM DEPARTMENT OF TECHNOLOGY, COLLEGE OF ENGINEERING, SIUC April 26, 2011, 10:00 am -4:30 pm, Wabash Room, SIUC Student
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
7:00 p.m. Regular Meeting April 9 12
7:00 p.m. Regular Meeting April 9 12 HELD AT: CALL TO ORDER: PLEDGE OF ALLEGIANCE: ROLL CALL: ATTENDANCE: Berlin Township House, 3271 Cheshire Rd., Delaware, OH Ron, Trustee Chairman The Pledge of Allegiance
How To Understand And Understand Cyber Security
Special Sessions on Cybersecurity Research for Critical Infrastructure Thursday, February 12, 2015 In Oceans 12 Session 1, 8:30 10:00, Oceans 12 Michael Siegel Principal Research Scientist, and Associate
INCOSE Healthcare Working Group Charter
1 PURPOSE 2 GOAL To improve healthcare delivery in the world by bringing together systems engineers and systems thinkers in healthcare system to identify, develop, and tailor best practices for the improvement
Proposed Task Group: Electrical Cable and Condition Monitoring Codes and Standards for Nuclear Power Plants
Proposed Task Group: Electrical Cable and Condition Monitoring Codes and Standards for Nuclear Power Plants Dr. Stephanie Watson Engineering Laboratory, NIST Cables in NPPs Categories Medium voltage power
FOR REVIEW PURPOSES ONLY!
FOR REVIEW PURPOSES ONLY! THIS DOCUMENT IS A WORKING DRAFT OF AN ISA99 COMMITTEE WORK PRODUCT. IT MAY NOT BE ACCURATE OF COMPLETE AND IS SUBJECT TO CHANGE WITHOUT NOTICE. IT IS PROVIDED SOLELY FOR THE
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Thursday, Minutes. David Young II. Commissioner Young. III. FORUM IV. PUBLIC. Project. He believes. crossing. all the traffic of after the
TRANSPORTATION COMMISSION Thursday, June 23, 2011 Council Chambers, 1175 East Main Street Minutes Attendees: Eric Heesacker, Shawn Kampmann, Steve Ryan (Chair) Julia Sommer, Colin Swales, and David Young
Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this field.
27, IT Security Techniques An Interview with Walter Fumy, Chairman of ISO/IEC JTC 1/SC Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this
Policies and Procedures Communications Quality & Reliability (CQR) Technical Committee
Policies and Procedures Communications Quality & Reliability (CQR) Technical Committee http://www.comsoc.org/~cqr/index.html Issued on August 28, 2003. Revised on August 29, 2003 based on one comment.
ISA Security Compliance Institute. ISASecure Embedded Device Security Assurance Certification
ISA Security Compliance Institute ISASecure Embedded Device Security Assurance Certification Introduction The ISASecure program has been developed by an industry consortium called the ISA Security Compliance
Communication Security Measures for SCADA Systems
Communication Security Measures for SCADA Systems Ron Farquharson, MV Consulting, DNP User Group Jim Coats, Triangle MicroWorks, DNP User Group Joe Stevens, Triangle MicroWorks 23 September 2014, Raleigh,
Security Levels in ISA-99 / IEC 62443
Summary Assessment of the security protection of a plant A Security Protection Level has to be assessed in a plant in operation A Protection Level requires both: The fulfillment of the policies and procedures
Article IV Membership and Member Representatives
Commercial Facilities Sector Coordinating Council Charter Article I Official Designation This organization shall be known as the Commercial Facilities Sector Coordinating Council, hereinafter referred
Energy Storage Safety Plan Implementation Kickoff
Energy Storage Safety Plan Implementation Kickoff Web Meeting July 8, 2015 Hosted by DOE-OE Energy Storage Program Sandia National Laboratories Pacific Northwest National Laboratory SNL Document Number:
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Program Overview. BOSC Homeland Security Subcommittee Meeting August 25, 2015
1 Program Overview BOSC Homeland Security Subcommittee Meeting August 25, 2015 2 Tuesday, August 25 8:00 Welcome Mr. Thomas Tracy, Designated Federal Official 8:15 Introductions and Review of Charge Questions
CWSS-SCM Annual Business Meeting Thursday, November 20 th, 2014 Fairmont The Queen Elizabeth Montreal, Québec
CWSS-SCM Annual Business Meeting Thursday, November 20 th, 2014 Fairmont The Queen Elizabeth Montreal, Québec Call to Order 1.0 Approval of the agenda (Beckie) 2.0 Call for Resolutions (Sapsford) 3.0 Acceptance
2016 CHAPTER OFFICERS & COMMITTEE ROLES
2016 CHAPTER OFFICERS & COMMITTEE ROLES REGIONAL CHAIR - OFFICER One year with the option to serve a second year in same position. Two-year consecutive term maximum. 3-4 hours/month The regional chair
NIST Cybersecurity Framework. ARC World Industry Forum 2014
NIST Cybersecurity Framework Vicky Yan Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy
Facilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
Where Smart Data meets Data Security Siemens Cloud for Industry powered by SAP HANA. April 2015
Where Smart Data meets Data Security Siemens Cloud for Industry powered by SAP HANA April 2015 Think of a Number! 13642916 Page 2 Prologue: Nineteenth-century Data Overkill Page 3 Prologue: Your Brain
ISA Security Compliance Institute
ISA Security Compliance Institute Andre Ristaino, Managing Director, ISCI 28 May 2013 CSSC 1 ISA Security Compliance Institute agenda topics About ISA Security Compliance Institute (ISCI) About ISA 99
TeleTrusT Bundesverband IT-Sicherheit e.v.
TeleTrusT Bundesverband IT-Sicherheit e.v. TeleTrusT-Workshop "Industrial Security" 2015 München, 11.06.2015 Einführung Industrial Security anhand des IEC 62443; Bedrohungslage für Betreiber von ICS (Industrial
Information Security Management System Information Security Policy
Management System Policy Version: 3.4 Issued Document Name: Owner: P079A - ISMS Security Policy Classification: Public Security Policies, Standards and Procedures emanate from the Policy which has been
An AFSCME Guide. chair. How to. a meeting
An AFSCME Guide chair How to a meeting 1 Call to Order Start Your Meeting on Time. Rap your gavel and say: I call this meeting to order. Wait for quiet, and then begin the meeting. 1 1 Call to Order 2
Working Group 5 Identity Management and Privacy Technologies within ISO/IEC JTC 1/SC 27 IT Security Techniques
Working Group 5 Identity Management and Privacy Technologies within ISO/IEC JTC 1/SC 27 IT Security Techniques Joint Workshop of ISO/IEC JTC 1/SC 27/WG 5, ITU-T SG17/Q.6, and FIDIS on Identity Management
Framework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 8 April 2015 [email protected] Agenda Mission of NIST Cybersecurity at NIST Cybersecurity Framework
Incident Standard Service Request Information Request. IT Request. Minor/Low Impact Change to Existing Service. Capture and refine the idea
Incident Standard Service Request Information Request IT Request Idea Capture and refine the idea Determine the type of work Minor/Low Impact to Existing Service Mgmt. Work with customer, management to
ISO/IEC/IEEE 29119 The New International Software Testing Standards
ISO/IEC/IEEE 29119 The New International Software Testing Standards Stuart Reid Testing Solutions Group 117 Houndsditch London EC3 UK Tel: 0207 469 1500 Fax: 0207 623 8459 www.testing-solutions.com 1 Stuart
Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Critical Infrastructure Cybersecurity Framework Overview and Status Executive Order 13636 Improving Critical Infrastructure Cybersecurity Executive Order: Improving Critical Infrastructure Cybersecurity
NIST Cybersecurity Framework Manufacturing Implementation
NIST Cybersecurity Framework Manufacturing Implementation Keith Stouffer Project Leader, Cybersecurity for Smart Manufacturing Systems Engineering Lab, NIST Manufacturing Cybersecurity Research at NIST
The State-of-the-State of Control System Cyber Security
The State-of-the-State of Control System Cyber Security Prepared for HTCIA September 19, 2012 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] Summary Control systems are
Preparing yourself for ISO/IEC 27001 2013
Preparing yourself for ISO/IEC 27001 2013 2013 a Vintage Year for Security Prof. Edward (Ted) Humphreys ([email protected]) [Chair of the ISO/IEC and UK BSI Group responsible for the family of ISMS standards,
Global Industrial Cyber Security Professional GICSP
Global Industrial Cyber Security Professional GICSP A certification for Engineers, ICS Security Professionals, and ICS Technology Specialists ARC Industry Forum, Feb 10, 2014 SANS ICS Resources Control
