San Antonio, TX, August 7, 2011 National Association of Regulatory Utility Commissioners Miles Keogh Christina Cody

Size: px
Start display at page:

Download "San Antonio, TX, August 7, 2011 National Association of Regulatory Utility Commissioners Miles Keogh Christina Cody"

Transcription

1 San Antonio, TX, August 7, 2011 National Association of Regulatory Utility Commissioners Miles Keogh Christina Cody

2 NARUC & Critical Infrastructure Committee Chair: Commissioner Elizabeth Fleming, South Carolina Public Service Commission Staff Subcommittee Chair: Thomas Pearce, Public Utilities Commission of Ohio Members from every region of the country Federal Funders: Department of Energy, Department of Homeland Security Today s funder: DHS Office of Infrastructure Protection Partnerships with FCC, EPA, NCS

3 Today s Agenda I. Threats i. Weather ii. Non-Weather iii. Human iv. Interdependencies II. Roles i. Emergency Response vs. Resilience ii. Federal iii. State iv. Information Protection, Information Management v. Cyber Security III. What you can do, as state legislators i. Action Items

4

5 Weather Spring Floods Almost all damage caused during Hurricane Katrina was due to flood; Entergy New Orleans infrastructure destroyed Wind Storm in Oregon and Washington, March 2011, bedeviled Seattle power supply for about a month Most damage caused by trees (need for vegetation management) REUTERS, Fort Calhoun flooded in Eastern Nebraska, June BELLINGHAM HERALD, Northwest Wind Storm Knocks Out Power, March, 2011.

6 Weather - Summer Fire Southern California wildfire, 2009 Enormous losses for PG&E, SDG&E Storms Every utility has a plan; Vegetation management is key

7 Weather - Fall Hurricanes Threat to Gulf region, source of oil and gas for entire country Damage mostly inflicted by flooding and debris / vegetation States may consider sufficient storm reserve fund Florida, 2008 Hurricane Katrina Picture Taken from Entergy New Orleans downtown offices

8 Weather - Winter Snow Snowmaggedon, Washington D.C. Ice SE Michigan/NW Ohio Ice Storm, February 2011 More than 84,600 customers lost power overnight Affected 40 of Consumer Power Co s 68 counties THE BLADE/JEREMY WADSWORTH, Toledo Edison works on a power line following an ice storm in Toledo, February, 2011

9 Weather Events How have your utilities respond to weather interruptions? Please share your experiences.

10 Non-Weather Events Earthquake Volcano Tsunami Geomagnetic Disturbance (GMD)

11 Human Impact Accidents/Negligence Workforce Pandemic Disruption to labor supply or key talent

12 Human - Intentional Physical Attacks Low tech. to high tech. Coordinated or wide-area attacks e.g. EMP Cyber Security

13 Cyber Security Threats are Increasing 13

14 Cyber Security Threats April / May 2007: Estonian economy largely shut down by cyberattacks originating in Russia over a statue of Stalin; 2009 cyber attacks of Georgia prompted NATO comments. In 2001, hackers penetrated the California Independent System Operator; attacks were routed through California, Oklahoma, and China. Ohio Davis-Besse nuclear power plant safety monitoring system was offline for 5 hours due to Slammer worm in January Aaron Caffrey, 19, brought down the Port of Houston in October, This is thought to be the first well-documented attack on critical U.S. infrastructure. In March 2005, security consultants within the electric industry reported that hackers were targeting the U.S. electric power grid and had gained access to U.S. utilities electronic control systems. In a few cases, these intrusions had caused an impact. In April 2009, the Wall Street Journal stated Chinese and other spies hacked into the U.S. electric grid and left behind computer programs that could allow them to disrupt service.

15 Aurora and STUXNET Aurora: an experiment to hack control systems and destroy a generator staged by the DOE and DHS STUXNET: a worm story with more intrigue and plot twists than a Tom Clancy novel The big question is whether/how to prioritize these concerns

16 We know security: what changed? Ubiquity of, and dependency on, networks A network is cheaper, faster, more effective, and ultimately more secure Ease of sophisticated attack Reliance on commercial software Evolution toward distributed networks Interdependencies between sectors

17 Cyber Security: Three Flavors Business Systems Control Systems Smart Grid 17 17

18 Interdependencies Interdependency The functional reliance of an essential service (e.g., networked utility service) on another network/system Disruption/outage in one area/sector has implications beyond that area/sector, and vice versa Maintaining Infrastructure integrity Requires systems-based thinking requires a focus on both security and reliability

19 Interdependencies Northeast Blackout, 2003 Hurricane Isabel, 2003 What are your experiences with interdependency issues?

20

21 Build Resilience

22 Reliability vs. Resilience We know how to plan for Utility System Reliability: Redundancy No choke points Diversity Critical Infrastructure Protection now also needs to include a focus on Security: Physical Insider Cyber Moreover, there is a shift in thinking from recovery (responding well) to resiliency (continuity of operations) as well 22

23 Local, State and Federal Jurisdiction Jurisdiction Over Energy Security Function Local State Federal Nuclear Power Plant Oversight X, for emergency response X, for emergency response X Ongoing Guarding of Energy Facilities X X, if National Guard X, in rare circumstances Freedom of Information Requests X X X Awareness of Energy System Vulnerabilities Pipeline Safety X X X X, Federal DOT Retail Electricity Products and Fuel Diversity X, for municipally owned utilities; for local government purchases X, through utility commissions, portfolio standards, incentives, funding and state purchase X, through tax incentives, federal government purchases Energy System Planning X, limited role X X Siting Certification X, in home rule states X X, for interstate pipelines only Emergency Management and Response First Response to Emergency X X X X Oversight of Energy Security Costs X, for municipal utilities X, through utility commissions under statutory authority X, for FERC-jurisdictional *Source: NCSL 2003 What has your experience been like compared with the above distribution of roles? How has it matched what is reflected above and how has it been different?

24 Department of Homeland Security Agency most directly concerned with direct threats to the nation s energy infrastructure, vulnerability assessments and responding to those threats Key Offices for Energy Security: FEMA Provides emergency support and coordination to local responders and citizens with a focus on essential human needs. Division of Information Analysis and Infrastructure Protection Determines security needs and priorities Supports state capacity building through training just like this Targets: vulnerabilities with catastrophic potential, e.g. nuclear power plants, chemical facilities, pipelines and ports Establish policy for standardized, tiered protective measures that address perceived threats DHS Office for State and Local Coordination Provides primary contact for training, equipment, planning and other critical response needs Coordinates communication systems from federal to state and local government levels Distributes research, technical support, warnings and other information to state governments

25 Other Roles DOE works to address strategic energy security issues through its efforts on electricity transmission, fuel diversity, energy supplies, research and development and other similar issues TSA lead federal agency for security of transportation, including pipelines Dept. of Commerce Office of Pipeline Safety regulates safetyrelated issues in pipelines FERC examines economic issues affecting security costs for utilities under its jurisdiction Non Feds: NERC, RTOs, Control Area Operators, Utilities

26 State Roles Governor s Office conducts overall emergency planning Emergency Management Agency provides primary emergency response Federal Lead Agencies (DOE, EPA, DHS) State Energy Offices State Legislatures Homeland Security, State Military or State Police prevents criminal and terrorist-caused disasters State Energy Office assures supplies of petroleum, heating oil, propane Other State Agencies Departments of health, environment, social or human services department, transportation departments At the local level Counties and Municipal Organizations Public Utility Commissions Utilities and Interdependent Systems Emergency Managers Other States Local Government Contracts Governors Offices State and Local Police; National Guard

27 Roles of Legislatures Establish Agency Regulatory Oversight: Reliability Planning Resource Diversity Manage information and authorize information protection Set liability Set rules for emergency situations Pricing, quarantine, evacuation, coordination What else?

28 Roles of PUC s Develop guidelines for cost recovery & evaluate utility investment prudence Manage sensitive information & disclosure concerns in accordance with FOIA procedures Establish methods for rapid information sharing & communication Review utility emergency response plans Provide regulatory oversight of reliability Participate in State emergency planning Understand utility interdependencies Engage in regional coordination and response Question: What s been your experience working with PUC s?

29 Roles of SEO, EMA and Governor Emergency Management coordinates functions of State agencies: emergency responders, law enforcement, public health, etc. Incident Response is dictated by Incident Command Structure. Online training for ICS is available and worthwhile Governor is ultimately politically responsible for State agencies, can declare states of emergency, deploy National Guard, is point of contact for other states & feds. State Energy Office helps avoid energy emergencies and builds and implements energy assurance plans. Tabletop exercises: get involved!

30 Information protection/ Information Management Connecting information with those who need it breeds success; Connecting information with those who want it for the wrong reasons is a recipe for disaster. What goes in the public record? What legal protections exist? What capacity exists to protect it from illegal or extra-legal exploitation?

31 Approaches to Information Protection 1. We can t protect it so don t share it. 2. We can t protect it onsite but can see it at your site 3. We can protect it in a special case 4. We can protect it within a standard case with a secure hearing 5. We can protect it as a matter of course Some of these approaches require people with specialized skills, clearances, or professional relationships 31

32

33 State Actions Seek Information and Education Review Utility Commission Enabling Statutes Recognize Importance of and Encourage Energy Efficiency and Demand Response Programs Review Utility Oversight Laws for Security Implications Review Statutes Governing Energy Office and Duties

34 State Actions Review Statutes Influencing Energy System Diversity and Redundancy Review Statutes Governing Freedom of Information Laws Reassess Laws and Procedures Governing Open Meetings Evaluate State Liability Statutes Ensure that Industry and/or State Agencies Have Conducted Appropriate Vulnerability Studies

35 State Actions Update Statutes Governing Emergency Response for Coordination, Delegation, Flexibility and Communication Examine Possible Unfair Pricing Legislation in Emergencies Cyber Security

36 Miles Keogh Christina Cody Director of Grants and Research Program Officer, Grants and Research

37 Four Steps To Building a Cyber Security Capability Additional Slides

38 Building a Cyber Security Capability Cyber security is not a one-time activity, like building a fence for protection. Because smart grid will be built over time, cyber security must also grow and evolve over time to address threats and vulnerabilities. For additional background information on cyber security see the NASEO Energy Assurance Guidelines (pages 23 to 29). A critical prerequisite to this is for State energy offices and public utility commissions to assign staff resources to cyber security on an ongoing basis. This might also be done using a team or taskforce approach. The National Association of Regulatory Commissioners also adopted a Resolution Regarding Cyber Security in February 2010 that states in part: That NARUC supports member commissions in becoming and remaining knowledgeable about these threats, and ensuring that their own staffs have the capability, training, and access to resources to adequately review and understand cyber security issues that enhances expertise in the review of cyber security aspects of filings by their jurisdictional utilities

39 Distinguish Between Utility Operations And National Defense / Law Enforcement Cyber secure utility operations is the domain of utilities. Defending against nation-state cyber attacks and cyber terrorism are national defense and law enforcement matters. Effective cyber security takes utility / regulator / federal agency (DHS, etc.) partnership.

40 A Five Step Process to Building Capability Step One Understand the State s internal cyber security profile. 1. Understand cyber security risks at work and at home. Many States and organizations have guidance available. For an example see: 2. Identify the individuals in the State who have the primary roles for addressing cyber security, and identify their roles and responsibilities. 3. Determine which State agency, if any, has lead and/or supporting roles and responsibilities in cyber security as it directly relates to smart grid implementation. 4. Know what the State s Continuity of Operations Plans (COOP) and disaster recovery strategies are that pertain to the essential cyber security systems. 5. Determine if it may be helpful to become a member of the FBI s InfraGard Program: 6. Become familiar with the U. S. Computer Emergency Readiness Team (US- CERT), which provides response support and defense against cyber attacks for the Federal Civil Executive Branch, as well as information sharing and collaboration 7. The SANS (SysAdmin, Audit, Network, Security) Institute is a good resource see:

41 Step Two Understand current cyber security for the energy sector. 1. Electricity and smart grid: NERC -- Standards CIP-002 through CIP-009 (the Critical Cyber Asset Identification portion of the Critical Infrastructure Protection Standards Section 1305 of Energy Independence and Security Act (EISA) 2007 defines the roles of both Federal Energy Regulatory Commission and NIST as they relate to the development and adoption of smart grid standards. The Act defines the Commission s role as: At any time after the Institute s work has led to sufficient consensus in the Commission s judgment, the Commission shall institute a rulemaking proceeding to adopt such standards and protocols as may be necessary to insure smart-grid functionality and interoperability in interstate transmission of electric power, and regional and wholesale electricity markets. 2. Understand the cyber security requirement for other parts of the energy sector including natural gas (pipeline safety standards) and the petroleum sector, because of the interdependency effects that need to be considered. 3. Under EISA 2007, NIST has "primary responsibility to coordinate development of a framework that includes protocols and model standards for information management to achieve interoperability of smart grid devices and systems " One of the primary documents was issued in January 2010 and titled Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0 (Framework). The Framework identified 75 interoperability standards that are applicable, or are likely applicable, to the ongoing development of smart grid technologies and applications. NIST developed Guidelines for Smart Grid Cyber Security.

42 Step Three Understand future standards and guidelines currently under discussion and development, and how they may affect utilities plans for smart grid deployment 1. The Advanced Security Acceleration Project for the Smart Grid (ASAP-SG) is a utilitydriven, public-private collaborative among DOE, EPRI, and a large group of leading North American utilities. ASAP-SG is developing system-level security requirements for smart grid applications, such as advanced metering, third party access for customer usage data, distribution automation, home area networks, and synchrophasors. 2. Over the next three years, the National Electric Sector Cyber Security Organization (NESCO) will be working with the National Electric Sector Cyber Security Organization Resources (NESCOR) to lead a broad-based, public-private partnership to improve electric sector energy systems cyber security

43 Step Four Determine whether there are cyber security plans in place, and are they driven by State regulatory or Federal grants compliance or other policies and programs. 1. What requirement are not Standards driven? 2. Are there regulatory efforts underway at a State public utility commission to create audit, reporting and compliance obligations on cyber security for the utilities 3. Are there State policy and program that address cyber security? 4. How is your State approaching the public private partnerships as provided for in the National Infrastructure Protection framework and the Energy Sector Specific Plan 5. The ARRA Smart Grid Investment Grants program required utilities proposing projects to develop cyber security plans. These Grants require: A description of the cyber security risks at each stage of the system deployment lifecycle. Cyber security criteria used for vendor and device selection. Cyber security control strategies. Descriptions of residual cyber security risks. Relevant cyber security standards and best practices. Descriptions of how the projects will support/adopt/implement emerging smart grid security standards. 6. Public utility commissions need to address how regulated utilities will pay for the necessary infrastructure upgrades to meet the cyber security requirements

Cyber Security & State Energy Assurance Plans

Cyber Security & State Energy Assurance Plans Cyber Security & State Energy Assurance Plans Michigan Cyber Summit 2011 Friday, October 7, 2011 Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials What is Energy

More information

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 1 AGENDA Why Cybersecurity? A Few Helpful Cybersecurity Concepts Developing Expertise:

More information

Miles Keogh, NARUC Patrick Miller, Principal, NESCO Alan Rivaldo, Public Utility Commission of Texas Security

Miles Keogh, NARUC Patrick Miller, Principal, NESCO Alan Rivaldo, Public Utility Commission of Texas Security Miles Keogh, NARUC Patrick Miller, Principal, NESCO Alan Rivaldo, Public Utility Commission of Texas Rick Lichtenfels, NCCIC US Department of Homeland Security Indianapolis IN, December 1 2011 The Plan

More information

Cybersecurity in the Energy/Utility Sectors

Cybersecurity in the Energy/Utility Sectors Cybersecurity in the Energy/Utility Sectors Hon. Todd Snitchler Chairman Thomas Pearce Senior Utility Specialist Chair, NARUC Staff Subcommittee on Critical Infrastructure Thursday, March 21, 2013 Ohio

More information

AURORA Vulnerability Background

AURORA Vulnerability Background AURORA Vulnerability Background Southern California Edison (SCE) September 2011-1- Outline What is AURORA? Your Responsibility as a Customer Sectors Impacted by AURORA Review of Regulatory Agencies History

More information

U.S. DEPARTMENT OF ENERGY ENERGY SECTOR CYBERSECURITY OVERVIEW. November 12, 2012 NASEO

U.S. DEPARTMENT OF ENERGY ENERGY SECTOR CYBERSECURITY OVERVIEW. November 12, 2012 NASEO U.S. DEPARTMENT OF ENERGY ENERGY SECTOR CYBERSECURITY OVERVIEW November 12, 2012 NASEO ISER Response: from site focused to system focused Emergency Preparedness, Response, and Restoration Analysis and

More information

Energy Cybersecurity Regulatory Brief

Energy Cybersecurity Regulatory Brief Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider

More information

Smart Grid and Cyber Security for Energy Assurance

Smart Grid and Cyber Security for Energy Assurance Smart Grid and Cyber Security for Energy Assurance Planning Elements for Consideration in States Energy Assurance Plans National Association of State Energy Officials Disclaimer of Warranties and Limitation

More information

State Roles in Enhancing the Cybersecurity of Energy Systems and Infrastructure

State Roles in Enhancing the Cybersecurity of Energy Systems and Infrastructure NGA PAPER State Roles in Enhancing the Cybersecurity of Energy Systems and Infrastructure Executive Summary Protecting the nation s energy system and infrastructure from cyber threats is of vital importance

More information

Cyber security: Practical Utility Programs that Work

Cyber security: Practical Utility Programs that Work Cyber security: Practical Utility Programs that Work Securing Strategic National Assets APPA National Conference 2009 Michael Assante Vice President & CSO, NERC June 15, 2009 The Electric Grid - Challenges

More information

Cybersecurity & Public Utility Commissions

Cybersecurity & Public Utility Commissions Cybersecurity & Public Utility Commissions November 12, 2014 TCIPG Ann McCabe, Commissioner Illinois Commerce Commission NARUC (National Association of Regulatory Utility Commissioners) Cybersecurity Primer

More information

This chapter provides an overview of cyber security issues and activities by state and federal organizations Cyber security is an ongoing, high

This chapter provides an overview of cyber security issues and activities by state and federal organizations Cyber security is an ongoing, high This chapter provides an overview of cyber security issues and activities by state and federal organizations Cyber security is an ongoing, high priority, active initiative within the utility industry.

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE

STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE COMMITTEE ON ENERGY AND NATURAL RESOURCES UNITED STATES SENATE

More information

Resilient and Secure Solutions for the Water/Wastewater Industry

Resilient and Secure Solutions for the Water/Wastewater Industry Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Your slides here Copyright 2011

More information

CYBERSECURITY RISK MANAGEMENT

CYBERSECURITY RISK MANAGEMENT CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS

More information

Resilient and Secure Solutions for the Water/Wastewater Industry

Resilient and Secure Solutions for the Water/Wastewater Industry Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Cyber Security IT People Geeks How

More information

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman

More information

State Engagement with the Energy Sector to Improve Cyber Security

State Engagement with the Energy Sector to Improve Cyber Security Contact: Allison Cullin Homeland Security and Technology Division 202/624-5311 April 20, 2010 State Engagement with the Energy Sector to Improve Cyber Security Executive Summary The state-owned computer

More information

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Panel Session: Lessons Learned in Smart Grid Cybersecurity PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory

More information

Forward-Looking Statement Disclosure

Forward-Looking Statement Disclosure Forward-Looking Statement Disclosure Certain information contained in this article is forward looking information based on current expectations and plans that involve risks and uncertainties. Forward looking

More information

Hearing on Oversight of Federal Efforts to Address Electromagnetic Risks. May 17, 2016

Hearing on Oversight of Federal Efforts to Address Electromagnetic Risks. May 17, 2016 Testimony of Joseph McClelland Director, Office of Energy Infrastructure Security Federal Energy Regulatory Commission Before the Committee on Homeland Security Subcommittee on Oversight and Management

More information

FBI AND CYBER SECURITY

FBI AND CYBER SECURITY FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.

More information

April 28, 2009. Dear Mr. Chairman:

April 28, 2009. Dear Mr. Chairman: April 28, 2009 The Honorable Edward J. Markey Chairman Subcommittee on Energy and Environment Committee on Energy and Commerce U.S. House of Representatives Washington, D.C. 20515 Dear Mr. Chairman: I

More information

APPENDIX XII: EMERGENCY SUPPORT FUNCTION 12 - ENERGY

APPENDIX XII: EMERGENCY SUPPORT FUNCTION 12 - ENERGY APPENDIX XII: EMERGENCY SUPPORT FUNCTION 12 - ENERGY PRIMARY AGENCIES: Public Service Commission and the Florida Energy and Climate Commission SUPPORT AGENCIES: Nuclear Regulatory Commission, Florida Rural

More information

Keeping the Lights On

Keeping the Lights On Keeping the Lights On Fundamentals of Industrial Control Risks, Vulnerabilities, Mitigating Controls, and Regulatory Compliance Learning Goals o Understanding definition of industrial controls o Understanding

More information

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage. Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee

More information

What Risk Managers need to know about ICS Cyber Security

What Risk Managers need to know about ICS Cyber Security What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 joe.weiss@realtimeacs.com ICSs What are they

More information

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc. Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets

More information

Building more resilient and secure solutions for Water/Wastewater Industry

Building more resilient and secure solutions for Water/Wastewater Industry Building more resilient and secure solutions for Water/Wastewater Industry Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Copyright 2010 Rockwell Automation, Inc. All rights reserved. 1 Governmental

More information

Cybersecurity Leadership

Cybersecurity Leadership Cybersecurity Leadership How does Dynamic Enterprise Security Governance benefit ICS Security? Christopher A. Peters May 1, 2014 Overview A Perilous Time in Boston during 1775 Fast Forward Today Internal

More information

Legal Issues / Estonia Cyber Incident

Legal Issues / Estonia Cyber Incident Control System Cyber Security Conference 22 October 2009 Legal Issues / Estonia Cyber Incident Maeve Dion Center for Infrastructure Protection George Mason University School of Law Legal Issues / Estonia

More information

DOE Project Team: DOE Field Contracting Officer Sara Wilson/Margo Gorin DOE Field Project Officer - Steve Palmeri Project Monitor - Yana Rasulova

DOE Project Team: DOE Field Contracting Officer Sara Wilson/Margo Gorin DOE Field Project Officer - Steve Palmeri Project Monitor - Yana Rasulova Final Scientific/Technical Report Project Title: Covering Period: July 1, 2007 to December 31, 2011 Date of Report: March 30, 2012 Recipient: Award Number: Working Partners: Cost-Sharing Partners: DE-FC36-07

More information

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

Cybersecurity in the Energy/Utility Sectors

Cybersecurity in the Energy/Utility Sectors Cybersecurity in the Energy/Utility Sectors Thomas Pearce Senior Utility Specialist, PUCO Chair, NARUC Staff Subcommittee on Critical Infrastructure NARUC Staff Subcommittee on Actg. & Fin. Portland, OR

More information

Statement for the Record

Statement for the Record Statement for the Record Robert M. Blue President Dominion Virginia Power Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities Quadrennial Energy Review Task Force April 11, 2014

More information

Securing the Grid. Marianne Swanson, NIST Also Moderator Akhlesh Kaushiva (AK), DOE Lisa Kaiser, DHS Leonard Chamberlin, FERC Brian Harrell, NERC

Securing the Grid. Marianne Swanson, NIST Also Moderator Akhlesh Kaushiva (AK), DOE Lisa Kaiser, DHS Leonard Chamberlin, FERC Brian Harrell, NERC 1 Securing the Grid Marianne Swanson, NIST Also Moderator Akhlesh Kaushiva (AK), DOE Lisa Kaiser, DHS Leonard Chamberlin, FERC Brian Harrell, NERC February 27, 2012 NIST and the SGIP 2.0 Cybersecurity

More information

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE

CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE 1 CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE Gavin McLintock P.Eng. CISSP PCIP 2 METCALFE POWER STATION 16 April 2013 Sophisticated physical attack 27 Days outage $15.4 million

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure

Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure Asset Management Challenges and Options, Including the Implications and Importance of Aging Infrastructure Presentation to the U.S. Department of Energy by the IEEE Joint Task Force on QER Trends: Resilience

More information

Keeping the Lights On: Security Priorities for the 21 st Century. Harvard Energy Policy Group June 13, 2014 Tamara Linde Vice President Regulatory

Keeping the Lights On: Security Priorities for the 21 st Century. Harvard Energy Policy Group June 13, 2014 Tamara Linde Vice President Regulatory Keeping the Lights On: Security Priorities for the 21 st Century Harvard Energy Policy Group June 13, 2014 Tamara Linde Vice President Regulatory The PSEG Companies PSEG Fast Facts Assets: $32.5 billion

More information

NIST Cybersecurity Framework What It Means for Energy Companies

NIST Cybersecurity Framework What It Means for Energy Companies Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber

More information

Cyber Security and Other Realities of Our Digital World Andy Dickson IT Director Nuclear Fleet Operations

Cyber Security and Other Realities of Our Digital World Andy Dickson IT Director Nuclear Fleet Operations Cyber Security and Other Realities of Our Digital World Andy Dickson IT Director Nuclear Fleet Operations What Changes Are We Facing? Cyber Security Regulation and Threats Changing IT Landscape and Expectations

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events.

Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events. ESF Coordinator: Energy Primary Agency: Energy Support Agencies: Agriculture Commerce Defense Homeland Security the Interior Labor State Transportation Environmental Protection Agency Nuclear Regulatory

More information

North Carolina Emergency Management

North Carolina Emergency Management North Carolina Emergency Management North Carolina Incidents North Carolina Incidents Primary mission is consequence management Must be prepared to: Search and Rescue Provide Mass Care Protect Life and

More information

Addressing Dynamic Threats to the Electric Power Grid Through Resilience

Addressing Dynamic Threats to the Electric Power Grid Through Resilience Addressing Dynamic Threats to the Electric Power Grid Through Resilience NOVEMBER 2014 INTRODUCTION The U.S. electric power grid is an interconnected system made up of power generation, transmission, and

More information

Understanding the Electric Power Industry s Response and Restoration Process

Understanding the Electric Power Industry s Response and Restoration Process Understanding the Electric Power Industry s Response and Restoration Process Electricity is a crucial product many of us take for granted. We scarcely think about it, unless we don t have it. Because electricity

More information

The Commonwealth of Massachusetts State Homeland Security Strategy

The Commonwealth of Massachusetts State Homeland Security Strategy The Commonwealth of Massachusetts State Homeland Security Strategy Massachusetts Executive Office of Public Safety and Security December 2014 The Commonwealth of Massachusetts Executive Office of Public

More information

What is Cyber Liability

What is Cyber Liability What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure

More information

Managing Electrical Demand through Difficult Periods: California s Experience with Demand Response

Managing Electrical Demand through Difficult Periods: California s Experience with Demand Response Managing Electrical Demand through Difficult Periods: California s Experience with Demand Response Greg Wikler Vice President and Senior Research Officer Global Energy Partners, LLC Walnut Creek, CA USA

More information

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The

More information

How Secure is Your SCADA System?

How Secure is Your SCADA System? How Secure is Your SCADA System? Charles Drobny GlobaLogix, Inc. Houston, TX, USA Our Industry is a Target 40% of cyber attacks on Critical Infrastructure targets are aimed at the Energy Industry The potential

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

Testimony of Patrick D. Gallagher, Ph.D. Deputy Director

Testimony of Patrick D. Gallagher, Ph.D. Deputy Director Testimony of Patrick D. Gallagher, Ph.D. Deputy Director National Institute of Standards and Technology United States Department of Commerce Before the Committee on Energy and Natural Resources United

More information

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions

More information

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014

Remarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before a Meeting of CES Government Washington, DC April 16, 2014 Good afternoon. It s a pleasure to finally be here with you. I had very much hoped

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for

September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for Testimony of John A. McCarthy, Director of the Critical Infrastructure Protection Project, George Mason School of Law Before a joint hearing of the House Subcommittee on Infrastructure Security and The

More information

Fast Facts About The Cyber Security Job Market

Fast Facts About The Cyber Security Job Market Cybersecurity Cybersecurity is the measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. Cybersecurity is the faster growing IT job, growing

More information

Maturation of a Cyber Security Incident Prevention and Compliance Program

Maturation of a Cyber Security Incident Prevention and Compliance Program Maturation of a Cyber Security Incident Prevention and Compliance Program Utilities & Energy Compliance & Ethics Conference February 25, 2013 Houston, Texas Anna Wang Principal Consultant Imminent Cyber

More information

New York State 2100 Commission Report: Energy

New York State 2100 Commission Report: Energy New York State 2100 Commission Report: Energy Improving Strength and Resilience Phil Mihlmester New York Bar Association Columbia University Law School New York, NY May 14, 2014 Context: Aftermath of Hurricane

More information

Increasing Energy Reliability & Resiliency NGA Policy Institute for Governors' Energy Advisors Denver Colorado, September 11, 2013

Increasing Energy Reliability & Resiliency NGA Policy Institute for Governors' Energy Advisors Denver Colorado, September 11, 2013 + Increasing Energy Reliability & Resiliency NGA Policy Institute for Governors' Energy Advisors Denver Colorado, September 11, 2013 Jeffrey R. Pillon, Director, Energy Assurance Programs National Association

More information

Georgia Emergency Operations Plan. Emergency Support Function # 12 Annex Energy

Georgia Emergency Operations Plan. Emergency Support Function # 12 Annex Energy Emergency Support Function # 12 Annex Energy 2015 E S F C o o r d i nator and Support Ag e n c i e s ESF C oordi na t or Georgia Environmental Finance Authority P rima ry Agenc y Georgia Department of

More information

Technology Infrastructure Services

Technology Infrastructure Services LOB #303: DISASTER RECOVERY Technology Infrastructure Services Purpose Disaster Recovery (DR) for IT is a capability to restore enterprise-wide technology infrastructure, applications and data that are

More information

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014

More information

Continuity of Operations:

Continuity of Operations: Continuity of Operations: By Robert Marinelli The past twelve months have provided many challenges due to severe weather events. Massachusetts has withstood a major tropical storm, tornados, and several

More information

North Carolina Emergency Management. Preparedness, Response & Long-Term Recovery

North Carolina Emergency Management. Preparedness, Response & Long-Term Recovery North Carolina Emergency Management Preparedness, Response & Long-Term Recovery Status of Recovery from Hurricane Irene Individual Assistance 35 counties declared 29,936 people registered $21,182,252 disbursed

More information

Business Continuity for Cyber Threat

Business Continuity for Cyber Threat Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between

More information

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE

TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August

More information

A presentation to the IEA-EPRI Task Force by Reid Detchon Executive Director Energy Future Coalition Washington, D.C.

A presentation to the IEA-EPRI Task Force by Reid Detchon Executive Director Energy Future Coalition Washington, D.C. A presentation to the IEA-EPRI Task Force by Reid Detchon Executive Director Energy Future Coalition Washington, D.C. The question is not where we need to go, but how to get there Several drivers make

More information

Protect Your Assets. Cyber Security Engineering. Control Systems. Power Plants. Hurst Technologies

Protect Your Assets. Cyber Security Engineering. Control Systems. Power Plants. Hurst Technologies Protect Your Assets Cyber Security Engineering Control Systems. Power Plants. Hurst Technologies Cyber Security The hackers are out there and the cyber security threats to your power plant are real. That

More information

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of

More information

N-Dimension Solutions Cyber Security for Utilities

N-Dimension Solutions Cyber Security for Utilities AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential

More information

Cyber Security Working Group

Cyber Security Working Group Cyber Security Working Group Guidelines for Smart Grid Cyber Security (NISTIR 7628) National Institute of Standards and Technology U.S. Department of Commerce 1 Today s Electric Grid Markets and Operations

More information

Water Security Issues: The Federal Perspective. J. Alan Roberson, P.E. Director of Security and Regulatory Affairs AWWA Washington, DC

Water Security Issues: The Federal Perspective. J. Alan Roberson, P.E. Director of Security and Regulatory Affairs AWWA Washington, DC Water Security Issues: The Federal Perspective J. Alan Roberson, P.E. Director of Security and Regulatory Affairs AWWA Washington, DC Outline The Overall Concept for Water Security What s Important in

More information

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

Lessons Learned from a Basic Vulnerability Assessment and Emergency Response Plan Update Project in Greensboro

Lessons Learned from a Basic Vulnerability Assessment and Emergency Response Plan Update Project in Greensboro Lessons Learned from a Basic Vulnerability Assessment and Emergency Response Plan Update Project in Greensboro Steve Drew, Director, Greensboro Water Resources Department Jack Moyer, Carolinas / Tennessee

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

Simple Tabletop Exercise, Interdependency Natural Disaster Scenario Scenario #8 Facilitator s Guide

Simple Tabletop Exercise, Interdependency Natural Disaster Scenario Scenario #8 Facilitator s Guide Simple Tabletop Exercise, Interdependency Natural Disaster Scenario Scenario #8 Facilitator s Guide Scenario Summary Background: It is March in Zenith City and the residents are experiencing a cold spring.

More information

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Roberta Stempfley Acting Assistant Secretary for Cybersecurity and Communications

More information

NARUC. The Smart Grid: Frequently Asked Questions for State Commissions. The National Association of Regulatory Utility Commissioners

NARUC. The Smart Grid: Frequently Asked Questions for State Commissions. The National Association of Regulatory Utility Commissioners 2009 NARUC The National Association of Regulatory Utility Commissioners The Smart Grid: Frequently Asked Questions for State Commissions May 2009 Miles Keogh NARUC Grants & Research Department 1 The Smart

More information

Dan T. Stathos, CPA* Associate Director

Dan T. Stathos, CPA* Associate Director Dan T. Stathos, CPA* dstathos@navigant.com Austin, Texas Direct: 512.493.5415 Professional Summary Dan Stathos, an in NCI s Austin, Texas office, has been involved with electric, gas, water and telephone

More information

STATE OF LOUISIANA STANDARD OPERATING PROCEDURE. Statewide Credentialing/Access Program. All Hazards Access

STATE OF LOUISIANA STANDARD OPERATING PROCEDURE. Statewide Credentialing/Access Program. All Hazards Access STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Statewide Credentialing/Access Program All Hazards Access STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators Pilot

More information

IEEE-Northwest Energy Systems Symposium (NWESS)

IEEE-Northwest Energy Systems Symposium (NWESS) IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific

More information

2 nd Quarter 2011 Earnings Conference Call. July 27, 2011

2 nd Quarter 2011 Earnings Conference Call. July 27, 2011 2 nd Quarter 2011 Earnings Conference Call July 27, 2011 Cautionary Note Regarding Forward-Looking Statements Certain information contained in this presentation is forward-looking information based on

More information

HAZARD VULNERABILITY & RISK ASSESSMENT

HAZARD VULNERABILITY & RISK ASSESSMENT Hazard Vulnerability Analysis Purpose and Scope A Hazard Vulnerability Analysis (HVA) evaluates risk associated with a specific hazard. During this analysis, the hazard is evaluated for its probability

More information

Prepared by Rod Davis, ABCP, MCSA November, 2011

Prepared by Rod Davis, ABCP, MCSA November, 2011 Prepared by Rod Davis, ABCP, MCSA November, 2011 Disaster an event, which causes the loss of an essential service, or part of it, for a length of time which imperils mission achievement. (Andrew Hiles,

More information

OCTOBER 20, 2005 WASHINGTON, D.C.

OCTOBER 20, 2005 WASHINGTON, D.C. REMARKS FOR WILLIAM M. FLYNN CHAIRMAN NEW YORK STATE PUBLIC SERVICE COMMISSION PRESENTATION TO: FEDERAL ENERGY REGULATORY COMMISSION OPEN MEETING OCTOBER 20, 2005 WASHINGTON, D.C. Good morning, Chairman

More information

The best practice guide for businesses and human resources

The best practice guide for businesses and human resources Emergency response and business continuity plan: The best practice guide for businesses and human resources How to develop and implement an emergency response and business continuity plan to deal with

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Table of Contents ESF-12-1 034-00-13

Table of Contents ESF-12-1 034-00-13 Table of Contents Primary Coordinating Agency... 2 Local Supporting Agencies... 2 State, Regional, and Federal Agencies and Organizations... 2 Purpose... 3 Situations and Assumptions... 4 Direction and

More information

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview

More information

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? Agenda Threats Risk Assessment Implementation Validation Advanced Security Implementation Strategy

More information

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

The State of Industrial Control Systems Security and National Critical Infrastructure Protection The State of Industrial Control Systems Security and National Critical Infrastructure Protection Emerging Threats Tinuade Adesina, Lulea University of Technology Sweden IT Security for the Next Generation

More information

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 James.Costello@srpnet.com James J. Costello Director, Enterprise IT Security April 8,

More information

Tokyo, Japan. William L. Carwile, III FEMA Associate Administrator Response and Recovery. Most catastrophic natural disaster in United States in the

Tokyo, Japan. William L. Carwile, III FEMA Associate Administrator Response and Recovery. Most catastrophic natural disaster in United States in the Hurricane Katrina Long term Recovery Expert twork kgroup Meeting Tokyo, Japan May 31, 2011 William L. Carwile, III FEMA Associate Administrator Response and Recovery Hurricane Katrina August 29, 2005 Most

More information