Smart Grid Security: A Look to the Future
|
|
|
- Rosalind Gregory
- 10 years ago
- Views:
Transcription
1 Smart Grid Security: A Look to the Future SESSION ID: TECH-W03A Gib Sorebo Chief Cybersecurity Technologist
2 Overview Distributed Energy Plug-in Vehicles Evolving Threats: Market Manipulation, Cascading Failure Modes 2
3 Distributed Generation: Cybersecurity Threats and Vulnerabilities Depends on a sophisticated communications infrastructure to be always available Needs instantaneous information on status of generation resource, particularly wind and solar Often widely dispersed from control centers and vulnerable to cable cuts and radio frequency interference May leverage public networks that are more vulnerable to infiltration or bandwidth limitations 3
4 Distributed Generation: Cybersecurity Threats and Vulnerabilities Integrity of Information is Critical Using complex algorithms, renewable resources such as solar and wind can be dispatchable Tampering with or errors in algorithms can lead to power outages when an expected power resource is not available Protection of the software supply chain will be critical 4
5 Distributed Generation: Cybersecurity Threats and Vulnerabilities Do-It-Yourself Generation People have been able to sell back power to utility for decades, but not at any scale Potential for manipulation of generation data or even intentional disruption of grid Analogous to BotNet networks; if malicious actors can control thousands of micro-generation sites, the consequences could be significant 5
6 Plug-In Vehicles: Grid to Vehicle Plug-in vehicles will require significant instrumentation and data reporting Utilities will need feedback from vehicles to predict demand Potential privacy concerns will need to be addressed Charging stations need trusted communications infrastructure and data reporting More monitoring of traditional grid components Communication with vehicle over home area network (HAN) needs higher level of protection 6
7 Plug-In Vehicles: Grid to Vehicle Public Charging and Roaming Payment systems for charging Should someone be able to roam and use their vehicle s identification number like cell phones or simply pay owner of facility without utility involved? Potential for fraud and privacy issues; tax collection 7
8 Plug-In Vehicles: Vehicle to Grid The Potential for Energy Storage Utilities can draw from potentially thousands of energy storage resources without having to pay for the capital costs Vehicle owners have option to sell back electricity during peak times and charge during low peak Requires vehicle owner to accurately predict driving habits and for battery technology to inform the utility of the available power in real time 8
9 Plug-In Vehicles: Vehicle to Grid Cybersecurity Challenges Similar to do-it-yourself generation; people can send false information to manipulate how much a utility thinks it is paying for Someone else s vehicle identifier could be stolen or hacker could manipulate whose power is used Potential for privacy issues Potential for malfunctioning vehicles to disrupt grid Need a mini balancing authority for vehicles and a reliable system for detecting abuse 9
10 Evolving Threats: Market Manipulation, Cascading Failure Modes NIST = National Institute of Standards and Technology 10
11 Evolving Threats: Market Manipulation Market Manipulation With distributed energy resources come exchanges to buy and sell energy Markets can be manipulated by obtaining generation capabilities and demand data before it is available to the general market Data can be manipulated to influence markets 11
12 Evolving Threats: Cascading Failure Modes Cascading Failure Modes We have limited information of the failure modes of many new and critical devices on the distribution and transmission side Can sensor feeds, at a high enough volume, overwhelm a system? Will automation and safety protocols lead to unintended consequences such as the Yuma, Arizona, incident; protection devices seek to prevent further damage but cause more Automated controls often need human sanity checks 12
13 Key Takeaways For Utilities Build your architecture to support cybersecurity for future innovation Assume manufacturers of consumer products won t build in adequate security When creating new markets, assume someone will look to exploit them Be prepared to operate in a world where you have less control For Residential and Business Customers Don t assume the utility can protect you from whatever you connect to the grid Demand that product vendors spell out how security is implemented Always have a manual override and analog gauges available 13
14 Questions? Thank You. Gib Sorebo Chief Cybersecurity Technologist tel: Available at the RSA Bookstore 14
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3
Synchronized real time data: a new foundation for the Electric Power Grid.
Synchronized real time data: a new foundation for the Electric Power Grid. Pat Kennedy and Chuck Wells Conjecture: Synchronized GPS based data time stamping, high data sampling rates, phasor measurements
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
Seize the benefits of green energy and the smart grid
Seize the benefits of green energy and the smart grid Electrical energy storage system for buildings optimizes self-consumption, costs, and reliability Are you getting the most from your onsite energy
How To Protect Your Network From Attack
NextGen SCADA security Erwin Kooi Setting the stage This talk is not An introduction to SCADA security AIC versus CIA The latest blinky-lights SCADA security appliance How to use IT security in OT envrionments
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
Cyber Infrastructure for the Smart Grid
Cyber Infrastructure for the Smart Grid Dr. Anurag K. Srivastava, Dr. Carl Hauser, and Dr. Dave Bakken Smart Grid Use Cases: Part 2 SGIC Xcel Energy SG Xcel Energy A public Service company of Colorado
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
AMI security considerations
AMI security considerations Jeff McCullough Introduction Many electric utilities are deploying or planning to deploy smart grid technologies. For smart grid deployments, advanced metering infrastructure
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
Smart Energy Consumption and the Smart Grid
Smart Energy Consumption and the Smart Grid Executive Summary The nation s outdated electrical infrastructure is being transformed. Fundamental changes that add intelligence, integrated communications
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Transactive Energy. A Sustainable Business and Regulatory Model for Electricity. Arizona Corporation Commission
Transactive Energy A Sustainable Business and Regulatory Model for Electricity Arizona Corporation Commission Workshop on Emerging Technologies Docket No. E-00000J-13-0375 August 18, 2014 Edward G. Cazalet,
Jim Sheppard, Director of Business Processes CenterPoint Energy, Texas, USA
Jim Sheppard, Director of Business Processes CenterPoint Energy, Texas, USA About Us... Public company traded on the New York Stock Exchange (CNP) Headquartered in Houston, TX Operating 3 business segments
Getting real about cyber threats: where are you headed?
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Security within a development lifecycle. Enhancing product security through development process improvement
Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web
NIST Coordination and Acceleration of Smart Grid Standards. Tom Nelson National Institute of Standards and Technology 8 December, 2010
NIST Coordination and Acceleration of Smart Grid Standards Tom Nelson National Institute of Standards and Technology 8 December, 2010 The Electric Grid One of the largest, most complex infrastructures
TLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
How To Protect Your Mobile From Attack From A Signalling Storm
ICL, TUB, CERTH, Telecom Italia IT, COSMOTE, HISPASEC Erol Gelenbe Fellow of the French National Academy of Engineering Dynamic Real-Time Security for Seamless Service Provisioning in the Mobile Ecosystem
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
Preparing for Distributed Energy Resources
Preparing for Distributed Energy Resources Executive summary Many utilities are turning to Smart Grid solutions such as distributed energy resources (DERs) small-scale renewable energy sources and energy
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
Smart buildings in smart grids KNX City. Rafael Marculescu May 2013
Smart buildings in smart grids KNX City Rafael Marculescu May 2013 Smart grids - definition A smart grid is a digital, self-healing energy system that delivers electricity or gas from generation sources,
White Paper. Convergence of Information and Operation Technologies (IT & OT) to Build a Successful Smart Grid
White Paper Convergence of Information and Operation Technologies (IT & OT) to Build a Successful Smart Grid Contents Executive Summary... 3 Integration of IT and OT... 4 Smarter Grid using Integrated
SEC. 1301. STATEMENT OF POLICY ON MODERNIZATION OF ELECTRICITY GRID.
TITLE XIII--SMART GRID SEC. 1301. STATEMENT OF POLICY ON MODERNIZATION OF ELECTRICITY GRID. It is the policy of the United States to support the modernization of the Nation's electricity transmission and
Demand Response Management System Smart systems for Consumer engagement By Vikram Gandotra Siemens Smart Grid
Demand Response Demand Response Management System Smart systems for Consumer engagement By Vikram Gandotra Siemens Smart Grid siemens.com/answers The Siemens Smart Grid Suite DRMS part of Grid Application
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Securing the Internet of Things WHITEPAPER
Securing the Internet of Things WHITEPAPER Table of Contents Introduction...1 Expectations of Security Risk...1 Complexity... 2 What is Secure Enough?... 2 Authenticated Sender & Receiver... 3 Accessible
Incident Response 101: You ve been hacked, now what?
Incident Response 101: You ve been hacked, now what? Gary Perkins, MBA, CISSP Chief Information Security Officer (CISO) Information Security Branch Government of British Columbia Agenda: threat landscape
POLIWALL: AHEAD OF THE FIREWALL
POLIWALL: AHEAD OF THE FIREWALL FIREWALL HISTORY Since the earliest days of the Internet, when hackers sat in their darkened basements dialing into networks with dial-up modems, both network threats and
COMMUNICATIONS SYSTEMS USED FOR ITS
COMMUNICATIONS SYSTEMS USED FOR ITS Index Purpose Description Technologies 1 of 5 Purpose The telecommunication system is the main element for the development of telematics in Transport field. It enables
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
EY Cyber Security Hacktics Center of Excellence
EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS
COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS Hyatt Regency Phoenix is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 11.0 credits for the course. 1 OVERVIEW
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE COMMITTEE ON ENERGY AND NATURAL RESOURCES UNITED STATES SENATE
Smart Grid America: Securing your network and customer data. Michael Assante Vice President and Chief Security Officer March 9, 2010
Smart Grid America: Securing your network and customer data Michael Assante Vice President and Chief Security Officer March 9, 2010 About NERC The electric industry s self-regulatory organization for reliability
POLIWALL: AHEAD OF THE FIREWALL
POLIWALL: AHEAD OF THE FIREWALL FIREWALL HISTORY Since the earliest days of the Internet, when hackers sat in their darkened basements dialing into networks with dial-up modems, both network threats and
DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE
TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
How To Use Icem
DataSheet icem: A complete view of the customer To overcome the challenges of decreasing margins from voice services, whilst catering for high cost network investments due to high data consumption, operators
Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges
Multi-vendor Penetration Testing in the Advanced ing Infrastructure: Future Challenges DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid Stephen McLaughlin - Penn State University 1 Data
The Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy
The Changing Threat Surface in Embedded Computing Riley Repko Vice President, Global Cyber Security Strategy Embedded Computing History First embedded system was the Apollo Guidance Computer First integrated
Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited
Contemporary Web Application Attacks Ivan Pang Senior Consultant Edvance Limited Agenda How Web Application Attack impact to your business? What are the common attacks? What is Web Application Firewall
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Securing Smart Grid Implementation: Case study using IBM WebSphere DataPower Appliance
Miracle Software Systems, Inc. Securing Smart Grid Implementation: Case study using IBM WebSphere DataPower Appliance David B White ([email protected]) Business Development Manager Miracle Software
Cybersecurity Awareness. Part 1
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
Using Predictive Maintenance to Approach Zero Downtime
SAP Thought Leadership Paper Predictive Maintenance Using Predictive Maintenance to Approach Zero Downtime How Predictive Analytics Makes This Possible Table of Contents 4 Optimizing Machine Maintenance
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends
Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014
Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
The IBM Solution Architecture for Energy and Utilities Framework
IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions
Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps
Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually
Energy & Environment Market Trends, Smart Technologies, New Fuels, Future Business Models and Growth Opportunities
& Environment Market Trends, Technologies, New Fuels, Future Business Models and Growth Opportunities September 2014 OUR COVERAGE & VISION: IDENTIFYING OPPORTUNITIES FROM UPSTREAM TO POINT OF USE Oil &
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Data Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Digital Metering: a key enabling factor to foster RES development
RES4MED Days, Rabat September 16th, 2014 Digital Metering: a key enabling factor to foster RES development Simone Aibino Area Manager Europe, Mediterranean Countries & USA CESI SpA Consulting Division
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Totally Wireless Video Security
Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and complexity has limited deployment
NetVision. NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management. Solution Datasheet
Version 2.0 - October 2014 NetVision Solution Datasheet NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management According to analyst firm Berg Insight, the installed base
Security in Smart Grid / IoT. Nenad Andrejević Comtrade Solutions Engineering
Security in Smart Grid / IoT Nenad Andrejević Comtrade Solutions Engineering Introduction Why is security important With so much of our lives connected to the Internet from our critical infrastructure
Medium voltage products. Technical guide Smart grids
Medium voltage products Technical guide Smart grids Contents 2 1. Introduction 8 2 The different components and functions of a smart grid 8 2.1 Integration of distributed renewable energy sources 9 2.2
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios
SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith [email protected] AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,
Storage Battery System Using Lithium ion Batteries
Offices and schools Utilities / Renewable energy Storage Battery System Using Lithium ion Batteries Worldwide Expansion of Storage Battery System s Commercial Buildings Residential The Smart Energy System
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Capabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
The Analytics Value Chain Key to Delivering Value in IoT
Vitria Operational Intelligence The Value Chain Key to Delivering Value in IoT Dr. Dale Skeen CTO and Co-Founder Internet of Things Value Potential $20 Trillion by 2025 40% 2015 Vitria Technology, Inc.
Nokia Networks. security you can rely on
Nokia Networks security you can rely on Protecting communication networks is critical 7 billion mobile subscriptions in 2014 1 Mobile broadband network traffic expected to grow by a factor of 1,000 by
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
The State of the Electrical Grid in Washington State. Michael Pesin, PMP, P.E. Seattle City Light
The State of the Electrical Grid in Washington State Michael Pesin, PMP, P.E. Seattle City Light April 24, 2014 *Seattle City Light *National and Washington State Electrical Grid Today *Smart Grid *Pacific
