IEEE-Northwest Energy Systems Symposium (NWESS)
|
|
|
- Merilyn Parsons
- 10 years ago
- Views:
Transcription
1 IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer
2 The Pacific Northwest National Laboratory is a DOE Office of Science laboratory in Richland, WA. Operated since 1965 by Battelle, a global non-profit research and development organization committed to science and technology for the greater good. Mission: Transform the world through courageous discovery and innovation. Vision: PNNL science and technology inspires and enables the world to live prosperously, safely, and securely. Values: Integrity, creativity, collaboration, impact and courage provide the foundation for all we do. PNNL employs nearly 5,000 staff and has an annual operating budget of $1.1 billion. PNNL has over 100 people working in Electric Infrastructure over 50 Power System Engineers.
3 PNNL draws upon core capabilities, facilities, and investments in Electric Infrastructure Staff Capabilities Physical Control Center (EIOC) Cyber Security / Resilience Center (EICC) Future Power Grid Initiative Power system operation, planning and security Power markets Demand response Renewable integration Advanced analytic methods, HPCbased simulations, visualization Live PMU data from all three interconnections PMU data archive PowerNET lab EMS/DMS displays T&D-level data displays Platform for tool evaluation, operator training Live security data streams Visual analytics Co-located with classified assets that accelerate threat recognition and appropriate response Emergency Response Public / Private Networking and data management Advanced analytic methods and HPC approaches for realtime modeling and simulation Visualization and decision support Next Generation EMS Next Generation Simulation
4 PNNL facilities and unique technologies accelerate innovation and impact Our strength is derived from applying R&D results to support operational missions Systems Engineering Facility Computational Sciences Facility Cyber Innovation & Operations Center Electricity Information & Operations Center
5 Abstract From business needs, to initial planning, procurement, receiving, deployment, operation, maintenance, to retirement, an overview of the entire control system lifecycle, and how cyber security fits into each phase. Compliance has improved many aspects of our nation electric utility cyber security posture, but what about where compliance does not apply? What resources are there for stakeholders to turn to, like the Electricity Subsector Cybersecurity Capability Maturity Model (ES- C2M2), and how can I use them today?
6 Control Systems Security Vulnerability assessments for SCADA and other control systems Unique systems architectures, experimentation, modeling and simulation Secure protocols to authenticate communication Reverse engineering and specialized equipment Partnerships with government and industry
7 Power: Inventory of U.S. Electrical Infrastructure Assets Inputs Distributed Generation Generation Transmission Distribution End Use Residential Customers 110M Commercial Customers 15M 1,400 Large Plants 159,000 Miles High Voltage Lines More than 4,700 generation plants in the U.S. 4,500 Large Substations 1,400 are greater than 100 MW and generate 95% of the electricity More than 350,000 miles of transmission lines in the U.S. 159,000 miles are greater than 230 kv More than 21,600 substations in the U.S. 4,500 are larger than 230 kv Industrial Customers 610K
8 CI / KR Control Systems Commercialized Security Technology Internal Investments Trusted Security Paradigms Next Generation Control System Simulation
9 Trends Impacting Control System Security Open Protocols Open industry standard protocols are replacing vendor-specific proprietary communication protocols General Purpose Computing Equipment and Software Standardized computational platforms increasingly used to support control system applications Interconnected to Other Systems Connections with enterprise networks to obtain productivity improvements and information sharing Reliance on External Communications Increasing use of public telecommunication systems, the Internet, and wireless for control system communications Increased Capability of Field Equipment Smart sensors and controls with enhanced capability and functionality KEY: COMMUNICATONS/CONNECTIVITY
10 Power Grid Transformation Department of Energy-Office of Emergency Operations- Electricity Delivery and Energy Reliability, Recovery $3,672,233,727 50% Cost share = Approx$8B infrastructure upgrades, improvements, research SMART GRID INVESTMENT TOPIC AREAS Equipment Manufacturing Customer Systems Advanced Metering Infrastructure Electric Distribution Systems Electric Transmission Systems Integrated and/or Crosscutting Systems
11 DOE Cyber Mission for ARRA CYBERSECURITY Cyber/Physical Security Controls Cybersecurity plan Scale Impacts to projects Sustainable
12 Alignment with emerging Smart Grid Architecture Modeling
13 Basics: What You Need To Know About The Electric Utility Organizational Processes Maturity Indicator Levels Risk Management (Analyze Risk) Defined progressions of goals Asset 3 Configuration Management (Inventory, Architecture, Software Upgrades Managed 2 Identity and Access Management Each (Role cell contains Based Access the defining for Application practices and by Physical goal Access) Performed for the domain at that maturity indicator level Threat and Vulnerability Management (New IT, OT Technologies) 1 Situational Initiated Awareness (Monitoring / Intrusion Detection Tools) 0 Information Sharing and Communications Not Performed Event and Incident Response (Detect and Respond) RISK ASSET ACCESS THREAT SITUATION Supply Chain and External Dependencies Management Workforce Management SHARING 10 Domains: Logical groupings of cybersecurity goals RESPONSE DEPENDENCIES WORKFORCE CYBER 13
14 Utility Resources: How To Get There RISK ASSET ACCESS THREAT SITUATION SHARING RESPONSE DEPENDENCIES WORKFORCE CYBER DOE RMP, NIST SP800-30, NRECA Guide to Developing a Cyber Security & Risk Mitigation Plan, ISO 27005:2011, SCADA AU RMF ISO/IEC 27002:2005, NISTIR 7628 Vol. 1, NERC CIP-002 NISTIR 7628 Vol 1., NERC CIP-002/004/005/007, NIST SP NIST SP800-40, NERC ES-ISAC, DHS ICS-CERT, CRISP, NVE, Vendors, NERC CIP-005/007 NIST SP , NRECA Guide to Developing a Cyber Security & Risk Mitigation Plan, NERC RTSA NERC Security Guideline: Information Protection, NERC ES-ISAC, FERC CEII, DHS PCII NSIT SP800-40/61/82/83/86, NERC ES-ISAC, DHS ICS-CERT, NERC GridEx DOE OE Cybersecurity Procurement Language for Energy Delivery Systems, NRECA Security Questions for Vendors, NISTIR 7622, MIT SCMM, ISO 28001:2007, Filsinger 2012 NERC CIP-004, CERT RMM, PM/HRM/OTA, NIST SP800-16/35/50/53/82, DOE OE Secure Power Systems Professional (SPSP), NERC GridEx NERC CIP-001/002/003/004/005/006/007/008/009, NIST SP800-35/53/64/82
15 Measuring the Maturity of Cybersecurity Capability ES-Cybersecurity Maturity Model (ES-C2M2) Support ongoing development and measurement of cybersecurity capabilities within the electricity subsector through the following four objectives: Strengthen cybersecurity capabilities in the electricity subsector Enable utilities to effectively and consistently evaluate and benchmark cybersecurity capabilities Share knowledge, best practices, and relevant references within the subsector as a means to improve cybersecurity capabilities Enable utilities to prioritize actions and investments to improve cybersecurity
16 Basics: What You Need To Know about Risk Management Basically, security is Risk Management This allows financial investment for security to be targeted where it is needed most Considerations: Threats Vulnerabilities Impacts Risk = Threats x Vulnerabilities x Impact Return on Investment has been a long standing holy grail Logging events to show possible attacks is one of the approaches to show ROI 16
17 Tools to get there: Risk Management Process Risk Management Process The electricity subsector1 cybersecurity Risk Management Process (RMP) guideline has been developed by a team of government and industry representatives to provide a consistent and repeatable approach to managing cybersecurity risk across the electricity subsector
18 Basics: What You Need To Know About Software Development Lifecycle Secure Coding Guidelines must be pervasive 18
19 Utility Resources: How to Get There The CERT C Coding Standard: 98 Rules for Developing Safe, Reliable, and Secure Systems, Second Edition Java Coding Guidelines CERT Oracle Secure Coding Standard for Java Supporting the Use of CERT Secure Coding Standards in DoD Acquisitions Source Code Analysis Laboratory (SCALe) Secure Coding Initiative Secure Design Patterns PNNL
20 Information Sharing U.S. Electric Grid /w Smart Sensors Western (U.S.) Interconnecti on Insider Threat Eastern (U.S.) Interconnec tion ERCOT PNNL
21 Cybersecurity Risk Information Sharing Project (CRISP) CRISP builds on the successes of the DOE Cooperative Protection Program (CPP) to deliver an energy sector situational awareness capability for infrastructure protection. U.S. Electric Grid Western (U.S.) Interconnecti on Eastern (U.S.) Interconnec tion ERCOT CRISP is an industry led wide-area situational awareness capability enables a real-time operational response to active cyber threats. Volunteer sites deploy the technology to provide robust situational awareness tailored to meet the needs of the energy sector. Data is shared to gain insights into adversary motives enabling rapid response to emerging threats.
22 Strategy: DOE-OE Control Systems Roadmap (R&D) CEDS/NSTB (OE10) Research Agenda Original Roadmap 2006, updated Challenges: Address Roadmap with partnered research leading to commercial solutions Influencing Supply Chain Advanced Persistent Threat Advanced Operators behind the threat utilize the full spectrum of intelligence gathering techniques. Persistent Operators give priority to a specific task over time, rather than opportunistically seeking to achieve the defined objectives. Threat Means that operators have a specific objective and are skilled, motivated, organized and well funded. In 10 years, control systems for critical applications will be designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function. 22
23 Cybersecurity for Energy Delivery Systems (CEDS) Roadmap Framework for Collaboration Energy Sector s synthesis of critical control system security challenges, R&D needs, and implementation milestones Provides strategic framework to align activities to sector needs coordinate public and private programs stimulate investments in control systems security Roadmap Vision By 2020, resilient energy delivery systems are designed, installed, operated, and maintained to survive a cyber incident while sustaining critical functions. For more information go to:
24 National Electric Grid Cyber Exercises Evolving Goals Identify and exercise processes, procedures, relationships, mechanisms that address a cyber incident; Examine the role of DHS and its National Cyber Incident Response Plan (NCIRP); Assess information sharing issues; Examine coordination and decision-making mechanisms; and Practically apply elements of ongoing cyber initiatives and findings from past exercises. 24
25 NERC GridEX-II 09:30-11:30 11:30 14:40
26 GridEx-II: Day 1 Summary by Organization Green Utility Orange Gov Blue Vendor Yellow - NERC
27 GridEX-II (2014) Exercise after-action report Grid-Ex I 2011 Table Top (Executive) Grid-Ex II 2014 Highly Expanded to on-site stakeholders Grid-Ex III 2015 More advanced exercise enabled with structured communications, collaboration Grid-Ex IV 2017 Future?
28 Discussion Paul Skare Program Manager Desk Carl Imhoff Sector Manager Desk Dale King Project Management Office Desk Phil Craig Deputy Desk
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
Rebecca Massello Energetics Incorporated
Cybersecurity Procurement Language for Energy Delivery Systems Rebecca Massello Energetics Incorporated NRECA TechAdvantage February 25, 2015 Talking Points What is this document? Who can use this document
Facilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
Securing the Grid. Marianne Swanson, NIST Also Moderator Akhlesh Kaushiva (AK), DOE Lisa Kaiser, DHS Leonard Chamberlin, FERC Brian Harrell, NERC
1 Securing the Grid Marianne Swanson, NIST Also Moderator Akhlesh Kaushiva (AK), DOE Lisa Kaiser, DHS Leonard Chamberlin, FERC Brian Harrell, NERC February 27, 2012 NIST and the SGIP 2.0 Cybersecurity
Smart Grid Cybersecurity Lessons Learned
Smart Grid Cybersecurity Lessons Learned Hank Kenchington Deputy Assistant Secretary From More than 11 Million Smart Meters Deployed Office of Electricity Delivery and Energy Reliability Grid Modernization:
Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, [email protected]. 2014 Utilities Telecom Council
Voluntary Cybersecurity Initiatives in Critical Infrastructure Nadya Bartol, CISSP, SGEIT, [email protected] 2014 Utilities Telecom Council Utility cybersecurity environment is full of collaborations
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
Addressing Dynamic Threats to the Electric Power Grid Through Resilience
Addressing Dynamic Threats to the Electric Power Grid Through Resilience NOVEMBER 2014 INTRODUCTION The U.S. electric power grid is an interconnected system made up of power generation, transmission, and
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE JANUARY 2015 U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector Cybersecurity Framework Implementation
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
Roadmaps to Securing Industrial Control Systems
Roadmaps to Securing Industrial Control Systems Insert Photo Here Mark Heard Eastman Chemical Company Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL McCormick
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.
Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee
Smart Grid Cybersecurity
Smart Grid Cybersecurity Exceeding cybersecurity requirements mandated by customers and regulatory agencies Abstract The world has become much more connected, with over 32 percent of the population of
Cyber Security Seminar KTH 2011-04-14
Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid [email protected] Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE COMMITTEE ON ENERGY AND NATURAL RESOURCES UNITED STATES SENATE
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D
ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D Eric Lightner Director Federal Smart Grid Task Force July 2015 2 OE Mission The Office of Electricity
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman
System Stability through technology
System Stability through technology 1 Smart Grid Design Goals More increased capabilities More capabilities at the edge and enterprise, pervasive automation Better faster, more reliable & secure The electric
Smart Grid America: Securing your network and customer data. Michael Assante Vice President and Chief Security Officer March 9, 2010
Smart Grid America: Securing your network and customer data Michael Assante Vice President and Chief Security Officer March 9, 2010 About NERC The electric industry s self-regulatory organization for reliability
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding TCIPG Seminar April 4, 2014 Southern California Edison (SCE) is committed to safely providing reliable and affordable electricity
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division James Stevens is a senior member of the technical staff
National Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair [email protected] 1 The National Institute of Standards
DOE Cyber Security Policy Perspectives
DOE Cyber Security Policy Perspectives Mike Smith Senior Cyber Policy Advisor to the Assistant Secretary Department of Energy Overview of DOE Cybersecurity Priorities Protecting the DOE Enterprise from
Electricity Subsector Cybersecurity Capability Maturity MODEL (ES-C2M2)
Electricity Subsector Cybersecurity Capability Maturity MODEL (ES-C2M2) Version 1.0 31 May 2012 2012 Carnegie Mellon University TABLE OF CONTENTS Acknowledgments...iii CAUTIONARY NOTE Intended Scope and
NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH
NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH SANS ICS Security Summit March 18, 2014 Jason D. Christopher Nadya Bartol Ed Goff Agenda Background Use of Existing Tools: C2M2 Case
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division
Cyber Security focus in ABB: a Key issue 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security in ABB Agenda ABB introduction ABB Cyber
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
Help for the Developers of Control System Cyber Security Standards
INL/CON-07-13483 PREPRINT Help for the Developers of Control System Cyber Security Standards 54 th International Instrumentation Symposium Robert P. Evans May 2008 This is a preprint of a paper intended
Cyber security: Practical Utility Programs that Work
Cyber security: Practical Utility Programs that Work Securing Strategic National Assets APPA National Conference 2009 Michael Assante Vice President & CSO, NERC June 15, 2009 The Electric Grid - Challenges
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT
Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT December 3, 2013 slide 1 A global leader in power and
McAfee Application Control Change Control Integrity Control
PNNL- 21313 Technology Security Assessment for Capabilities and Applicability in Energy Sector Industrial Control Systems: McAfee Application Control Change Control Integrity Control Philip A Craig Jr
Communication Security Measures for SCADA Systems
Communication Security Measures for SCADA Systems Ron Farquharson, MV Consulting, DNP User Group Jim Coats, Triangle MicroWorks, DNP User Group Joe Stevens, Triangle MicroWorks 23 September 2014, Raleigh,
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT
Energy Research and Development Division FINAL PROJECT REPORT CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Prepared for: Prepared by: California Energy Commission KEMA, Inc. MAY 2014 CEC
Appropriate security measures for smart grids
1 Appropriate security measures for smart grids Guidelines to assess the sophistication of security measures implementation [2012-12-06] 1 Copyright TenneT Appropriate security measures for smart grids
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Secure Machine to Machine Communication on the example of Smart Grids
Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :
Enabling the SmartGrid through Cloud Computing
Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from
Risk Management in Practice A Guide for the Electric Sector
Risk Management in Practice A Guide for the Electric Sector Annabelle Lee Senior Technical Executive ICCS European Engagement Summit April 28, 2015 Before we continue let s get over our fears and myths
PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Roadmap to Achieve Energy Delivery Systems Cybersecurity
i Acknowledgements The Energy Sector Control Systems Working Group (ESCSWG) developed this roadmap in support of the Electricity Sub-sector Coordinating Council, Oil and Natural Gas Sector Coordinating
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology
Cybersecurity Risk Assessment in Smart Grids
Cybersecurity Risk Assessment in Smart Grids Lucie Langer, Paul Smith, Thomas Hecht [email protected] AIT Austrian Institute of Technology ComForEn Symposium 2014 Sept 30, 2014 1 Risk Assessment:
Cybersecurity Procurement Language for Energy Delivery Systems
Cybersecurity Procurement Language for Energy Delivery Systems April 2014 Energy Sector Control Systems Working Group (ESCSWG) For Questions or Comments Energy sector asset owners, operators, and suppliers
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Working to Achieve Cybersecurity in the Energy Sector
Working to Achieve Cybersecurity in the Energy Sector Cybersecurity for Energy Delivery Systems (CEDS) Rita Wells Idaho National Laboratory Roadmap Framework for Public-Private Collaboration Published
SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS
1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase
CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool
INL/CON-07-12810 PREPRINT CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool ISA Expo 2007 Kathleen A. Lee January 2008 This is a preprint of a paper intended for publication in a journal
An Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
How To Protect Your Network From Attack
Liste von ausgewählten Cybersecurity-Normen, -Standards und -Richtlinien mit Smart-Grid-Relevanz: Advanced Security Acceleration Project Smart Grid (ASAP-SG): Entwicklung von Security Anforderungen für
PREPARED DIRECT TESTIMONY OF SCOTT KING ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY
BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA Application of SOUTHERN CALIFORNIA GAS COMPANY (U 0 G) for Review of its Safety Model Assessment Proceeding Pursuant to Decision 1-1-0.
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT
Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated
San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions June 4, 2015. Electric Grid Operations
San Diego Gas & Electric Company FERC Order 717 Transmission Function Employee Job Descriptions June 4, 2015 Electric Grid Operations Director Electric Grid Operations: Responsible for overall transmission
Public Service Co. of New Mexico (PNM) - PV Plus Storage for Simultaneous Voltage Smoothing and Peak Shifting
Public Service Co. of New Mexico (PNM) - PV Plus Storage for Simultaneous Voltage Smoothing and Peak Shifting Steve Willard, P.E. Brian Arellano DOE Peer Review October 20, 2011 Project Goals Develop an
The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.
The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013. The Executive Order calls for the development of a voluntary risk based Cybersecurity Framework
Smart grid security analysis
Smart grid security analysis Paul Smith et al. [email protected] SPARKS Stakeholder Workshop 20 th May, 2014, Graz SPARKS Objectives The SPARKS project has three main objectives regarding security analysis:
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB
NIST Cybersecurity Initiatives. ARC World Industry Forum 2014
NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission
