EU CIP Project DENSEK. Joining forces against cyber threats on European level

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "EU CIP Project DENSEK. Joining forces against cyber threats on European level"

Transcription

1 EU CIP Project DENSEK Joining forces against cyber threats on European level

2 DENSEK EU CIP Objectives Improving the resilience of the energy infrastructure i.e. improving the security of the Smart Energy Grid How? 1. Joining forces at European Level 2. Involving the whole energy supply chain 3. Improving the know how & awareness of all stakeholders

3 Consortium partners Security Industry Energy Utilities Research/Academia Facilitating partner

4 Alliander is a Distribution System Operator

5 Alliander is a Distribution System Operator Electricity distribution Customers: 3,4 million Grid: km Stations (sub, distribution): Gas distribution Customers: 2,6 million Grid: km Stations (sub, distribution): Company 12 Billion asset value 1.6 Billion revenues 400 Million Investment / Annum FTE KPI, Performance 20.4 SVBM (outage time in minutes per end user)

6 Development of the intelligent grid

7 We change our substations into remote locations

8 What is our worst nightmare scenario?

9 Alliander Cyber Resilience vision Alliander resilience vision*: Alliander is a resilient organization capable of anticipating and responding on a range or threats against her mission Alliander security vision: Protecting the mission of Alliander and her stakeholders by securing our crown jewels against intentionally caused damage through human actions * Underwriting the WEF resilience principles

10 Alliander Situational Awareness vision

11 Deliverables European Energy ISAC Information Sharing Platform Situational Awareness Network

12 European Energy ISAC A trusted Information Sharing and Analysis Center Focus on cyber security within the energy branch Members are stakeholders within the energy supply chain Monitors cyber security within the branch Gathers analyses of events Provides information and education

13 European Energy ISAC Utilities Stakeholders of the Energy Supply Value Chain Vendors Research/ Academia Government/ International Agencies Standardization Organizations

14 Why? Value propositions Share Data/Information/ Knowledge to increase the security level of their infrastructure Improve one s own portfolio of products/services Added Value Promote innovation, understanding the needs of the industry to better define its strategic research, from one hand, and advertising their portfolio of knowledge and services to the other members Improve the security level of Critical Infrastructures by means of appropriate legislation and governance processes Improve the process of standardization

15 Information Sharing Platform Portal for the European Energy ISAC Communication channel for ISAC members Facilitates info sharing through periodical reports, newsletters, webinars, etc. Facilitates E-learning

16 Main functionalities Social kind: Forums / Q&A Messages / News Notification of updates as soon as possible Information Sharing Platform More technical: Technical reports (Anonymous) Raw data from system monitors Configurations, workarounds, tech recipes, (Controlled) Integration with other platform, like operators dashboards

17 Situational Awareness Network Optional service for DENSEK members European Network for participating members Integrating existing Awareness Networks in place at participating members 24/7 monitoring on occurence of cyber threats or attacks Immediate alerts upon on any occurence to all participating members

18 Creating Situational Awareness Situational Awareness is created by extracting information about the industrial processes, people and the lower network layer (SCADA & Process control) by a network of sensors and systems - the Situational Awareness Network (SAN) The information is processed and displayed on the Situational Awareness Dashboard

19 Network Analyzer Situational Awareness Network SA Dashboard SIEM & Correlation Signature- and non-signature based NIDS Other analysis tools and sensor SAN of member X Network feed

20 Network Analyzer Network Analyzer Network Analyzer Network Analyzer Sharing with ISAC European Energy ISAC Information Sharing Platform SA Dashboard SIEM SA Dashboard SIEM Signature NIDS Non-sig. NIDS Sig. NIDS Non-sig. NIDS Log Analy. Malw. Analy. SAN member A SAN member D SA Dashboard SA Dashboard SIEM SIEM Log Analyzer Non-sig. NIDS Sig. NIDS Log Analy. Non-sig. NIDS SAN member B SAN member C

21 Roadmap Timetable European ISAC Live 2. Sit. Awareness Netw. Definition Development Testing Live 3. Info Sharing Platform Dissemination Definition Development Testing Live Reporting

22 International collaboration is crucial!! Johan Rambi : Alliancemanager Privacy & Security Telephone :

NextGen SCADA security. Erwin Kooi

NextGen SCADA security. Erwin Kooi NextGen SCADA security Erwin Kooi Setting the stage This talk is not An introduction to SCADA security AIC versus CIA The latest blinky-lights SCADA security appliance How to use IT security in OT envrionments

More information

Lessons learned from the new Smart Meter Risk Analysis Methodology in the Netherlands

Lessons learned from the new Smart Meter Risk Analysis Methodology in the Netherlands Lessons learned from the new Smart Meter Risk Methodology in the Netherlands Johan Rambi Alliancemanager Privacy & Security Alliander Chairman Policy Committee Privacy & Security Netbeheer Nederland 6

More information

Cyber Security for the energy industry

Cyber Security for the energy industry ENERGY Cyber Security for the energy industry 28-03-2014 1 DNV GL 2014 10-03-2014 SAFER, SMARTER, GREENER 2 3 Challenges Utilities are thinking they are ok! The fence around the assets isn t enough anymore

More information

Lessons learned from the new Smart Meter Risk Analysis Methodology in the Netherlands

Lessons learned from the new Smart Meter Risk Analysis Methodology in the Netherlands Lessons learned from the new Smart Meter Risk Analysis Methodology in the Netherlands Johan Rambi Alliancemanager Privacy & Security Alliander Chairman Policy Committee Privacy & Security Netbeheer Nederland

More information

Ecom Infotech. Page 1 of 6

Ecom Infotech. Page 1 of 6 Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance

More information

WHITE PAPER: THREAT INTELLIGENCE RANKING

WHITE PAPER: THREAT INTELLIGENCE RANKING WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes

More information

Operational Collaboration of Situational Awareness inside and beyond Smart Grid Control Centers

Operational Collaboration of Situational Awareness inside and beyond Smart Grid Control Centers Operational Collaboration of Situational Awareness inside and beyond Smart Grid Control Centers Suchit Rout Director - Strategic Marketing, Barco Inc., USA suchit.rout@barco.com +1.678.475.8000 Agenda

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Water Security in New Jersey: Partnership and Services

Water Security in New Jersey: Partnership and Services GOV. CHRIS CHRISTIE LT. GOV. KIM GUADAGNO DIR. CHRIS RODRIGUEZ NJOHSP OFFICE OF HOMELAND SECURITY AND PREPAREDNESS Preparedness Act Water Security in New Jersey: Partnership and Services Created by the

More information

Application for Membership

Application for Membership Application for Membership This Application for Industry Membership is subject to approval by EnergySec. By executing the Membership Application and Membership Agreement and submitting payment for membership

More information

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

White Paper: Leveraging Web Intelligence to Enhance Cyber Security White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence

More information

Using Big Data for Crisis Management. Mohammad Khaled AL Hassan

Using Big Data for Crisis Management. Mohammad Khaled AL Hassan Using Big Data for Crisis Management Mohammad Khaled AL Hassan Agenda 1 2 3 4 Introduction Purpose of Big Data for Crises Management Crisiss Description Mission & Vision Crises Management & Business Need

More information

Cyber Security in EU: ENISA approach

Cyber Security in EU: ENISA approach Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency Norwegian Energy Days 2015, Oslo European Union Agency for Network and

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors

More information

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation

More information

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA 2 Agenda What is the cloud business value? What about the SecaaS? Why companies

More information

IEEE-Northwest Energy Systems Symposium (NWESS)

IEEE-Northwest Energy Systems Symposium (NWESS) IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific

More information

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191 Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3

More information

GE Measurement & Control. Cyber Security for NERC CIP Compliance

GE Measurement & Control. Cyber Security for NERC CIP Compliance GE Measurement & Control Cyber Security for NERC CIP Compliance GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used for purposes

More information

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D Eric Lightner Director Federal Smart Grid Task Force July 2015 2 OE Mission The Office of Electricity

More information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information www.wipro.com RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information Saritha Auti Practice Head - Enterprise Security Solutions, Wipro Table of Contents 03... Abstract 03... Why

More information

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation

More information

Why the Global Cyber Security Landscape Paints a Concerning Picture

Why the Global Cyber Security Landscape Paints a Concerning Picture SESSION ID: SPO-W07A Why the Global Cyber Security Landscape Paints a Concerning Picture Simon Goldsmith Director of Cyber Security (Commercial Sectors) BAE Systems @BAE_AI Today s Discussion PART 1 THE

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

Plan of Attack 5 Step Plan

Plan of Attack 5 Step Plan Plan of Attack 5 Step Plan Naming those Digital Assets Practicing Digital Doomsday Training + Policies and Procedures Technology Tuning Security in the Supply Chain Next Steps Sample Plan 0 to 30 Days

More information

2010 SMART GRID INVESTMENTS INFORMATION TECHNOLOGY

2010 SMART GRID INVESTMENTS INFORMATION TECHNOLOGY EB-00-0 Exhibit G Tab Schedule Page of 00 SMART GRID INVESTMENTS INFORMATION TECHNOLOGY CUSTOMER PORTALS PILOT Customer Display Integration: The implementation of a customer display in the future is identified

More information

What Risk Managers need to know about ICS Cyber Security

What Risk Managers need to know about ICS Cyber Security What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 joe.weiss@realtimeacs.com ICSs What are they

More information

Service-Aware Security for Distributed Automation. Ilan Barda GRIPS SciREX Symposium February 2 nd 2015

Service-Aware Security for Distributed Automation. Ilan Barda GRIPS SciREX Symposium February 2 nd 2015 Service-Aware Security for Distributed Automation Ilan Barda GRIPS SciREX Symposium February 2 nd 2015 The market Securing the Industrial IoT Source: MarketsandMarkets, December 2014-2- Radiflow Mission

More information

FOCUS. Security. Research projects. Innovation serving Comprehensive Protection! In this edition: No 1 - November 2014

FOCUS. Security. Research projects. Innovation serving Comprehensive Protection! In this edition: No 1 - November 2014 FOCUS Security Research projects No 1 - November 2014 In its role as technical platform and forum for gathering and expressing members ideas, UIC is able to synthesise these research needs, along with

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Applying IBM Security solutions to the NIST Cybersecurity Framework

Applying IBM Security solutions to the NIST Cybersecurity Framework IBM Software Thought Leadership White Paper August 2014 Applying IBM Security solutions to the NIST Cybersecurity Framework Help avoid gaps in security and compliance coverage as threats and business requirements

More information

VULNERABILITY MANAGEMENT

VULNERABILITY MANAGEMENT Vulnerability Management (VM) software differ in the richness of reporting, and the capabilities for application and security configuration assessment. Companies must consider how a VM technology will

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

PUSH INTELLIGENCE. Bridging the Last Mile to Business Intelligence & Big Data. 2013 Copyright Metric Insights, Inc.

PUSH INTELLIGENCE. Bridging the Last Mile to Business Intelligence & Big Data. 2013 Copyright Metric Insights, Inc. PUSH INTELLIGENCE Bridging the Last Mile to Business Intelligence & Big Data 2013 Copyright Metric Insights, Inc. INTRODUCTION... 3 CHALLENGES WITH BI... 4 The Dashboard Dilemma... 4 Architectural Limitations

More information

Enabling the SmartGrid through Cloud Computing

Enabling the SmartGrid through Cloud Computing Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from

More information

ARRA Grant Case Studies SMUD s Smart Grid Program

ARRA Grant Case Studies SMUD s Smart Grid Program . ARRA Grant Case Studies SMUD s Smart Grid Program Jim Parks December 2012 Powering forward. Together. About SMUD 600,000 customers 1.4 million population $1.4 billion in revenues 900 mi 2, 2331 km 2

More information

Securing the Grid: A Progressive Approach to Cyber-Security for Municipal Utilities

Securing the Grid: A Progressive Approach to Cyber-Security for Municipal Utilities Securing the Grid: A Progressive Approach to Cyber-Security for Municipal Utilities Patrick C Miller, President and CEO, EnergySec July 26 2011 Municipal Smart Grid Summit Advantage: Adversaries Intelligent,

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

Cyber Security and Privacy - Program 183

Cyber Security and Privacy - Program 183 Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology

More information

TLP AMBER: An Overview of CIS

TLP AMBER: An Overview of CIS TLP AMBER: An Overview of CIS April 15, 2014 Chair William Pelgrin What is the? The is the key resource for cyber threat prevention, protection, response and recovery for the nation s state, local, territorial

More information

Strengthening Utility Critical

Strengthening Utility Critical WEBINAR Strengthening Utility Critical Infrastructure Cybersecurity Under June 4, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview The White

More information

Cyber Security & Data Privacy. January 22, 2014

Cyber Security & Data Privacy. January 22, 2014 Cyber Security & Data Privacy January 22, 2014 Today s Presenters Bob DiBella Director of Product Management Aclara Technologies Srinivasalu Ambati Application Architect, Consumer Engagement Aclara Technologies

More information

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure

More information

IESO Information & Technology Services Group Roles, Responsibilities, and Project Management. Doug Thomas: VP- I&TS and CIO May 28, 2015

IESO Information & Technology Services Group Roles, Responsibilities, and Project Management. Doug Thomas: VP- I&TS and CIO May 28, 2015 IESO Information & Technology Services Group Roles, Responsibilities, and Project Management Doug Thomas: VP- I&TS and CIO May 28, 2015 IESO I&TS: Presentation Agenda Group Overview Roles and responsibilities

More information

New Broadband and Dynamic Infrastructures for the Internet of the Future

New Broadband and Dynamic Infrastructures for the Internet of the Future New Broadband and Dynamic Infrastructures for the Internet of the Future Margarete Donovang-Kuhlisch, Government Industry Technical Leader, Europe mdk@de.ibm.com Agenda Challenges for the Future Intelligent

More information

Supplier Relationship Management Tools

Supplier Relationship Management Tools Supplier Relationship Management Tools Contents The Need for Supplier Management Automation VSAAM Capabilities The Magic of VSAAM The VSAAM Value Proposition VSAAM System Integration and Deployment Process

More information

Cyber Security Metrics Dashboards & Analytics

Cyber Security Metrics Dashboards & Analytics Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics

More information

Business Intelligence & Situational Awareness

Business Intelligence & Situational Awareness Business Intelligence & Situational Awareness UltraAPEX: What s in it for the Customer Have you ever asked yourself any of the following questions? How consistently is my operation performing? Can I proactively

More information

Management of Security Information and Events in Future Internet

Management of Security Information and Events in Future Internet Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?

More information

Faculdade de Direito, Lisboa, 02-Jul-2014. The Competitive Advantage of Cybersecurity

Faculdade de Direito, Lisboa, 02-Jul-2014. The Competitive Advantage of Cybersecurity Faculdade de Direito, Lisboa, 02-Jul-2014 The Competitive Advantage of Cybersecurity Thales Key highlights (I) A global company with 65,000 employees and 14,2 billion in revenues, R&D 2,5 billion * We

More information

Cyber Security Seminar KTH 2011-04-14

Cyber Security Seminar KTH 2011-04-14 Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid erik.z.johansson@se.abb.com Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon

More information

All about Threat Central

All about Threat Central All about Threat Central Ted Ross & Nadav Cohen #HPProtect Forward-looking statements This is a rolling (up to three year) Roadmap and is subject to change without notice. This document contains forward

More information

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200

More information

NetVision. NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management. Solution Datasheet

NetVision. NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management. Solution Datasheet Version 2.0 - October 2014 NetVision Solution Datasheet NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management According to analyst firm Berg Insight, the installed base

More information

IT Security Risk Management

IT Security Risk Management IT Security Risk Adding Insight to Security Gennaro Scalo April 2, 2014 1 Where is Security Today? Companies have built layer upon layer of security, but is it helping? Complexity Data Breaches Damage

More information

US-CERT Year in Review. United States Computer Emergency Readiness Team

US-CERT Year in Review. United States Computer Emergency Readiness Team US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 What s Inside Welcome 1 Vison, Mission, Goals

More information

FS-ISAC CHARLES BRETZ

FS-ISAC CHARLES BRETZ FS-ISAC CHARLES BRETZ Information Sharing To be forewarned is to be fore-armed MISSION: Sharing Timely, Relevant, Actionable Cyber and Physical Security Information & Analysis A nonprofit private sector

More information

Southern States Energy Board. Introductions & Overview February 23, 2015

Southern States Energy Board. Introductions & Overview February 23, 2015 Southern States Energy Board Introductions & Overview February 23, 2015 Introductions Freda Guzman, NorthStar Account Manager Joined our NorthStar Team in 2014 Your primary point of contact for our relationship

More information

Решения HP по информационной безопасности

Решения HP по информационной безопасности Решения HP по информационной безопасности Евгений Нечитайло ynechyta@hp.com Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Secure SCADA Summit. Dan Mintz, CTO. Civil Health Services Group dmintz@csc.com. Twitter: technogeezer, December 2009

Secure SCADA Summit. Dan Mintz, CTO. Civil Health Services Group dmintz@csc.com. Twitter: technogeezer, December 2009 Secure SCADA Summit Dan Mintz, CTO Civil Health Services Group dmintz@csc.com Twitter: technogeezer, December 2009 For 50 years, CSC Has Helped Clients Ride Every Major Business- Driven Technology Wave

More information

How Much Cyber Security is Enough?

How Much Cyber Security is Enough? How Much Cyber Security is Enough? Business Drivers of Cyber Security Common Challenges and Vulnerabilities Cyber Security Maturity Model Cyber Security Assessments September 30, 2010 Business in the Right

More information

Keeping the Lights On: Security Priorities for the 21 st Century. Harvard Energy Policy Group June 13, 2014 Tamara Linde Vice President Regulatory

Keeping the Lights On: Security Priorities for the 21 st Century. Harvard Energy Policy Group June 13, 2014 Tamara Linde Vice President Regulatory Keeping the Lights On: Security Priorities for the 21 st Century Harvard Energy Policy Group June 13, 2014 Tamara Linde Vice President Regulatory The PSEG Companies PSEG Fast Facts Assets: $32.5 billion

More information

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008 U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October

More information

Data Breach Response Planning: Laying the Right Foundation

Data Breach Response Planning: Laying the Right Foundation Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA

More information

Gov 3.0. Driving e-government through social, mobile, analytics and the cloud. Microsoft CityNext

Gov 3.0. Driving e-government through social, mobile, analytics and the cloud. Microsoft CityNext Gov 3.0 Driving e-government through social, mobile, analytics and the cloud Rodrigo Becerra Mizuno Director Public Sector Asia Microsoft rbecerra@microsoft.com e-government Evolution Gov 1.0 (e-gov)

More information

Bridging the gap between COTS tool alerting and raw data analysis

Bridging the gap between COTS tool alerting and raw data analysis Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading

More information

Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection

Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection SESSION ID: CXO-F02 Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection Timothy Lee CISO City of Los Angeles @tswlj316 AGENDA Introduction Why do we need Cyber Security Operations

More information

I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2

I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 www.vitria.com TABLE OF CONTENTS I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 III. COMPLEMENTING UTILITY IT ARCHITECTURES WITH THE VITRIA PLATFORM FOR

More information

Guidelines to Building an Effective Marketing Plan

Guidelines to Building an Effective Marketing Plan Guidelines to Building an Effective Marketing Plan Building an Effective Marketing Plan Too often the new fiscal year comes upon us but there was never really any down time to build the new plan. As a

More information

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 James.Costello@srpnet.com James J. Costello Director, Enterprise IT Security April 8,

More information

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Panel Session: Lessons Learned in Smart Grid Cybersecurity PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory

More information

The digital future for energy and utilities.

The digital future for energy and utilities. Digital transformation has changed the way you do business. The digital future for energy and utilities. Digital is reshaping the landscape in every industry, and the energy and utilities sectors are no

More information

CoreSHIELD Product Catalog

CoreSHIELD Product Catalog CoreSHIELD Product Catalog Revised - 6/23/15 Created by the National Center for Food Protection and Defense. CoreSHIELD is the information technology architecture underlying a suite of web-based portals

More information

IBM Security Strategy

IBM Security Strategy IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

Scroll. An MDM (Metering Data Management) platform

Scroll. An MDM (Metering Data Management) platform Scroll An MDM ( Data Management) platform Overview Meter Data Management (MDM) has been traditionally defined as a repository for meter data collected from diverse meter collection systems as well as providing

More information

Cyber Security in Europe

Cyber Security in Europe Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community

More information

ITEMS International! Smart Grids in Smart Cities perspectives

ITEMS International! Smart Grids in Smart Cities perspectives ITEMS International! Grids in Cities perspectives Hervé Rannou - herve.rannou@smartgridsconsulting.com April 2013 16, rue Kléber 92442 Issy-les-Moulineaux France www.items.fr Offices PARIS : 70 rue Amelot

More information

ByteMobile Insight. Subscriber-Centric Analytics for Mobile Operators

ByteMobile Insight. Subscriber-Centric Analytics for Mobile Operators Subscriber-Centric Analytics for Mobile Operators ByteMobile Insight is a subscriber-centric analytics platform that provides mobile network operators with a comprehensive understanding of mobile data

More information

NERC CIP MAPPING RKNEAL, INC. VERVE SECURITY CENTER. See how the Verve Security Center addresses the requirements of NERC CIP version 5

NERC CIP MAPPING RKNEAL, INC. VERVE SECURITY CENTER. See how the Verve Security Center addresses the requirements of NERC CIP version 5 VERVE SECURITY CENTER NERC CIP MAPPING See how the addresses the requirements of NERC CIP version 5 3 NERC CIP VERSION 5 Defense In Depth Protection For ICS Systems ADOPTS NEW CYBER SECURITY CONTROLS AND

More information

HP NonStop Server Security and HP ArcSight SIEM

HP NonStop Server Security and HP ArcSight SIEM HP NonStop Customer Technical Talk HP NonStop Server Security and HP ArcSight SIEM 04/12/2012 HP NonStop Karen Copeland HP Enterprise Security Morgan DeRodeff XYPRO Barry Forbes NonStop Enterprise Division

More information

Cyber Supply Chain Risk Management Portal

Cyber Supply Chain Risk Management Portal Cyber Supply Chain Risk Management Portal Dr. Sandor Boyson, Director, Supply Chain Management Center& Holly Mann, Chief InformaBon Officer R.H. Smith School Of Business The Cyber Supply Chain Challenge

More information

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security focus in ABB: a Key issue 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security in ABB Agenda ABB introduction ABB Cyber

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

HOMELAND SECURITY INTERNET SOURCES

HOMELAND SECURITY INTERNET SOURCES I&S Internet Sources I&S HOMELAND SECURITY INTERNET SOURCES USEFUL SITES, PORTALS AND FORUMS Homeland Security Home Page http://www.whitehouse.gov/homeland/ A federal agency whose primary mission is to

More information

Overview TECHIS60851. Manage information security business resilience activities

Overview TECHIS60851. Manage information security business resilience activities Overview Information security business resilience encompasses business continuity and disaster recovery from information security threats. As well as addressing the consequences of a major security incident,

More information

EMARSYS PARTNER PROGRAM

EMARSYS PARTNER PROGRAM EMARSYS PARTNER PROGRAM CONTENTS EMARSYS PARTNER COMMUNITY 3 PARTNER PROGRAM TYPES 5 AGENCY PARTNER PROGRAM 6 REFERRAL PARTNER PROGRAM 8 RESELLER PARTNER PROGRAM 12 EMARSYS PARTNER COMMUNITY 4 EMARSYS

More information

Why Smart Water Networks Boost Efficiency

Why Smart Water Networks Boost Efficiency Why Smart Water Networks Boost Efficiency by Jeff M. Miller and Mark Leinmiller Executive summary The Smart Water Network (SWAN) is the water utility industry s equivalent to the energy industry s Smart

More information

ASSET Connect. The next level in Critical Environment Operational Efficiency

ASSET Connect. The next level in Critical Environment Operational Efficiency Connect The next level in Critical Environment Operational Efficiency 10-30% is the potential efficiency gain from optimized Data Centers and Critical Environments Operational Efficiency of Your Critical

More information

SCADA Security Measures

SCADA Security Measures Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA SCADA Security Measures

More information

Information Technology Strategic Plan

Information Technology Strategic Plan Information Technology Strategic Plan Delivers solutions that are planned, anticipate the future and valued by customers Introduction Our Information Technology Strategy supports the Corporate Plan by

More information

Cisco Security IntelliShield Alert Manager Service

Cisco Security IntelliShield Alert Manager Service Data Sheet Cisco Security IntelliShield Alert Manager Service The Cisco Security IntelliShield Alert Manager Service provides a comprehensive, cost-effective solution for delivering the security intelligence

More information

Using MASSIF to Protect a Critical Infrastructure: Dam Use Case

Using MASSIF to Protect a Critical Infrastructure: Dam Use Case Using MASSIF to Protect a Critical Infrastructure: Dam Use Case Luigi Coppolino Epsilon Srl Advanced Security Event Management of Complex Systems CSP EU FORUM 24 th -25 th April, Berlin, Germany www.massif-project.eu

More information

Symantec Company Overview. Symantec Company Overview 1

Symantec Company Overview. Symantec Company Overview 1 Symantec Company Overview Symantec Company Overview 1 Symantec Is Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure

More information

Utility of the Future Virtual Event Series Monthly Virtual Studio Event Series for Utilities

Utility of the Future Virtual Event Series Monthly Virtual Studio Event Series for Utilities Utility of the Future Virtual Event Series Monthly Virtual Studio Event Series for Utilities PART 1 OPERATIONAL AND CYBER SECURITY WITH AlertEnterprise WEDNESDAY, APRIL 30 Monthly Virtual Events Last Wednesday

More information

European Network for Cyber Security

European Network for Cyber Security European Network for Cyber Security Cyber Security: a fundamental basis for Smart Grids Project Summary December 19, 2014 Introduction Smart grids are crucial to support the use of more sustainable energy

More information

Smart City Live! 9-10 May 2016, Nice

Smart City Live! 9-10 May 2016, Nice Monday, May 9, 2016 Smart City Live! 9-10 May 2016, Nice Draft agenda as of November 20, 2015 SMART LIVING SMART CITY SERVICES 9:00 AM CASE STUDY: Developing Smart Energy communities Understanding the

More information