Industry involvement in education and research - TCIPG
|
|
- Roland Lambert
- 8 years ago
- Views:
Transcription
1 1 Industry involvement in education and research - TCIPG Peter W. Sauer and William H. Sanders (and the TCIPG team) IEEE/PES GM, Denver, CO July 29, 2015
2 Outline History and facts TCIPG Overview and Vision Project Structure Crosscutting activities Summary
3 Builds upon $7.5M NSF TCIP CyberTrust Center $18.8M over 5 years, starting Oct 1, 2009 ($3.8M cost share) Funded by: Department of Energy - Office of Electricity Delivery and Energy Reliability Department of Homeland Security - Office of Science and Technology Cybersecurity R&D Center 4 Universities Dartmouth College History and Facts University of California at Davis (then ASU) University of Illinois at Urbana-Champaign Washington State University 23 Faculty, 17 Technical Staff, 38 Graduate Students, 9 Undergrad Students, 2 Admin Staff worked on the project in FY 2013
4 TCIPG Vision and Research Focus Vision: Create technologies which improve the design of a resilient and trustworthy cyber infrastructure for today s and tomorrow s power grid, so that it operates through attacks Research focus: Resilient and Secure Smart Grid Systems Protecting the cyber infrastructure Making use of cyber and physical state information to detect, respond, and recover from attacks Supporting greatly increased throughput and timeliness requirements for next generation energy applications and architectures Quantifying security and resilience
5 The early days year 1 Kickoff meeting CSL, Urbana, IL (December 15-16, 2005) 23 Industry participants: Two-day workshop and discussion of research areas and industry needs
6 The early days year 1 AmerenIP Control center and ADM substation Decatur, Illinois (July 13, 2006) 16 TCIP participants: 4 faculty, 3 academic professional staff, 9 graduate students All day workshop and discussion of operations and cyber security issues
7 Project Structure Site leads coordinate activities at partner schools Dartmouth College (Sean Smith, site lead) University of California Davis/ASU (Anna Scaglione, site lead) Washington State University (Carl Hauser, site lead) TCIPG stresses industry interaction from inception of research initiatives Pete Sauer, Industry Interaction Lead, co-pi External Advisory Board (9 members) and Industry Interaction Board (more than 500 members) TCIPG is organized into clusters of research threads, supporting multiple activities Weekly grad-student-led reading group and all-hands meetings
8 TCIPG Technical Clusters and Threads Trustworthy Technologies for Wide Area Monitoring and Control Trustworthy Technologies for Local Area Management, Monitoring, and Control Responding To and Managing Cyber Events Trust Assessment Communication and Data Delivery (5 activities) Active Demand Management (4 activities) Design of Semi-automated Intrusion Detection and Response Techniques (6 activities) Model-based Assessment (3 activities) Applications (2 activities) Distribution Networks (1 activity) Experiment-based Assessment (5 activities) Component Technologies (2 activities)
9 Crosscutting efforts Education and engagement K-12 Outreach and Workforce Development Consumer Education and Public Information Testbed HW and SW Integration to support research Testbed federation Utility testbed interactions Industry Interaction and Technology Transition
10 Education, Outreach, and Training Education of professionals versed in cyber and power is the core mission Degree programs Internships Public webinars K-12 education and outreach Power and Energy applets continue to evolve, and are integrated into curriculum projects nationwide TCIPG Minecraft World, TESLA town Encouraging interest in STEM education and careers Teachers, parents learn too! Assisting community colleges in smart grid curriculum development under IGEN Consortium
11 Testbeds Illinois Primary TCIPG Testbed Illinois Center for a Smarter Electric Grid Ameren TAC Washington State University Energy Systems Innovation Center Smart Grid Demonstration and Investigation Lab Dartmouth Zigbee and other misc. equipment
12 Who attends? TCIPG researchers and students Representatives of industry: utilities, vendors, national labs,... Our sponsors and external advisory board Why have an annual industry workshop? For TCIPG and sponsors: to have impact to communicate our results to get feedback from industry to help choose our research well Industry workshops For industry: to discover and explore TCIPG research to influence future directions to form productive collaborations that can profitably shape the evolving Smart Grid
13 Industry Interaction Engage with Industry early and deeply Work on problems where fundamentals can make difference and whose solution will be high impact to industry Supplement grad student/faculty researchers with professional programmers, power and security engineers to insure industrial quality of developed product Strategically decide the best method for transfer among: open source, incorporation in existing product, new product, startup company During testing, engage deeply with a small number of users first, and then expand the circle as concept/product develops Provide technology transfer support to researchers
14 Industry Impact Collaboration, internship arrangements, data sharing, or pilot deployments with Ameren, American Transmission Co., Commonwealth Edison, First Energy, Southern Cal Edison Collaboration, research, or internship arrangements, or other agreements with SEL, ABB, Honeywell, Fujitsu, Qualcomm Collaboration with LANL (quantum crypto) and LBL (SCADA security, TCIPG-UC Davis), EPRI NERC evaluation of NP View Over 130 organizations have attended TCIPG Events
15 Collaboration Examples Utilities AMI Security pilot with First Energy Ameren collaboration on DNP3 IDS ATC collaboration on PMU data quality and analysis Engagement with EPRI on various fronts NetAPT (a.k.a NP-View) as NERC CIPS pre-audit and audit tool SECURE, open communication gateway with Grid Protection Alliance (GPA) Vendors Schweitzer incorporating TCIPG embedded system security approach in their products Schweitzer is a major donor of TCIPG testbed equipment Honeywell collaboration on Role Based Access Control (RBAC) project in automation systems National Labs Demonstrated Los Alamos NL quantum cryptography in the TCIPG testbed, securing PMU communications using a hardware-in-the-loop experiment NetAPT integrated with Idaho NL Sophia security visualization tool SCADA security collaboration, LBNL and TCIPG-UC Davis International In-Depth Defense of SCADA and Control Systems, UI and University of Twente (NL), facilitated by DHS S&T and Netherlands Organization for Scientific Research (NWO). Kicked off June 2014.
16 Industry Interactions
17 Transition Examples Startups: Network Perception and River Loop Security XUTools structured text analyzer, useful for, e.g., change detection in device configurations Open source transition of hardware IDS platform and tools for security assessment of wireless networks and SECURE open communication gateway Open source SCADA protocol parsers now part of the BRO framework
18 Patents (filed and granted) NetAPT technologies GridStat technology involving distributed key storage Secure Inter-chip Communication System Hardware Intrusion Detection System Using Resistive-Capacitive Circuit Smart Meter Research Platform Robust and Secure Timing Device Based on Multiple Cooperative GNSS Receivers
19 TCIPG Summer School Offered alternate years in Chicago Last session was June 2015 Weeklong and intensive 141 participants 2015 Summer School June 15-19, 2015 Reception: June 14 Geared toward graduate students, utility practitioners, and consultants 45 technical sessions, presented by leading subject matter experts Deep Dive on selected topics Hands-on SCADA security assessment training
20 Summary TCIPG is focused on industry interaction at all levels TCIPG is focused on research and education at all levels For more information: Pete Sauer, Bill Sanders,
INTRUSION DETECTION IN INDUSTRIAL CONTROL SYSTEMS
INTRUSION DETECTION IN INDUSTRIAL CONTROL SYSTEMS ILLINOIS/EINDHOVEN COLLABORATION ROBIN BERTHIER, HUI LIN, AL VALDES UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JUNE 2014 1 OUTLINE TCIPG Summary The challenge
More informationTechnology Transition Case Study Trustworthy Cyber Infrastructure for the Power Grid (TCIPG)
Technology Transition Case Study Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) 1. Case Study Context TCIPG (www.tcipg.org) is a project funded by DOE and DHS under DOE Cooperative Agreement
More informationCybersecurity for Energy Delivery Systems 2010 Peer Review. William H. Sanders University of Illinois TCIPG Center Overview
Cybersecurity for Energy Delivery Systems 2010 Peer Review Alexandria, VA July 20-22, 2010 William H. Sanders University of Illinois TCIPG Center Overview TCIPG Summary Extend and integrate previously
More informationBridging the knowledge gap between power engineering and cyber security: Imparting the interdisciplinary knowledge in cyber security for power systems
1 Bridging the knowledge gap between power engineering and cyber security: Imparting the interdisciplinary knowledge in cyber security for power systems Peter W. Sauer University of Illinois at Urbana-Champaign
More informationRisk and Security Assessment. Zbigniew Kalbarczyk
Risk and Security Assessment Zbigniew Kalbarczyk 1 TCIPG Cluster Arrangement Communication and Data Delivery for Wide-Area Monitoring and Control Trustworthy cyber infrastructure and technologies for wide-area
More informationWorking to Achieve Cybersecurity in the Energy Sector
Working to Achieve Cybersecurity in the Energy Sector Cybersecurity for Energy Delivery Systems (CEDS) Rita Wells Idaho National Laboratory Roadmap Framework for Public-Private Collaboration Published
More informationFacilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
More informationFollowing the Energy Sector s Roadmap
Cybersecurity for Energy Delivery Systems (CEDS) R&D Following the Energy Sector s Roadmap Carol Hawk CEDS R&D Program Manager Energy Sector Cybersecurity Different Priorities Energy Delivery Control Systems
More informationSECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
More informationWorking to Achieve Cybersecurity in the Energy Sector. Cybersecurity for Energy Delivery Systems (CEDS)
Working to Achieve Cybersecurity in the Energy Sector Cybersecurity for Energy Delivery Systems (CEDS) Energy Sector Cybersecurity Challenges Open Protocols Open industry standard protocols are replacing
More informationSmart Grid Cybersecurity Lessons Learned
Smart Grid Cybersecurity Lessons Learned Hank Kenchington Deputy Assistant Secretary From More than 11 Million Smart Meters Deployed Office of Electricity Delivery and Energy Reliability Grid Modernization:
More informationSecuring the Electric Grid with Common Cyber Security Services Jeff Gooding
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding TCIPG Seminar April 4, 2014 Southern California Edison (SCE) is committed to safely providing reliable and affordable electricity
More informationfuture data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
More informationSCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
More informationIEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
More informationCyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
More informationCybersecurity for Energy Delivery Systems 2010 Peer Review. William H. Sanders University of Illinois TCIPG: Network Access Policy Tool (NetAPT)
Cybersecurity for Energy Delivery Systems 2010 Peer Review Alexandria, VA July 20-22, 2010 William H. Sanders University of Illinois TCIPG: Network Access Policy Tool (NetAPT) (Joint work with David Nicol,
More informationCIO and Cyber Security Overview Argonne National Laboratory. Michael A. Skwarek CIO Matthew A. Kwiatkowski CISO Oct. 12, 2011
CIO and Cyber Security Overview Argonne National Laboratory Michael A. Skwarek CIO Matthew A. Kwiatkowski CISO Oct. 12, 2011 Argonne Cyber Security Overview The laboratory cyber security program is mature
More information2008 Visualization and Controls Peer Review. NSTB Program. Sam Clements Pacific Northwest National Laboratory
2008 Visualization and Controls Peer Review NSTB Program Washington, DC October 21-22, 2008 Sam Clements Pacific Northwest National Laboratory PNNL - NSTB Program Vision GRIDSTAT SECURITY EVALUATION Enterprise
More informationTRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY2005-2015)
TRUST TRUST: : Team for Research in Ubiquitous Secure Technology A Collaborative Approach to Advancing Cyber Security Research and Development Larry Rohrbough Executive Director, TRUST University of California,
More informationProtecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
More informationOutline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?
Critical Information Infrastructure Research in the U.S. An informal status report The 2nd US-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) Tokyo, Japan Outline Definitions,
More informationSystem Stability through technology
System Stability through technology 1 Smart Grid Design Goals More increased capabilities More capabilities at the edge and enterprise, pervasive automation Better faster, more reliable & secure The electric
More informationSteve Lusk Alex Amirnovin Tim Collins
Steve Lusk Alex Amirnovin Tim Collins ViaSat Inc. Cyber-intrusion Auto-response and Policy Management System (CAPMS) Cybersecurity for Energy Delivery Systems Peer Review August 5-6, 2014 Summary: Cyber-intrusion
More informationDOE Cyber Security Policy Perspectives
DOE Cyber Security Policy Perspectives Mike Smith Senior Cyber Policy Advisor to the Assistant Secretary Department of Energy Overview of DOE Cybersecurity Priorities Protecting the DOE Enterprise from
More informationCyber Infrastructure for the Smart Grid
Cyber Infrastructure for the Smart Grid Dr. Anurag K. Srivastava, Dr. Carl Hauser, and Dr. Dave Bakken Smart Grid Use Cases: Part 2 SGIC Xcel Energy SG Xcel Energy A public Service company of Colorado
More informationUS Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)
US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST) william.newhouse@nist.gov NITRD Structure for US Federal Cybersecurity
More informationCollaborative Research and Education in Southeastern US in Emerging Areas of Power Engineering
1 Collaborative Research and Education in Southeastern US in Emerging Areas of Power Engineering B. Chowdhury, J. Enslin, T. Reddoch, S. Coley, S. Whisenant, E. Makram, M. Baran 2 Outline Energy Production
More informationSCADA System Overview
Introduction SCADA systems are critical to the control and monitoring of complex cyber-physical systems. Now with advanced computer and communications technologies, SCADA systems are connected to networks
More informationCyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
More informationUtility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
More informationSPARKS Cybersecurity Technology and the NESCOR Failure Scenarios
SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith firstname.lastname@ait.ac.at AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,
More informationHow Much Cyber Security is Enough?
How Much Cyber Security is Enough? Business Drivers of Cyber Security Common Challenges and Vulnerabilities Cyber Security Maturity Model Cyber Security Assessments September 30, 2010 Business in the Right
More informationSolving Big Data Challenges US Electric Utility Industry
1 Solving Big Data Challenges US Electric Utility Industry IEEE PES Meeting July 29, 2014 Sunil Pancholi 2 Agenda Smart Grid and Big Data Lockheed Martin Big Data Expertise Lockheed Martin Solutions in
More informationSecure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014!
Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014! October 3, 2013 Scott Sternfeld, Project Manager Smart Grid Substation & Cyber
More informationRebecca Massello Energetics Incorporated
Cybersecurity Procurement Language for Energy Delivery Systems Rebecca Massello Energetics Incorporated NRECA TechAdvantage February 25, 2015 Talking Points What is this document? Who can use this document
More informationRisk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
More informationNERC CIP Tools and Techniques
NERC CIP Tools and Techniques Supplemental Project - Introduction Webcast Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs ssternfeld@epri.com (843) 619-0050 October
More informationChallenges and Opportunities for Aligning the Power System Cybersecurity and Reliability Objectives
Challenges and Opportunities for Aligning the Power System Cybersecurity and Reliability Objectives for Mexico, US and Canada Ameen H. Hamdon SUBNET Solutions Inc. hamdon@subnet.com +1 403 270 8885 Cuernavaca,
More informationPanel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
More informationProtect Your Assets. Cyber Security Engineering. Control Systems. Power Plants. Hurst Technologies
Protect Your Assets Cyber Security Engineering Control Systems. Power Plants. Hurst Technologies Cyber Security The hackers are out there and the cyber security threats to your power plant are real. That
More informationSecure Remote Substation Access Solutions
Secure Remote Substation Access Solutions Supplemental Project - Introduction Webcast October 16, 2013 Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs ssternfeld@epri.com
More informationHow To Protect A Smart Grid From Cyber Security Threats
Smart Grid Cyber Security System Reliability, Defense-in-Depth, Business Continuity, Change Management, Secure Telecommunications, Endpoint Protection, Identity Management, and Security Event Management
More informationSecuring Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
More informationSEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
More informationMoving Towards the Smart Grid. Southern California Edison s Advanced Metering Infrastructure (AMI) Program
Moving Towards the Smart Grid Southern California Edison s Advanced Metering Infrastructure (AMI) Program 1 Copyright 2006, Southern California Edison www.sce.com/ami Select SCE Projects using Smart Grid
More informationPublic Service Co. of New Mexico (PNM) - PV Plus Storage for Simultaneous Voltage Smoothing and Peak Shifting
Public Service Co. of New Mexico (PNM) - PV Plus Storage for Simultaneous Voltage Smoothing and Peak Shifting Steve Willard, P.E. Brian Arellano DOE Peer Review October 20, 2011 Project Goals Develop an
More informationMS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman bcn@isi.edu
MS in Computer Science with specialization in Computer Security Prof. Clifford Neuman bcn@isi.edu Computer Security Specialization Computer Security is a hot area of study with a critical need Needed by
More informationCyber Security. Smart Grid
Cyber Security for the Smart Grid Peter David Vickery Executive Vice President N-Dimension Solutions Inc. APPA National Conference June 21, 2010 Cyber Security Solutions For Cyber Security
More informationSECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS
1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase
More informationSchneider Electric DMS NS. Company Profile. Commercial Documentation
Schneider Electric DMS NS Company Profile Commercial Table of Contents 1. SCHNEIDER ELECTRIC DMS NS (SEDMS)... 1 1.1. History... 1 1.2. Current Working Environment... 2 1.3. Gartner Report... 4 2. ADVANCED
More informationDocument ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
More informationSTATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE COMMITTEE ON ENERGY AND NATURAL RESOURCES UNITED STATES SENATE
More informationThe Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
More informationWilliam Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly
William Hery (whery@poly.edu) Research Professor, Computer Science and Engineering NYU-Poly Ramesh Karri (rkarri@poly.edu) Associate Professor, Electrical and Computer Engineering NYU-Poly Why is cyber
More informationThales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg
Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Challenges of Future Internet Internet as a starting point Was defined for asynchronous services (web pages, file transfer
More informationRising to the Challenge
CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned
More informationCybersecurity: A Shared Responsibility and Department of Homeland Security Priority
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority A Presentation to the National Cyberwatch Center November 20, 2015 Webinar Protocol :: Mute your phone/mic when not talking
More informationCybersecurity & Public Utility Commissions
Cybersecurity & Public Utility Commissions November 12, 2014 TCIPG Ann McCabe, Commissioner Illinois Commerce Commission NARUC (National Association of Regulatory Utility Commissioners) Cybersecurity Primer
More informationSmart Grid and Privacy An International View
Smart Grid and Privacy An International View 27 November 2013 By: Nader Farah President ESTA International One US Consumer s Reaction in Texas! 2 Source: SmartGridNews.com July 20, 2012 ESTA International
More informationCyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division
Cyber Security focus in ABB: a Key issue 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security in ABB Agenda ABB introduction ABB Cyber
More informationCybersecurity in a Mobile IP World
Cybersecurity in a Mobile IP World Alexander Benitez, Senior Scientist, ComSource Introduction by Robert Durbin, Cybersecurity Program Manager, ComSource Introduction ComSource s cybersecurity initiative
More informationNext Generation Grid Data Architecture & Analytics Required for the Future Grid
& Analytics Required for the Future Grid Arjun Shankar and Russell Robertson Team: Lin Zhu, Frank Liu, Jim Nutaro, Yilu Liu, and Tom King 1 2 2 Project Purpose PURPOSE To foster open collaboration on issues,
More informationUS Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
More informationHow to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework Jacques Benoit, Cooper Power Systems Inc., Energy Automations Solutions - Cybectec Robert O Reilly, Cooper
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationExecutive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.
Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee
More informationThe USNA Cyber Program
The USNA Cyber Program Turning Midshipmen into Cyber Warriors CAPT Paul Tortora, USN Director, Center for Cyber Security Studies Bottom Line Up Front All Midshipmen now take two Cyber Security Courses
More informationSDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
More informationADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D
ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D Eric Lightner Director Federal Smart Grid Task Force July 2015 2 OE Mission The Office of Electricity
More informationINTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT
Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated
More informationRE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
More informationUtility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008
Utility Telecom Forum Robert Sill, CEO & President Aegis Technologies February 4, 2008 1 Agenda Asked to describe his job, Mike Selves, director of Emergency Management and Homeland Security in Johnson
More informationSmart Grid Cybersecurity
Smart Grid Cybersecurity Exceeding cybersecurity requirements mandated by customers and regulatory agencies Abstract The world has become much more connected, with over 32 percent of the population of
More informationRESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02
RESEARCH CALL TO DOE/FEDERAL LABORATORIES Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 CONTACT: Diane Hooie, Project Manager TELEPHONE NUMBER: (304) 285-4524 FAX NUMBER: (304)
More informationThe VIKING Project: An Initiative on Resilient Control of Power Networks
The VIKING Project: An Initiative on Resilient Control of Power Networks Annarita Giani, Shankar Sastry Department of Electrical Engineering and Computer Sciences University of California at Berkeley Berkeley,
More informationThe Massachusetts Open Cloud (MOC)
The Massachusetts Open Cloud (MOC) October 11, 2012 Abstract The Massachusetts open cloud is a new non-profit open public cloud that will be hosted (primarily) at the MGHPCC data center. Its mission is
More informationHelp for the Developers of Control System Cyber Security Standards
INL/CON-07-13483 PREPRINT Help for the Developers of Control System Cyber Security Standards 54 th International Instrumentation Symposium Robert P. Evans May 2008 This is a preprint of a paper intended
More informationAgenda: Secure Power Systems Specialist. Challenges Project description Outcomes & findings. Phase I briefing, August 27, 2012
Secure Power Systems Specialist Phase I briefing, August 27, 2012 By Lori Ross O Neil, PNNL and Michael Assante, NBISE Agenda: Challenges Project description Outcomes & findings 1 Challenge facing the
More informationExascale Computing Project (ECP) Update
Exascale Computing Project (ECP) Update Presented to ASCAC Paul Messina Project Director Stephen Lee Deputy Director Washington, D.C. April 4, 2016 ECP is in the process of making the transition from an
More informationMaking Sound Cyber Security Decisions Through a Quantitative Metrics Approach
Making Sound Cyber Security Decisions Through a Quantitative Metrics Approach April 25, 2011 Bill Sanders Joint work with Elizabeth LeMay, Ken Keefe, and Carol Muehrcke University of Illinois at Urbana-Champaign
More informationSIMPLIFYING THE PATCH MANAGEMENT PROCESS
SIMPLIFYING THE PATCH MANAGEMENT PROCESS www.icsupdate.com Monta Elkins Security Architect FoxGuard Solutions melkins@foxguardsolutions.com SIMPLIFYING THE PATCH MANAGEMENT PROCESS 2 SIMPLIFYING THE PATCH
More informationCybersecurity for Energy Delivery Systems 2010 Peer Review. Dale Peterson Digital Bond, Inc. Bandolier and Portaledge
Cybersecurity for Energy Delivery Systems 2010 Peer Review Alexandria, VA July 20-22, 2010 Dale Peterson Digital Bond, Inc. Bandolier and Portaledge Summary Slide: Bandolier Outcomes: Insure new and upgraded
More informationHomeland Open Security Technology HOST Program
Homeland Open Security Technology HOST Program Informational Briefing August 2011 Sponsored by: U.S. Department of Homeland Security Science and Technology Directorate Implemented by: Open Technology Research
More informationThe National Consortium for Data Science (NCDS)
The National Consortium for Data Science (NCDS) A Public-Private Partnership to Advance Data Science Ashok Krishnamurthy PhD Deputy Director, RENCI University of North Carolina, Chapel Hill What is NCDS?
More informationC ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationCyber Security. Doug Houseman Doug@Enernex.com. Engineering Consulting Research. Modeling Simulation Security. The Practical Grid Visionaries TM
Cyber Security Engineering Consulting Research Modeling Simulation Security Doug Houseman Doug@Enernex.com The Practical Grid Visionaries TM Warnings The costs given are based on prior projects They may
More informationDHS S&T Cyber Security Division (CSD) Overview
Dept. of Homeland Security Science & Technology Directorate DHS S&T Cyber Security Division (CSD) Overview TCIPG Industry Workshop UIUC November 8, 2011 Greg Wigton Program Manager Cyber Security Division
More information7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
More informationCASE STUDIES ON CYBER SECURITY
CASE STUDIES ON CYBER SECURITY ERRIN - CYBER SECURITY BROKERAGE EVENT 30 TH SEPT 2015 DAVID CROZIER TECHNICAL MARKETING MANAGER @DAVID_CROZIER Vision GLOBAL INNOVATION HUB FOR CYBER SECURITY Our vision
More informationWireless Sensor Networks (WSN) for Distributed Solar Energy in Smart Grids
Wireless Sensor Networks (WSN) for Distributed Solar Energy in Smart Grids Dr. Driss Benhaddou Associate Professor and Fulbright Scholar University of Houston, TX dbenhaddou@uh.edu 06/26/2014 Outline Background
More informationTesting Intelligent Device Communications in a Distributed System
Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) dgoughnour@trianglemicroworks.com United States Smart Grid systems
More informationSCOPE. September 25, 2014, 0930 EDT
National Protection and Programs Directorate Office of Cyber and Infrastructure Analysis (OCIA) Critical Infrastructure Security and Resilience Note Critical Infrastructure Security and Resilience Note:
More informationCyber Security Seminar KTH 2011-04-14
Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid erik.z.johansson@se.abb.com Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon
More informationSmart Grid Overview How the smart grid will give customers the tools to create the new future for electricity use.
Smart Grid Overview How the smart grid will give customers the tools to create the new future for electricity use. Presentation to California Municipal Utilities Association Paul Lau Assistant General
More informationSecure Machine to Machine Communication on the example of Smart Grids
Corporate Technology Secure Machine to Machine Communication on the example of Smart Grids 10.ITG Fachtagung Zukunft der Netze 2011, Steffen Fries Siemens AG, CT T, GTF IT Security : +49 89 636 53403 :
More informationThe Computerworld Honors Program
The Computerworld Honors Program Honoring those who use Information Technology to benefit society Year: 2013 Final Copy of Case Study Status: Laureate Organization Name: Cyber Defence Challenge Organization
More informationCCET Discovery Across Texas Security Fabric Demonstration
CCET Discovery Across Texas Security Fabric Demonstration November 16, 2012 John Ballance EPG EPG Intel/McAfee Collaboration on Security Fabric (SF) EPG and Intel/McAfee are collaborating on Security Fabric
More informationTRUST:Team for Research in Ubiquitous Secure Technologies
TRUST:Team for Research in Ubiquitous Secure Technologies An Overview Shankar Sastry (Berkeley), Ruzena Bajcsy (Berkeley), Sigurd Meldal (SJSU), John Mitchell (Stanford), Mike Reiter (CMU), Fred Schneider
More information