Securing the Electric Grid with Common Cyber Security Services Jeff Gooding
|
|
|
- Corey Wilson
- 10 years ago
- Views:
Transcription
1 Securing the Electric Grid with Common Cyber Security Services Jeff Gooding TCIPG Seminar April 4, 2014
2 Southern California Edison (SCE) is committed to safely providing reliable and affordable electricity to its customers On an average day SCE provides power to: Nearly 14 million people 180 cities in 50,000 square miles of service area, encompassing 11 counties in central, coastal and Southern California Commercial industrial and nonprofit customers, including: 5,000 large businesses 280,000 small businesses 1
3 CURRENT EMERGING The electric utility system is facing fundamental changes Grid stability thru rotational inertia Reduced stability due to generation mix change Dispatchable generation Passive/predictable loads Human-in-the-loop grid management Drivers Policies Technologies Customers Competition Stochastic generation Transactive loads Faster system dynamics by orders of magnitude Rigid and centralized system control Flexible and resilient distributed systems 2
4 System stability through technology Basic capability Advanced capabilities Mechanical controls Fly by wire Stability through physics Stability through technology
5 Smart grid design goals More increased capabilities More capabilities at the edge and enterprise, pervasive automation Better faster, more reliable & secure The electric grid is more resilient Dynamic control of all security elements allows the system to adapt to evolving threats Easier usability (convergence, unified control, visualization, information on demand) Tens of Millions of nodes are manageable Situational awareness Common Services allow for easier integration of new capabilities and technologies
6 Smart Grid System of Systems (SoS) Research Four evolutions of Smart Grid SoS Architectures Silos ESB Adapter-based Common Current-state Typical SI Approach DoD-style approach Standards based Internet-style 5
7 A holistic strategy is needed to serve customers better Inform policy Manage operational costs Serve customers through improved operations and services Mitigate reliability impact of variable energy resources Mitigate risk of technology obsolescence and stranded assets Secure our system from cybersecurity threats Integrate and adapt to disruptive technologies 6
8 SCE developed a structured approach for modernization strategies and technologies 7
9 There are already a number of smart grid projects in flight to meet policy and changing customer needs Centralized Remedial Action Scheme (RAS) - Synchrophasors Substation Automation 3 EMS, DMS & ALCS Upgrades SmartConnect and Beyond Meter Applications Grid 2 & Communication Projects Cybersecurity Projects Common Cybersecurity Services (CCS) NERC CIP Projects 8
10 SCE evaluates the safety and operability of new technologies in a controlled environment first Situational Awareness Lab Communications & Computing Lab Power Systems Lab Distributed Energy Resources Lab Substation Automation Lab Distribution Automation Lab Home Area Network Lab Garage of the Future Lab Integrated platform for evaluating the safety and operability of smart grid technologies in a controlled environment before being deployed on the grid. 9
11 Goals of Information Security Goals: Make data visible Make data accessible Enable data to be understandable Enable data to be trusted Enable data interoperability To make the right decisions at the right time Actions: Secure data assets to ensure reliable operations through: Authentication Authorization Accounting Peer to Peer Quality-of-Trust Dynamic security posture awareness Make system data and processes available to the Enterprise by protecting: Availability Integrity Confidentiality Courtesy DOD office of CIO
12 High Assurance Capability Using DoD cybersecurity methods to enhance system resiliency Networked Battlefield Networked Utility Operations CIP owners/operators facing transition that DoD started 10+ years ago 2013 Southern California Edison 2013 ViaSat, Inc.
13 Common Cyber Security Services (CCS) An advanced security system for the energy sector Next generation utility technologies DoD technology transfer Best practices from many sectors Modern SOA style architecture A standards compliant security system NERC CIP Version X All Federal Processing Standards (DHS, FIPS) NIST Compliant (NISTIR, SP) An extremely scalable and dynamic security system Supports Grid Applications (control & monitoring) Supports current and next generation networking (MPLS) Supports major protocols used on the Grid ( , DNP3, etc) Build-to specifications supports multi-vendor adoption 2013 Southern California Edison 2013 ViaSat, Inc.
14 Cybersecurity System Capabilities Authentication Integrated Operational Public Key Infrastructure (PKI), Identity Management Authorization Role and Group Based Access Control (RBAC) Accounting Security Information and Event Management (SIEM) Peer to Peer Authenticated communication Defense in Depth Quality-of-Trust Continuous device to device trust monitoring Cyber & Physical alerts, device health, operator actions Integrity Dynamic Scalable GUI Trusted Boot, Trusted Network Connect Device Bill-of-Health Central operations security visualization GUI accessed via web browser Multi-Tier Security Operations Capability Large scale System Planning and Test Capabilities 2013 Southern California Edison 2013 ViaSat, Inc.
15 CCS Enabled ESP Grid Operations Security Operations CCS Services Grid Application IP Network (Next Gen Security Protocols) MPLS Networks Security Control Plane (Red) IPSEC PE MPLS Core Data Planes (Grey) CCS Enabled App or VM Partition Infosec Boundary - Separation based on Application (e.g., EMS, DMS, CRAS) not physical network - Access Controls at entry points into application (discrete ESP) - Client Access is simplified (Single IPSEC Operational Tunnel) - User Access Control should be in Protected Security Space - Entry points into network only at Application Access Points Security Control Plane (Red) PE Security Control Plane (Red) CCS Enabled Proxy App (e.g., GW, CCS Proxy, Firewall) IP Network (Next Gen Security Protocols) CCS Security Client Tier 2 App
16 COI (Key Group Management) CCS Services Security Operations Grid Operations GROUP 2 Control Plane Security Associations Grid Application GROUP 1 GROUP 3
17 Common Cybersecurity Service Concept Security Policy Enforcement & Status based on device and function Device A Policies Status HEARTBEAT BoH INTEGRITY Device B Policies QoT QUALITY of TRUST ID CERTIFICATE Device C Policies Status: Trusted Questionable Untrusted Unknown 2013 Southern California Edison 2013 ViaSat, Inc.
18 Real-time Operational Grid Security Posture 2013 Southern California Edison 2013 ViaSat, Inc.
19 Common Cyber Security Services (CCS) CCS operational in production environment since mid Various federal and state agencies are supportive of CCS and are open to supporting a variety of industry adoption acceleration approaches. Key vendors such as GE and others have developed and delivered CCS enabled clients SCE has installed CCS in the McArthur substation and is working to scale up to BES subs over the next several years CCS Specifications are available under NDA upon request 2013 Southern California Edison 2013 ViaSat, Inc.
20 Questions? Jeff Gooding Southern California Edison Southern California Edison 2013 ViaSat, Inc.
System Stability through technology
System Stability through technology 1 Smart Grid Design Goals More increased capabilities More capabilities at the edge and enterprise, pervasive automation Better faster, more reliable & secure The electric
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
Cyber Security Seminar KTH 2011-04-14
Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid [email protected] Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon
Steve Lusk Alex Amirnovin Tim Collins
Steve Lusk Alex Amirnovin Tim Collins ViaSat Inc. Cyber-intrusion Auto-response and Policy Management System (CAPMS) Cybersecurity for Energy Delivery Systems Peer Review August 5-6, 2014 Summary: Cyber-intrusion
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT
Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
William Hery ([email protected]) Research Professor, Computer Science and Engineering NYU-Poly
William Hery ([email protected]) Research Professor, Computer Science and Engineering NYU-Poly Ramesh Karri ([email protected]) Associate Professor, Electrical and Computer Engineering NYU-Poly Why is cyber
AURORA Vulnerability Background
AURORA Vulnerability Background Southern California Edison (SCE) September 2011-1- Outline What is AURORA? Your Responsibility as a Customer Sectors Impacted by AURORA Review of Regulatory Agencies History
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
THE FUTURE OF SMART GRID COMMUNICATIONS
THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND
Requirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
Smart Grid. System of Systems Architectures
Smart Grid System of Systems Architectures Systems Evolution to Guide Strategic Investments in Modernizing the Electric Grid K. Mani Chandy, California Institute of Technology Jeff Gooding, Southern California
Cyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
How Much Cyber Security is Enough?
How Much Cyber Security is Enough? Business Drivers of Cyber Security Common Challenges and Vulnerabilities Cyber Security Maturity Model Cyber Security Assessments September 30, 2010 Business in the Right
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Secure Remote Substation Access Solutions
Secure Remote Substation Access Solutions Supplemental Project - Introduction Webcast October 16, 2013 Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs [email protected]
Remote Management Services Portfolio Overview
Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On
Security of Cloud Computing for the Power Grid
ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 Security of Cloud Computing for the Power Grid Industry Panel November 12, 2014 UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY
Threat-Centric Security for Service Providers
Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product
PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 1 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V2 Company Name: The Boeing Company December 10, 2012 1 Interim Techlogy Performance Report 1
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
Cisco Network Optimization Service
Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings
Department of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014!
Secure Remote Substation Access Interest Group Part 3: Review of Top Challenges, CIPv5 mapping, and looking forward to 2014! October 3, 2013 Scott Sternfeld, Project Manager Smart Grid Substation & Cyber
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
Cyber Security. Smart Grid
Cyber Security for the Smart Grid Peter David Vickery Executive Vice President N-Dimension Solutions Inc. APPA National Conference June 21, 2010 Cyber Security Solutions For Cyber Security
Smart Substation Security
Smart Substation Security SmartSec Europe 2014 Amsterdam 29/01/2014 Agenda Context Elia Introduction to the substation environment in Elia Security design and measures in the substation Near and far future
GE Measurement & Control. Cyber Security for Industrial Controls
GE Measurement & Control Cyber Security for Industrial Controls Contents Overview...3 Cyber Asset Protection (CAP) Software Update Subscription....4 SecurityST Solution Options...5 Centralized Account
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Consulting International
NIST Cyber Security Working Group (CSWG) NISTIR 7628: NIST Guidelines for Smart Grid Cyber Security Frances Cleveland Xanthus Consulting International Xanthus Consulting International [email protected]
HP E-PCM Plus Network Management Software Series
Data sheet Product overview HP E-PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security
Cybersecurity in a Mobile IP World
Cybersecurity in a Mobile IP World Alexander Benitez, Senior Scientist, ComSource Introduction by Robert Durbin, Cybersecurity Program Manager, ComSource Introduction ComSource s cybersecurity initiative
Dr. Raheem Beyah Georgia Tech. Cyber-Physical Modeling & Simulation for Situational Awareness (CYMSA)
Seth Walters Dr. Sakis Meliopoulos Dr. Santiago Grijalva Dr. Raheem Beyah Georgia Tech Cyber-Physical Modeling & Simulation for Situational Awareness (CYMSA) Cybersecurity for Energy Delivery Systems Peer
NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 [email protected]
NERC CIP Substation Cyber Security Update John M Shaw Presentation to UTC Region 7 February 19, 2009 [email protected] It s February 19, 2009 132 project days left to compliance Do you know where (what)
API Management: Powered by SOA Software Dedicated Cloud
Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting
PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3
Network Cyber Security. Presented by: Motty Anavi RFL Electronics
Network Cyber Security Presented by: Motty Anavi RFL Electronics Agenda Cyber Security Threats Defense Strategy & Consequences Next Generation Networking ICS Vulnerabilities Liabilities Next Gen Networking
Smart Grid Innovation: A Look at a Microgrid Testbed Industrial Internet Energy Summit Houston, TX June 23, 2015. Brett Burger, NI Brett Murphy, RTI
Smart Grid Innovation: A Look at a Microgrid Testbed Industrial Internet Energy Summit Houston, TX June 23, 2015 Brett Burger, NI Brett Murphy, RTI The Smart Grid The underlying infrastructure of a smart
Secure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
PREPARED DIRECT TESTIMONY OF SCOTT KING ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY
BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA Application of SOUTHERN CALIFORNIA GAS COMPANY (U 0 G) for Review of its Safety Model Assessment Proceeding Pursuant to Decision 1-1-0.
GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
John M Shaw Presentation to UTC Region 7 February 19, 2009 [email protected]
NERC CIP Substation Cyber Security Update John M Shaw Presentation to UTC Region 7 February 19, 2009 [email protected] It s February 19, 2009 132 project days left to compliance Do you know where (what)
Extreme Networks Software Defined Networking (SDN) Platform: Open, Standards-based and Comprehensive
Extreme Networks Software Defined Networking (SDN) Platform: Open, Standards-based and Comprehensive EXTREME NETWORKS SDN PLATFORM An Evolutionary SDN Platform to Promote Community Led Innovation. Extreme
CON9488 The Enterprise Cloud Simplified with Oracle VM
CON9488 The Enterprise Cloud Simplified with Oracle VM Andy Herm, Senior Architect, Cloud Infrastructure, Oracle Conor Wentz, Senior Architect, Cloud Infrastructure, Oracle Honglin Su, Sr. Director of
Security Coordination with IF-MAP
Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Recap of TNC Explanation of IF-MAP What is IF-MAP?
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
INSERT COMPANY LOGO HERE
INSERT COMPANY LOGO HERE 2014 Frost & Sullivan 1 We Accelerate Growth Technology Innovation Leadership Award Network Security Global, 2014 Frost & Sullivan s Global Research Platform Frost & Sullivan is
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
Operational Core Network
Service Assured Networking for Power Utilities Application Brochure Operational Core Network Using Carrier-Grade Ethernet Typical users: Transmission & Distribution Power Utilities For more than 30 years,
Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
How To Protect Your Data From Attack
Solutions Brochure Situation Under Control Security Connected for the Public Sector 2 Security Connected for the Public Sector Increase Availability. Strengthen Resiliency. Government entities face pressure
nfx One for Managed Service Providers
NFX FOR MSP SOLUTION GUIDE nfx One for Managed Service Providers With netforensics MSP suite of solutions, you can quickly and effectively ramp up customer security offerings and increase your bottom line
Next Generation Grid Data Architecture & Analytics Required for the Future Grid
& Analytics Required for the Future Grid Arjun Shankar and Russell Robertson Team: Lin Zhu, Frank Liu, Jim Nutaro, Yilu Liu, and Tom King 1 2 2 Project Purpose PURPOSE To foster open collaboration on issues,
The Open Cloud Near-Term Infrastructure Trends in Cloud Computing
The Open Cloud Near-Term Infrastructure Trends in Cloud Computing Markus Leberecht BELNET Networking Conference 25-Oct-2012 1 Growth & IT Challenges Drive Need for Cloud Computing IT Pros Growth IT Challenges
HP PCM Plus v3 Network Management Software Series Overview
Overview HP PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security and extensibility for
Smart Grid Cybersecurity Lessons Learned
Smart Grid Cybersecurity Lessons Learned Hank Kenchington Deputy Assistant Secretary From More than 11 Million Smart Meters Deployed Office of Electricity Delivery and Energy Reliability Grid Modernization:
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
GE Measurement & Control. Cyber Security for NERC CIP Compliance
GE Measurement & Control Cyber Security for NERC CIP Compliance GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used for purposes
Huawei Agile Network FAQ... 2. 1 What is an agile network? What is the relationship between an agile network and SDN?... 2
Contents Huawei Agile Network FAQ... 2 1 What is an agile network? What is the relationship between an agile network and SDN?... 2 2 What is an agile campus?... 3 3 What are the benefits of an agile network?...
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
National Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair [email protected] 1 The National Institute of Standards
DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices
DNP SCADA to SCADA Over : Standards, Regulations Security and Best Practices Earl Emerson, Director Systems Engineering RAD Data Communications 2014 Utilities Telecom Council of Canada Motivations for
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Smart Grid Cybersecurity
Smart Grid Cybersecurity Exceeding cybersecurity requirements mandated by customers and regulatory agencies Abstract The world has become much more connected, with over 32 percent of the population of
About Southern California Edison
About Southern California Edison One of the nations largest investorowned utilities with 125 years of service. Service Area 50,000 square miles Over 430 cities and communities Population Served Nearly
Intelligent WAN 2.0 principles. Pero Gvozdenica, Systems Engineer, [email protected] Vedran Hafner, Systems Engineer, vehafner@cisco.
Intelligent WAN 2.0 principles Pero Gvozdenica, Systems Engineer, [email protected] Vedran Hafner, Systems Engineer, [email protected] Then VS Now Intelligent WAN: Leveraging the Any Transport
Northrop Grumman White Paper
Northrop Grumman White Paper A Distributed Core Network for the FirstNet Nationwide Network State Connectivity to the Core Network April 2014 Provided by: Northrop Grumman Corporation Information Systems
Waterfall for NERC-CIP Compliance
Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool
INL/CON-07-12810 PREPRINT CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool ISA Expo 2007 Kathleen A. Lee January 2008 This is a preprint of a paper intended for publication in a journal
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
