Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures

Size: px
Start display at page:

Download "Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures"

Transcription

1 COurse Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 1.0 CEUs for the course. 1

2 Overview The electric smart grid promises increased capacity, reliability and efficiency through the existing electricity network. However, there is a new host of vulnerabilities stemming from physical intrusion potentially leading to devastating physical effects. The security of a system is as strong as its weakest link. Thus, the scale and complexity of the smart grid, along with its increased connectivity and automation make the task of physical protection particularly challenging. Power facilities, including power plants, sub stations and transmission lines, must be prepared as they face the challenges that come with protecting their assets. What is the concept of defense, including perimeter security? Safety versus Security - what do you do when the two contradict each other? What is bomb recognition and sweeping? Get answers to these questions and more. This course will cover physical security from three major perspectives; preventative measures, physical security 101, and personnel security for those in the energy industry. Issues related to CIP 5 and any new issues identified by CIP 14 will also be discussed in addition to security incidents at power facilities making headlines. Attendees will discover the legal issues facing the security community, and review brand protection, touching upon terrorism of all types. Examples will be provided revolving around risk management and how it has become even more important with limited resources, including the various concepts of risk management. A review of access control, identification and authentication, as well as security at remote locations, will also be discussed, covering security at shared facilities, including the Four Scenarios of Attack. Finally, personnel security, background investigations, workplace violence, vendor contract security as well as security in the age of social media and the importance of security when contracting services will be addressed. Upon completion of this course, attendees should have the skills and knowledge to effectively apply physical security concepts and practices, acquire and analyze the information necessary for protecting assets, and allocate security resources to protect those assets. Who Should Attend Utility and energy company staff from the following departments: Directors and CEOs Corporate Security Risk Assessment Managers/Directors Legal and regulatory staff Information technology and information security Operations and engineering Administrative and support staff Control systems Crisis Management Managers As well as: Attorneys and regulators Contractors and vendors LEARNING OUTCOMES Discuss lessons learned from past security events at power facilities, review legal issues facing security personnel and understand the different type of threats facing the security community Review various threats facing US Energy assets, examine various concepts designed to reduce the risks to energy facilities and examine the four scenarios of attack Discuss the concepts of Risk Management including Risk Tolerance / Appetite, Risk Management Cycle and Risk Management Framework Review the basics of physical security including but not limited to access management, visitor control, hardening of site security and the handling of bomb threats Examine individual roles in information security and the protection of critical assets and intellectual property Discuss the prevention of workplace violence REGISTER 4601 TODAY! DTC Blvd., CALL Suite OR VISIT 2

3 Agenda Wednesday, August 20, :00-8:30 a.m. registration and Continental Breakfast 8:30-8:45 a.m. introduction 8:45-10:00 a.m. review of CIP 5, Real World Security Incidents and Threats to Facilities Lessons learned from past security incidents, legal issues facing security personnel, and types of threats facing today s facility security personnel are covered Corporate Security has been an important part of business since the days of Allan Pinkerton and the Railroad Express companies. In this session, various aspects of physical security that are important to any facility or business in any industry will be reviewed. There will also be an analysis of certain aspects of CIP 5, in addition to revealing real world incidents that have occurred in the energy industry and what could have been done to prevent those incidents. Physical security incidents occur from coast to coast. An evaluation from a historical perspective to identify procedures, that if implemented properly, could have prevented the security incidents. Additionally, a depiction of potential legal issues facing those that work in the field of security will be clarified should those in the industry fail to act in the best interests of themselves, the industry and their customers. Finally, there will be an examination of the types of threats that face facilities in the energy industry. 10:00-10:30 a.m. Networking Break 10:30 a.m. - 12:00 p.m. Security Management Theory and Threats Types of threats facing US energy assets, concepts ad theory used to reduce risks and the four scenarios of attack. Understanding the threats facing facilities and the differences in the types of threats facing facilities is crucial to any security management program. In this session, the theories of physical security management will be discussed in addition to identifying the threats, and a breakdown of the differences between the threats and the different aspects of threats and the various stages. By better understanding the various threats, security managers will be able to better protect their facilities. Terrorism versus criminal activity will be examined along with groups and criminal organizations whose mission is to disrupt business, harm personnel and steal assets. Knowing the precursors of an attack, and the importance of intelligence gathering, will prepare security managers for current security threats. Lastly, four scenarios of an attack each and every facility should be aware of to better protect their facility will be studied.. 12:00-1:00 p.m. Group Luncheon 1:00-2:15 p.m. risk Management Risk Management concepts, including risk appetite/tolerance, risk management cycles, and development of risk tolerance framework will be reviewed. In the era of shrinking resources it is incredibly important for today s physical security professionals to use what resources they have in a highly efficient and beneficial manner. Understanding risk management will enable security managers to better use their limited resources to protect their industry from catastrophic events. This session will introduce different principles of risk management and how it can assist the industry in identifying, scoring and remediating risks facing security professionals. Attendees will learn how to address corporate risk and tolerance, discuss the risk management cycle and begin to understand the importance of implementing a risk tolerance framework. The following topics will be clarified: Ishikawa fishbone diagram, risk appetite scale and the steps of developing a risk appetite/tolerance framework. The importance of developing a strategic risk assessment is crucial and will be discussed and the importance of using this assessment to prioritize funding and allocation of initiative to reduce risk. 2:15-2:30 p.m. Afternoon Break 2:30-3:30 p.m. Risk Management Continued 3

4 Agenda Wednesday, August 20, 2014 (Continued) 3:30-4:30 p.m. A Physical Security Approach to Substation Security and NERC Compliance High profile intrusions and physical attacks against substations have spurred a lot of discussion about physical security resulting in a FERC directive, for NERC to propose new physical security standards from NERC. A holistic approach to security has been proven to be more effective and addresses compliance requirements In the Utilities Industry at the same time. It is now essential to monitor and report rolesbased physical access to various facilities, control rooms, substations and critical assets. Utilities of all size need to know who has access to specific facilities, critical assets and cyber critical assets and how much area access they should have within those facilities. Version 5 of the NERC CIP compliance requirements adds more to physical security requirements in addition to complete background check and criminal history record checks for employees and un-escorted contractors. Additionally, highly critical assets must be housed in secured boundaries and any access to that area recorded and tracked. Join the experts who are leading this session to discuss why this new approach is the only way to detect and identify complex threats that extend across the boundaries of cyber and physical security. Lessons you will learn: Why integrating physical and cyber security is key How to overcome the challenges of extending security across organizational boundaries New techniques that cover upfront risk analysis and automated workflow to simplify onboarding offboarding, anomaly detection and threat correlation - Ron Fabela, Sr. Product Manager, AlertEnterprise Thursday, August 21, :00 8:30 a.m. continental Breakfast 8:30-10:00 a.m. Physical Security 101 A sampling of concepts in Physical Security including Access Management, Site Security, Security Systems, Visitor Screening, and Handling of Bomb Threats. Physical security is an ever evolving field and it is important for both novice and experienced managers to understand the concepts of physical security. Real world examples of where security failed will be identified. Physical security concepts, including what constitutes a physical security system will be revealed in addition to deterrence, detection and delaying factors and the important of access controls. The aspect of proper lighting, credentialing, cameras and fencing as well as vegetation management is important to the overall success of protecting facilities, including the importance of proper visitor management. Providing security training to personnel with non security duties can have exponential benefits. How to handle bomb threats including searching methods and identifying dangerous substances will be discussed and the importance of physical security training and conducting exercises and drills. 10:00-10:30 a.m. Networking Break 10:30 a.m. - 12:00 p.m. Operational Security, Personnel Security and Workplace Violence Concepts in handling of critical assets, information security, intellectual property and HR from a security perspective In the digital age, information has become today s currency. Protecting a company s assets, whether its people, information, equipment, data or intellectual property should be a priority. This session will examine the importance of protecting assets and provide recommendations to better protect current and future assets. Operational security will also be discussed, including instruction on protection of data cradle to grave. The protection of data, both physical and electronic format will be examined, including examples of the repercussions companies face when policies are not followed. Finally, the importance of personnel security, including background investigations, social media solutions and workplace violence will be reviewed, along with a group discussion about protecting assets. 12:00-12:30 p.m. Q&A/Conclusion 4

5 INSTRUCTORs CAPT Chris Schaffer, USCGR (ret) / Principal, Risk Mitigation and Security / AliTek Consulting, LLP Chris Schaffer is Principal of the Security Practice at AliTek Consulting in specializing in security, regulatory compliance, business continuity, disaster recovery, and incident and crisis management. Chris has over 28 years of practical experience in facility and Maritime security, security vulnerability assessments, regulatory compliance, crisis management and business continuity in both government and private sector companies. Chris has served in senior management and as a senior consultant in both Fortune 500 companies as well as the Department of Homeland Security, U.S. Coast Guard where he currently holds the rank of Captain (0-6) in the Reserves. He holds a Bachelor of Science in Risk Management from Florida State University, a Master of Arts in Theology from Andersonville Theological Seminary and is a graduate of the U.S. Naval War College s Command and Staff program as well as the Darden Executive Education Program at the University of Virginia. He also holds a second Master s Degree in Security Management from the University of Houston and is a member of the Phi Kappa Phi Honor Society. Captain Schaffer s awards include the Meritorious Service Medal, two Coast Guard Commendation Medals with Operational Distinguishing Device, three Coast Guard Achievement Medals with Operational Distinguishing Device, the Navy and Marine Corps Achievement Medal, two Coast Guard Commandant s Letter of Commendation ribbons, the Global War On Terrorism Service Medal, the 9-11 Department of Transportation service ribbon and various other unit and service awards. He also is authorized to wear the permanent Advanced Boat Force Operations insignia. Jesse Flores / Lead Security Trainer, Senior Security Consultant / AliTek Consulting, LLP Jesse Flores is the Lead Trainer and a Senior Consultant at AliTek Consulting in Houston, Texas specializing in security / risk management, information security, records management and security, crisis management, regulatory compliance, business continuity, incident response and disaster recovery. Jesse has nearly 15 years of practical experience in the risk management and physical / information security industry. Jesse has worked with both the private sector and federal government agencies working in risk management, and physical / information security management. Jesse has conducted IT and physical security vulnerability assessments, risk assessments, enforcing regulatory compliance, crisis management and business continuity planning both in the United States and abroad. He has served as a information security officer, supervisory risk analyst, IT security auditor and consultant. Jesse has worked in integrated operation centers monitoring the real time emergency activities of federal agencies and conducted / lead numerous emergency exercises. Jesse is a seasoned speaker and has been conducting training sessions within the energy sector for many years. His most recent duties allow him to engage facility security officers, health and safety officers and contract security personnel in the areas of physical security, MTSA, and CFATS. Jesse has conducted facility security vulnerability assessments throughout his career and continues to work with leading companies in the energy sector to advise security personnel, conduct business continuity exercises, address critical infrastructure needs and identify, score and mitigate risk. Jesse holds a Bachelor s Degree in Computer Information Systems from Texas State University at San Marcos, and a Graduate Degree (Masters in Security Management for Executives) from the University of Houston - Downtown. Jesse has received in depth training in the areas of Business Continuity Planning, Risk Assessment and Abatement, and Information Security. 5

6 Instructional Methods This program will use PowerPoint Presentations, group discussions, as well as active participation. Requirements for Successful Completion of Program Participants must sign in/out each day and be in attendance for the entirety of the course to be eligible for continuing education credit. Credits has been accredited as an Authorized Provider by the International Association for Continuing Education and Training (IACET). In obtaining this accreditation, the (organization name) has demonstrated that it complies with the ANSI/IACET Standard which is recognized internationally as a standard of good practice. As a result of their Authorized Provider status, (organization name) is authorized to offer IACET CEUs for its programs that qualify under the ANSI/IACET Standard. is authorized by IACET to offer 1.0 CEUs for the course. EVENT LOCATION A room block has been reserved at the Houston Marriott West Loop by The Galleria, 1750 West Loop South, Houston, TX 77027, for the nights of August 19-20, Room rates are $189 for single & double occupancy, plus applicable tax. Call for reservations and mention the course to get the group rate. The cutoff date to receive the group rate is August 8, 2014 but as there are a limited number of rooms available at this rate, the room block may close sooner. Please make your reservations early. PROCEEDINGS The proceedings of the course will be published, and one copy will be distributed to each registrant at the course. register 3 send 4th free Any organization wishing to send multiple attendees to these conferences may send 1 FREE for every 3 delegates registered. Please note that all registrations must be made at the same time to qualify. 6

7 REGISTRATION INFORMation Mail Directly To: Electric Utility Consultants, Inc. () 4601 DTC Blvd., Ste. 800 OR, scan and to: please register the following Power Facilities Physical Security Threats : US $1495 Early bird on or before August 8, 2014: US $1295 Event location A room block has been reserved at the Houston Marriott West Loop by The Galleria, 1750 West Loop South, 77027, for the nights of August 19-20, Room rates are $189 for single & double occupancy, plus applicable tax. Call for reservations and mention the course to get the group rate. The cutoff date to receive the group rate is August 8, 2014 but as there are a limited number of rooms available at this rate, the room block may close sooner. Please make your reservations early. ENERG ZE WEEKLY s Energize Weekly newsletter compiles and reports on the latest news and trends in the energy industry. Newsletter recipients also receive a different, complimentary conference presentation every week on a relevant industry topic. The presentations are selected from a massive library of more than 1,000 current presentations that has gathered during its 26 years organizing conferences. Sign me up for Energize Weekly. How did you hear about this event? (direct , colleague, speaker(s), etc.) Print Name Job Title Company What name do you prefer on your name badge? Address City State/Province Zip/Postal Code Country Telephone List any dietary or accessibility needs here CREDIT CARD Name on Card Account Number Billing Address Billing City Billing State Billing Zip Code/Postal Code exp. Date Security Code (last 3 digits on the back of Visa and MC or 4 digits on front of AmEx) OR Enclosed is a check for $ to cover registrations. All cancellations received on or before July 18, 2014, will be subject to a US $195 processing fee. Written cancellations received after this date will create a credit of the tuition (less processing fee) good toward any other event or publication. This credit will be good for six months. In case of event cancellation, s liability is limited to refund of the event registration fee only. For more information regarding administrative policies, such as complaints and refunds, please contact our offices at reserves the right to alter this program without prior notice. 7

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS Hyatt Regency Phoenix is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 11.0 credits for the course. 1 OVERVIEW

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS

AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS COURSE AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS Hilton Houston Southwest is authorized by IACET to offer 1.1 CEUs for the course. is authorized by CPE to offer 13.5 credits for this

More information

ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS

ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS COURSE ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS Houston Marriott West Loop by The Galleria is authorized by IACET to offer 0.7 CEUs for the course. Media Sponsor 1 OVERVIEW There is seldom

More information

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW This

More information

Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities

Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities WEBINAR Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities May 2, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer

More information

DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES:

DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: AN ACCOUNTING COURSE ON DERIVATIVE INSTRUMENTS, HEDGING ACTIVITIES, AND FAIR VALUE Hyatt Regency Miami COURSE is authorized by IACET to offer 1.0

More information

Strengthening Utility Critical

Strengthening Utility Critical WEBINAR Strengthening Utility Critical Infrastructure Cybersecurity Under June 4, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview The White

More information

PROJECT PORTFOLIO MANAGEMENT

PROJECT PORTFOLIO MANAGEMENT COURSE PROJECT PORTFOLIO MANAGEMENT Hyatt Regency Louisville EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW Many organizations struggle with limited resources and too many projects

More information

ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS

ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS COURSE ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS Denver Marriott City Center is authorized by IACET to offer 1.0 CEUs for the course. This course has been approved for 12.0 CPEs. 1 OVERVIEW This course

More information

CONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM

CONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM WEBINAR CONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM April 16, 2015 12:00 1:30 p.m. Eastern Time Online is authorized by IACET to offer

More information

POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING

POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING COURSE POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING October 27-28, 2015 Houston Marriott West Loop by The Galleria Houston, TX is authorized by IACET

More information

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING

INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center EUCI is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW

More information

September 22-23, 2014 JW Marriott Houston Houston, TX

September 22-23, 2014 JW Marriott Houston Houston, TX COurse Energy Joint Ventures JW Marriott Houston is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 12.0 credits for this program. 1 Overview This course will provide

More information

NATURAL GAS UTILITY BASICS

NATURAL GAS UTILITY BASICS COURSE NATURAL GAS UTILITY BASICS Hilton Houston Southwest EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW This training is targeted at participants in the natural gas industry

More information

Project Prioritization and Utility Project Portfolio Management

Project Prioritization and Utility Project Portfolio Management COurse Project Prioritization and Utility Project Portfolio Management Denver Marriott Tech Center EUCI is authorized by IACET to offer 1.2 CEUs for the course. 1 Overview As utilities face increasing

More information

Lessons Learned from Utilities that are in the Cloud

Lessons Learned from Utilities that are in the Cloud Webinar Lessons Learned from Utilities that are in the Cloud Online Photo credit: WikiUser Sam Johnston is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview It is increasingly inefficient

More information

Learn About the Billing and Collection Process Through an Onlineinar

Learn About the Billing and Collection Process Through an Onlineinar WEBINAR THE BASICS OF COLLECTIONS & BANKRUPTCY IN THE OIL & GAS INDUSTRY: GETTING PAID IN HARD TIMES Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW The purpose of this webinar

More information

Fundamentals of Oil and Gas Taxation

Fundamentals of Oil and Gas Taxation COurse Fundamentals of Oil and Gas Taxation Houston Marriott West Loop by The Galleria EUCI is authorized by IACET to offer 1.0 CEUs for the course. EUCI is authorized by CPE to offer 12 credits for this

More information

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse Midstream Oil & Gas Contracts for Non-lawyers Hotel ICON is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts yet so often the details

More information

How To Learn Workforce Analytics

How To Learn Workforce Analytics COurse Workforce Analytics Marina del Rey Marriott is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Within the last 5 years, we have moved from an environment where HR reporting and

More information

MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY BONDS

MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY BONDS WEBINAR MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY November 19, 2015 1:00 2:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW Insurance

More information

Minimizing Disputes in Energy Project Development

Minimizing Disputes in Energy Project Development COurse Minimizing Disputes in Energy Project Development Hilton Charlotte University is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Energy development projects are fraught with potential

More information

Improving Utility Call Centers

Improving Utility Call Centers CONFERENCE Improving Utility Call Centers Realigning Services with Customer Expectations Hyatt Regency Atlanta on Peachtree Street EUCI is authorized by IACET to offer 1.0 CEUs for the conference. 1 Overview

More information

5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE:

5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE: CONFERENCE 5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE: Houston Marriott West Loop by the Galleria Pre-Conference Workshop All Hazards Emergency Predicting, Planning and Response: An Evolving

More information

Data Centers and Utilities: Planning, Incentives, Audits & Trends

Data Centers and Utilities: Planning, Incentives, Audits & Trends CONFERENCE Data Centers and Utilities: Planning, Incentives, Audits & Trends September 29-30, 2014 Denver Marriott Tech Center Denver, CO Photo Credit: Wikimedia User123net is authorized by IACET to offer

More information

Estimation and Cost Control Fundamentals for Oil & Gas

Estimation and Cost Control Fundamentals for Oil & Gas COurse Estimation and Cost Control Fundamentals for Oil & Gas Capital Projects Denver Marriott City Center EUCI is authorized by IACET to offer 1.1 CEUs for the course. 1 Overview Managing the complexity

More information

COurse. Midstream Oil & Gas. April 28-29, 2014 The Westin Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

COurse. Midstream Oil & Gas. April 28-29, 2014 The Westin Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse Midstream Oil & Gas Contracts for Non-lawyers The Westin Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts

More information

(IN)CONDUIT HYDRO-ELECTRIC GENERATION

(IN)CONDUIT HYDRO-ELECTRIC GENERATION COURSE (IN)CONDUIT HYDRO-ELECTRIC GENERATION Royal Sonesta Harbor Court Baltimore is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW Adding renewable energy like solar and wind to the

More information

FERC Natural Gas 101. October 2-3, 2014 Renaissance Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

FERC Natural Gas 101. October 2-3, 2014 Renaissance Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse FERC Natural Gas 101 Renaissance Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview FERC Natural Gas 101 provides a comprehensive overview of the agency s impact

More information

in Ontario and Key Canadian

in Ontario and Key Canadian CONFERENCE The Future of Electricity Prices in Ontario and Key Canadian Markets Toronto Don Valley Hotel & Suites Supporting Organizations is authorized by IACET to offer 0.9 CEUs for the conference. 1

More information

IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS

IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS WEBINAR IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW In recent years regulatory authorities have placed increased

More information

Improving Utility Call Centers

Improving Utility Call Centers CONFERENCE Improving Utility Call Centers Realigning Services with Customer Expectations Hyatt Regency Atlanta on Peachtree Street Featuring Georgia Power Call Center Tour Friday, December 6, 2013 Sponsor

More information

The Importance of Cyber Security and Risk Management

The Importance of Cyber Security and Risk Management CONFERENCE Cybersecurity for Utilities: Compliance, Protection and Improving Overall April 24-25, 2014 Offices of Troutman Sanders, LLP Washington, DC Pre-conference Workshop The New IT/OT/Telecom Convergence:

More information

CYBERSECURITY FOR UTILITIES

CYBERSECURITY FOR UTILITIES CONFERENCE CYBERSECURITY FOR UTILITIES Offices of Troutman Sanders, LLP Pre-Conference Workshop Disaster Recovery and Contingency Planning Managing and Delivering after your Cyber Apocalypse Tuesday, April

More information

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course.

Midstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course. COurse Midstream Oil & Gas Contracts for Non-lawyers Hotel ICON EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts yet so often the

More information

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS Millennium Knickerbocker Hotel Chicago Instructed by COURSE Baltimore

More information

LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY

LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY CONFERENCE LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY Sheraton Indianapolis City Centre Hotel PRESENTATIONS FROM Keynote Presentations from: Department Of Energy - The Honorable Patricia Hoffman, Assistant

More information

AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS

AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS CONFERENCE AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 0.8 CEUs for the course. is authorized by CPE to offer

More information

PLANNING & GROWING ONLINE LEARNING INITIATIVES. October 25 26, 2010 Atlanta, GA

PLANNING & GROWING ONLINE LEARNING INITIATIVES. October 25 26, 2010 Atlanta, GA PLANNING & GROWING ONLINE LEARNING INITIATIVES October 25 26, 2010 Atlanta, GA OVERVIEW Many institutions wanting to improve student access and increase degree completion rates are looking to online programs

More information

LEGAL UPDATE FOR OIL & GAS ENTITIES:

LEGAL UPDATE FOR OIL & GAS ENTITIES: COURSE LEGAL UPDATE FOR OIL & GAS ENTITIES: CONTRACTS TO LIABILITY, PERMITS TO INDEMNITY, STRATEGIES TO AVOID RISK, AND CYBERSECURITY CHALLENGES Houston Marriott West Loop by The Galleria is authorized

More information

Security Management Program Development:

Security Management Program Development: Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are

More information

WRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT. May 24-25, 2012 Atlanta, GA

WRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT. May 24-25, 2012 Atlanta, GA WRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT May 24-25, 2012 Atlanta, GA OVERVIEW Clean and simple content based on the top tasks your visitors want to accomplish online

More information

Utility of the Future Virtual Event Series Monthly Virtual Studio Event Series for Utilities

Utility of the Future Virtual Event Series Monthly Virtual Studio Event Series for Utilities Utility of the Future Virtual Event Series Monthly Virtual Studio Event Series for Utilities PART 1 OPERATIONAL AND CYBER SECURITY WITH AlertEnterprise WEDNESDAY, APRIL 30 Monthly Virtual Events Last Wednesday

More information

SOUTHEAST CLEAN POWER SUMMIT

SOUTHEAST CLEAN POWER SUMMIT CONFERENCE 4 TH ANNUAL SOUTHEAST CLEAN POWER SUMMIT Hyatt Regency Atlanta Post Conference Workshop Pricing the Purchase of Renewable Energy Tuesday, March 31, 2015 Studies and Presentations from Entergy

More information

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc. Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets

More information

Online Course Design. August 2 4, 2010 Denver, CO

Online Course Design. August 2 4, 2010 Denver, CO Online Course Design August 2 4, 2010 Denver, CO An excellent study of the elements that must be considered when conceptualizing, executing, and revising course content. Thomas Friedmann, Instructional

More information

CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES

CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES 13 TH ANNUAL CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES Millenium Knickerbocker CONFERENCE Host Utility Sponsors is authorized by IACET to offer 1.0 CEUs for the conference.

More information

AURORA Vulnerability Background

AURORA Vulnerability Background AURORA Vulnerability Background Southern California Edison (SCE) September 2011-1- Outline What is AURORA? Your Responsibility as a Customer Sectors Impacted by AURORA Review of Regulatory Agencies History

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

July 22-25, 2016 Washington, DC Marriott Wardman Park Hotel

July 22-25, 2016 Washington, DC Marriott Wardman Park Hotel Partner with NASW to Reach Social Workers and Other Health and Human Service Professionals at the 2016 NASW National Conference Leading Change Transforming Lives July 22-25, 2016 Washington, DC Marriott

More information

HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE

HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE CONFERENCE HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE Hyatt Regency Orange County Pre-Conference Workshop THE CLOUD: A VIABLE OPTION FOR UTILITIES Wednesday, January 27, 2016 Sponsor Media Partner is

More information

ISACA North Dallas Chapter

ISACA North Dallas Chapter ISACA rth Dallas Chapter Business Continuity Planning Observations of Critical Infrastructure Environments Ron Blume, P.E. Ron.blume@dyonyx.com 214-280-8925 Focus of Discussion Business Impact Analysis

More information

2015 AESC 3rd Annual Oilfield Trucking Conference. Hilton Hotel Downtown Fort Worth, Texas. November 17-19, 2015

2015 AESC 3rd Annual Oilfield Trucking Conference. Hilton Hotel Downtown Fort Worth, Texas. November 17-19, 2015 2015 AESC 3rd Annual Oilfield Trucking Conference Hilton Hotel Downtown Fort Worth, Texas REGISTER NOW November 17-19, 2015 Association of Energy Service Companies 14531 FM 529, Suite 250 Houston, TX 77095

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

& Project Management

& Project Management Event Planning March 2-6, 2009 Washington, DC & Project Management For Administrative Professionals Take Your Career to the Next Level. Learn How to Effectively Execute Projects and Plan First Class Events

More information

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 1 AGENDA Why Cybersecurity? A Few Helpful Cybersecurity Concepts Developing Expertise:

More information

University of Maryland University College. American Military University. Henley-Putnam University

University of Maryland University College. American Military University. Henley-Putnam University A P R I L 2 0 1 1 Table of Contents 2-3 UMUC: Training Tomorrow s Cybersecurity Leaders Today University of Maryland University College 4-5 Preparing Those Who Protect the Public American Military University

More information

WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES

WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES EUCI presents a conference on: WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES National Arts Centre Ottawa, Ontario TESTIMONIALS FROM PAST ATTENDEES "Exceeded my expectations. It was great

More information

TRIPWIRE NERC SOLUTION SUITE

TRIPWIRE NERC SOLUTION SUITE CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering

More information

InstructIonal strategies for Blended & online. December 9 11, 2009 Scottsdale, AZ

InstructIonal strategies for Blended & online. December 9 11, 2009 Scottsdale, AZ InstructIonal strategies for Blended & online learning December 9 11, 2009 Scottsdale, AZ overview To teach well in the online environment, instructors need to explore new pedagogical options and craft

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical

More information

Corporate Membership and Sponsorship Opportunities

Corporate Membership and Sponsorship Opportunities 2015 Corporate Membership and Sponsorship Opportunities 2015 Membership and Sponsorship Dates Corporate Membership January 1 December 31 Mid-Year Meeting January 23-25 Loews Madison Hotel Washington, DC

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Summary of CIP Version 5 Standards

Summary of CIP Version 5 Standards Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Best Practices in ICS Security for System Operators. A Wurldtech White Paper Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe 2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information

More information

EEOC Atlanta Seminar AUGUST 21-22, 2014. Fee $349 per day. REGISTER NOW www.eeotraining.eeoc.gov

EEOC Atlanta Seminar AUGUST 21-22, 2014. Fee $349 per day. REGISTER NOW www.eeotraining.eeoc.gov Fee $349 per day Early/Online Discount $319 ($638 both days) for on-line registration or if payment is received by July 20, 2014 ENHANCE YOUR EEO KNOWLEDE at the 2014 seminar sponsored by the EEOC Atlanta

More information

The Fire Chiefs Planning Committee thanks you for your continued support. We look forward to seeing you at the conference in February.

The Fire Chiefs Planning Committee thanks you for your continued support. We look forward to seeing you at the conference in February. Dear Vendor: The 2016 Fire Chiefs Executive Development Conference is scheduled for February 2nd 5th at the Bryant Conference Center in Tuscaloosa, Alabama. The conference continues to grow each year with

More information

Seven Steps To A Superior Physical Identity and Access Management Solution. Enterprise-Class Physical Identity and Access Management Software

Seven Steps To A Superior Physical Identity and Access Management Solution. Enterprise-Class Physical Identity and Access Management Software WHITE PAPER Seven Steps To A Superior Physical Identity and Access Management Solution Enterprise-Class Physical Identity and Access Management Software www.alertenterprise.com Seven Steps To A Superior

More information

Ten Steps for Preventing a terrorist Attack

Ten Steps for Preventing a terrorist Attack WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business

More information

Increase insight. Reduce risk. Feel confident.

Increase insight. Reduce risk. Feel confident. Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING

More information

How To Protect A Smart Grid From Cyber Security Threats

How To Protect A Smart Grid From Cyber Security Threats Smart Grid Cyber Security System Reliability, Defense-in-Depth, Business Continuity, Change Management, Secure Telecommunications, Endpoint Protection, Identity Management, and Security Event Management

More information

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a

More information

2011 CSHP Catch the Wave CONFERENCE INFORMATION FOR OUR EXHIBIBITORS AND SPONSORS

2011 CSHP Catch the Wave CONFERENCE INFORMATION FOR OUR EXHIBIBITORS AND SPONSORS CONFERENCE INFORMATION FOR OUR EXHIBIBITORS AND SPONSORS If you ve questions about registration and/or payment, please contact the CSHP office at 888/506-3784 or office@cshponline.org DATES and NEW LOCATION

More information

RE: Notice of Proposed Rulemaking, Request for Comments: Operation and Certification of Small Unmanned Aircraft Systems [Docket No.

RE: Notice of Proposed Rulemaking, Request for Comments: Operation and Certification of Small Unmanned Aircraft Systems [Docket No. April 24, 2015 Docket Management Facility (M-30) U. S. Department of Transportation West Building Ground Floor Room W12-140 1200 New Jersey Ave. Washington, DC 20590-0001 RE: Notice of Proposed Rulemaking,

More information

Education & Training Plan. Texas A&M International University (TAMIU)

Education & Training Plan. Texas A&M International University (TAMIU) Office of Continuing Education 5201 University Boulevard Laredo, TX 78041 http://www.tamiu.edu/ce Contact: Jacqueline H. Arguidegui 956.326.3068 ce@tamiu.edu Education & Training Plan Texas A&M International

More information

Risk, Threat, and Vulnerability Assessment

Risk, Threat, and Vulnerability Assessment Risk, Threat, and Vulnerability Assessment October 23 24, 2014 Earn up to 14 CPEs New Program EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N REDUCE RISK INCREASE RESILIENCE

More information

February 18, 2014 Dear Florida Public Power Supporter,

February 18, 2014 Dear Florida Public Power Supporter, February18,2014 DearFloridaPublicPowerSupporter, WewantyoutobeanimportantpartoftheFMEAFMPAAnnualConference,July1518, 2014,attheRitzCarltoninNaples.Thisisyouropportunitytoparticipateintheunique eventbyshowingyoursupportasacorporatesponsor.

More information

July 28, 2011 The Wynfrey Hotel Birmingham, Alabama

July 28, 2011 The Wynfrey Hotel Birmingham, Alabama July 28, 2011 The Wynfrey Hotel Birmingham, Alabama Sponsored by: Alabama Nursing Home Association in cooperation with Alabama Nursing Home Association Long Term Care Professional Nurses Auxiliary Agenda:

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

Business Continuity/Disaster Recovery Planning Berkeley County Chamber of Commerce 7/20/12

Business Continuity/Disaster Recovery Planning Berkeley County Chamber of Commerce 7/20/12 Business Continuity/Disaster Recovery Planning Berkeley County Chamber of Commerce 7/20/12 Ben Fleming, Jr. Santee Cooper Manager, Transmission Operations Agenda Importance Purpose Basic Necessities Program

More information

Change and Configuration Management

Change and Configuration Management Change and Configuration Management for CIP Compliance OCTOBER 21, 2009 Developed with: Presenters Bart Thielbar, CISA Senior Research hanalyst Sierra Energy Group, a Division of Energy Central CIP-003,

More information

Implementation Plan for Version 5 CIP Cyber Security Standards

Implementation Plan for Version 5 CIP Cyber Security Standards Implementation Plan for Version 5 CIP Cyber Security Standards April 10September 11, 2012 Prerequisite Approvals All Version 5 CIP Cyber Security Standards and the proposed additions, modifications, and

More information

NERC-CIP S MOST WANTED

NERC-CIP S MOST WANTED WHITE PAPER NERC-CIP S MOST WANTED The Top Three Most Violated NERC-CIP Standards What you need to know to stay off the list. www.alertenterprise.com NERC-CIP s Most Wanted AlertEnterprise, Inc. White

More information

CIP-003-5 Cyber Security Security Management Controls

CIP-003-5 Cyber Security Security Management Controls A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-5 3. Purpose: To specify consistent and sustainable security management controls that establish responsibility and

More information

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which

More information

CYBER SECURITY GUIDANCE

CYBER SECURITY GUIDANCE CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires

More information

UNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION

UNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION UNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION As an institution trying to bring both its online course offerings and the support services to distance education students up to the next level, it was

More information

Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard

Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard The North American Electric Reliability Corporation 1 s (NERC) CIP Reliability Standard is the most comprehensive and pervasive

More information

Learn the essential components of designing effective online courses.

Learn the essential components of designing effective online courses. MAKING THE SHIFT FROM CLASSROOM TO ONLINE COURSE DESIGN Session 1: (Re)Mapping Course Design Wednesday, September 7, 2011 :: 1:00 2:45 p.m. EDT Session 2: Course Organization Monday, September 12, 2011

More information

Critical Asset Security Enhancementation - A Review

Critical Asset Security Enhancementation - A Review U.S. Department of Energy Office of Inspector General Office of Audit Services Audit Report Report on Critical Asset Vulnerability and Risk Assessments at the Power Marketing Administrations--Followup

More information

JUNE 8-10, 2015 Nashville Airport Marriott

JUNE 8-10, 2015 Nashville Airport Marriott 18 th In association with the International Workers Compensation Foundation, a non-profit corporation dedicated to workers compensation research and education. ANNUAL TENNESSEE WORKERS COMPENSATION EDUCATIONAL

More information

PCI DSS Overview and Solutions. Anwar McEntee Anwar_McEntee@rapid7.com

PCI DSS Overview and Solutions. Anwar McEntee Anwar_McEntee@rapid7.com PCI DSS Overview and Solutions Anwar McEntee Anwar_McEntee@rapid7.com Agenda Threat environment and risk PCI DSS overview Who we are Solutions and where we can help Market presence High Profile Hacks in

More information

CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on

More information

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The

More information

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information