Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures
|
|
- Roberta Horn
- 8 years ago
- Views:
Transcription
1 COurse Power Facilities Physical Security Threats Physical Security, Personnel Security and Preventative Measures Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 1.0 CEUs for the course. 1
2 Overview The electric smart grid promises increased capacity, reliability and efficiency through the existing electricity network. However, there is a new host of vulnerabilities stemming from physical intrusion potentially leading to devastating physical effects. The security of a system is as strong as its weakest link. Thus, the scale and complexity of the smart grid, along with its increased connectivity and automation make the task of physical protection particularly challenging. Power facilities, including power plants, sub stations and transmission lines, must be prepared as they face the challenges that come with protecting their assets. What is the concept of defense, including perimeter security? Safety versus Security - what do you do when the two contradict each other? What is bomb recognition and sweeping? Get answers to these questions and more. This course will cover physical security from three major perspectives; preventative measures, physical security 101, and personnel security for those in the energy industry. Issues related to CIP 5 and any new issues identified by CIP 14 will also be discussed in addition to security incidents at power facilities making headlines. Attendees will discover the legal issues facing the security community, and review brand protection, touching upon terrorism of all types. Examples will be provided revolving around risk management and how it has become even more important with limited resources, including the various concepts of risk management. A review of access control, identification and authentication, as well as security at remote locations, will also be discussed, covering security at shared facilities, including the Four Scenarios of Attack. Finally, personnel security, background investigations, workplace violence, vendor contract security as well as security in the age of social media and the importance of security when contracting services will be addressed. Upon completion of this course, attendees should have the skills and knowledge to effectively apply physical security concepts and practices, acquire and analyze the information necessary for protecting assets, and allocate security resources to protect those assets. Who Should Attend Utility and energy company staff from the following departments: Directors and CEOs Corporate Security Risk Assessment Managers/Directors Legal and regulatory staff Information technology and information security Operations and engineering Administrative and support staff Control systems Crisis Management Managers As well as: Attorneys and regulators Contractors and vendors LEARNING OUTCOMES Discuss lessons learned from past security events at power facilities, review legal issues facing security personnel and understand the different type of threats facing the security community Review various threats facing US Energy assets, examine various concepts designed to reduce the risks to energy facilities and examine the four scenarios of attack Discuss the concepts of Risk Management including Risk Tolerance / Appetite, Risk Management Cycle and Risk Management Framework Review the basics of physical security including but not limited to access management, visitor control, hardening of site security and the handling of bomb threats Examine individual roles in information security and the protection of critical assets and intellectual property Discuss the prevention of workplace violence REGISTER 4601 TODAY! DTC Blvd., CALL Suite OR VISIT 2
3 Agenda Wednesday, August 20, :00-8:30 a.m. registration and Continental Breakfast 8:30-8:45 a.m. introduction 8:45-10:00 a.m. review of CIP 5, Real World Security Incidents and Threats to Facilities Lessons learned from past security incidents, legal issues facing security personnel, and types of threats facing today s facility security personnel are covered Corporate Security has been an important part of business since the days of Allan Pinkerton and the Railroad Express companies. In this session, various aspects of physical security that are important to any facility or business in any industry will be reviewed. There will also be an analysis of certain aspects of CIP 5, in addition to revealing real world incidents that have occurred in the energy industry and what could have been done to prevent those incidents. Physical security incidents occur from coast to coast. An evaluation from a historical perspective to identify procedures, that if implemented properly, could have prevented the security incidents. Additionally, a depiction of potential legal issues facing those that work in the field of security will be clarified should those in the industry fail to act in the best interests of themselves, the industry and their customers. Finally, there will be an examination of the types of threats that face facilities in the energy industry. 10:00-10:30 a.m. Networking Break 10:30 a.m. - 12:00 p.m. Security Management Theory and Threats Types of threats facing US energy assets, concepts ad theory used to reduce risks and the four scenarios of attack. Understanding the threats facing facilities and the differences in the types of threats facing facilities is crucial to any security management program. In this session, the theories of physical security management will be discussed in addition to identifying the threats, and a breakdown of the differences between the threats and the different aspects of threats and the various stages. By better understanding the various threats, security managers will be able to better protect their facilities. Terrorism versus criminal activity will be examined along with groups and criminal organizations whose mission is to disrupt business, harm personnel and steal assets. Knowing the precursors of an attack, and the importance of intelligence gathering, will prepare security managers for current security threats. Lastly, four scenarios of an attack each and every facility should be aware of to better protect their facility will be studied.. 12:00-1:00 p.m. Group Luncheon 1:00-2:15 p.m. risk Management Risk Management concepts, including risk appetite/tolerance, risk management cycles, and development of risk tolerance framework will be reviewed. In the era of shrinking resources it is incredibly important for today s physical security professionals to use what resources they have in a highly efficient and beneficial manner. Understanding risk management will enable security managers to better use their limited resources to protect their industry from catastrophic events. This session will introduce different principles of risk management and how it can assist the industry in identifying, scoring and remediating risks facing security professionals. Attendees will learn how to address corporate risk and tolerance, discuss the risk management cycle and begin to understand the importance of implementing a risk tolerance framework. The following topics will be clarified: Ishikawa fishbone diagram, risk appetite scale and the steps of developing a risk appetite/tolerance framework. The importance of developing a strategic risk assessment is crucial and will be discussed and the importance of using this assessment to prioritize funding and allocation of initiative to reduce risk. 2:15-2:30 p.m. Afternoon Break 2:30-3:30 p.m. Risk Management Continued 3
4 Agenda Wednesday, August 20, 2014 (Continued) 3:30-4:30 p.m. A Physical Security Approach to Substation Security and NERC Compliance High profile intrusions and physical attacks against substations have spurred a lot of discussion about physical security resulting in a FERC directive, for NERC to propose new physical security standards from NERC. A holistic approach to security has been proven to be more effective and addresses compliance requirements In the Utilities Industry at the same time. It is now essential to monitor and report rolesbased physical access to various facilities, control rooms, substations and critical assets. Utilities of all size need to know who has access to specific facilities, critical assets and cyber critical assets and how much area access they should have within those facilities. Version 5 of the NERC CIP compliance requirements adds more to physical security requirements in addition to complete background check and criminal history record checks for employees and un-escorted contractors. Additionally, highly critical assets must be housed in secured boundaries and any access to that area recorded and tracked. Join the experts who are leading this session to discuss why this new approach is the only way to detect and identify complex threats that extend across the boundaries of cyber and physical security. Lessons you will learn: Why integrating physical and cyber security is key How to overcome the challenges of extending security across organizational boundaries New techniques that cover upfront risk analysis and automated workflow to simplify onboarding offboarding, anomaly detection and threat correlation - Ron Fabela, Sr. Product Manager, AlertEnterprise Thursday, August 21, :00 8:30 a.m. continental Breakfast 8:30-10:00 a.m. Physical Security 101 A sampling of concepts in Physical Security including Access Management, Site Security, Security Systems, Visitor Screening, and Handling of Bomb Threats. Physical security is an ever evolving field and it is important for both novice and experienced managers to understand the concepts of physical security. Real world examples of where security failed will be identified. Physical security concepts, including what constitutes a physical security system will be revealed in addition to deterrence, detection and delaying factors and the important of access controls. The aspect of proper lighting, credentialing, cameras and fencing as well as vegetation management is important to the overall success of protecting facilities, including the importance of proper visitor management. Providing security training to personnel with non security duties can have exponential benefits. How to handle bomb threats including searching methods and identifying dangerous substances will be discussed and the importance of physical security training and conducting exercises and drills. 10:00-10:30 a.m. Networking Break 10:30 a.m. - 12:00 p.m. Operational Security, Personnel Security and Workplace Violence Concepts in handling of critical assets, information security, intellectual property and HR from a security perspective In the digital age, information has become today s currency. Protecting a company s assets, whether its people, information, equipment, data or intellectual property should be a priority. This session will examine the importance of protecting assets and provide recommendations to better protect current and future assets. Operational security will also be discussed, including instruction on protection of data cradle to grave. The protection of data, both physical and electronic format will be examined, including examples of the repercussions companies face when policies are not followed. Finally, the importance of personnel security, including background investigations, social media solutions and workplace violence will be reviewed, along with a group discussion about protecting assets. 12:00-12:30 p.m. Q&A/Conclusion 4
5 INSTRUCTORs CAPT Chris Schaffer, USCGR (ret) / Principal, Risk Mitigation and Security / AliTek Consulting, LLP Chris Schaffer is Principal of the Security Practice at AliTek Consulting in specializing in security, regulatory compliance, business continuity, disaster recovery, and incident and crisis management. Chris has over 28 years of practical experience in facility and Maritime security, security vulnerability assessments, regulatory compliance, crisis management and business continuity in both government and private sector companies. Chris has served in senior management and as a senior consultant in both Fortune 500 companies as well as the Department of Homeland Security, U.S. Coast Guard where he currently holds the rank of Captain (0-6) in the Reserves. He holds a Bachelor of Science in Risk Management from Florida State University, a Master of Arts in Theology from Andersonville Theological Seminary and is a graduate of the U.S. Naval War College s Command and Staff program as well as the Darden Executive Education Program at the University of Virginia. He also holds a second Master s Degree in Security Management from the University of Houston and is a member of the Phi Kappa Phi Honor Society. Captain Schaffer s awards include the Meritorious Service Medal, two Coast Guard Commendation Medals with Operational Distinguishing Device, three Coast Guard Achievement Medals with Operational Distinguishing Device, the Navy and Marine Corps Achievement Medal, two Coast Guard Commandant s Letter of Commendation ribbons, the Global War On Terrorism Service Medal, the 9-11 Department of Transportation service ribbon and various other unit and service awards. He also is authorized to wear the permanent Advanced Boat Force Operations insignia. Jesse Flores / Lead Security Trainer, Senior Security Consultant / AliTek Consulting, LLP Jesse Flores is the Lead Trainer and a Senior Consultant at AliTek Consulting in Houston, Texas specializing in security / risk management, information security, records management and security, crisis management, regulatory compliance, business continuity, incident response and disaster recovery. Jesse has nearly 15 years of practical experience in the risk management and physical / information security industry. Jesse has worked with both the private sector and federal government agencies working in risk management, and physical / information security management. Jesse has conducted IT and physical security vulnerability assessments, risk assessments, enforcing regulatory compliance, crisis management and business continuity planning both in the United States and abroad. He has served as a information security officer, supervisory risk analyst, IT security auditor and consultant. Jesse has worked in integrated operation centers monitoring the real time emergency activities of federal agencies and conducted / lead numerous emergency exercises. Jesse is a seasoned speaker and has been conducting training sessions within the energy sector for many years. His most recent duties allow him to engage facility security officers, health and safety officers and contract security personnel in the areas of physical security, MTSA, and CFATS. Jesse has conducted facility security vulnerability assessments throughout his career and continues to work with leading companies in the energy sector to advise security personnel, conduct business continuity exercises, address critical infrastructure needs and identify, score and mitigate risk. Jesse holds a Bachelor s Degree in Computer Information Systems from Texas State University at San Marcos, and a Graduate Degree (Masters in Security Management for Executives) from the University of Houston - Downtown. Jesse has received in depth training in the areas of Business Continuity Planning, Risk Assessment and Abatement, and Information Security. 5
6 Instructional Methods This program will use PowerPoint Presentations, group discussions, as well as active participation. Requirements for Successful Completion of Program Participants must sign in/out each day and be in attendance for the entirety of the course to be eligible for continuing education credit. Credits has been accredited as an Authorized Provider by the International Association for Continuing Education and Training (IACET). In obtaining this accreditation, the (organization name) has demonstrated that it complies with the ANSI/IACET Standard which is recognized internationally as a standard of good practice. As a result of their Authorized Provider status, (organization name) is authorized to offer IACET CEUs for its programs that qualify under the ANSI/IACET Standard. is authorized by IACET to offer 1.0 CEUs for the course. EVENT LOCATION A room block has been reserved at the Houston Marriott West Loop by The Galleria, 1750 West Loop South, Houston, TX 77027, for the nights of August 19-20, Room rates are $189 for single & double occupancy, plus applicable tax. Call for reservations and mention the course to get the group rate. The cutoff date to receive the group rate is August 8, 2014 but as there are a limited number of rooms available at this rate, the room block may close sooner. Please make your reservations early. PROCEEDINGS The proceedings of the course will be published, and one copy will be distributed to each registrant at the course. register 3 send 4th free Any organization wishing to send multiple attendees to these conferences may send 1 FREE for every 3 delegates registered. Please note that all registrations must be made at the same time to qualify. 6
7 REGISTRATION INFORMation Mail Directly To: Electric Utility Consultants, Inc. () 4601 DTC Blvd., Ste. 800 OR, scan and to: please register the following Power Facilities Physical Security Threats : US $1495 Early bird on or before August 8, 2014: US $1295 Event location A room block has been reserved at the Houston Marriott West Loop by The Galleria, 1750 West Loop South, 77027, for the nights of August 19-20, Room rates are $189 for single & double occupancy, plus applicable tax. Call for reservations and mention the course to get the group rate. The cutoff date to receive the group rate is August 8, 2014 but as there are a limited number of rooms available at this rate, the room block may close sooner. Please make your reservations early. ENERG ZE WEEKLY s Energize Weekly newsletter compiles and reports on the latest news and trends in the energy industry. Newsletter recipients also receive a different, complimentary conference presentation every week on a relevant industry topic. The presentations are selected from a massive library of more than 1,000 current presentations that has gathered during its 26 years organizing conferences. Sign me up for Energize Weekly. How did you hear about this event? (direct , colleague, speaker(s), etc.) Print Name Job Title Company What name do you prefer on your name badge? Address City State/Province Zip/Postal Code Country Telephone List any dietary or accessibility needs here CREDIT CARD Name on Card Account Number Billing Address Billing City Billing State Billing Zip Code/Postal Code exp. Date Security Code (last 3 digits on the back of Visa and MC or 4 digits on front of AmEx) OR Enclosed is a check for $ to cover registrations. All cancellations received on or before July 18, 2014, will be subject to a US $195 processing fee. Written cancellations received after this date will create a credit of the tuition (less processing fee) good toward any other event or publication. This credit will be good for six months. In case of event cancellation, s liability is limited to refund of the event registration fee only. For more information regarding administrative policies, such as complaints and refunds, please contact our offices at reserves the right to alter this program without prior notice. 7
FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS
COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS Hyatt Regency Phoenix is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 11.0 credits for the course. 1 OVERVIEW
More informationOil & Gas Cybersecurity
COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry
More informationAN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS
COURSE AN INTRODUCTION TO ELECTRIC UTILITY SYSTEMS FOR NON-ENGINEERS Hilton Houston Southwest is authorized by IACET to offer 1.1 CEUs for the course. is authorized by CPE to offer 13.5 credits for this
More informationACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS
COURSE ACCIDENT & INCIDENT INVESTIGATION FOR UPSTREAM OIL & GAS Houston Marriott West Loop by The Galleria is authorized by IACET to offer 0.7 CEUs for the course. Media Sponsor 1 OVERVIEW There is seldom
More informationINLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING
COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW This
More informationHacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities
WEBINAR Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities May 2, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer
More informationDERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES:
DERIVATIVES ACCOUNTING FOR POWER AND ENERGY COMPANIES: AN ACCOUNTING COURSE ON DERIVATIVE INSTRUMENTS, HEDGING ACTIVITIES, AND FAIR VALUE Hyatt Regency Miami COURSE is authorized by IACET to offer 1.0
More informationStrengthening Utility Critical
WEBINAR Strengthening Utility Critical Infrastructure Cybersecurity Under June 4, 2013 12:00-1:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview The White
More informationPROJECT PORTFOLIO MANAGEMENT
COURSE PROJECT PORTFOLIO MANAGEMENT Hyatt Regency Louisville EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW Many organizations struggle with limited resources and too many projects
More informationELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS
COURSE ELECTRIC UTILITY CONTRACTS FOR NON-LAWYERS Denver Marriott City Center is authorized by IACET to offer 1.0 CEUs for the course. This course has been approved for 12.0 CPEs. 1 OVERVIEW This course
More informationCONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM
WEBINAR CONTROL ROOM MANAGEMENT: GUIDANCE FOR AND LESSONS LEARNED FROM DEVELOPING AND IMPLEMENTING A WORKABLE PROGRAM April 16, 2015 12:00 1:30 p.m. Eastern Time Online is authorized by IACET to offer
More informationPOWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING
COURSE POWER GENERATION AND INDUSTRIAL PLANT CABLES - CONSTRUCTION, APPLICATION, INSTALLATION AND TESTING October 27-28, 2015 Houston Marriott West Loop by The Galleria Houston, TX is authorized by IACET
More informationINLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING
COURSE INLINE INSPECTION OF PIPELINES CRITICAL FACTORS IN STRUCTURAL DESIGN, TESTING AND MANUFACTURING Denver Marriott Tech Center EUCI is authorized by IACET to offer 0.8 CEUs for the course. 1 OVERVIEW
More informationSeptember 22-23, 2014 JW Marriott Houston Houston, TX
COurse Energy Joint Ventures JW Marriott Houston is authorized by IACET to offer 1.0 CEUs for the course. is authorized by CPE to offer 12.0 credits for this program. 1 Overview This course will provide
More informationNATURAL GAS UTILITY BASICS
COURSE NATURAL GAS UTILITY BASICS Hilton Houston Southwest EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW This training is targeted at participants in the natural gas industry
More informationProject Prioritization and Utility Project Portfolio Management
COurse Project Prioritization and Utility Project Portfolio Management Denver Marriott Tech Center EUCI is authorized by IACET to offer 1.2 CEUs for the course. 1 Overview As utilities face increasing
More informationLessons Learned from Utilities that are in the Cloud
Webinar Lessons Learned from Utilities that are in the Cloud Online Photo credit: WikiUser Sam Johnston is authorized by IACET to offer 0.2 CEUs for the webinar. 1 Overview It is increasingly inefficient
More informationLearn About the Billing and Collection Process Through an Onlineinar
WEBINAR THE BASICS OF COLLECTIONS & BANKRUPTCY IN THE OIL & GAS INDUSTRY: GETTING PAID IN HARD TIMES Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW The purpose of this webinar
More informationFundamentals of Oil and Gas Taxation
COurse Fundamentals of Oil and Gas Taxation Houston Marriott West Loop by The Galleria EUCI is authorized by IACET to offer 1.0 CEUs for the course. EUCI is authorized by CPE to offer 12 credits for this
More informationMidstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course.
COurse Midstream Oil & Gas Contracts for Non-lawyers Hotel ICON is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts yet so often the details
More informationHow To Learn Workforce Analytics
COurse Workforce Analytics Marina del Rey Marriott is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Within the last 5 years, we have moved from an environment where HR reporting and
More informationMANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY BONDS
WEBINAR MANAGING CONSTRUCTION RISKS WITH INSURANCE AND CONSTRUCTION SURETY November 19, 2015 1:00 2:30 p.m. Eastern Time Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW Insurance
More informationMinimizing Disputes in Energy Project Development
COurse Minimizing Disputes in Energy Project Development Hilton Charlotte University is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Energy development projects are fraught with potential
More informationImproving Utility Call Centers
CONFERENCE Improving Utility Call Centers Realigning Services with Customer Expectations Hyatt Regency Atlanta on Peachtree Street EUCI is authorized by IACET to offer 1.0 CEUs for the conference. 1 Overview
More information5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE:
CONFERENCE 5 TH ANNUAL STORM, PLANNING AND PREPARATION CONFERENCE: Houston Marriott West Loop by the Galleria Pre-Conference Workshop All Hazards Emergency Predicting, Planning and Response: An Evolving
More informationData Centers and Utilities: Planning, Incentives, Audits & Trends
CONFERENCE Data Centers and Utilities: Planning, Incentives, Audits & Trends September 29-30, 2014 Denver Marriott Tech Center Denver, CO Photo Credit: Wikimedia User123net is authorized by IACET to offer
More informationEstimation and Cost Control Fundamentals for Oil & Gas
COurse Estimation and Cost Control Fundamentals for Oil & Gas Capital Projects Denver Marriott City Center EUCI is authorized by IACET to offer 1.1 CEUs for the course. 1 Overview Managing the complexity
More informationCOurse. Midstream Oil & Gas. April 28-29, 2014 The Westin Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.
COurse Midstream Oil & Gas Contracts for Non-lawyers The Westin Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts
More information(IN)CONDUIT HYDRO-ELECTRIC GENERATION
COURSE (IN)CONDUIT HYDRO-ELECTRIC GENERATION Royal Sonesta Harbor Court Baltimore is authorized by IACET to offer 1.0 CEUs for the course. 1 OVERVIEW Adding renewable energy like solar and wind to the
More informationFERC Natural Gas 101. October 2-3, 2014 Renaissance Denver Downtown Denver, CO. EUCI is authorized by IACET to offer 1.0 CEUs for the course.
COurse FERC Natural Gas 101 Renaissance Denver Downtown EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview FERC Natural Gas 101 provides a comprehensive overview of the agency s impact
More informationin Ontario and Key Canadian
CONFERENCE The Future of Electricity Prices in Ontario and Key Canadian Markets Toronto Don Valley Hotel & Suites Supporting Organizations is authorized by IACET to offer 0.9 CEUs for the conference. 1
More informationIN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS
WEBINAR IN-SERVICE REPAIRS TO LEAKING ABOVE GROUND STORAGE TANK ROOFS Online is authorized by IACET to offer 0.2 CEUs for the webinar. 1 OVERVIEW In recent years regulatory authorities have placed increased
More informationImproving Utility Call Centers
CONFERENCE Improving Utility Call Centers Realigning Services with Customer Expectations Hyatt Regency Atlanta on Peachtree Street Featuring Georgia Power Call Center Tour Friday, December 6, 2013 Sponsor
More informationThe Importance of Cyber Security and Risk Management
CONFERENCE Cybersecurity for Utilities: Compliance, Protection and Improving Overall April 24-25, 2014 Offices of Troutman Sanders, LLP Washington, DC Pre-conference Workshop The New IT/OT/Telecom Convergence:
More informationCYBERSECURITY FOR UTILITIES
CONFERENCE CYBERSECURITY FOR UTILITIES Offices of Troutman Sanders, LLP Pre-Conference Workshop Disaster Recovery and Contingency Planning Managing and Delivering after your Cyber Apocalypse Tuesday, April
More informationMidstream Oil & Gas. September 15-16, 2014 Hotel ICON Houston, TX. EUCI is authorized by IACET to offer 1.0 CEUs for the course.
COurse Midstream Oil & Gas Contracts for Non-lawyers Hotel ICON EUCI is authorized by IACET to offer 1.0 CEUs for the course. 1 Overview Midstream companies do business through contracts yet so often the
More informationADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS
ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS (ADMS) HOW TO SUCCESSFULLY ASSESS, PROCURE, IMPLEMENT, AND UPGRADE AN OMS, DMS OR A COMPLETE ADMS Millennium Knickerbocker Hotel Chicago Instructed by COURSE Baltimore
More informationLEADERSHIP CONFERENCE FOR WOMEN IN ENERGY
CONFERENCE LEADERSHIP CONFERENCE FOR WOMEN IN ENERGY Sheraton Indianapolis City Centre Hotel PRESENTATIONS FROM Keynote Presentations from: Department Of Energy - The Honorable Patricia Hoffman, Assistant
More informationAN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS
CONFERENCE AN IN-DEPTH INTRODUCTION TO MASTER LIMITED PARTNERSHIPS Houston Marriott West Loop by The Galleria Sponsor is authorized by IACET to offer 0.8 CEUs for the course. is authorized by CPE to offer
More informationPLANNING & GROWING ONLINE LEARNING INITIATIVES. October 25 26, 2010 Atlanta, GA
PLANNING & GROWING ONLINE LEARNING INITIATIVES October 25 26, 2010 Atlanta, GA OVERVIEW Many institutions wanting to improve student access and increase degree completion rates are looking to online programs
More informationLEGAL UPDATE FOR OIL & GAS ENTITIES:
COURSE LEGAL UPDATE FOR OIL & GAS ENTITIES: CONTRACTS TO LIABILITY, PERMITS TO INDEMNITY, STRATEGIES TO AVOID RISK, AND CYBERSECURITY CHALLENGES Houston Marriott West Loop by The Galleria is authorized
More informationSecurity Management Program Development:
Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are
More informationWRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT. May 24-25, 2012 Atlanta, GA
WRITING RIGHT FOR THE WEB WORKSHOP: IMPROVING YOUR INSTITUTION S WEB CONTENT May 24-25, 2012 Atlanta, GA OVERVIEW Clean and simple content based on the top tasks your visitors want to accomplish online
More informationUtility of the Future Virtual Event Series Monthly Virtual Studio Event Series for Utilities
Utility of the Future Virtual Event Series Monthly Virtual Studio Event Series for Utilities PART 1 OPERATIONAL AND CYBER SECURITY WITH AlertEnterprise WEDNESDAY, APRIL 30 Monthly Virtual Events Last Wednesday
More informationSOUTHEAST CLEAN POWER SUMMIT
CONFERENCE 4 TH ANNUAL SOUTHEAST CLEAN POWER SUMMIT Hyatt Regency Atlanta Post Conference Workshop Pricing the Purchase of Renewable Energy Tuesday, March 31, 2015 Studies and Presentations from Entergy
More informationCyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
More informationOnline Course Design. August 2 4, 2010 Denver, CO
Online Course Design August 2 4, 2010 Denver, CO An excellent study of the elements that must be considered when conceptualizing, executing, and revising course content. Thomas Friedmann, Instructional
More informationCREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES
13 TH ANNUAL CREDIT AND COLLECTIONS: IMPROVING FINANCIAL PERFORMANCE FOR UTILITIES Millenium Knickerbocker CONFERENCE Host Utility Sponsors is authorized by IACET to offer 1.0 CEUs for the conference.
More informationAURORA Vulnerability Background
AURORA Vulnerability Background Southern California Edison (SCE) September 2011-1- Outline What is AURORA? Your Responsibility as a Customer Sectors Impacted by AURORA Review of Regulatory Agencies History
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationJuly 22-25, 2016 Washington, DC Marriott Wardman Park Hotel
Partner with NASW to Reach Social Workers and Other Health and Human Service Professionals at the 2016 NASW National Conference Leading Change Transforming Lives July 22-25, 2016 Washington, DC Marriott
More informationHOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE
CONFERENCE HOW AMI IS IMPACTING THE CUSTOMER EXPERIENCE Hyatt Regency Orange County Pre-Conference Workshop THE CLOUD: A VIABLE OPTION FOR UTILITIES Wednesday, January 27, 2016 Sponsor Media Partner is
More informationISACA North Dallas Chapter
ISACA rth Dallas Chapter Business Continuity Planning Observations of Critical Infrastructure Environments Ron Blume, P.E. Ron.blume@dyonyx.com 214-280-8925 Focus of Discussion Business Impact Analysis
More information2015 AESC 3rd Annual Oilfield Trucking Conference. Hilton Hotel Downtown Fort Worth, Texas. November 17-19, 2015
2015 AESC 3rd Annual Oilfield Trucking Conference Hilton Hotel Downtown Fort Worth, Texas REGISTER NOW November 17-19, 2015 Association of Energy Service Companies 14531 FM 529, Suite 250 Houston, TX 77095
More informationTASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
More information& Project Management
Event Planning March 2-6, 2009 Washington, DC & Project Management For Administrative Professionals Take Your Career to the Next Level. Learn How to Effectively Execute Projects and Plan First Class Events
More informationEFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013
EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013 1 AGENDA Why Cybersecurity? A Few Helpful Cybersecurity Concepts Developing Expertise:
More informationUniversity of Maryland University College. American Military University. Henley-Putnam University
A P R I L 2 0 1 1 Table of Contents 2-3 UMUC: Training Tomorrow s Cybersecurity Leaders Today University of Maryland University College 4-5 Preparing Those Who Protect the Public American Military University
More informationWEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES
EUCI presents a conference on: WEB SELF-SERVICE, MOBILE APPS, AND SOCIAL MEDIA FOR UTILITIES National Arts Centre Ottawa, Ontario TESTIMONIALS FROM PAST ATTENDEES "Exceeded my expectations. It was great
More informationTRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
More informationInstructIonal strategies for Blended & online. December 9 11, 2009 Scottsdale, AZ
InstructIonal strategies for Blended & online learning December 9 11, 2009 Scottsdale, AZ overview To teach well in the online environment, instructors need to explore new pedagogical options and craft
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
More informationCorporate Membership and Sponsorship Opportunities
2015 Corporate Membership and Sponsorship Opportunities 2015 Membership and Sponsorship Dates Corporate Membership January 1 December 31 Mid-Year Meeting January 23-25 Loews Madison Hotel Washington, DC
More informationCybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
More informationSummary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
More informationEEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
More informationBest Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
More informationHigh Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
More informationEEOC Atlanta Seminar AUGUST 21-22, 2014. Fee $349 per day. REGISTER NOW www.eeotraining.eeoc.gov
Fee $349 per day Early/Online Discount $319 ($638 both days) for on-line registration or if payment is received by July 20, 2014 ENHANCE YOUR EEO KNOWLEDE at the 2014 seminar sponsored by the EEOC Atlanta
More informationThe Fire Chiefs Planning Committee thanks you for your continued support. We look forward to seeing you at the conference in February.
Dear Vendor: The 2016 Fire Chiefs Executive Development Conference is scheduled for February 2nd 5th at the Bryant Conference Center in Tuscaloosa, Alabama. The conference continues to grow each year with
More informationSeven Steps To A Superior Physical Identity and Access Management Solution. Enterprise-Class Physical Identity and Access Management Software
WHITE PAPER Seven Steps To A Superior Physical Identity and Access Management Solution Enterprise-Class Physical Identity and Access Management Software www.alertenterprise.com Seven Steps To A Superior
More informationTen Steps for Preventing a terrorist Attack
WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business
More informationIncrease insight. Reduce risk. Feel confident.
Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING
More informationHow To Protect A Smart Grid From Cyber Security Threats
Smart Grid Cyber Security System Reliability, Defense-in-Depth, Business Continuity, Change Management, Secure Telecommunications, Endpoint Protection, Identity Management, and Security Event Management
More informationNorth American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)
Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a
More information2011 CSHP Catch the Wave CONFERENCE INFORMATION FOR OUR EXHIBIBITORS AND SPONSORS
CONFERENCE INFORMATION FOR OUR EXHIBIBITORS AND SPONSORS If you ve questions about registration and/or payment, please contact the CSHP office at 888/506-3784 or office@cshponline.org DATES and NEW LOCATION
More informationRE: Notice of Proposed Rulemaking, Request for Comments: Operation and Certification of Small Unmanned Aircraft Systems [Docket No.
April 24, 2015 Docket Management Facility (M-30) U. S. Department of Transportation West Building Ground Floor Room W12-140 1200 New Jersey Ave. Washington, DC 20590-0001 RE: Notice of Proposed Rulemaking,
More informationEducation & Training Plan. Texas A&M International University (TAMIU)
Office of Continuing Education 5201 University Boulevard Laredo, TX 78041 http://www.tamiu.edu/ce Contact: Jacqueline H. Arguidegui 956.326.3068 ce@tamiu.edu Education & Training Plan Texas A&M International
More informationRisk, Threat, and Vulnerability Assessment
Risk, Threat, and Vulnerability Assessment October 23 24, 2014 Earn up to 14 CPEs New Program EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N REDUCE RISK INCREASE RESILIENCE
More informationFebruary 18, 2014 Dear Florida Public Power Supporter,
February18,2014 DearFloridaPublicPowerSupporter, WewantyoutobeanimportantpartoftheFMEAFMPAAnnualConference,July1518, 2014,attheRitzCarltoninNaples.Thisisyouropportunitytoparticipateintheunique eventbyshowingyoursupportasacorporatesponsor.
More informationJuly 28, 2011 The Wynfrey Hotel Birmingham, Alabama
July 28, 2011 The Wynfrey Hotel Birmingham, Alabama Sponsored by: Alabama Nursing Home Association in cooperation with Alabama Nursing Home Association Long Term Care Professional Nurses Auxiliary Agenda:
More informationDESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
More informationSystem Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
More informationCyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
More informationBusiness Continuity/Disaster Recovery Planning Berkeley County Chamber of Commerce 7/20/12
Business Continuity/Disaster Recovery Planning Berkeley County Chamber of Commerce 7/20/12 Ben Fleming, Jr. Santee Cooper Manager, Transmission Operations Agenda Importance Purpose Basic Necessities Program
More informationChange and Configuration Management
Change and Configuration Management for CIP Compliance OCTOBER 21, 2009 Developed with: Presenters Bart Thielbar, CISA Senior Research hanalyst Sierra Energy Group, a Division of Energy Central CIP-003,
More informationImplementation Plan for Version 5 CIP Cyber Security Standards
Implementation Plan for Version 5 CIP Cyber Security Standards April 10September 11, 2012 Prerequisite Approvals All Version 5 CIP Cyber Security Standards and the proposed additions, modifications, and
More informationNERC-CIP S MOST WANTED
WHITE PAPER NERC-CIP S MOST WANTED The Top Three Most Violated NERC-CIP Standards What you need to know to stay off the list. www.alertenterprise.com NERC-CIP s Most Wanted AlertEnterprise, Inc. White
More informationCIP-003-5 Cyber Security Security Management Controls
A. Introduction 1. Title: Cyber Security Security Management Controls 2. Number: CIP-003-5 3. Purpose: To specify consistent and sustainable security management controls that establish responsibility and
More informationSCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
More informationCYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
More informationUNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION
UNIVERSAL DESIGN FOR LEARNING AND ONLINE EDUCATION As an institution trying to bring both its online course offerings and the support services to distance education students up to the next level, it was
More informationTop Ten Compliance Issues for Implementing the NERC CIP Reliability Standard
Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard The North American Electric Reliability Corporation 1 s (NERC) CIP Reliability Standard is the most comprehensive and pervasive
More informationLearn the essential components of designing effective online courses.
MAKING THE SHIFT FROM CLASSROOM TO ONLINE COURSE DESIGN Session 1: (Re)Mapping Course Design Wednesday, September 7, 2011 :: 1:00 2:45 p.m. EDT Session 2: Course Organization Monday, September 12, 2011
More informationCritical Asset Security Enhancementation - A Review
U.S. Department of Energy Office of Inspector General Office of Audit Services Audit Report Report on Critical Asset Vulnerability and Risk Assessments at the Power Marketing Administrations--Followup
More informationJUNE 8-10, 2015 Nashville Airport Marriott
18 th In association with the International Workers Compensation Foundation, a non-profit corporation dedicated to workers compensation research and education. ANNUAL TENNESSEE WORKERS COMPENSATION EDUCATIONAL
More informationPCI DSS Overview and Solutions. Anwar McEntee Anwar_McEntee@rapid7.com
PCI DSS Overview and Solutions Anwar McEntee Anwar_McEntee@rapid7.com Agenda Threat environment and risk PCI DSS overview Who we are Solutions and where we can help Market presence High Profile Hacks in
More informationCIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on
More informationUtility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
More informationBest Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
More information