SGIG Cyber Security Program Review Process
|
|
|
- Neal Foster
- 10 years ago
- Views:
Transcription
1 SGIG Cyber Security Program Review Process A. DAVID MCKINNON, PH.D. Cyber Security Group, National Security Directorate TCIPG Industry Workshop 2014 November 14, 2014 PNNL-SA
2 SGIG Cyber Security Program Overview Smart Grid Investment Grant (SGIG) was funded by the 2009 ARRA 99 Grants awarded $3.4B of federal funding, matched by $4.4B of private sector funding Cyber security was built in FOA required that each proposal address cyber security Each awardee had to submit a cyber security plan (CSP) for review and approval DOE established a cybersecurity subject matter expert (CS-SME) team Team consisted of leading cyber security experts from PNNL, ANL, CMU SEI, and private industry CS-SME team members joined the DOE technical project officer (TPO) on their annual site visits CS-SME team conducted several outreach activities November 14,
3 Cyber Security Requirements (DE-FOA ) Submitted Project Plans are also required to include a section on the technical approach to cyber security. The technical approach to cyber security should include: A summary of the cyber security risks and how they will be mitigated at each stage of the lifecycle (focusing on vulnerabilities and impact). A summary of the cyber security criteria utilized for vendor and device selection. A summary of the relevant cyber security standards and/or best practices that will be followed. A summary of how the project will support emerging smart grid cyber security standards. DOE intends to work with those selected for award but may not make an award to an otherwise meritorious application if that applicant cannot provide reasonable assurance that their cyber security will provide protection against broad based systemic failures in the electric grid in the event of a cyber security breach. November 14,
4 Online information resource for SGIG & SGDP cyber security Overview of baseline cyber security principles Guidance on cyber security plan development and execution References to cyber security standards and regulations Prescriptive templates for cyber security plans were not provided 4
5 99 Cyber Security Plans Cyber security one size does *NOT* fit all Grant awards varied from $1M to $200M Technologies varied Electric transmission systems Electric distribution systems Advanced metering infrastructure (AMI) Customer systems Cross-cutting deployments Awardees used their own internal processes and templates DOE technical project officers (TPO) forwarded each project s cyber security plans to the CS-SME team Each plan was independently reviewed by two CS-SMEs Initial reviews were conducted by all team members Secondary reviews were performed by a QC subteam member November 14,
6 Cyber Security Plan Reviews Strong cyber security plans included: Cyber security risks and how they will be mitigated at each stage of the lifecycle (focusing on vulnerabilities and impact) Cyber security criteria utilized for vendor and device selection Relevant cyber security standards and/or best practices to be followed Plans for supporting emerging smart grid cyber security standards Cyber security plans also had to address the adequacy of their technical approach for addressing interoperability and cyber security Ensuring confidentiality, integrity, availability Secure logging, monitoring, alarming, and notification Demonstrable evidence of the effectiveness of cyber security controls Inadequate cyber security plans were revised and resubmitted CS-SME team frequently held project-specific teleconference calls Interactive discussion quickly resolved issues Many awardees did not have prior experience writing cyber security plans November 14,
7 244 Site Visits SGIG project reviews included cyber security CS-SMEs traveled with the DOE review team Cyber security was a formal topic on the agenda Site visits were conducted : on-site visits 2013: on-site, virtual, or off-line visits at the discretion of the DOE TPOs Guidance was provided to each site prior to the annual site visits Focus on demonstrable evidence Were project-specific risks being identified and addressed? Were implemented cyber security controls adequate? No prescribed format for how evidence was to be provided Site assessment visit report 13 requirements derived from FOA were assessed Scale: meets,, & does not meet FOA requirements November 14,
8 Cyber Security Impact Cyber security was a FOA requirement Senior-level management approved cyber security plans Cyber security was a funded requirement Each project was able to focus on their specific risks Awardees and the CS-SMEs built close working relationships Smart grid cyber security information exchanges Chicago (August 2011) & Washington, D.C. (December 2012) Utilities met & exchanged cyber security best practices Many anecdotal stories of utilities implementing new and/or improved cyber security practices Enhanced staffing, training, policies, tools, etc. November 14,
9 Cyber Security Impact, continued CS-SME team assessment CP Normalized Score (%) Based upon a weighted scoring of each site assessment report 13 questions, Green/ /Red Projects were grouped by category Cities/Public Utility Districts (CP) Rural Electric Cooperatives (RE/COOP) Transmission/Generation (T&G) Compared 2012 and 2013 results CP had the largest score improvement RE/COOP Norm. Score (%) RE/COOP had the 2 nd best improvement T&G improved the least Caveat: T&G projects had the best overall scores T&G Normalized Score (%) November 14,
10 SGIG Cyber Security Conclusions FOA requirement for cyber security was a key enabler Utilities were able to build-in in cyber security DOE facilitated across-the-board cyber security improvements Project staff, DOE TPOs, and the CS-SME team built strong and trusted working relationships Cyber security plans focused and enhanced cyber security efforts Each project focused on their specific risks Cyber security plans are living documents Approval by senior-level management provided accountability November 14,
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
Smart Grid Cybersecurity Lessons Learned
Smart Grid Cybersecurity Lessons Learned Hank Kenchington Deputy Assistant Secretary From More than 11 Million Smart Meters Deployed Office of Electricity Delivery and Energy Reliability Grid Modernization:
Cybersecurity & Public Utility Commissions
Cybersecurity & Public Utility Commissions November 12, 2014 TCIPG Ann McCabe, Commissioner Illinois Commerce Commission NARUC (National Association of Regulatory Utility Commissioners) Cybersecurity Primer
National Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair [email protected] 1 The National Institute of Standards
Cybersecurity: Lessons Learned from DOE Projects
1 Cybersecurity: Lessons Learned from DOE Projects Mark Morgan: PNNL Ginger Armstrong: CMEEC Sue Blanchette: Groton Utilities Scott Franklin: Exelon Paul Hartung: NOVEC 2 Program Outline Background: SGIG
Office of Electricity Delivery & Energy Reliability ANALYSIS AND REPORTING OF METRICS AND BENEFITS FOR ARRA SMART GRID PROJECTS
November 7, 2011 Office of Electricity Delivery & Energy Reliability ANALYSIS AND REPORTING OF METRICS AND BENEFITS FOR ARRA SMART GRID PROJECTS Joe Paladino EU/US Meeting Objectives Elements What we are
Securing the Grid. Marianne Swanson, NIST Also Moderator Akhlesh Kaushiva (AK), DOE Lisa Kaiser, DHS Leonard Chamberlin, FERC Brian Harrell, NERC
1 Securing the Grid Marianne Swanson, NIST Also Moderator Akhlesh Kaushiva (AK), DOE Lisa Kaiser, DHS Leonard Chamberlin, FERC Brian Harrell, NERC February 27, 2012 NIST and the SGIP 2.0 Cybersecurity
ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D
ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D Eric Lightner Director Federal Smart Grid Task Force July 2015 2 OE Mission The Office of Electricity
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
Cyber Security in Europe
Cyber Security in Europe Steve Purser Head of Core Operations Dept. - ENISA www.enisa.europa.eu Agenda About ENISA The ENISA Threat Landscape National Cyber Security Strategies Supporting the CERT Community
OEB Smart Grid Advisory Committee
Meeting Summary OEB Smart Grid Advisory Committee Meeting Date: October 1, 2013 Time: 9:30 am 4:00 pm Location: OEB Offices, 2300 Yonge Street The Meeting Summary provides a high level review of the presentations
How Much Cyber Security is Enough?
How Much Cyber Security is Enough? Business Drivers of Cyber Security Common Challenges and Vulnerabilities Cyber Security Maturity Model Cyber Security Assessments September 30, 2010 Business in the Right
Client Update SEC Releases Updated Cybersecurity Examination Guidelines
Client Update September 18, 2015 1 Client Update SEC Releases Updated Cybersecurity Examination Guidelines NEW YORK Jeremy Feigelson [email protected] Jim Pastore [email protected] David Sarratt
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
DOE Smart Grid Investment Grant Program: Dynamic Pricing & Consumer Behavior Studies
DOE Smart Grid Investment Grant Program: Dynamic Pricing & Consumer Behavior Studies Lisa Schwartz, Regulatory Assistance Project Consultant to Lawrence Berkeley National Laboratory Pacific Northwest Demand
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
National Cybersecurity Assessment and Technical Services
National Cybersecurity Assessment and Technical Services Updated: September 9, 2015 NCATS Program Overview Offer Full-Scope Red Team/Penetration Testing Capabilities through two primary programs: Risk
ARRA Grant Case Studies SMUD s Smart Grid Program
. ARRA Grant Case Studies SMUD s Smart Grid Program Jim Parks December 2012 Powering forward. Together. About SMUD 600,000 customers 1.4 million population $1.4 billion in revenues 900 mi 2, 2331 km 2
SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios
SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios Lucie Langer and Paul Smith [email protected] AIT Austrian Institute of Technology ComForEn Workshop Monday 29 th September,
Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit
Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation
Cyber Security Working Group
Cyber Security Working Group Guidelines for Smart Grid Cyber Security (NISTIR 7628) National Institute of Standards and Technology U.S. Department of Commerce 1 Today s Electric Grid Markets and Operations
What Risk Managers need to know about ICS Cyber Security
What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] ICSs What are they
Cybersecurity Risk Assessment in Smart Grids
Cybersecurity Risk Assessment in Smart Grids Lucie Langer, Paul Smith, Thomas Hecht [email protected] AIT Austrian Institute of Technology ComForEn Symposium 2014 Sept 30, 2014 1 Risk Assessment:
AUDITING A BCP PLAN. Thomas Bronack Auditing a BCP Plan presentation Page: 1
AUDITING A BCP PLAN Thomas Bronack Auditing a BCP Plan presentation Page: 1 What are the Objectives of a Good BCP Plan Protect employees Restore critical business processes or functions to minimize the
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
STREAM Cyber Security
STREAM Cyber Security Management Software Governance, Risk Management & Compliance (GRC) Security Operations, Analytics & Reporting (SOAR) Fast, flexible, scalable, easy to use and affordable software
Cyber Security Working Group
Cyber Security Working Group National Institute of Standards and Technology U.S. Department of Commerce 1 Energy Independence and Security Act In the Energy Independence and Security Act (EISA) of 2007,
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives
NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives Center of excellence for secure integration, deployment and sustainment of Industrial Control Systems and Operational Technology
SmartSacramento. Green Summit 2011. Jim Parks Program Manager SmartSacramento Team. April 19, 2011
SmartSacramento Green Summit 2011 April 19, 2011 Jim Parks Program Manager SmartSacramento Team The Current State of the Grid Current grid tends toward dumb We typically learn about outages via phone Many
Risk-Based IT Change Management
PNNL-SA-54320 Application for The Northwest Academic Computing Consortium Joanne R. Hugi Excellence Award Risk-Based IT Change Management Pacific Northwest National Laboratory IT Services Division Abstract:
Cyber attack on Twitter, 250,000 accounts hacked
HEADLINES Impact and Cost At least 19 states have introduced or are considering security breach legislation in 2014. Most of the bills would amend existing security breach laws. According to the Ponemon
RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02
RESEARCH CALL TO DOE/FEDERAL LABORATORIES Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2012-02 CONTACT: Diane Hooie, Project Manager TELEPHONE NUMBER: (304) 285-4524 FAX NUMBER: (304)
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding
Securing the Electric Grid with Common Cyber Security Services Jeff Gooding TCIPG Seminar April 4, 2014 Southern California Edison (SCE) is committed to safely providing reliable and affordable electricity
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 1 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V2 Company Name: The Boeing Company December 10, 2012 1 Interim Techlogy Performance Report 1
SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS
1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
Facilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
Working to Achieve Cybersecurity in the Energy Sector
Working to Achieve Cybersecurity in the Energy Sector Cybersecurity for Energy Delivery Systems (CEDS) Rita Wells Idaho National Laboratory Roadmap Framework for Public-Private Collaboration Published
Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation
Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation Agenda Problem Description Issues for Consideration Mitigation of the Issues Options
Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division
Cyber Security focus in ABB: a Key issue 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security in ABB Agenda ABB introduction ABB Cyber
CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency
CERT Collaboration with ISP to Enhance Cybersecurity Jinhyun CHO, KrCERT/CC Korea Internet & Security Agency I. Alarming call for cooperation with ISPs Slammer Worm Spread most of vulnerable SQL servers
Smart Meters Programme Schedule 8.6. (Business Continuity and Disaster Recovery Plan) (CSP North version)
Smart Meters Programme Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Amendment History
Why we Need Standards for Breaking the Smart Grid
Why we Need Standards for Breaking the Smart Grid Stephen McLaughlin 2012 Western Energy Policy Research Conference 1 NISTIR 7628 The organization assesses the security requirements in the Smart Grid information
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
1. Summary. electric grid, strengthen saving programs sponsored by utilities. The project
1. 1. Summary Honeywell s Smart Grid Investment Grant (SGIG) project demonstrates utility-scale performance of a Under the American Recovery and hardware/software platform for automated demand Reinvestment
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
Tehachapi Wind Energy Storage Project (TSP)
Tehachapi Wind Energy Storage Project (TSP) Peer Review Presented by Mr. Loïc Gaillac October 20, 2011 San Diego, CA 1 Outline Policy Challenges SCE s Position SCE Smart Grid Vision Project Description
INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT
Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Strengthening Cybersecurity Defenders #ISC2Congress Healthcare and Security "Information Security is simply a personal
Smart Meters Programme Schedule 2.5. (Security Management Plan) (CSP South version)
Smart Meters Programme Schedule 2.5 (Security Management Plan) (CSP South version) Schedule 2.5 (Security Management Plan) (CSP South version) Amendment History Version Date Author Status v.1 Signature
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Effective Use of Assessments for Cyber Security Risk Mitigation
White Paper Effective Use of Assessments for Cyber Security Risk Mitigation Executive Summary Managing risk related to cyber security vulnerabilities is a requirement for today s modern systems that use
Business Continuity for Cyber Threat
Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
Automation Suite for NIST Cyber Security Framework
WHITEPAPER NIST Cyber Security Framework Automation Suite for NIST Cyber Security Framework NOVEMBER 2014 Automation Suite for NIST Cyber Security Framework The National Institute of Standards and Technology
Vendor Management for Critical Access Hospitals
Vendor Management for Critical Access Hospitals Provided By: The National Learning Consortium (NLC) Developed By: Health Information Technology Research Center (HITRC) Carolyn P. Hartley, MLA, CHP National
Smart Grid and Privacy An International View
Smart Grid and Privacy An International View 27 November 2013 By: Nader Farah President ESTA International One US Consumer s Reaction in Texas! 2 Source: SmartGridNews.com July 20, 2012 ESTA International
Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name
Network Assessment Prepared For: Prospect Or Customer Prepared By: Your Company Name Environment Risk and Issue Score Issue Review Next Steps Agenda Environment - Overview Domain Domain Controllers 4 Number
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology [email protected] 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology [email protected] 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE
TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar
2012 CIP Spring Compliance Workshop May 7-11. Testing, Ports & Services and Patch Management
2012 CIP Spring Compliance Workshop May 7-11 Testing, Ports & Services and Patch Management Purpose This presentation provides an overview of the CIP-007-3 R1 Test Procedures which includes a discussion
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Privacy Risk Assessments
Privacy Risk Assessments Michael Hulet Principal November 8, 2012 Agenda Privacy Review Definition Trends Privacy Program Considerations Privacy Risk Assessment Risk Assessment Tools Generally Accepted
