Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective

Size: px
Start display at page:

Download "Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective"

Transcription

1 Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective Terry Jamieson Vice-President Technical Support Branch Canadian Nuclear Safety Commission August 11,

2 Outline CNSC mission and mandate Modern cyber security threat Cyber security and modern industrial control system Regulatory approach to cyber security International perspectives Current and future challenges Closing remarks 2

3 Canadian Nuclear Safety Commission Regulates the use of nuclear energy and materials to protect health, safety, security and the environment, and to implement Canada s international commitments on the peaceful use of nuclear energy; and to disseminate objective scientific, technical and regulatory information to the public 3

4 CNSC presence Headquarters in Ottawa Five offices at nuclear power plants One site office at Chalk River Labs Four regional offices Staff: ~800 Resources: $140M (75% of costs recovered) Number of licensees: 2,500 Total number of licences: 3,300 Calgary Western Regional Office Saskatoon Uranium Mills and Mines Division Regional Office Gentilly-2 Point Lepreau Chalk River HQ Bruce Laval Eastern Regional Office Darlington Mississauga Southern Regional Office Pickering A and B 4

5 CNSC regulates all nuclear-related facilities and activities Imports and exports Controlled information Medical diagnostics Therapeutic Controlled material Refining Teletherapy Nuclear medicine and radiation therapy Controlled equipment Fuel fabrication Milling Brachytherapy Irradiators Mining Power reactor High power accelerators From cradle to grave Accelerators Waste Research reactors Radioisotope reactors Industrial applications Nuclear gauges Nuclear R&D test facilities Research and radioisotope production facilities 5

6 Nuclear power plants in Canada Darlington (4 unit station) Refurbishment of current 4-unit station scheduled to begin in 2016 Point Lepreau (single unit station) Refurbishment project completed and unit returned to service (late 2012) Gentilly-2 (single unit station) HQ permanently shut down facility in December 2012 Bruce (8 unit station) Refurbishments ongoing (2 of 8 units completed as of 2015) Pickering (6 of 8 units operating) Shutdown expected in

7 In the old days Operators of process control systems (PCS) believed they were invulnerable to cyber attack for two main reasons: 1. PCS are isolated from the Internet. 2. PCS generally use proprietary protocols and specialized hardware, which are not compatible with common network protocols and the Internet. Source: The Vulnerability of Nuclear Facilities to Cyber Attack, B. Kesler,

8 Cyber security and modern digital systems: the reality 2003: Slammer worm at Davis Besse Nuclear Power Plants (2003) in the US Siemens Programmable Logic Controller 2010: Stuxnet malware infiltrated Natanz (Iran) nuclear facility disabling over 1000 centrifuges 2014: Monju fast reactor (Japan) infected by malware (data integrity and compromise) Various theories as to its introduction Monju Sodium Fast Reactor Natanz Enrichment Facility, Iran And many more cyber incidents 8

9 And more recent incidents South Korean nuclear operator hacked amid cyber attack fears Operator begins two-day exercise after suspected hacker tweets information on Korea Hydro & Nuclear Power (KHNP) plants and staff The latest attack resulted in the leak of personal details of 10,000 KHNP workers, designs and manuals for at least two reactors, electricity flow charts and estimates of radiation exposure among local residents. There was no evidence, however, that the nuclear control systems had been hacked. 9

10 What do we mean by cyber security and the nuclear industry? Protect digital assets that perform the functions of systems important to nuclear safety, security, emergency preparedness and international safeguards from cyber attack Digital asset: A subcomponent of a system that consists of or contains a digital device, computer or communication system or network, and information stored in the subcomponent. 10

11 Scope of cyber security program nuclear facilities Industrial Control System for nuclear safety Physical protection systems Annunciation, communication systems for emergency preparedness / response and international safeguards systems 11

12 Cyber threats What are the CNSC and nuclear industry doing? Since 2008, the CNSC has engaged major nuclear facilities in Canada in defining requirements of and implementing programs for cyber security Regulations updated, licence conditions added, modern standards developed CSA N290.7 Cyber Security for Nuclear Power Plants and Small Reactor Facilities (published December 2014) Site cyber security inspections by CNSC staff began in January 2015 for Canadian Nuclear Power Plants 12

13 CSA N290.7 security controls cyber security for nuclear facilities CSA N290.7 will form the cornerstone of CNSC s regulatory framework requirements N290.7 comprises technical, operational and management control requirements: Technical - executed through non-human mechanisms Operational - executed through human mechanisms Management - risk management and general policies including procurement strategies 13

14 Cyber defensive architecture at NPPs Cyber security focuses on defence in depth (similar to traditional principles of safety) Data flow restricted as per diagram (i.e., typically from higher to lower security levels) Defensive architecture is implemented by establishing the logical and physical boundaries 14

15 State of cyber defensive architecture in Canadian NPPs Networks responsible for safety systems, process control systems, physical security systems and business systems are segregated Safety system network connected to process system network via one-way communication device (no possibility of bidirectional information flow) Administrative and mechanical controls prevent unauthorized access (portable mobile devices, etc.) to safety, process control and physical security computers Licensees have robust cyber security measures in place that have been verified by staff 15

16 Cyber security the importance of national/international collaboration Domestically, CNSC works with Public Safety Canada / Canadian Cyber Incident Response Centre, Natural Resources Canada, Communication Security Establishment Canada and others Internationally, bilateral work with the US Nuclear Regulatory Commission has greatly advanced knowledge CNSC contributes significantly to the work at International Atomic Energy Agency (IAEA) in developing security series documents Nuclear Security Series (NSS) 17 Computer Security at Nuclear Facilities, Conducting Cyber Security Assessments for Nuclear Facilities and many more 16

17 IAEA and cyber security (cont.) International Physical Protection Advisory Service (IPPAS) missions Module on computer (cyber) security Canada will host an IPPAS mission in 2015! Training Offered by international cyber experts from nuclear industry to host countries (operators, regulators, others) Production of Nuclear Security Series publications to assist IAEA member states with program implementation and improvements 17

18 Challenges to managing and regulating cyber security in the nuclear industry Rapid evolution of cyber threat vectors and instruments nuclear plants seen as a target of interest Challenges of regulating across global supply chain counterfeit, fraudulent, suspect items cases well publicized Increased sophistication of cyber attacks makes detection and prevention increasingly difficult Knowledge and resource limitations (cyber expertise): industry and regulator State of board/senior executive oversight on cyber security matters is still evolving 18

19 Conclusions Canadian nuclear power plants have robust comprehensive cyber security programs in place CNSC is evolving its regulatory approaches to meet the needs of the proponents now and in the future while ensuring high levels of safety are assured Cyber security requirements need to be embedded into every phase of the regulatory review process for I&C systems Cyber security (like physical security) is only as strong as the weakest link 19

20 Thank You Any Questions? nuclearsafety.gc.ca facebook.com/canadiannuclearsafetycommission twitter.com/cnsc_ccsn youtube.com/cnscccsn 20

Operating Performance: Accident Management: Severe Accident Management Programs for Nuclear Reactors REGDOC-2.3.2

Operating Performance: Accident Management: Severe Accident Management Programs for Nuclear Reactors REGDOC-2.3.2 Operating Performance: Accident Management: Severe Accident Management Programs for Nuclear Reactors REGDOC-2.3.2 September 2013 Accident Management: Severe Accident Regulatory Document REGDOC-2.3.2 Canadian

More information

Seoul Communiqué 2012 Seoul Nuclear Security Summit

Seoul Communiqué 2012 Seoul Nuclear Security Summit Seoul Communiqué 2012 Seoul Nuclear Security Summit We, the leaders, gathered in Seoul on March 26-27, 2012, renew the political commitments generated from the 2010 Washington Nuclear Security Summit to

More information

ROK s Assistance Programs for New comers

ROK s Assistance Programs for New comers ROK s Assistance Programs for New comers TM on Topical Issues in the Development of Nuclear Power Infrastructure, 3-6 February 2015 Kyo Hwang Technology Policy & Strategy Department Korea Hydro & Nuclear

More information

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) Cyber Security Design Methodology for Nuclear Power Control & Protection Systems By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) 1. INTRODUCTION In today s world, cyber security is one

More information

Nuclear Security Requires Cyber Security

Nuclear Security Requires Cyber Security Nuclear Security Requires Cyber Security A. DAVID MCKINNON, PH.D., MARY SUE HOXIE Cyber Physical Security Team, National Security Directorate Project on Nuclear Issues (PONI) Fall 2015 Conference PNNL-SA-113027

More information

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012 Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012 ATC Nuclear ATC-N serves the commercial nuclear utilities in the US and many foreign

More information

Security and Safeguards Considerations in Radioactive Waste Management. Canadian Nuclear Safety Commission

Security and Safeguards Considerations in Radioactive Waste Management. Canadian Nuclear Safety Commission Security and Safeguards Considerations in Radioactive Waste Management Raoul Awad Director General, Directorate of Security and Safeguards Canadian Nuclear Safety Commission Radioactive Waste Management

More information

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer

More information

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS http://dx.doi.org/10.5516/net.04.2012.091 AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG *, JUNG-WOON LEE, GEE-YONG PARK, KEE-CHOON KWON,

More information

IAEA Safety Standards for Regulatory Activities

IAEA Safety Standards for Regulatory Activities Safety Standards for Regulatory Activities April 2010 Gustavo Caruso Regulatory Activities Section Division of Nuclear Installation Safety International Atomic Energy Agency Content Safety Standards and

More information

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

Announcement of a new IAEA Co-ordinated Research Programme (CRP) Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)

More information

Licensing Process for New Nuclear Power Plants in Canada. INFO-0756 (Revision 1)

Licensing Process for New Nuclear Power Plants in Canada. INFO-0756 (Revision 1) Licensing Process for New Nuclear Power Plants in Canada INFO-0756 (Revision 1) May 2008 Licensing Process for New Nuclear Power Plants in Canada Minister of Public Works and Government Services Canada

More information

Energy Cybersecurity Regulatory Brief

Energy Cybersecurity Regulatory Brief Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider

More information

abstract NRC Headquarters United States Nuclear Regulatory Commission

abstract NRC Headquarters United States Nuclear Regulatory Commission abstract The Strategic Plan Fiscal Years 2008-2013 describes the U.S. Nuclear Regulatory Commission s mission and defines the strategic goals and outcomes the agency intends to pursue. NRC Headquarters

More information

Radiation and Environmental Protection at the CNSC

Radiation and Environmental Protection at the CNSC Radiation and Environmental Protection at the CNSC Patsy Thompson, Director General Rachel Lane, Radiation and Health Sciences Specialist Directorate of Environmental and Radiation Protection and Assessment,

More information

Safety Analysis Probabilistic Safety Assessment (PSA) for Nuclear Power Plants REGDOC-2.4.2

Safety Analysis Probabilistic Safety Assessment (PSA) for Nuclear Power Plants REGDOC-2.4.2 Safety Analysis Probabilistic Safety Assessment (PSA) for Nuclear Power Plants REGDOC-2.4.2 May 2014 Probabilistic Safety Assessment (PSA) for Nuclear Power Plants Regulatory Document REGDOC-2.4.2 Canadian

More information

UAE Nuclear Power Programme : Status and Update

UAE Nuclear Power Programme : Status and Update UAE Nuclear Power Programme : Status and Update Technical Meeting on Topical Issues in the Development of Nuclear Power Infrastructure Vienna, 3 rd Feb 2015 Hamad Alkaabi Permanent Representative of the

More information

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES JAEKWAN PARK * and YONGSUK SUH Korea Atomic Energy Research Institute

More information

Human Resource Management in Nuclear Safety

Human Resource Management in Nuclear Safety Human Resource Management in Nuclear Safety Christer Viktorsson Nuclear Installations Safety Role of the (IAEA) Established in 1957 143 Member States 2,200 staff Three Pillars: Safeguards Nuclear Technology

More information

Cyber Security R&D (NE-1) and (NEET-4)

Cyber Security R&D (NE-1) and (NEET-4) Cyber Security R&D (NE-1) and (NEET-4) Trevor Cook Office of Science and Technology Innovation Office of Nuclear Energy U.S. Department of Energy Cyber Security for Nuclear Systems (the threat is real)

More information

How To Strengthen Nuclear Security

How To Strengthen Nuclear Security COUCIL OF TH UROPA UIO N The Hague, 25 March 2014 8193/14 (OR. en) PRSS 187 The Hague uclear Security Summit Communiqué We, the leaders, met in The Hague on 24 and 25 March 2014 to strengthen nuclear security,

More information

OPC & Security Agenda

OPC & Security Agenda OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information

More information

Options for Cyber Security. Reactors. April 9, 2015

Options for Cyber Security. Reactors. April 9, 2015 Options for Cyber Security Design Requirements for Power Reactors April 9, 2015 Scope Discuss options for including cyber security design requirements for power reactors into NRC regulations Scope does

More information

Environmental Protection: Environmental Protection Policies, Programs and Procedures REGDOC-2.9.1

Environmental Protection: Environmental Protection Policies, Programs and Procedures REGDOC-2.9.1 Environmental Protection: Environmental Protection Policies, Programs and Procedures REGDOC-2.9.1 September 2013 Environmental Protection: Policies, Programs and Procedures Regulatory Document REGDOC-2.9.1

More information

Technical Meeting on the Implications of the Fukushima Daiichi Accident on the Safety of Fuel Cycle Facilities. IAEA Headquarters Vienna, Austria

Technical Meeting on the Implications of the Fukushima Daiichi Accident on the Safety of Fuel Cycle Facilities. IAEA Headquarters Vienna, Austria 1 J7-TM-44883 Technical Meeting on the Implications of the Fukushima Daiichi Accident on the Safety of Fuel Cycle Facilities IAEA Headquarters Vienna, Austria 1 5 July 2013 INFORMATION SHEET 1. Background

More information

OPG READY TO DELIVER REFURBISHMENT OF DARLINGTON NUCLEAR STATION OPG also planning continued operation of Pickering Station

OPG READY TO DELIVER REFURBISHMENT OF DARLINGTON NUCLEAR STATION OPG also planning continued operation of Pickering Station OPG READY TO DELIVER REFURBISHMENT OF DARLINGTON NUCLEAR STATION OPG also planning continued operation of Pickering Station Toronto - Ontario Power Generation (OPG) is ready to deliver on the Government

More information

HEALTH CARE AND CYBER SECURITY:

HEALTH CARE AND CYBER SECURITY: HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers

More information

Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants

Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants Sooill Lee a*, Yong Sik Kim a, Song Hae Ye a a Central Research Institute, Korea Hydro and

More information

Are you prepared to be next? Invensys Cyber Security

Are you prepared to be next? Invensys Cyber Security Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber

More information

Ensuring Quality Going Down the Supply Chain

Ensuring Quality Going Down the Supply Chain Ensuring Quality Going Down the Supply Chain (Including Vendor Qualification) What is the Role of Operators, Vendors and Regulators? April 21, 2015 DAE-HEE LEE Contents Nuclear Quality Issues The Role

More information

NSS 2014 UK NATIONAL PROGRESS REPORT. March 2014

NSS 2014 UK NATIONAL PROGRESS REPORT. March 2014 NSS 2014 UK NATIONAL PROGRESS REPORT March 2014 1. Support for the Convention on the Physical Protection of Nuclear Material and the International Convention for the Suppression of Acts of Nuclear Terrorism

More information

Nuclear A Canadian Strategy for Energy, Jobs and Innovation

Nuclear A Canadian Strategy for Energy, Jobs and Innovation Nuclear A Canadian Strategy for Energy, Jobs and Innovation November 2012 CME Studies Economic Benefits of Nuclear in Canada The Canadian Nuclear Association engaged Canadian Manufacturers and Exporters

More information

Cyber Security in a Nuclear Context

Cyber Security in a Nuclear Context Cyber Security in a Nuclear Context Mitchell Hewes & Nick Howarth UNCLASSIFIED Who are we? Our Facilities Synchrotron Accelerators Cyclotron OPAL Lucas Heights Campus Some Considerations We have an interesting

More information

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

The State of Industrial Control Systems Security and National Critical Infrastructure Protection The State of Industrial Control Systems Security and National Critical Infrastructure Protection Emerging Threats Tinuade Adesina, Lulea University of Technology Sweden IT Security for the Next Generation

More information

Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected]

Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: opa@nrc.gov Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected] Nuclear Security Background While security of the nuclear facilities and materials the NRC regulates has always been a

More information

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design Integrating Cyber Security into Nuclear Power Plant Safety Systems Design Deanna Zhang U.S. Nuclear Regulatory Commission Document Date: 05/21/2010 Objectives To provide methods for utilizing safety features,

More information

Canadian Nuclear Safety Commission Nuclear Emergency Response Plan - Master Plan. May 2013 E-DOCS # 3845178 v25

Canadian Nuclear Safety Commission Nuclear Emergency Response Plan - Master Plan. May 2013 E-DOCS # 3845178 v25 Canadian Nuclear Safety Commission Nuclear Emergency Response Plan - Master Plan May 2013 E-DOCS # 3845178 v25 ii Authority In accordance with the Strategic Emergency Management Plan (SEMP), this document

More information

How To Write A Cyber Security Risk Analysis Model For Research Reactor

How To Write A Cyber Security Risk Analysis Model For Research Reactor MODEL BASED CYBER SECURITY ANALYSIS FOR RESEARCH REACTOR PROTECTION SYSTEM JINSOO SHIN, RAHMAN KHALIL UR, GYUNYOUNG HEO Kyung Hee University, Seogyeong-daero, Giheung-gu, Gyeonggi-do, 446-701, Republic

More information

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS http://dx.doi.org/10.5516/net.04.2011.065 A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG, JUNG-WOON LEE *, CHEOL-KWON LEE, KEE-CHOON KWON, and DONG-YOUNG

More information

A Regulatory Approach to Cyber Security

A Regulatory Approach to Cyber Security A Regulatory Approach to Cyber Security Perry Pederson Security Specialist (Cyber) Office of Nuclear Security and Incident Response U.S. Nuclear Regulatory Commission 1 Agenda Overview Regulatory Framework

More information

Regulatory Requirements and Licensing of OPG s DGR Project

Regulatory Requirements and Licensing of OPG s DGR Project Regulatory Requirements and Licensing of OPG s DGR Project OPG s Deep Geologic Repository Project for Low and Intermediate Level Radioactive Waste Presentation to Joint Review Panel July 18, 2012 nuclearsafety.gc.ca

More information

CYBERSPACE SECURITY CONTINUUM

CYBERSPACE SECURITY CONTINUUM CYBERSPACE SECURITY CONTINUUM A People, Processes, and Technology Approach to Meeting Cyber Security Challenges in the 21 st Century 1 InterAgency Board 1550 Crystal Drive Suite 601, Arlington VA 22202

More information

International Symposium on Nuclear Security

International Symposium on Nuclear Security International Symposium on Nuclear Security The Nuclear Security actions taken in Mexico to get an effective protection system of nuclear and radioactive facilities RUBÉN RAMÍREZ GUERRERO [email protected]

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12 Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,

More information

Executive Director for Operations AUDIT OF NRC S CYBER SECURITY INSPECTION PROGRAM FOR NUCLEAR POWER PLANTS (OIG-14-A-15)

Executive Director for Operations AUDIT OF NRC S CYBER SECURITY INSPECTION PROGRAM FOR NUCLEAR POWER PLANTS (OIG-14-A-15) UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 OFFICE OF THE INSPECTOR GENERAL May 7, 2014 MEMORANDUM TO: Mark A. Satorius Executive Director for Operations FROM: Stephen D. Dingbaum

More information

Safety Analysis for Nuclear Power Plants

Safety Analysis for Nuclear Power Plants Regulatory Document Safety Analysis for Nuclear Power Plants February 2008 CNSC REGULATORY DOCUMENTS The Canadian Nuclear Safety Commission (CNSC) develops regulatory documents under the authority of paragraphs

More information

Cyber Security. Protecting the UK water industry

Cyber Security. Protecting the UK water industry Cyber Security Protecting the UK water industry In today s connected world, cyber attacks are a daily occurrence. These attacks can have potentially disastrous consequences for water companies and the

More information

The Role of Nuclear Knowledge Management

The Role of Nuclear Knowledge Management The Role of Nuclear Knowledge Management A. Introduction The Agency has been a focal point for nuclear knowledge and information since its establishment in 1957. Nuclear knowledge management (NKM) came

More information

RENCEE SAFETY MARIES

RENCEE SAFETY MARIES IAEA MINISTE ERIAL CONFE RENCEE ON NUCLEAR SAFETY Vienna,, 20 24 June 2011 CHAIRPERSONS SUMM MARIES 1 The attached texts are the Chairpersons summaries of the main proposals that emerged from the Working

More information

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced

More information

N-Dimension Solutions Cyber Security for Utilities

N-Dimension Solutions Cyber Security for Utilities AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential

More information

DeltaV System Cyber-Security

DeltaV System Cyber-Security January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...

More information

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote

More information

3 rd Review Meeting Convention on Nuclear Safety First Anniversary Report Status of Actions on Canada April 2006

3 rd Review Meeting Convention on Nuclear Safety First Anniversary Report Status of Actions on Canada April 2006 3 rd Review Meeting Convention on Nuclear Safety First Anniversary Report Status of Actions on Canada April 2006 1. Introduction At the 3 rd review meeting of the Convention on Nuclear Safety, held in

More information

Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants

Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants Jung-Woon Lee, Cheol-Kwon Lee, Jae-Gu Song, and Dong-Young Lee I&C and HF Research Division, Korea Atomic Energy

More information

Protecting Organizations from Cyber Attack

Protecting Organizations from Cyber Attack Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics

More information

International Safeguards Infrastructure Development

International Safeguards Infrastructure Development PNNL-SA-74182 International Safeguards Infrastructure Development NGSI Lecture Series, 2011 Sarah Frazar 1 Structure! Overview of the Milestones Process and its three phases! National Development of a

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

IBC 2100. Nuclear Energy Liability Exclusion. Explained

IBC 2100. Nuclear Energy Liability Exclusion. Explained IBC 2100 Nuclear Energy Liability Exclusion Explained By Colleen DeMerchant Assistant Manager Nuclear Insurance Association of Canada June 22, 2005 Nuclear Energy Liability Exclusion (IBC 2100 CGL form)

More information

CYBERSECURITY EXAMINATION SWEEP SUMMARY

CYBERSECURITY EXAMINATION SWEEP SUMMARY This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,

More information

Spreading the Word on Nuclear Cyber Security

Spreading the Word on Nuclear Cyber Security Spreading the Word on Nuclear Cyber Security Clifford Glantz, Guy Landine, Philip Craig, and Robert Bass Pacific Northwest National Laboratory (PNNL) PO Box 999; 902 Battelle Blvd Richland, WA 99352 USA

More information

Presented by Evan Sylvester, CISSP

Presented by Evan Sylvester, CISSP Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information

More information

The Conceptualization and Development of Safeguards Implementation at the State Level

The Conceptualization and Development of Safeguards Implementation at the State Level Atoms for Peace Board of Governors GOV/2013/38 Date: 12 August 2013 Restricted Distribution Original: English For official use only Item 6(b) of the provisional agenda (GOV/2013/37) The Conceptualization

More information

Institute for Science and International Security

Institute for Science and International Security Institute for Science and International Security ISIS Report Defining Iranian Nuclear Programs in a Comprehensive Solution under the Joint Plan of Action Drawn from Institute for Science and International

More information

Code of Conduct on the Safety and Security of Radioactive Sources

Code of Conduct on the Safety and Security of Radioactive Sources FOREWORD In recent years there has been a growing awareness of the potential for accidents involving radiation sources, some such accidents having had serious, even fatal, consequences. More recently still,

More information

New Proposed Department of Energy Rules to Clarify and Update Part 810. By Shannon MacMichael and Michael Lieberman of Steptoe & Johnson, LLP 1

New Proposed Department of Energy Rules to Clarify and Update Part 810. By Shannon MacMichael and Michael Lieberman of Steptoe & Johnson, LLP 1 New Proposed Department of Energy Rules to Clarify and Update Part 810 I. Introduction By Shannon MacMichael and Michael Lieberman of Steptoe & Johnson, LLP 1 Since April 2010, when former U.S. Secretary

More information

NRC Cyber Security Regulatory

NRC Cyber Security Regulatory Ask SME and Learn NRC Cyber Security Regulatory Program Development Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda

More information

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation

More information

What is Cyber Liability

What is Cyber Liability What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE

More information

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Best Practices in ICS Security for System Operators. A Wurldtech White Paper Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

MANAGEMENT SYSTEM FOR A NUCLEAR FACILITY

MANAGEMENT SYSTEM FOR A NUCLEAR FACILITY GUIDE YVL A.3 / 2 June 2014 MANAGEMENT SYSTEM FOR A NUCLEAR FACILITY 1 Introduction 5 2 Scope of application 6 3 Management system 6 3.1 Planning, implementation, maintenance, and improvement of the management

More information

Cyber Security Implications of SIS Integration with Control Networks

Cyber Security Implications of SIS Integration with Control Networks Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program

More information

Corporate Plan Summary 2014-2015 to 2018-2019. Operating Budget Summary 2014-2015 Capital Budget Summary 2014-2015. Atomic Energy of Canada Limited

Corporate Plan Summary 2014-2015 to 2018-2019. Operating Budget Summary 2014-2015 Capital Budget Summary 2014-2015. Atomic Energy of Canada Limited Sommaire du Plan de l entreprise 2014-2015 to 2018-2019 Operating Budget Summary 2014-2015 Capital Budget Summary 2014-2015 Atomic Energy of Canada Limited AECL AECL s Corporate Plan is approved by the

More information

Nuclear Plant Information Security A Management Overview

Nuclear Plant Information Security A Management Overview Nuclear Plant Information Security A Management Overview The diagram above is a typical (simplified) Infosec Architecture Model for a nuclear power plant. The fully-developed model would, for example,

More information

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government

More information

Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG 2012. All Rights Reserved.

Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG 2012. All Rights Reserved. Patch Management Is it recommended to patch an Industrial Automation Control System and, if so, why? Facts Most of the computer components of modern Industrial Automation Control System are based on standard

More information

How To Protect Water Utilities From Cyber Attack

How To Protect Water Utilities From Cyber Attack Cybersecurity in the Water Sector Copyright 2015 American Water Works Association Overview Reality of the Threat Environment Water Sector Cyber Risk Management Key Resources Connectivity = Exposure Process

More information

Protection from cyber threats

Protection from cyber threats 52 ABB review 4 12 Protection from cyber threats Can utilities and industries afford a cyber security breach? PATRIK BOO The intensity of cyber attacks on IT systems increases with every passing day. Worryingly,

More information

The State-of-the-State of Control System Cyber Security

The State-of-the-State of Control System Cyber Security The State-of-the-State of Control System Cyber Security Prepared for HTCIA September 19, 2012 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] Summary Control systems are

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

SCADA Security @ City of Raleigh. Martin Petherbridge, CPA, CIA Internal Audit Manager Shirley McFadden, CPA, CIA Senior Internal Auditor

SCADA Security @ City of Raleigh. Martin Petherbridge, CPA, CIA Internal Audit Manager Shirley McFadden, CPA, CIA Senior Internal Auditor SCADA Security @ City of Raleigh Martin Petherbridge, CPA, CIA Internal Audit Manager Shirley McFadden, CPA, CIA Senior Internal Auditor Agenda 1. PLCs, SCADA and Stuxnet 2. Selecting Audit Standards 3.

More information

SECURITY CONSIDERATIONS FOR LAW FIRMS

SECURITY CONSIDERATIONS FOR LAW FIRMS SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,

More information

RC-17. Alejandro V. Nader National Regulatory Authority Montevideo - Uruguay

RC-17. Alejandro V. Nader National Regulatory Authority Montevideo - Uruguay RC-17 Radiation Protection in Waste Management and Disposal Implementing the Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management Alejandro V. Nader

More information

Capabilities for Cybersecurity Resilience

Capabilities for Cybersecurity Resilience Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information