Cynthia Broadwell, Progress Energy. William Gross, Nuclear Energy Institute
|
|
|
- Kerry Charles
- 10 years ago
- Views:
Transcription
1 Cyber Security Plan Overview Cynthia Broadwell, Progress Energy Nolan Heinrich, TVA William Gross, Nuclear Energy Institute
2 Introduction Cynthia Broadwell Progress Energy Progress Energy Fleet Cyber Security and SQA Program manger > 30- Years Nuclear Industry Experience Engineering, Technical Support, Nuclear Information Technology NEI Cyber Security Task Force Member (2010 Present) NITSL Executive Committee Cyber Security Sponsor ( ) NITSL Cyber Security Committee Chairman ( ) Member writing team: NEI Rev. 0 Rev. 6 NEI Rev. 0 NEI Rev. 0 NITSL SQA Policy and Guidance Documents Four nuclear sites / 5 units/ BWR & PWR Fortune 500 Service Area in the Carolinas & Florida 21,800 owned Mw of capacity 11,000 employees/ 3.1 Million customers
3 Digital Systems History in Nuclear Plants 1990s computer systems in a nuclear power plant were less susceptible to the random worms and virus most of those systems were completely isolated from any external connectivity Before 9/11 nuclear power plants were transitioning to modern operating systems Site personnel wanted connectivity to desktop Vendors wanted remote access
4 Cyber Security Evolution EA (B5b) (2002) Security Order to insure security connectivity for safety systems NEI 04-04, Cyber Security Program for Power Reactors (Accepted by NRC 12/2005) Cyber added to both RG 5.69 and 10 CFR 73.1 which described the types of cyberattacks and attackers (~2007) NEI Cyber Security Program Implemented and migrated to maintenance phase (May 2008) 4
5 Cyber Security Codified 10CFR73.54,Cyber Security Regulation (Effective May 26, 2009) Cyber Security Plan Submittals to the NRC as a license amendment (LAR) (November 2009) ~100 generic RAIs resolved (May 2010) All plants submitted revision of Cyber Security Plan based on NEI Rev. 6 (July 2010) 3 generic RAIs on the cyber security LAR; resubmittal (April 2011) Licensees expect the NRC will approve site/fleet license amendments by July 31, 2011
6 What is Cyber Security? Provides high assurance that digital computer and communication systems and networks associated with SSEP are adequately protected t from cyber attack up to and including DBT: 73.54(a)(1)(i) Safety and Important to Safety functions 73.54(a)(1)(ii) Security functions 73.54(a)(1)(iii) Emergency Preparedness functions including off-site communications 73.54(a)(1)(iv) Support Systems Cyber Security Plan, 73.54, is one of four Security Plans required by 10 CFR 73 Component of operating license 6
7 Why is Cyber Security important? Protects site Critical Systems and Critical Digital Assets from cyber attack Implements cyber security controls to mitigate internal and external threat vectors: Network/Internet (Direct connection) Wireless Access/Capability Portable Mass Media Supply Chain Direct Physical Access
8 What are our Commitments? 10 CFR 73.54, Protection of digital computer and communications i systems and networks The Rule The Cyber Security Plan, Appendix A Performance Requirements ( 73.54, 73.55, 73.56) Technical Security Controls designated to be implemented in Appendix A The Implementation Schedule Technical Security Controls designated to be implemented in the Implementation Schedule The two commitment dates: December 31, 2012 [mm/dd/yyyy] Full Compliance with the Rule
9 Implementation Schedule Template Establish Cyber Security Assessment Team * Identify Critical Systems and Critical Digital Assets * Install Unidirectional Network equipment * Implement portable media controls * Implement observation of obvious cyber related tampering * Perform assessment to identify, document, and implement cyber security controls * Commence ongoing monitoring and assessment of CDAs and Cyber Program * Full implementation of Cyber Security Plan (12/31/20##) * Actions to be completed by 12/31/2012 9
10 LEVEL 4 CDA FW/ IDS LEVEL 3 LEVEL 2 LEVEL 1 LEVEL 4 CDA Diode CDA Data Diode Diode LEVEL 4 FW FW CDA Diode LEVEL 3 Level 4 Isolated Network CDA CDA FW/ IDS Less Attack Vectors More Attack Vectors NEI Digital Protection Boundaries
11 Owner Controlled Area Outside Plant Boundary Unmanned Room Protected Area Vital Area OCA Room E Other Area Room G Vital Room A Protected LOCKED CABINET LOCKED ROOM Room C More Attack Vectors Vital Room B Protected t Room D Manned Room Locked Cabinet/Door OCA Room F LOCKED AND ALARMED CABINET/DOOR Other Area Room H ACCESS CONTROLLED BUILDING WITH ALARMED ROOM/CABINET Les s Attack Ve ectors Less Attack More Attack Vectors Vectors NEI Physical Protection Boundaries
12 Introduction Nolan Henrich General Manager, Computer Engineering Real Time Computer Systems SQA Program Management Cyber Security Program Management NITSL Executive Committee NITSL SQA Subcommittee NITSL Cyber Security Subcommittee TVA Three nuclear sites 6 nuclear units in service (3 BWR/3 PWR) Watts Bar 2 fuel load and startup in next 18 months
13 Key Take Aways Cyber Security is a way of doing business; it is not an event, it is a collection of processes It requires a significant change in the q g g way business is conducted
14 How does Cyber Security impact my organization? Engineering (Systems and Design) Information Technology Physical Security Operations Maintenance Emergency Preparedness Training i Work Management Procurement
15 Observations From WB2 CSAT team (6 permanent team members) CSAT supplemented by system engineer for the system under review Dedicated 3 days per week 3 Month effort Drew on information collected during NSIAC Cyber Security Initiative
16 Observations From WB2 (Continued) 50 Plant Systems 1400 digital devices 900 Critical Digital Devices (CDAs) 500 Digital Devices (DAs) Evaluated assets against approximately 1100 cyber controls
17 Next Steps Develop remediation plans and implementation schedules Integrate cyber security into existing plant processes, training, and procedures Develop implementing procedures (fleet- wide approach) PMs developed for ongoing cyber activities (approximately 75 controls must be performed on CDAs monthly)
18 Challenges Changing regulatory environment Integration of cyber security controls with plant processes and procedures Changing the Culture Project mentality (cyber security is an event) Resistance to change (trying to make my job harder) Resources
19 Introduction William Gross Project Manager, Security Cyber Security all activities NEI 08-09, NEI 10-04, NEI 10-09, NEI FERC Order 706-B Chair, NEI Cyber Security Task Force Member, NEI Security Working Group NEI Policy organization for nuclear industry Members b include all entities licensed to operate commercial nuclear power plants in the United States, nuclear plant designers, major architect/ engineering g firms, fuel fabrication facilities, nuclear materials licensees, etc.
20 Who is the CSTF? The NEI Cyber Security Task Force: Reports to the Security Working Group SGI workshop NNSC workshop Recommends cyber initiatives to be approved by SWG then to be carried out by the CSSC CSTF member is sponsor and lead participant i of CSTF initiative INPO representative Industry Fleet and Individual Licensee Directors, Managers, Designees Interface to government and regulatory agencies Sponsors annual Workshop
21 Who is the CSSC? The NITSL Cyber Security Standing Committee: Sponsored by NEI and INPO Has been in place since ~2006 All licensee companies represented Forms working team for CSTF initiatives Sponsors weekly meetings and annual workshop Attended d by NRC, DHS, FBI, others
22 CSTF and CSSC Initiatives NEI 04-04, Voluntary Cyber Security Initiative NEI 08-09, Cyber Security Plan Template NEI 10-04, Critical Systems (SSEP, BOP, EP) NEI 10-09, Addressing Security Controls NEI 10-08, Cyber Security Rule Evaluation Program SFAQ IT Functions for the Critical Group DG-5019 Reporting Cyber Events; Industry Response Team White paper: Crediting the Insider Mitigation Program Nuclear Responses to NERC Alerts/Advisories Brief NRC on initiatives Host DHS, FBI, others, to ensure awareness of cyber related issues
23 Questions
24 What are the key terms and definitions? i i Adversary Individual, group or organization that has adversely impacted or is attempting to adversely impact a CDA. (Cyber Security Plan) Critical System A system that is associated with safety-related functions; important-to-safety functions; security functions; emergency preparedness functions, including offsite communications; or support systems and equipment which, if compromised, would adversely impact safety, security, or emergency preparedness functions. (Cyber Security Plan)
25 What are the key terms and definitions? Critical Digital Asset A digital computer, communication system, or network that is 1) a component of a critical system (this includes assets that perform SSEP functions; provide support to, protect, or provide a pathway to Critical Systems); or 2) a support system asset whose failure or compromise as the result of a cyber attack would result in an adverse impact to a SSEP Function. (Cyber Security Plan) Critical Digital Asset The electronic systems, networks, or equipment that fall within the scope of 10 CFR (i.e., within the Level 3 or 4 boundaries described in Regulatory Guide 5.71). Such systems, networks, and equipment have the ability to compromise the facility s safety, security, or emergency response (SSEP) functions. DG
26 What are the key terms and definitions? Cyber Attack Any event in which there is reason to believe that an adversary has committed or caused, or attempted to commit or cause, or has made a credible threat to commit or cause malicious exploitation of a CDA. * Clarify definition and align with definition found acceptable by the NRC as documented in a USNRC letter from Richard P. Correia to Christopher E. Earls, Nuclear Energy Institute 08-09, Cyber Security Plan Template, Rev. 6, dated June 7, Cyber Attack (1 hour reportable) Any event in which there is reason to believe that a person has committed or caused, or attempted to cause, or has made a threat to commit or cause, an act to modify, destroy, or compromise any systems, networks, or equipment that falls within the scope of of this part. As established by 10 CFR 73 Appendix G Paragraph I (h) 26
27 What are the key terms and definitions? Threat Any circumstance or event with the potential to adversely impact SSEP functions through a CDA via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. (derived from NIST ) Threat Vector Pathways that can be exploited through malicious activity to penetrate security perimeters or network devices to adversely impact a CDA s SSEP functions (derived from Twenty Critical Controls for Effective Cyber Defense: Consensus Audit Version 2.3: November 13, 2009) 27
28 What are the key terms and definitions? Threat Vectors The means an adversary must have at his disposal to compromise a CDA. This list could be collapsed into two items, physical access and logical access. (NEI 10-09) 09) Direct Network Connectivity Wireless Access Capability Portable Media and Equipment Supply Chain Direct Physical Access 28
29 Break 3 3:30 p.m.
NRC Cyber Security Regulatory
Ask SME and Learn NRC Cyber Security Regulatory Program Development Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda
U.S. NUCLEAR REGULATORY COMMISSION January 2010 REGULATORY GUIDE OFFICE OF NUCLEAR REGULATORY RESEARCH. REGULATORY GUIDE 5.71 (New Regulatory Guide)
U.S. NUCLEAR REGULATORY COMMISSION January 2010 REGULATORY GUIDE OFFICE OF NUCLEAR REGULATORY RESEARCH REGULATORY GUIDE 5.71 (New Regulatory Guide) CYBER SECURITY PROGRAMS FOR NUCLEAR FACILITIES A INTRODUCTION
A Regulatory Approach to Cyber Security
A Regulatory Approach to Cyber Security Perry Pederson Security Specialist (Cyber) Office of Nuclear Security and Incident Response U.S. Nuclear Regulatory Commission 1 Agenda Overview Regulatory Framework
NUCLEAR REGULATORY COMMISSION. 10 CFR Part 73 [NRC-2014-0036] RIN 3150-AJ37. Cyber Security Event Notifications
This document is scheduled to be published in the Federal Register on 11/02/2015 and available online at http://federalregister.gov/a/2015-27855, and on FDsys.gov [7590-01-P] NUCLEAR REGULATORY COMMISSION
Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012
Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012 ATC Nuclear ATC-N serves the commercial nuclear utilities in the US and many foreign
NRC Cyber Security Policy &
Ask SME and Learn NRC Cyber Security Policy & Guidance Development Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001. March 3, 2011
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 March 3, 2011 Mr. Timothy S. Rausch Senior Vice President and Chief Nuclear Officer PPL Susquehanna, LLC 769 Salem Boulevard Berwick,
Cyber Security R&D (NE-1) and (NEET-4)
Cyber Security R&D (NE-1) and (NEET-4) Trevor Cook Office of Science and Technology Innovation Office of Nuclear Energy U.S. Department of Energy Cyber Security for Nuclear Systems (the threat is real)
NEI 08-09 [Rev. 6] Cyber Security Plan for Nuclear Power Reactors
NEI 08-09 [Rev. 6] Cyber Security Plan for Nuclear Power Reactors [THIS PAGE IS LEFT BLANK INTENTIONALLY] NEI 08-09 [Rev. 6] Nuclear Energy Institute Cyber Security Plan for Nuclear Power Reactors Nuclear
Options for Cyber Security. Reactors. April 9, 2015
Options for Cyber Security Design Requirements for Power Reactors April 9, 2015 Scope Discuss options for including cyber security design requirements for power reactors into NRC regulations Scope does
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants Jung-Woon Lee, Cheol-Kwon Lee, Jae-Gu Song, and Dong-Young Lee I&C and HF Research Division, Korea Atomic Energy
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) 1. INTRODUCTION In today s world, cyber security is one
Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants
Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants Sooill Lee a*, Yong Sik Kim a, Song Hae Ye a a Central Research Institute, Korea Hydro and
Spreading the Word on Nuclear Cyber Security
Spreading the Word on Nuclear Cyber Security Clifford Glantz, Guy Landine, Philip Craig, and Robert Bass Pacific Northwest National Laboratory (PNNL) PO Box 999; 902 Battelle Blvd Richland, WA 99352 USA
The U.S. Nuclear Regulatory Commission s Cyber Security Regulatory Framework for Nuclear Power Reactors
NUREG/CR-7141 The U.S. Nuclear Regulatory Commission s Cyber Security Regulatory Framework for Nuclear Power Reactors Office of Nuclear Security and Incident Response AVAILABILITY OF REFERENCE MATERIALS
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001. November 13, 2012
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 November 13, 2012 Vice President, Operations Entergy Nuclear Operations, Inc. Vermont Yankee Nuclear Power Station P.O. Box 250 Governor
Integrating Cyber Security into Nuclear Power Plant Safety Systems Design
Integrating Cyber Security into Nuclear Power Plant Safety Systems Design Deanna Zhang U.S. Nuclear Regulatory Commission Document Date: 05/21/2010 Objectives To provide methods for utilizing safety features,
Ask SME and Learn. NRC Cyber Security Oversight. Cyber Security Directorate
Ask SME and Learn NRC Cyber Security Oversight Program Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda Cyber Security
A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS
http://dx.doi.org/10.5516/net.04.2011.065 A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG, JUNG-WOON LEE *, CHEOL-KWON LEE, KEE-CHOON KWON, and DONG-YOUNG
A Cost-Efficient Approach to High Cyber Security Assurance in Nuclear Power Plants
A Cost-Efficient Approach to High Cyber Security Assurance in Nuclear Power Plants The RIPE Framework as an Alternative to Regulatory Guide 5.71 and NEI 08-09 Perry Pederson April 2014 The Langner Group
NEI 10-04 [Revision 2] Identifying Systems and Assets Subject to the Cyber Security Rule
NEI 10-04 [Revision 2] Identifying Systems and Assets Subject to the Cyber Security Rule [THIS PAGE IS LEFT BLANK INTENTIONALLY] NEI 10-04 [Revision 2] Nuclear Energy Institute Identifying Systems and
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Cyber Security and Other Realities of Our Digital World Andy Dickson IT Director Nuclear Fleet Operations
Cyber Security and Other Realities of Our Digital World Andy Dickson IT Director Nuclear Fleet Operations What Changes Are We Facing? Cyber Security Regulation and Threats Changing IT Landscape and Expectations
Standard CIP 007 3a Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for
REGULATORY GUIDE 5.29 (Draft was issued as DG 5028, dated May 2012) SPECIAL NUCLEAR MATERIAL CONTROL AND ACCOUNTING SYSTEMS FOR NUCLEAR POWER PLANTS
U.S. NUCLEAR REGULATORY COMMISSION June 2013 Revision 2 REGULATORY GUIDE OFFICE OF NUCLEAR REGULATORY RESEARCH REGULATORY GUIDE 5.29 (Draft was issued as DG 5028, dated May 2012) SPECIAL NUCLEAR MATERIAL
Protecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
October 29, 2014 - Washington, DC. Copyr i g h t 2014-1 5 O S Is o f t, LLC. 1
October 29, 2014 - Washington, DC 1 Shared Situational Awareness for US Nuclear Emergency Planning, Preparedness and Response (EP) Presented by Chris Crosby US Federal -- Global Nuclear and Renewable Energy
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS. Kwangjo Kim
PBNC 2012 CHALLENGES OF CYBER SECURITY FOR NUCLEAR POWER PLANTS Kwangjo Kim KAIST, Daejeon, Korea Khalifa University of Science, Technology and Research, Abu Dhabi, UAE [email protected], [email protected]
DRAFT REGULATORY GUIDE
U.S. NUCLEAR REGULATORY COMMISSION August 2012 OFFICE OF NUCLEAR REGULATORY RESEARCH Division 1 DRAFT REGULATORY GUIDE Contact: K. Sturzebecher (301) 251-7494 DRAFT REGULATORY GUIDE DG-1206 (Proposed Revision
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Regulatory Guide 1.169 Configuration Management Plans for Digital Computer Software Used in Safety Systems of Nuclear Power Plants
Regulatory Guide 1.169Configuration Managemen... Page 1 of 10 September 1997 Regulatory Guide 1.169 Configuration Management Plans for Digital Computer Software Used in Safety Systems of Nuclear Power
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
The Anatomy of an Effective Cyber Security Solution: Regulatory Guidelines and the Technology Required for Compliance
The Anatomy of an Effective Cyber Security Solution: Regulatory Guidelines and the Technology Required for Compliance A Bentley White Paper Hilmar Retief, Product Manager AssetWise July 2011 www.bentley.com
U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security
NUREG-0800 U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN 13.6.2 PHYSICAL SECURITY DESIGN CERTIFICATION REVIEW RESPONSIBILITIES Primary - Organization responsible for the review of physical security
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
NUCLEAR REGULATORY COMMISSION [EA-14-193; NRC-2015-0289] In the Matter of Northern States Power Company, Minnesota
This document is scheduled to be published in the Federal Register on 01/11/2016 and available online at http://federalregister.gov/a/2016-00322, and on FDsys.gov [7590-01-P] NUCLEAR REGULATORY COMMISSION
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS
http://dx.doi.org/10.5516/net.04.2012.091 AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG *, JUNG-WOON LEE, GEE-YONG PARK, KEE-CHOON KWON,
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH
Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks
Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table
NRC REGULATORY ISSUE SUMMARY 2006-11, REQUESTING QUALITY ASSURANCE PROGRAM APPROVAL RENEWALS ONLINE BY ELECTRONIC INFORMATION EXCHANGE
UNITED STATES NUCLEAR REGULATORY COMMISSION OFFICE OF NUCLEAR MATERIAL SAFETY AND SAFEGUARDS WASHINGTON, DC 20555 July 20, 2006 NRC REGULATORY ISSUE SUMMARY 2006-11, REQUESTING QUALITY ASSURANCE PROGRAM
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015
Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015 OIG-16-A-03 November 12, 2015 All publicly available OIG reports (including
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
AURORA Vulnerability Background
AURORA Vulnerability Background Southern California Edison (SCE) September 2011-1- Outline What is AURORA? Your Responsibility as a Customer Sectors Impacted by AURORA Review of Regulatory Agencies History
UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook
Introduction Per UCSC's HIPAA Security Rule Compliance Policy 1, all UCSC entities subject to the HIPAA Security Rule ( HIPAA entities ) must implement the UCSC Practices for HIPAA Security Rule Compliance
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
Security Risk Management For Health IT Systems and Networks
Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Setting the stage. NATIONAL INSTITUTE OF STANDARDS AND
Top 10 Compliance Issues for Implementing Security Programs
www.dyonyx.com Top 10 Compliance Issues for Implementing Security Programs This White Paper articulates the top ten issues that we have encountered in the design and implementation of comprehensive Security
A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES
A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES JAEKWAN PARK * and YONGSUK SUH Korea Atomic Energy Research Institute
Data Security Concerns for the Electric Grid
Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical
HIPAA Security Checklist
HIPAA Security Checklist The following checklist summarizes HIPAA Security Rule requirements that should be implemented by covered entities and business associates. The citations are to 45 CFR 164.300
Standard CIP 007 3 Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for securing
Audit Report. Management of Naval Reactors' Cyber Security Program
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report Management of Naval Reactors' Cyber Security Program DOE/IG-0884 April 2013 Department of Energy Washington,
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Regulatory Guide 1.168 Verification, Validation, Reviews, And Audits For Digital Computer Software Used in Safety Systems of Nuclear Power Plants
Regulatory Guide 1.168 Page 1 of 10 September 1997 Regulatory Guide 1.168 Verification, Validation, Reviews, And Audits For Digital Computer Software Used in Safety Systems of Nuclear Power Plants Publication
OVERVIEW OF THE OPERATING REACTORS BUSINESS LINE. July 7, 2016 Michael Johnson Deputy Executive Director for Reactor and Preparedness Programs
OVERVIEW OF THE OPERATING REACTORS BUSINESS LINE July 7, 2016 Michael Johnson Deputy Executive Director for Reactor and Preparedness Programs Program Overview Bill Dean Director Office of Nuclear Reactor
Proposal to Consolidate Post-Fukushima Rulemaking Activities
Proposal to Consolidate Post-Fukushima Rulemaking Activities On January 28, 2014, the U.S. Nuclear Regulatory Commission s (NRC s) Fukushima Steering Committee endorsed an NRC staff proposal for integrating
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
NORTH CAROLINA EASTERN MUNICIPAL POWER AGENCY SHEARON HARRIS NUCLEAR POWER PLANT, UNIT 1. Renewed License No. NPF-63
CAROLINA POWER & LIGHT COMPANY NORTH CAROLINA EASTERN MUNICIPAL POWER AGENCY DOCKET NO. 50-400 SHEARON HARRIS NUCLEAR POWER PLANT, UNIT 1 RENEWED FACILITY OPERATING LICENSE 1. The Nuclear Regulatory Commission
G-Cloud Definition of Services Security Penetration Testing
G-Cloud Definition of Services Security Penetration Testing Commercial in Confidence G-Cloud Services An Overview Inner Security is a leading CREST registered information security services provider. We
Resilient and Secure Solutions for the Water/Wastewater Industry
Insert Photo Here Resilient and Secure Solutions for the Water/Wastewater Industry Ron Allen DA/Central and Steve Liebrecht Rockwell Automation Detroit W/WW Team Leader Your slides here Copyright 2011
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective
Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective Terry Jamieson Vice-President Technical Support Branch Canadian Nuclear Safety Commission August 11, 2015 www.nuclearsafety.gc.ca
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
Security Requirements for Spent Fuel Storage Systems 9264
Security Requirements for Spent Fuel Storage Systems 9264 P. G. Brochman, S. R. Helton, E. A. Thompson US Nuclear Regulatory Commission 11555 Rockville Pike, M/S: T4-F25M, Rockville, MD 20852-2738 ABSTRACT
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected]
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected] Nuclear Security Background While security of the nuclear facilities and materials the NRC regulates has always been a
Building Insecurity Lisa Kaiser
Building Insecurity Lisa Kaiser Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Insecurity How do I Specify it Buy it Test it Deploy it Regret it Apologize for it Specifying Insecurity
ARE VA AREVA INC. August 31, 2015 NRC:15:035. U.S. Nuclear Regulatory Commission Document Control Desk 11555 Rockville Pike Rockville, MD 20852
A ARE VA August 31, 2015 NRC:15:035 U.S. Nuclear Regulatory Commission Document Control Desk 11555 Rockville Pike Rockville, MD 20852 Request for Review and Approval of ANP-10337P, "PWR Fuel Assembly Structural
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
Energy Cybersecurity Regulatory Brief
Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider
Cyber Security in a Nuclear Context
Cyber Security in a Nuclear Context Mitchell Hewes & Nick Howarth UNCLASSIFIED Who are we? Our Facilities Synchrotron Accelerators Cyclotron OPAL Lucas Heights Campus Some Considerations We have an interesting
Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
CONCEPTS IN CYBER SECURITY
CONCEPTS IN CYBER SECURITY GARY KNEELAND, CISSP SENIOR CONSULTANT CRITICAL INFRASTRUCTURE & SECURITY PRACTICE 1 OBJECTIVES FRAMEWORK FOR CYBERSECURITY CYBERSECURITY FUNCTIONS CYBERSECURITY CONTROLS COMPARATIVE
How To Ensure The C.E.A.S.A
APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 3 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT TUGeneral TUSecurity TURequirements TUDesign TUIntegration
University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9
Security Incidents Page: 1 of 9 I. Purpose, Reference, and Responsibility A. Purpose The purpose of this policy is to define a security incident and to provide the procedures for notification, investigation,
