Cyber Security and Other Realities of Our Digital World Andy Dickson IT Director Nuclear Fleet Operations
|
|
|
- Barnaby Cunningham
- 10 years ago
- Views:
Transcription
1 Cyber Security and Other Realities of Our Digital World Andy Dickson IT Director Nuclear Fleet Operations
2 What Changes Are We Facing? Cyber Security Regulation and Threats Changing IT Landscape and Expectations Changing Industry
3 Exelon Overview Exelon Generation Exelon Utilities Power Generation Constellation ComEd, PECO & BGE Largest merchant Generation fleet in the nation (~35 GW of capacity), with unparalleled upside One of the largest and best managed nuclear fleets in the world (~19 GW) Significant gas generation capacity (~10 GW) Renewable portfolio (~1 GW), mostly contracted Retail & Wholesale Leading competitive energy provider in the U.S. Customer-facing business, with ~1.1 M competitive customers and large wholesale business Top-notch portfolio and risk management capabilities Extensive suite of products including Load Response, RECs, Distributed Solar One of the largest electric and gas distribution companies in the nation ~6.6 M customers E Diversified x across three utility jurisdictions e Illinois, Maryland and Pennsylvania l Significant o investments in n Smart Grid technologies Transmission infrastructure improvement at utilities Competitive Business Regulated Business Exelon is the largest competitive integrated energy company in the U.S. 3
4 Exelon Nuclear and My IT World By the Numbers 10 Nuclear Sites 17 Reactors (12 BWRs, 5 PWRs) 3 EOFs 2 Corporate Campuses 9 EP offsite staging facilities 21 Scientech R*Time PPCs 6 Legacy PPCs PCs 300 Business Servers 180 Real Time Servers 25 Firewalls 40 Routers 500 Switches/Routers 40 Data Diode Pairs
5 Is the glass half empty or half full? Challenges AND Opportunities!
6 What Changes Are We Facing? Cyber Security Regulation and Threats Changing IT Landscape and Expectations Changing Industry
7 Current Activity and Threats Question: What is the average time to infection of an unprotected Windows PC connected to the internet? Answer: 20 Minutes (SANS Internet Storm Center) Question: How many pieces of New Malware are created every day? Answer: >1 Million (Symantec)
8 Most targeted critical infrastructure sectors You Are HERE Source: ICS-CERT Incidents October 2012 to May 2013
9 Brief History of Nuclear Cyber Security (10CFR73.54) NEI 04-04, Cyber Security Program for Power Reactors, NEI -NERC MOA on CIP Cyber Attack Added to Design Basis Threat NEI Implemented and New NRC Cyber Rule Issued SSEP Systems 2009 NRC Decides Program Must be DETERMINISTIC NRC Endorses NEI 08-09, Cyber Plan Template Standard for the Industry NRC Approves Cyber Security Plans NRC Approved Interim Milestone Approach (1-7) Implemented Across Industry 2013 NRC Interim Inspections Begin Program Fully Implemented
10 Nuclear Plant Cyber Security Control and Data Acquisition Systems protected by Data Diodes Site Business LAN protected by Firewalls Data Centers Protected by Firewalls Nuclear Industry Has Isolated all Plant Control and Data Acquisition System by One-Way Deterministic Devices (Milestone 3)
11 This Leaves With Data Diodes in Place, Focus Shifts Swift Quickly to Portable Media Thank You Stuxnet Scanning Control Sanitization Security/Employee Awareness (Milestone 4)
12 Current State 137 Controls, broken into 698 Sub-Controls Must Be Assessed for EACH Critical Digital Asset Do the Math! 14 of the 22 Scheduled NRC Interim Milestone Inspections have been conducted Inspection Team s interpretation of Milestones 1-7 differs from the industries Current Deterministic Approach Treats EP Assets in the EOF the Same as Target Set Indications from NRC that they would consider moving to a Consequence-based Approach Industry must Seize the Opportunity Program can Conflict with Technology Improvements like Wireless Monitoring - Cost/Controls
13 Example of Evolution in Interpretations Issue Original Approach Current Approach Antivirus Scanning Kiosks for Removable Media Digital Test Equipment Engineering Configuration Control EP Assets (Business LAN) Leverage Enterprise Antivirus (AV) Solution Scan if Able For Plant Systems Take Credit for Existing Enterprise Cyber Controls Use Hardened, Multi AV, Network- Detached Solution Must be scanned, hardened, and controlled For Plant Systems and EP Facilities Need to Isolate and Provide Separate Controls
14 Cyber Security Challenges Threats are Real Nuclear Industry Cannot Tolerate Even Perception of a Breach Current Regulatory Interpretations and Lack of Graded Approach Stand to Drive Significant Up Front and Ongoing Costs and Complexity Opportunities Data Diodes and Removable Media Practices Have Fortified our Plants Significantly Program has Driven Better Documentation, control, and Disaster Recovery for Important Systems NRC Listening to Industry on Graded Approach
15 What Changes Are We Facing? Cyber Security Regulation and Threats Changing IT Landscape and Expectations Changing Industry
16 Changing Technology Landscape OR What s going on beyond the Data Diode? Source: Intel Inside Scoop 3/13/2012
17 Today s Challenges...the explosion of Digital Technologies has significantly increased requirements to improve efficiencies 17 Enabling Operational Efficiencies & Emerging Technologies Overview
18 Social Media Source: Forbes Website
19 NEI.org Post-Fukushima Page View Source: NEI
20 Cloud Computing Gartner predicts that by 2015, 35% of Enterprise IT Expenditures for most organizations will be managed outside of IT Departmental Budgets. Source: NIST Cloud Model Security a barrier to adoption Beware of 10CFR810 for Nuclear Pay attention to new demands on Internet pipe
21 BYOD Rationale: Consumerization & Anytime Access Trends Consumer Behavior Device Adoption Accelerating Usage Ubiquitous Access IT Consumerization Next Generation Employees want to work with technology and functionality that they can readily get in the marketplace Rise of Mobile Elite workers Mobility and flexibility are the focus of consumer technology 40% of devices being used for business purposes are personally owned. 10% increase between Diversification and Proliferation 7.5B Smartphones by 2015 from 4.6B in M Tablets by 2015 from 17M in M M2M Connections by 2015 from 80M in Ovum, Current Analysis, Current Analysis, 2011 Acceleration and Integration 76.9B Mobile Apps downloaded in 2014 from 10.9B in M Mobile Video Users by 2015 from 3.4M in Over 100M views a day via YouTube mobile in IDC, In-Stat, YouTube, 2011 Virtualization and Ubiquity 998.1M Mobile Cloud App Subscribers in 2014 from 42.8M in M Mobile-Only Internet Users by ABI Research, ARS Technica, IDC, 2011
22 BYOD Rationale: Benefits To Employees & Exelon Employee Satisfaction Single device to carry Employees empowered to choose device and plans Increased mobility Workforce Productivity Increased remote workforce productivity with any time, any where, any device access Improved cycle time for approval tasks & issue resolution Improved communications and business efficiency Effective Controls & Management Oversight Consistent BYOD policy and approach to determining employee stipend amounts Automated portal for onboarding employees Accurate tracking & reporting for management One Culture Consolidate multiple programs with different policies Enable ease of use and self service Encourage collaboration and advancement of an culture
23 Changing IT Landscape Challenges Social Media is Here Control Your Message or Someone Else Will Cloud-sourcing present Technical And Nuclear- Specific Challenges BYOD is Happening Today - Must Deal with It Opportunities Embrace Social Media to Get You Message Out Directly to Customer and with Great Speed Leverage Cloud as A Part of your IT Strategy to Speed Deployments, Reduce Internal Complexity and Provide Anytime-Anywhere Access where the Fit is Right Seize the Advantages of BYOD
24 What Changes Are We Facing? Cyber Security Regulation and Threats Changing IT Landscape and Expectations Changing Industry
25 What s Going on in our industry Shale Gas Disruption Nuclear Plant Closings Keewaunee - Wisconsin Crystal River - Florida SONGS California Post-Fukushima Mitigations Changing Workforce Demographics
26 What s Going on in our industry New Nuclear Construction Southern Company Vogtle 3 &4 SCANA/SCE&G Summer 2&3 TVA Watts Bar 2 Source: SCANA Corporation INSIGHTS Spring 2013
27 Changing Industry Challenges Gas Prices will Continue To Challenge the Economics of US Nuclear Fleet and Lead to Potential Additional Plant Closings Regulations like for Fukushima and Cyber Security will Apply Additional Financial Challenges Retaining Critical Knowledge and Skills as the Work Force Changes Particularly for Legacy Systems Opportunities Leverage Emerging Technology to: Automate and Improve Ineffective Processes Develop Optimal Solutions to Address Regulations Facilitate Knowledge Transfer and Retentions Attract Best Talent Promote Benefits of New Nuclear Technology
28 Closing So, Is the Glass Half Empty or Half Full? Technology Creates Both the Challenge and the Opportunity We Can Embrace Change, Seize Opportunities or Be Overwhelmed by the Challenges Its Up to Us!
Harnessing the Mobile Evolution. Shiraz Hasan Sr. Director M2M & Mobile Applications AT&T Business Solutions
Harnessing the Mobile Evolution Shiraz Hasan Sr. Director M2M & Mobile Applications AT&T Business Solutions Discussion Points Continued disrupting growth in the Mobile world. Role of IT Approach Things
A Regulatory Approach to Cyber Security
A Regulatory Approach to Cyber Security Perry Pederson Security Specialist (Cyber) Office of Nuclear Security and Incident Response U.S. Nuclear Regulatory Commission 1 Agenda Overview Regulatory Framework
Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012
Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012 ATC Nuclear ATC-N serves the commercial nuclear utilities in the US and many foreign
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends
Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014
ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
Executive Director for Operations AUDIT OF NRC S CYBER SECURITY INSPECTION PROGRAM FOR NUCLEAR POWER PLANTS (OIG-14-A-15)
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 OFFICE OF THE INSPECTOR GENERAL May 7, 2014 MEMORANDUM TO: Mark A. Satorius Executive Director for Operations FROM: Stephen D. Dingbaum
PCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
Cynthia Broadwell, Progress Energy. William Gross, Nuclear Energy Institute
Cyber Security Plan Overview Cynthia Broadwell, Progress Energy Nolan Heinrich, TVA William Gross, Nuclear Energy Institute Introduction Cynthia Broadwell Progress Energy Progress Energy Fleet Cyber Security
NRC Cyber Security Policy &
Ask SME and Learn NRC Cyber Security Policy & Guidance Development Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda
10 easy steps to secure your retail network
10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015
Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Energy Cybersecurity Regulatory Brief
Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider
Emerging Trends in the Network Security Market in India, CY 2013
Emerging Trends in the Network Security Market in India, CY 2013 Advanced Threat Landscape will Give Rise to Increased Network Security Spending 9AC3-74 July 2014 Contents Section Slide Numbers Executive
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Protecting Content and Securing the Organization Through Smarter Endpoint Choices
Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops
The Mobile Enterprise: Employee Self Service. Deepali Majumder, Senior Consultant, Wipro Mobility Solutions
The Mobile Enterprise: Employee Self Service Deepali Majumder, Senior Consultant, Wipro Mobility Solutions Table of contents 03... Technology is shaping demand 03... The Mobile Employee 04... Why is a
Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops
January 2015 Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops Executive Summary Physical desktop and notebook computer infrastructures no longer make sense for the corporate
COMMON CORPORATE COSTS CAPITAL - INFORMATION TECHNOLOGY
Updated: 0-0-0 EB-0-0 Tab Page of COMMON CORPORATE COSTS CAPITAL - INFORMATION TECHNOLOGY.0 OVERVIEW 0 Information Technology ( IT ) refers to computer systems (hardware, software and applications) that
Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
How To Get A Cloud Service For A Small Business
Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
NRC Cyber Security Regulatory
Ask SME and Learn NRC Cyber Security Regulatory Program Development Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
State of the States: IT Trends, Priorities and Issues
State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are
Assuring Application Security: Deploying Code that Keeps Data Safe
Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,
Symantec Endpoint Security Management Solutions Presentation and Demo for:
Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
SCADA Security: Challenges and Solutions
SCADA Security: Challenges and Solutions June 2011 / White paper by Metin Ozturk, Philip Aubin Make the most of your energy Summary Executive Summary... p 2 Protecting Critical Infrastructure Includes
AIMING HIGHER: CREATE A MOBILE- FIRST BUSINESS STRATEGY
A HARVARD BUSINESS REVIEW ANALYTIC SERVICES REPORT AIMING HIGHER: CREATE A MOBILE- FIRST BUSINESS STRATEGY Copyright 2015 Harvard Business School Publishing. sponsored by AIMING HIGHER: CREATE A MOBILE-FIRST
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Verizon Applications and Cloud
Verizon Applications and Cloud Mobilizing Business Applications, Efficiently and Affordably Mobile connectivity has become a way of life and an expectation for much of today s workforce. With pervasive
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere
Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices
ITIL 2015 and Beyond: Six Trends Driving Transformational Change in IT Best-Practices The Landscape of IT Services Provision is Changing! Customers and users are demanding a higher level of customer service
The Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
U.S. Department of Housing and Urban Development Data Center Consolidation Plan
U.S. Department of Housing and Urban Development Data Center Consolidation Plan FY12 Final Plan September 30, 2011 1 P a g e TABLE OF CONTENTS DOCUMENT INFORMATION TABLE OF CONTENTS... 2 TABLE of TABLES...
Rethinking Electric Company Business Models
Rethinking Electric Company Business Models National Association of Regulatory Utility Commissioners Staff Subcommittee on Accounting and Finance Spring 2014 Conference March 19, 2014 Discussion overview
HP Security Solutions for Microsoft
HP Security Solutions for the Microsoft Environment Achieving a secure adaptive enterprise How secure is your Microsoft environment? Enterprise boundaries are expanding, creating the need for faster, easier
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
Leveraging the Cloud for Your Business
Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and
Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected]
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected] Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
AURORA Vulnerability Background
AURORA Vulnerability Background Southern California Edison (SCE) September 2011-1- Outline What is AURORA? Your Responsibility as a Customer Sectors Impacted by AURORA Review of Regulatory Agencies History
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
EMPOWERING THE DYNAMIC WORKPLACE
EMPOWERING THE DYNAMIC WORKPLACE Matrix42 has been positioned in the visionary quadrant of the Gartner Magic Quadrant as the only vendor that enables organizations to manage physical, virtual and mobile
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
Conducting a Risk Assessment for Mobile Devices
Conducting a Assessment for Mobile Devices May 9, 2012 David Frei Director, Digital/Information Security Specialist The Changing Environment Today s Discussion Available Industry Assessment Models Unique
10 Hidden IT Risks That Might Threaten Your Business
(Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
When Computers really become Personal
When Computers really become Personal What is Consumerization of IT? The Consumerization of IT and what it means The term "consumerization" was first popularized in 20011 as a description for how innovation
Cloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Department of Management Services. Request for Information
Department of Management Services Request for Information Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 Submitted By: Carlos Henley
Simplifying Desktop Mgmt With Novell ZENworks
Simplifying Desktop Mgmt With Novell ZENworks Joe Marton Senior Systems Engineer Collaboration Solution Principal Novell North America [email protected] Ryan Radschlag Network Manager Hartford Joint #1
Cyber Security. Smart Grid
Cyber Security for the Smart Grid Peter David Vickery Executive Vice President N-Dimension Solutions Inc. APPA National Conference June 21, 2010 Cyber Security Solutions For Cyber Security
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected]. Developments in Web Application and Cloud Security
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected] Developments in Web Application and Cloud Security Forces of Change Workforce and IT trends 2 Applications 3 Web Application
Mobilizing Business Applications, Efficiently and Affordably
VERIZON APPLICATIONS AND CLOUD Mobilizing Business Applications, Efficiently and Affordably Mobile connectivity has become a way of life and an expectation for much of today s workforce. With pervasive
Building Insecurity Lisa Kaiser
Building Insecurity Lisa Kaiser Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Insecurity How do I Specify it Buy it Test it Deploy it Regret it Apologize for it Specifying Insecurity
Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan
Stephen Miles Vice President - Service Assurance Asia Pacific & Japan CA Expo Hong Kong 21 September, 2012 Transform IT assets to Drive Business Service Innovation The age of innovation has arrived CLOUD
Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants
Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants Sooill Lee a*, Yong Sik Kim a, Song Hae Ye a a Central Research Institute, Korea Hydro and
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Remote Management Services Portfolio Overview
Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On
10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Building Security into Your Industrial Internet Phillip Allison Tempered Networks Discussion topics Threats to network security TCP/IP
U.S. Nuclear Regulatory Commission
U.S. Nuclear Regulatory Commission 2011 Data Center Consolidation Plan and Progress Report Version 2.0 September 30, 2011 Enclosure Contents 1 Introduction... 2 2 Agency Goals for Data Center Consolidation...
BEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD How Smart Enterprises Are Making It Work Whitepaper Whitepaper 2 In a recent report, research firm Ovum concludes that: It is clear that when it comes to planning and implementing
Ask SME and Learn. NRC Cyber Security Oversight. Cyber Security Directorate
Ask SME and Learn NRC Cyber Security Oversight Program Mario R. Fernandez Jr., Security Specialist (Cyber) Cyber Security Directorate Office of Nuclear Security & Incident Response 1 Agenda Cyber Security
