Workshop C. 11:00 a.m. to 12:15 p.m.
|
|
|
- Clement Harrington
- 10 years ago
- Views:
Transcription
1 Workshop C The Electric Grid One of America's 3 Biggest Cyber Security Vulnerabilities Requiring Significant Capital Expenditures Impacting Electric Rates: What Actions Are Being Taken in Pennsylvania to Protect the Grid 11:00 a.m. to 12:15 p.m.
2 Biographical Information Pamela A. Witmer, Commissioner, Pennsylvania Public Utility Commission Keystone Building, 3rd Floor, 400 North Street, Harrisburg, PA Pamela A. Witmer took the oath of office as a Pennsylvania Public Utility Commissioner on June 30, She was nominated to serve as Commissioner by Gov. Tom Corbett on June 7, 2011, and unanimously confirmed by the Senate on June 27, Commissioner Witmer s term will expire April 1, In her confirmation hearing remarks, Witmer promised she would be a strong, independent Commissioner, thinker and decision-maker on behalf of Pennsylvania s consumers. Witmer most recently led the energy and environment practice for Harrisburg-based Bravo Group, a governmental and public relations firm. She also recently served on the Corbett Transition Team s Energy & Environment Committee. From 2000 to 2007, she was President and CEO of the Pennsylvania Chemical Industry Council, a trade association. She formerly served in the Department of Environmental Protection under Gov. Tom Ridge as the lead legislative liaison, where she successfully steered legislation through the General Assembly to create the Department of Environmental Protection and the Department of Conservation and Natural Resources. She also previously worked as a research analyst for the Pennsylvania House of Representatives. Commissioner Witmer has served as a member of Women in Pennsylvania Government Relations and the Pennsylvania Association for Government Relations, and has been involved with the Historical Society of East Hanover Township, the YMCA Youth and Government Program, and the Escape Center for Domestic Violence. Witmer earned a bachelor s degree in public service from the Pennsylvania State University. A native of Altoona in Western Pennsylvania, Commissioner Witmer resides in Hummelstown, Dauphin County. Steven McElwee, Manager, Corporate Information Security PJM Interconnection, 955 Jefferson Ave., Valley Forge Corporate Center Norristown, PA [email protected] Steven McElwee oversees a variety of cybersecurity functions at PJM Interconnection, including cyber threat and risk analysis, security policy, vulnerability management, security monitoring and response, and cyber forensics. He is responsible for a variety of industry, government, and academic collaborative partnerships related to cybersecurity. He has over 25 years of experience in information technology and cybersecurity roles, the most recent six years at PJM. McElwee is CISSP certified and holds a BA in Computer Science from Thomas Edison, an MBA from Alvernia University, and an MS in Computer Information Systems from Boston University.
3 Biographical Information Alan M. Greenberg, Senior Director IT Security and Risk Compliance PPL Corporation, Two North Ninth Street #GENN1B, Allentown PA Mr. Greenberg is the Senior Director for IT Security and Risk Compliance at PPL Corporation. PPL is an Energy company headquartered in Allentown Pennsylvania and has subsidiaries in Kentucky, Montana and the United Kingdom. Mr. Greenberg is responsible for cyber security, security regulatory compliance and supports security design, implementation, testing across all of the company s business areas. This includes IT Operations; Network and Cloud Systems; Data Centers; Mobile Device Security; policies, technologies, cyber security personnel, and protecting the energy generation operations systems. Mr. Greenberg has previously served as Technical Director for Boeing s Cyber Security Business Unit; supporting activities in the federal sector, energy, aviation, automotive and satellite industries and Department of Defense programs; Additionally, Mr. Greenberg has also been with Raytheon s Communication Network Group Division as the Information Assurance Group Program Manager. Alan is retired from the U.S. Army as a Signal Corps Officer serving in a variety of assignments including Battalion, Brigade and Division G6 assignments, Signal Battalion Operations Officer; serving on multiple communication systems fielding teams; Communications Officer at the VII Corps TAC during Desert Storm, and as a Program Manager at NSA s Information Assurance Division. Mr. Greenberg has a MSA from Central Michigan University and a B.S. from Western Illinois University.
4 Cybersecurity and the Commission s Initiatives with the Regulated Utilities Commissioner Pamela Witmer Manufacturers Education Council Conference October 23, 2013
5 PA PUC Role in Cybersecurity Ensure Compliance with law and regulation Conduit of information Break down silos: State Federal Industry Sectors Industry Sectors We are ALL working toward a common goal
6 Public Utility Confidential Security Information Disclosure Protection Act (Act 156 of 2006) Two Key elements of the statute: Exempts from disclosure, including Right to Know Requests, confidential security information Penalizes Commission employees for disclosing covered information
7 PA PUC Utility Security Regulations 2005 All hazards approach to security planning events may have impacts in multiple areas Requires utilities to identify mission critical functions and equipment Develop plans covering physical security, cybersecurity, emergency response, and continuity of business operations Submission of a self certification Annually review, alter and TEST
8 How does the PA PUC certify compliance with the regulations? Technical Utility Services PUC s Emergency Coordinator may visit Participate in drills Ask questions Do inspections/investigations as needed Audits Management Audit Division Will perform audits on all utilities whose plant in service is valued at not less than $10,000,000 May help in special investigations as needed Tasked with performing a one time Emergency Preparedness Audit of all PUC jurisdictional water companies regardless of size
9 What Else is the PUC Doing? Released a draft Policy Statement Critical Infrastructure Interdependency Working Group Creating a voluntary cybersecurity contact list for our regulated and nonregulated companies Creating a set of best practices that will be provided to industry partners Facilitated cybersecurity workshop with US DHS and PA OHS for regulated and non regulated companies Started a multi state Commission working group Working with the PUC IT folks and the Administration s OA to review and harden the Commission s systems Developing cybersecurity training for Commission staff
10 We Are ALL Working Toward a Common Goal Ensure Compliance with law and regulation Conduit of information Break down silos: State Federal Industry Sectors Industry Sectors We are ALL working toward a common goal
11 Protecting the Power Grid Against Cyber Attacks Steven McElwee Manager, Corporate Information Security PJM Interconnection PJM 2013
12 Reliability Grid Operations Supply/Demand Balance Transmission monitoring 1 PJM Focus on Just 3 Things Regional Planning 15 Year Outlook 2 Market Operation Energy Capacity Ancillary Services PJM 2013
13 Air Traffic Control for the Electric Power Grid 10 PJM 2013
14 PJM as Part of the Eastern Interconnection KEY STATISTICS Member companies 800+ Millions of people served 61 Peak load in megawatts 165,492 MWs of generating capacity 183,604 Miles of transmission lines 62, GWh of annual energy 793,679 Generation sources 1,376 21% of U.S. GDP produced in PJM Square miles of territory 243,417 States served 13 + DC As of 6/1/ PJM 2013
15 Cyber Threats to PJM NATION STATES Phishing, Malware, APT, Network Scans CRIMINALS Phishing, Malware, Drive-by Attacks edata INSIDERS Cooperation with outside actors, policy abuse, disgruntled HACTIVISTS Distributed Denial of Service, Defacement TERRORISTS Denial of Service, electronic jihad 12 PJM 2013
16 Security Starts at the Top CEO Champion of corporate cyber security goal Sponsors increased investment in cyber security SVP, Operations VP, Information Technology Services Chief Security Officer Director, IT Operations & Infrastructure Director, IT Support Services Security Program Product Owners Directs priorities and assigns resources 13 PJM 2013
17 Information Security Strategic Framework Risk Assessment R I S K T R E A T M E N T P L A N S Cyber Attacks DEFEND RESPOND EDUCATE PARTNER Metrics Measure Effectiveness 14 PJM 2013
18 Vulnerability Management Penetration Testing Vulnerability Assessment Security Assessment Committee Security Patch Management 15 PJM 2013
19 Round the Clock Security Monitoring Level 1 Level 2 Business Hours Escalation Escalation Level 2 On-Call After Hours Level PJM 2013
20 Spear Phishing Campaigns Baseline 20% Results 4% 17 PJM 2013
21 Cyber Risk Information Sharing Program CRISP Industry Participants 18 PJM 2013
22 Cyber Security in Energy Companies Presentation to MEC Conference Alan Greenberg Senior Director IT Security October 23, 2013
23 PPL Corporation One of the largest companies in the U.S. utility sector $12 Billion Dollar Company and a Fortune 200 Company Headquartered in Allentown, PA, PPL controls or owns approximately 19,000 megawatts of generating capacity in the United States Supports Power Generation in Pennsylvania, Kentucky, Montana and the U.K PPL Corporation
24 Today s Grid has Increased Connectivity Critical Loads Energy Consuming Equipment Non-Critical Loads Housing Electric Vehicles (Charging & Storage) Distributed Energy Resources (DER) Wind Solar Storage Other Installation Utility Grid Interface Intelligent Sub Station Intelligent Transformer Vault (HTV) Distributed Generators Geothermal Power On-Site Peaker Purchase/Demand Response/ Stability Support Utilities Energy Providers Installation or Regional Networked Energy Operations Center (NEOC) Energy Demand Driving Information Every node on the System represents a Point of System Entry for an attack 2013 PPL Corporation Points of System Entry 21
25 Security Challenges Facing Utilites External threats Sharp rise in external attacks from non-traditional sources Cyber attacks Organized crime Corporate espionage Denial-of-Service Attacks State-sponsored attacks Social engineering Phishing and executive attacks Internal threats Ongoing risk of careless and malicious insider behavior Administrative mistakes Careless inside behavior Internal breaches Disgruntled employee actions Mix of private / corporate data Insider attacks Compliance Growing need to address an increasing number of mandates National regulations Industry standards Local mandates Potential new legislation Mobility Generation Operational Impact Intelligent Substations Operations Center Protecting Customer Data 2013 PPL Corporation
26 The Big Picture - Good News PPL and most Utilities have a solid foundation in cyber security technology, policies, processes and people. Board-level and executive leadership emphasizing the importance of cyber security. Business line management realizes the importance and desires to build secure operational system. Good security awareness programs. Cyber security groups are talented. A major strength for cyber security is the NERC compliance program PPL Corporation
27 Remember Your Security is Only As Good As Your Entire System 2013 PPL Corporation
28 2013 PPL Corporation Questions?
Security Metrics & The Boardroom How does security articulate business value. Rick Miller IBM, Director Managed Security Services
Security Metrics & The Boardroom How does security articulate business value Rick Miller IBM, Director Managed Security Services Session ID: SECT-203 Session Classification: General Interest 2011 The Year
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
Cybersecurity & Public Utility Commissions
Cybersecurity & Public Utility Commissions November 12, 2014 TCIPG Ann McCabe, Commissioner Illinois Commerce Commission NARUC (National Association of Regulatory Utility Commissioners) Cybersecurity Primer
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?
Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So? Bruce Heiman K&L Gates September 10, 2015 [email protected] (202) 661-3935 Why share information? Prevention
Presentation for The National Commission for Energy State Regulation of Ukraine
Presentation for The National Commission for Energy State Regulation of Ukraine Todd Keech Laura Walter PJM Interconnection June 17, 2014 What is PJM? 1 What is PJM? ISO RTO Map Part of Eastern Interconnection
North Texas ISSA CISO Roundtable
North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton
Threats to Local Governments and What You Can Do to Mitigate the Risks
Association of Minnesota Counties Threats to Local Governments and What You Can Do to Mitigate the Risks Andrew Dolan Director of Government Affairs Multi-State Information Sharing and Analysis Center()
JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile
JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
S. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
Cybersecurity Awareness. Part 1
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
2014 Montana Government IT Conference. Securing Data Networks and People
Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
CYBERSECURITY HOT TOPICS
1 CYBERSECURITY HOT TOPICS Secure Banking Solutions 2 Presenter Chad Knutson VP SBS Institute Senior Information Security Consultant Masters in Information Assurance CISSP, CISA, CRISC www.protectmybank.com
Cyber security: Practical Utility Programs that Work
Cyber security: Practical Utility Programs that Work Securing Strategic National Assets APPA National Conference 2009 Michael Assante Vice President & CSO, NERC June 15, 2009 The Electric Grid - Challenges
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
PJM Interconnection LLC Regional Transmission Organization (RTO)
PJM Interconnection LLC Regional Transmission Organization (RTO) ComEd Generator Interconnection Meeting October 2015 William Patzin PJM Infrastructure Coordination October 2015 PJM 2013 Nine Major North
Working with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
Cybersecurity Primer
Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
ELECTRIC VEHICLES WITH V2G
ELECTRIC VEHICLES WITH V2G Willett Kempton University of Delaware and Mid-Atlantic Grid Interactive Cars Consortium Presented at DE Economic Development Workgroup 30 July 2008 OLD SCHOOL EVS NiMH or (gasp!)
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Professional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
New York State Energy Planning Board. Cyber Security and the Energy Infrastructure
New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August
Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security
Enterprise Security Governance Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security Governance and Organisational Model Risk Mgmt & Reporting Digital Risk & Security
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
Panel Session: Lessons Learned in Smart Grid Cybersecurity
PNNL-SA-91587 Panel Session: Lessons Learned in Smart Grid Cybersecurity TCIPG Industry Workshop Jeff Dagle, PE Chief Electrical Engineer Advanced Power and Energy Systems Pacific Northwest National Laboratory
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE
STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE COMMITTEE ON ENERGY AND NATURAL RESOURCES UNITED STATES SENATE
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 1 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V2 Company Name: The Boeing Company December 10, 2012 1 Interim Techlogy Performance Report 1
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Cybersecurity Awareness
Awareness Objectives Discuss the Evolution of Data Security Define Review Threat Environment Discuss Information Security Program Enhancements for Cyber Risk Threat Intelligence Third-Party Management
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015
An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans NICE Annual Conference November 2015 Panelists David Brown, Director of CyberTalent at the SANS Institute, a new business unit
WEST HANOVER TOWNSHIP BOARD OF SUPERVISORS 7171 ALLENTOWN BOULEVARD, HARRISBURG, PA 17112 MONDAY, AUGUST 13, 2012 WORKSHOP SESSION: 6:00 PM
WEST HANOVER TOWNSHIP BOARD OF SUPERVISORS 7171 ALLENTOWN BOULEVARD, HARRISBURG, PA 17112 MONDAY, AUGUST 13, 2012 WORKSHOP SESSION: 6:00 PM CALL TO ORDER 6:00 p.m. Mr. Megonnell called the workshop to
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)
Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Cyber in the News 1 Tactics, Techniques and Procedures These observed tactics, techniques
Delving Into FCC's 'Damn Important' Cybersecurity Report
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Delving Into FCC's 'Damn Important' Cybersecurity
I N T E L L I G E N C E A S S E S S M E N T
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
Business Continuity for Cyber Threat
Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
Preservation of longstanding, roles and missions of civilian and intelligence agencies
Safeguards for privacy and civil liberties Preservation of longstanding, respective roles and missions of civilian and sharing with targeted liability Why it matters The White House has pledged to veto
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order
Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses
Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:
Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony
Top 10 Baseline Cybersecurity Controls Banks Aren't Doing
Top 10 Baseline Cybersecurity Controls Banks Aren't Doing SECURE BANKING SOLUTIONS 1 Contact Information Chad Knutson President, SBS Institute Senior Information Security Consultant Masters in Information
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
THE WORLD IS MOVING FAST, SECURITY FASTER.
THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS
Oil & Gas Cybersecurity
COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
