Risk Management in Practice A Guide for the Electric Sector



Similar documents
Cyber Security and Privacy - Program 183

CONCEPTS IN CYBER SECURITY

NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION: ENERGY SECTOR APPROACH

Nadya Bartol, CISSP, CGEIT VP, Industry Affairs and Cybersecurity Strategist UTC (Utilities Telecom Council) USA Utilities Telecom Council 1

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

Understanding the NIST Cybersecurity Framework September 30, 2014

future data and infrastructure

C2M2 and the NIST Cyber Framework: Applying DOE's NIST Cyber Security Framework Guidance

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Information Bulletin

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

This chapter provides an overview of cyber security issues and activities by state and federal organizations Cyber security is an ongoing, high

Why you should adopt the NIST Cybersecurity Framework

The NIST Cybersecurity Framework

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Introduction to the Cyber Security Working Group

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Protect Your Assets. Cyber Security Engineering. Control Systems. Power Plants. Hurst Technologies

Framework for Improving Critical Infrastructure Cybersecurity

Looking at the SANS 20 Critical Security Controls

Building Security In:

Cybersecurity: The Legal, Legislative and Regulatory Outlook

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

NIST Cybersecurity Framework What It Means for Energy Companies

Framework for Improving Critical Infrastructure Cybersecurity

Building Insecurity Lisa Kaiser

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Assessing the Effectiveness of a Cybersecurity Program

Framework for Improving Critical Infrastructure Cybersecurity

Cyber Security. Doug Houseman Engineering Consulting Research. Modeling Simulation Security. The Practical Grid Visionaries TM

U.S. DEPARTMENT OF ENERGY ENERGY SECTOR CYBERSECURITY OVERVIEW. November 12, 2012 NASEO

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division

The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Guide to Developing a Cyber Security and Risk Mitigation Plan Update 1

Which cybersecurity standard is most relevant for a water utility?

Defending Against Data Beaches: Internal Controls for Cybersecurity

NIST Cybersecurity Framework & A Tale of Two Criticalities

FINRA Publishes its 2015 Report on Cybersecurity Practices

POLICIES TO MITIGATE CYBER RISK

Cybersecurity: What CFO s Need to Know

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012

Cybersecurity The role of Internal Audit

The Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy

IEEE-Northwest Energy Systems Symposium (NWESS)

Business Continuity for Cyber Threat

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

Changing Legal Landscape in Cybersecurity: Implications for Business

Managing Liabilities from Cyber Threats Using the SAFETY Act

Information Technology Risk Management

Cyber Security & State Energy Assurance Plans

William Hery Research Professor, Computer Science and Engineering NYU-Poly

DOE Cyber Security Policy Perspectives

NIST Cybersecurity Framework Manufacturing Implementation

istockphoto/ljupco 36 June 2015 practicallaw.com 2015 Thomson Reuters. All rights reserved.

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

How To Write A Cybersecurity Framework

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Cybersecurity Landscape for the Utility Industry and Considerations for State Regulators

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide

Implementing the U.S. Cybersecurity Framework at Intel A Case Study

Program Overview and 2015 Outlook

Cyber Security The Leadership Opportunity for Joint Action Agencies APPA Joint Action Workshop

Logging In: Auditing Cybersecurity in an Unsecure World

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

Industrial Cyber Security 101. Mike Spear

Bridging the Security Governance Divide in Utilities

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Compliance series Guide to the NIST Cybersecurity Framework

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

N-Dimension Solutions Cyber Security for Utilities

State Governments at Risk: The Data Breach Reality

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Communication Security Measures for SCADA Systems

PROTIVITI FLASH REPORT

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cybersecurity in a Mobile IP World

CForum: A Community Driven Solution to Cybersecurity Challenges

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Cybersecurity Risk Assessment in Smart Grids

Roadmaps to Securing Industrial Control Systems

ISACA North Dallas Chapter

Improving Critical Infrastructure Cybersecurity Executive Order Preliminary Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework

Information Security in Business: Issues and Solutions

PREPARED DIRECT TESTIMONY OF SCOTT KING ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY

Transcription:

Risk Management in Practice A Guide for the Electric Sector Annabelle Lee Senior Technical Executive ICCS European Engagement Summit April 28, 2015

Before we continue let s get over our fears and myths with some much needed levity The following three slides are based on a briefing given by Daniel Thanos of Telos 2

The Einstein Defense Sum of All Myths Myth: Our systems are so proprietary and esoteric that Einstein himself couldn t figure them out so hackers have no chance 3 Reality: Whatever can be engineered can be reverseengineered and Stuxnet is the proof

Wishful Immunity Sum of All Myths Myth: There is no problems here just happy and trusted people working on reliable and isolated systems Fact: Sophisticated attackers use trusted people and privileged access without the target s knowledge Attackers usually succeed when security is exclusively perimeter and trust based 4

Mordac Syndrome Sum of All Myths Myth: Security reduces reliability and degrades capabilities and prices us out of existence Fact: Correctly engineered security increases reliability and reduces costs and risks due to poor design and systemic failures 5

General Risk Assessment Approach Risk Assessment Methodology Asset /System Characterization Threat Agent Characterization Vulnerability Assessment Impact Analysis Threat Likelihood Assessment Risk Determination Security Requirements/ Controls NO Risk Acceptable? YES 6

Risk Assessment Methodology (2) Implementation and Assessment Phases Ongoing Monitoring Testing and Exercising System Implementation YES Successful Risk Mitigation? Risk Assessment Risk Acceptable? NO Security Controls 7

Cybersecurity Capability Maturity Model (C2M2) Overview Expansion Project and Comparative Analysis

Department of Energy Risk Management Process The risk management cycle: Risk Framing (i) Risk framing (i.e., establish the context for risk-based decisions) (ii) (iii) Risk assessment Risk response once determined, and Risk Monitoring Risk Assessment (iv) Risk monitoring on an ongoing basis. Risk management is carried out as an organization-wide activity Risk Response Risk Management Cycle 9

Categories Subcategories Informative References MIL 1 MIL 2 MIL 3 MIL 1 MIL 2 MIL 3 Framework Implementation Guidance Mapping (Project #1) CSF Core C2M2 CSF Tiers C2M2 C2M2 Practices CSF Tiers C2M2 Practices Functions IDENTIFY Tier 1: Partial PROTECT DETECT RESPOND RECOVER Tier 2: Risk Informed Tier 3: Repeatable Tier 4: Adaptive 10

Objectives Practices C2M2 Comparative Analysis (Project #2) C2M2 Industry Standards Domains Cyber Security Framework NISTIR 7628 SP 800-53 NRECA Cyber Security Guidelines Others as requested by industry Risk Management Asset, Change, & Configuration Management Identity and Access Management Cyber Program Management 11

Objectives Practices C2M2 Comparative Analysis Process C2M2 Domains Risk Management Asset, Change, & Configuration Management Identity and Access Management NRECA Cyber Security Guidelines Many sector-specific standards, such as the NRECA Cyber Security Guidelines, have already been mapped directly to the C2M2. In these cases, the maps are easily ported into the C2M2 expansion as a module. Cyber Program Management 12

C2M2 Comparative Analysis Process NIST SP 800-53 With the release of the Framework, even more standards are available. ISO 2700x NIST Cybersecurity Framework NISTIR 7628 By leveraging the maps that apply to the Framework, as well as industry s map of the C2M2-Framework, the expansion can include other modules with very little effort. ISA 99 / IEC 62443 COBIT 5 13

Risk Management in Practice A Guide for the Electric Sector EPRI Technical Update: 3002003333 14

Assessing and Monitoring Risk Issue There are many cyber security risk assessment and security requirements documents, tools and methods, making it difficult for a utility to show how they meet all of the specifications. Project approach Perform a comparative analysis of the NIST Cybersecurity Framework, DOE ES-C2M2, NISTIR 7628, NESCOR Failure Scenarios, NIST SP 800-53, NEI 08-09, NRC 5.71 Create a database to improve the usability of the mappings Value Straightforward reporting to senior management and regulatory agencies to verify conformance with industry frameworks 15

Assessing and Monitoring Risk (2) Department of Energy Electricity Subsector Cybersecurity Capability Maturity Model (DOE ES-C2M2) National Institute of Standards and Technology Interagency Report (NISTIR) 7628 National Electric Sector Cybersecurity Organization Resource (NESCOR) Failure Scenarios NIST Special Publication (NIST SP) 800-53 Nuclear Energy Institute (NEI) 08-09 Nuclear Regulatory Commission (NRC) 5.71 16

17

Example from the Document 18

Moving Forward Cyber security supports both the reliability and privacy of the Smart Grid Address interconnected systems both IT and control systems Cyber security needs to be addressed in all systems, not just critical assets Augment existing protection controls, as applicable Continuously monitor and assess the security status Acknowledge will be some security breaches Focus on response and recovery Fail secure Address both safety and security 19

alee@epri.com 202.293.6345 Discussion 20

Together Shaping the Future of Electricity 21