Cybersecurity in the Energy/Utility Sectors



Similar documents
New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

CYBERSECURITY RISK MANAGEMENT

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012

How Secure is Your SCADA System?

U.S. Cyber Security Readiness

Securing the Grid. Marianne Swanson, NIST Also Moderator Akhlesh Kaushiva (AK), DOE Lisa Kaiser, DHS Leonard Chamberlin, FERC Brian Harrell, NERC

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team. National Cybersecurity and Communications Integration Center

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Resilient and Secure Solutions for the Water/Wastewater Industry

Which cybersecurity standard is most relevant for a water utility?

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Keeping the Lights On

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

CYBER SECURITY GUIDANCE

Energy Cybersecurity Regulatory Brief

Communication Security Measures for SCADA Systems

N-Dimension Solutions Cyber Security for Utilities

AURORA Vulnerability Background

( 4EC C11392)

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Thomas J. Schlagel Chief Information Officer, BNL

Cybersecurity and the Evolving Role of State Regulation: How it Impacts the California Public Utilities Commission

Actions and Recommendations (A/R) Summary

National Health Information Sharing & Analysis Center. The National Health ISAC (NH-ISAC) NH-ISAC

Subject: Critical Infrastructure Identification, Prioritization, and Protection

PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

What is Cyber Liability

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

OPC & Security Agenda

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Preventing and Defending Against Cyber Attacks June 2011

Preventing and Defending Against Cyber Attacks November 2010

WHITE PAPER PROTECTING OUR CRITICAL UTILITIES WITH INTEGRATED CONTROL SYSTEMS PROTECTING OUR CRITICAL UTILITIES WITH INTEGRATED CONTROL SYSTEMS

National Cybersecurity & Communications Integration Center (NCCIC)

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

NH!ISAC"ADVISORY"201.13" NATIONAL"CRITICAL"INFRASTRUCTURE"RESILIENCE"ANALYSIS"REPORT""

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

National Initiative for Cyber Security Education

Cyber Security and Privacy - Program 183

Hacking the Industrial SCADA Network II The Latest Threats to Automated Production and Process Management Networks

Critical Infrastructure Security and Resilience

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Roadmaps to Securing Industrial Control Systems

NH-ISAC. Cybersecurity Resilience Securing the Infrastructures that Secure Healthcare & Public Health. The National Health ISAC

FBI AND CYBER SECURITY

What Risk Managers need to know about ICS Cyber Security

A Regulatory Approach to Cyber Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:

Department of Homeland Security Federal Government Offerings, Products, and Services

Cyber security: Practical Utility Programs that Work

Middle Class Economics: Cybersecurity Updated August 7, 2015

Managing Cyber Risks to Transportation Systems. Mike Slawski Cyber Security Awareness & Outreach

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

How To Protect Water Utilities From Cyber Attack

The Importance of Cybersecurity Monitoring for Utilities

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES


Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Confrontation or Collaboration?

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

ICS-CERT Incident Response Summary Report

Defending Against Data Beaches: Internal Controls for Cybersecurity

Oil & Gas Cybersecurity

No. 33 February 19, The President

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Cyber and Mobile Landscape, Challenges, & Best Practices

How To Write A National Cybersecurity Act

IEEE-Northwest Energy Systems Symposium (NWESS)

Cybersecurity: What CFO s Need to Know

Transcription:

Cybersecurity in the Energy/Utility Sectors Hon. Todd Snitchler Chairman Thomas Pearce Senior Utility Specialist Chair, NARUC Staff Subcommittee on Critical Infrastructure Thursday, March 21, 2013 Ohio Gas Association Technical Seminar

Agenda Purpose: to provide an introduction to issues, concepts, and vocabulary to facilitate action What is cybersecurity? Threats Principles of preparedness Role of government & regulators Where do we go from here?

Recent Headlines DHS: 40 percent of cyberattacks targeted energy sector (The Hill) Decoy ICS/SCADA Water Utility Networks Hit By Attacks (Dark Reading) U.S. Steps Up Alarm Over Cyberattacks (WSJ) Cyberattack leaves natural gas pipelines vulnerable to sabotage (CSMonitor) US Government Warns Over Vulnerable Control Systems (BBC) Obama Cybersecurity Order Lacks Bite, Security Experts Say (NetworkWorld) Cyber Threats To Energy Sector Happening At Alarming Rate (WSJ) U.S. Homeland Chief: Cyber 9/11 Could Happen Imminently (Reuters) DHS Warns of Password-Cracker Targeting Industrial Networks (Nextgov)

Recent Headlines (cont d) DHS Warns of Password-Cracker Targeting Industrial Networks (Nextgov) Malicious Virus Shuttered U.S. Power Plant DHS (Reuters) Federal Reserve Hacked (Guardian UK) Hackers in China Attacked the NY Times For Last 4 Months (NYTimes) China Hacked the Wall Street Journal, Too (The Atlantic Wire) Chinese Army Unit Is Seen As Tied To Hacking Against U.S. (NYTimes) One-Third of Cyber Attack Traffic Originates in China, Akamai Says (Bloomberg) Nations Prepare For Cyber War (CNN) Hacktivist Campaigners Claim To Have Stolen Accounts From A Number Of Organizations Including NASA, The Pentagon And The Federal Reserve (ZDNet)

What is it? Cybersecurity National Institute of Standards and Technology (NIST): The ability to protect or defend the use of cyberspace from cyber attacks.

Cybersecurity I think information sharing is a top priority. Hon. Cheryl LaFleur, Commissioner, Federal Energy Regulatory Commission, when questioned about cybersecurity, Tuesday, March 19, 2013, before the U.S. House of Representatives Energy & Commerce Committee hearings on Gas/Electric coordination

Cybersecurity There have been cyber attacks on systems that control plants being turned on/off; they are like FERC fuel neutral. We need to guard against risks to energy management systems, wherever they are. Hon. Cheryl LaFleur, March 19, 2013 testimony to House Energy & Commerce Committee

Cybersecurity Isn t just stopping bad guys Vulnerabilities include: Software bugs User errors Control system equipment malfunctions Communications equipment failures Deliberate intrusions and sabotage

Information Security 101 Devices generate & transmit data; converted to intelligence; someone or something takes action based on that intelligence Being smarter introduces new vulnerabilities that need to be managed Connectivity: how systems talk to each other can be exploited and should be protected at each stage of communication

Information Technology Systems Corporate IT/business systems Industrial Control Systems/Supervisory Control And Data Acquisition (ICS/SCADA) (SCADA e.g., power generation, gas transmission, water treatment, telecommunications)

Current Topics & Trends Vulnerabilities Increasing threats Stuxnet, Duqu, Gauss, Flame, miniflame, Shamoon Types of actors Types of threats SmartGrid

Shodan Have you heard of it? What is it? Who? John Matherly There s an app for that

Transportation 3% Telecom 2% Health 2% Nuclear 3% THREAT LANDSCAPE Internet-facing 11% Incidents By Sector FY2012 Water 15% Critical mfg 4% Financial 0% Agriculture 1% Chemical 4% Commercial Facilities 10% Energy 41% Dams 0% Agriculture Financial Chemical Commercial Facilities Dams Energy Government IT Internet-facing Nuclear Health Telecom IT 0% Transportation Water Government 4% ICS-CERT Data Critical mfg

Cybersecurity is one element of all-hazards preparedness

Implications for Utilities Delivery of services Reliability (& $) Industry actions & response OGA AGA: ONG SCC & CSWG (Denbow)

Industry Actions & Response NIST/SGIP CSWG NERC AGA ONG SCC

National Infrastructure Protection Plan (NIPP) Sector Partnership Model

Some Government Actions & Response NIST/SGIP CSWG U.S. Department of Homeland Security: National Cyber Security Division (CSET Tool, US- CERT/ICS-CERT, ICSJWG) ICS-CERT fly-away teams (Springfield MO water utility) ICS-CERT Active Cyber Campaigns Against the U.S. Energy Sector Briefings (9 conducted @ US late fall 2012) U.S. Department of Defense: CyberComm

Government Actions & Response (cont d) U.S. Department of Energy: Cybersecurity for Energy Delivery Systems (CEDS) Roadmap to Achieve Energy Delivery Systems Cybersecurity 2011 Cross-Sector Roadmap for Cybersecurity of Control Systems The Vulnerability Analysis of Energy Delivery Control Systems - 2011 Guide to Developing a Cyber Security and Risk Mitigation Plan ESC2M2 (Elec. Sector Cybersecurity Capability Maturity Model) NESCO (Nat l Electric Sector Cybersecurity Org)

Issues of Preparedness Assessments Equipment Policies: do you have a formal written employee internet security policy? Responses/action plans Do you have a cyber element/plan? Standards Information sharing

Aurora & Stuxnet Aurora: DHS/DOE experiment to hack generator control system Stuxnet: computer worm targeting Mid- East nuclear infrastructure

Some Things You Can Do Know what you need to protect Enforce strong password policies Map out a disaster preparedness plan Encrypt confidential information Use a reliable security solution Protect information completely Stay up to date Educate employees

Roles of State Commissions Cost recovery guidelines investment prudence Sensitive information develop handling protocols Rapid information sharing methods Review utility emergency response plans Regulatory oversight of reliability Promote State emergency planning efforts Understand interdependencies Engage in regional coordination and response

Some State Actions Regarding Cybersecurity NARUC: Cybersecurity for State Regulators State level actions: MO PSC: current review and formal dialogue with state utilities PA PUC: annual certification process; dialogue with state utilities CPUC: SmartGrid & SGIP CS, OH PUC: informal dialogue with state utilities TX PUC: SmartGrid & SGIP CS; work w/ercot

Ohio Partnerships Chairman Snitchler: Co-Vice-Chair, NARUC Committee on Gas Thom Pearce: Chair, NARUC Staff Subcommittee on Critical Infrastructure Congress: Sens. Portman & Brown, Reps. Latta & Stivers, among others Federal agencies: DHS (including ICSJWG), DOE, FCC, DoD U.S. CIPAC member Energy GCC (w/ong SCC)

Ohio Partnerships DOE CEDS Program Evaluation Panel DOE Labs: INL, PNNL, SNL OHS: SAIC weekly briefings; monthly classifieds OHSAC & CSWG DHS PSAs: Pat Shaw/Jim Emery DHS CSA NAESB Advisory Council & Cyber Task Force

Private & Public Sector Responsibilities Cyber secure utility operations: utilities Defend against nation-state cyber attacks: national defense & law enforcement Effective cybersecurity: utility/regulator/federal partners

Where Do We Go From Here? [Dialogue/discussion]

Questions? Todd A. Snitchler, Chairman Thomas Pearce, Senior Utility Specialist thomas.pearce@puc.state.oh.us 614.466.1846