Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.



Similar documents
N-Dimension Solutions Cyber Security for Utilities

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

The Importance of Cybersecurity Monitoring for Utilities

future data and infrastructure

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Cyber Security. Smart Grid

Industrial Cyber Security 101. Mike Spear

Cyber Security and Privacy - Program 183

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Cyber Security Seminar KTH

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

North American Electric Reliability Corporation (NERC) Cyber Security Standard

FERC, NERC and Emerging CIP Standards

Energy Cybersecurity Regulatory Brief

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

NIST Cybersecurity Framework What It Means for Energy Companies

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

AURORA Vulnerability Background

Communication Security Measures for SCADA Systems

ABB s approach concerning IS Security for Automation Systems

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Protecting against cyber threats and security breaches

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

A Regulatory Approach to Cyber Security

SCADA Security: Challenges and Solutions

Are you prepared to be next? Invensys Cyber Security

How To Protect Yourself From A Hacker Attack

NERC CIP Compliance with Security Professional Services

Regulatory Compliance Management for Energy and Utilities

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Cybersecurity The role of Internal Audit

Incident Response. Proactive Incident Management. Sean Curran Director

What is Really Needed to Secure the Internet of Things?

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

TRIPWIRE NERC SOLUTION SUITE

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Risk Management in Practice A Guide for the Electric Sector

Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr.

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Cybersecurity and internal audit. August 15, 2014

CIP Supply Chain Risk Management (RM ) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

Document ID. Cyber security for substation automation products and systems

Resilient and Secure Solutions for the Water/Wastewater Industry

William Hery Research Professor, Computer Science and Engineering NYU-Poly

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Bellevue University Cybersecurity Programs & Courses

Cybersecurity Enhancement Account. FY 2017 President s Budget

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Data Breach Response Planning: Laying the Right Foundation

NERC CIP VERSION 5 COMPLIANCE

OEB Smart Grid Advisory Committee

Smart Grid Cybersecurity

Cyber Security Compliance (NERC CIP V5)

External Supplier Control Requirements

Continuous Network Monitoring

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Security in the smart grid

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

SCADA Security Training

Cybersecurity: Protecting Your Business. March 11, 2015

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Oil & Gas Cybersecurity

FINRA Publishes its 2015 Report on Cybersecurity Practices

Implementation Plan for Version 5 CIP Cyber Security Standards

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

How Much Cyber Security is Enough?

The Protection Mission a constant endeavor

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Securing the Cloud Infrastructure

STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE

Transcription:

Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets

Presentation Topics Introductions Cyber Security Risk and Threats to the Energy Sector Cyber Security Concepts for the Energy Sector Implications for Grid Operators Q & A - 2 -

N-Dimension an industry leader since 2002 2012 award winner for Industrial Cyber Security Smart Grid Fund Recipient 2012 Hometown Connections Partner of the Year Smart Grid Leader Designation Vice chair and principal author of IEEE 1711 NESCO Founding Member Advisory Board for Trustworthy Computing Co-Editor NISTIR 7628 Vol. 3, Chapter 7 2013 Business Award Recipient - 3 -

Cyber Security Risks and Threats to the Energy Sector - 4 -

The cyber threat is escalating -5-

Energy is the most targeted sector Incident Response Activity First Half FY 2013 Results Total attacks are trending up 198 in total FY 2012 204 in first half FY 2013 93, 46% 111, 54% Energy attacks are increasing 82 in total FY 2012 111 in first half FY 2013 Oct 2012 May 2013 ICS-CERT Monitor Oct Dec 2013 ICS-CERT Monitor April Jun3 2013 Many of these (FY 2012) incidents targeted information pertaining to the ICS/SCADA environment, including data that could facilitate remote access and unauthorized operations.. - 6 -

Threat emphasized at leading hacker conferences By Heather Kelly, CNN updated 2:02 PM EDT, Mon August 5, 2013 The five scariest hacks we saw last week Industrial facilities Remote-controlled cars Compromising smartphones The too-smart home Hackers get personal most frightening targets highlighted at the conference. Multiple demonstrations showed just how simple it is to hack energy systems. on an actual oil well, the (mock) hack could result in an environmental catastrophe, according to the researchers. It's possible to shut down an entire industrial facility from 40 miles away There is no built-in system for releasing software patches, like there is with personal computers. - 7 -

All operators are at risk HIGHER Cyber-security resources LOWER Most Vulnerable o Smallest Utilities Impact from Attack o o Largest IOUs Most Impact o Transmission Operators o Generators o Distribution Utilities Other IOUs HIGHER - 8 -

It s a continuous and growing challenge Advanced Persistent Threats + Increasing Automation + Grid Interconnectedness - 9 -

Industry frameworks / standards / regulations Department Of Energy Federal Energy Regulatory Commission Standards Organizations North American Electric Reliability Corporation National Institute of Standards and Technology - 10 -

There is no official solution If I had a cyber threat that was revealed to me in a letter tomorrow, there is little I could do the next day to ensure that that threat was mitigated effectively by the utilities that were targeted. Federal Energy Regulatory Commission Chairman Jon Wellinghoff September, 2012 Source: The Hill - 11 -

Cyber Security Concepts for the Energy Sector - 12 -

Elements of cyber security risks Threat Vectors Vulnerabili*es - 13 -

Dangerous and common myths 1. Cyber security is only an issue for larger operators. 2. We re not a target. 3. We have a firewall we re secure. 4. This is an IT issue. 5. My vendor says that their system is 100% secure. - 14 -

Attack surface and attack vectors Vendors Third Parties Internet Customers External Attack Vectors Utility Enterprise Systems Utility Operations Systems Internal Attack Vectors Advanced Metering Substations Distribution Automation External Attack Vectors - 15 -

Implications for Grid Operators 3 2 1 Insurance Cost to recover vs. cost of protection Rate recovery 5 4 Privacy Regulations / Compliance - 16 -

Cyber security risks are a key insurance issue http://www.insurancejournal.com/magazines/features/2013/08/19/301657.htm 41 percent of large businesses (those with 500-plus employees) believe cyber security risks are greater than other insurable business risks such as natural disasters, 88 percent currently own or plan to purchase cyber security coverage in the near future. Of the 56 percent of respondents that had breaches, the average cost of these incidents was reported at $9.4 million in the last 24 months. Respondents quantified the average potential maximum financial risk of a data breach at $163 million, with some projecting more than $500 million in damages. - 17 -

Recovery cost benchmarks Unlimited 20x Additional costs arising from privacy breaches and other litigation Utility industry cost to recover vs. cost to protect N-Dimension actual data 5x 15% 5% Industry standard cost recover vs. cost to protect Cost to secure as a percentage of total IT investment Industry standard for banking and telecom Cost to secure as a percentage of total IT investment Proven in distribution utilities - 18 -

Rate Recovery NARUC N-Dimension recently presented to NARUC Top Priority Cyber security was one of their top priorities Buy In Discussion of linking cyber security protection to utility rate cases (California leading by example) - 19 -

Privacy issues are front page news Privacy Best Practices 1. Proactive not Reactive; Preventative not Remedial 2. Privacy as the Default Setting 3. Privacy Embedded into Design 4. Full Functionality Positive-Sum, not Zero-Sum 5. End-to-End Security Full Lifecycle Protection 6. Visibility and Transparency Keep it Open 7. Respect for User Privacy Keep it User-Centric Source: Privacy by Design - 20 -

Security vs. Compliance Utilities are focusing on regulatory compliance instead of comprehensive security. GAO-11-117 NERC CIP standards becoming more pervasive and covering more assets FERC NERC CIP 5 News Release Compliance can easily be achieved as a by-product of an effective cyber security strategy and program - 21 -

Solution = defense-in-depth strategy Identify Isolate Insulate Elements of a Defense in Depth Strategy Electronic security perimeters Monitoring Layered defenses Cyber-resilience Supported by vulnerability assessments and penetration tests People Technology Operations - 22 -

Benefits of comprehensive cyber-security Reliability Less chance of service interruption Revenue Assurance Attack mitigation for core revenue producing assets Risk Mitigation Complies with indemnification requirements - 23 -

Summary All utilities /operators in the energy sector are at risk Doing nothing is not an option It is 5 20 x more costly to recover Defense-in-depth is the goal for operators of all size This is not an IT issue, it is a matter of: Local, provincial, and national security Risk management Revenue assurance for the operator - 24 -

Q & A - 25 -

Thank You Doug Westlund CEO N-Dimension Solutions Inc. Office: 905.707.8884 x227 Mobile: 416.997.8833 doug.westlund@n-dimension.com - 26 -