Cyber Security. Doug Houseman Doug@Enernex.com. Engineering Consulting Research. Modeling Simulation Security. The Practical Grid Visionaries TM



Similar documents
How Much Cyber Security is Enough?

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

IEEE-Northwest Energy Systems Symposium (NWESS)

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

future data and infrastructure

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

William Hery Research Professor, Computer Science and Engineering NYU-Poly

Cyber Security and Privacy - Program 183

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Symphony Plus Cyber security for the power and water industries

Risk Management in Practice A Guide for the Electric Sector

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Cyber Risk to Help Shape Industry Trends in 2014

Data Security Concerns for the Electric Grid

Protect Your Assets. Cyber Security Engineering. Control Systems. Power Plants. Hurst Technologies

Securing the Grid. Marianne Swanson, NIST Also Moderator Akhlesh Kaushiva (AK), DOE Lisa Kaiser, DHS Leonard Chamberlin, FERC Brian Harrell, NERC

Appropriate security measures for smart grids

Introduction. Along with consulting, I previously. developing regulatory policy initiatives

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Facilitated Self-Evaluation v1.0

Cyber Security Seminar KTH

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Three Simple Steps to SCADA Systems Security

Bellevue University Cybersecurity Programs & Courses

NERC CIP VERSION 5 COMPLIANCE

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Challenges and Opportunities for Aligning the Power System Cybersecurity and Reliability Objectives

Claes Rytoft, ABB, Security in Power Systems. ABB Group October 29, 2009 Slide 1

Smart Grid Cybersecurity

Agenda: Secure Power Systems Specialist. Challenges Project description Outcomes & findings. Phase I briefing, August 27, 2012

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

N-Dimension Solutions Cyber Security for Utilities

Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

Cyber Security Health Test

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Document ID. Cyber security for substation automation products and systems

WHITEPAPER. Smart Grid Security Myths vs. Reality

Energy Cybersecurity Regulatory Brief

The Importance of Cybersecurity Monitoring for Utilities

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

Cyber Security The Leadership Opportunity for Joint Action Agencies APPA Joint Action Workshop

Wireless Network Security

Cybersecurity in a Mobile IP World

Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) (Case Study) James Stevens Senior Member, Technical Staff - CERT Division

Department of Management Services. Request for Information

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

Could your utility improve efficiency and performance with third-party services?

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Utility Modernization Cyber Security City of Glendale, California

CONCEPTS IN CYBER SECURITY

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Cyber security measures in protection and control IEDs

From the Lab to the Boardroom:

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

AMI security considerations

Smart Grid Security: A Look to the Future

NASA OFFICE OF INSPECTOR GENERAL

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Information Bulletin

Normen & Standards Industrie 4.0 IEEE Standards

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

How To Protect A Smart Grid From Cyber Security Threats

BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA ) ) ) ) ) )

ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE

Substation Hardening, Security and Monitoring Strategies For Critical Asset Protection, a PNM Case Study Thursday, 7-8AM

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

Leveraging Regulatory Compliance to Improve Cyber Security

PCI DSS: An Evolving Standard

ISACA rudens konference

Virtual Patching: a Proven Cost Savings Strategy

Designing & Implementing. Programs. MBA Bank Expo 2012 April 11, 2012

Advanced Metering Infrastructure Security

10 QUESTIONS TO ASK BEFORE YOU BUY PHONE SERVICE FOR YOUR BUSINESS SHARE THIS DOCUMENT 1

Securing the Electric Grid with Common Cyber Security Services Jeff Gooding

Firewalls for small business

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

Dr. György Kálmán

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Building Insecurity Lisa Kaiser

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Industrial Cyber Security 101. Mike Spear

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Cyber Security Risk Management: A New and Holistic Approach

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Help for the Developers of Control System Cyber Security Standards

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

What is Really Needed to Secure the Internet of Things?

Transcription:

Cyber Security Engineering Consulting Research Modeling Simulation Security Doug Houseman Doug@Enernex.com The Practical Grid Visionaries TM

Warnings The costs given are based on prior projects They may not reflect your local market Items in the lists are based on prior projects They may not reflect everything required Staffing levels are based on prior projects They may not reflect actual needs Experts differ on specifics of security practice You should consult several before accepting any solution Security experts tend to land on the side of more is better

Key Documents IEEE Salary Survey updated annually ieeeusa.org/careers/salary/ SANS 20 sans.org/critical-security-controls/ NERC CIP nerc.com/pa/stand/pages/cipstandards.aspx Organizational Models for Computer Security Incident Response Teams (CSIRTs) resources.sei.cmu.edu/asset_files/handbook/2003_002_001_14099.pdf Common Sense Guide to Mitigating Insider Threats, 4th Edition resources.sei.cmu.edu/asset-view.cfm?assetid=34017 NISTIR 7628: Guidelines for Smart Grid Cyber Security, Revision 1 released September 2014 Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2), v1.1 released February 2014 NIST Framework for Improving Critical Infrastructure Cybersecurity, V1.0 - released February 2014

Things to Remember Security is never DONE the hackers continue to find new ways to get in Security is both a capital exercise and an O&M exercise A chain saw can do as much damage as a hacker but with far more risks of getting caught Insiders cause far more damage than outsiders Most government programs share information but only if you have the right clearance and a need to know Most security staffs work day-shift, hackers know this is true Hackers don t have budget cycles or approval processes for new gear Utilities do

Staffing Security position 24/7 in the control center(s) Transmission, Distribution, Meter Operations all can have control centers Each position takes 5 full-time employees and a supervisor There are a range of roles that need security people: 1. Physical security 2. Network security 3. Communications 4. Security trainer 5. Incident response 6. Information analysis 7. Security architecture 8. Device and system penetration 9. Software testing and verification 10. Device configuration management 11. Access control and monitoring 12. Vendor security management 13. Firewall support 14. Cryptography 15. Intrusion detection 16. Logistics and supply chain 17. Security team administration 18. Record keeping 19. Standards development 20. Personnel reliability program 21. Device maintenance 22. Investigation 23. Literature monitoring 24. Sweeping & the list keeps growing

Staffing Costs Average cost of security management staff is around $165,000 Average senior staff salary is around $108,000 Average staff salary is around $80,000 Average benefits is around $60,000 (health, training, retirement, etc.) Security clearance $5-8,000 + wait time (3 to 15 months) Wall Street hired Neil Greenfield for more than $1 million a year from AEP Other key industry specialists have been hired for 3 to 5x the industry average salary Turnover for security people is higher than in most utility jobs

Cyber Security Equipment Categories Hardware 1. Firewalls 2. Intrusion detection devices 3. Sniffers 4. Sweepers 5. Secure communications modules 6. Secure radios/telephones/tablets Software 1. Packet inspection 2. Element managers 3. Manager of managers (MOM) 4. Key management 5. Virus protection 6. Monitoring (several types) 7. Risk and Vulnerability analysis 8. Security design (both physical and cyber) 9. Automated testing systems

Cyber Security Equipment Categories Hardware 1. Firewalls - $50,000 to $250,000 each 2. Intrusion detection devices - $12,000 to $250,000 each 3. Sniffers - $1,500 to $4,500 (handheld, mobile) 4. Sweepers - $250 to $5,000 (handheld, mobile) 5. Secure communications modules - $200 to $10,000 each 6. Secure radios/telephones/tablets typically 2 to 4 times non-secure (NOTE: you can buy non-secure and add software the labor to do so tends to make the decision a wash financially)

Cyber Security Equipment Categories Software (software only cost hardware & installation is extra) 1. Packet inspection Free to $350,000 per connection 2. Element managers Free to $5 per node 3. Manager of managers (MOM) - $20,000 to $250,000 4. Key management - $ 1/mo/device - $1 million 5. Virus protection Free to $ 10/mo/device 6. Monitoring (several types) Free to $50,000 per monitoring system 7. Risk and vulnerability analysis $10,000 to $500,000 8. Security design (both physical and cyber) - $20,000 per seat 9. Automated testing systems Free to $2,200,000

Other Security Related Issues Secure Communications The FCC is allowing Telecomm companies to drop copper (POTS) lines and Frame Relay The FCC is refusing to provide new frequencies for use by utilities and forcing movement to alternate frequencies, and narrow-banding of radio channels This means that utilities will have to find alternative ways of communicating Primarily this is resulting in decisions to deploy Fiber Optics at roughly $200K per mile So far telecomm companies have been unwilling to sign up for the QoS and longevity required to make utilities comfortable Physical Security NERC CIP-006 and NERC CIP 014-1 and other mandates for physical security are also driving the need for more communication Cabinet and door lock monitors, biometrics, cameras, etc. All need monitoring and backhaul communications this folds back on the secure communications above

Other Security Related Issues Distributed Generation and Storage At some point the amount of DG and DS will become significant and a key to system reliability The vast majority of this equipment is in the hands of customers The new IEEE 1547 interconnect standards, the new IEC standards (Europe primarily) and the new California Rule 21 requirements all require communications Distribution Automation/Substation Automation/AMI Programs designed to improve the operation of the grid, given the changing generation and usage environment Workforce Automation Changes in workforce (e.g. higher turnover, younger workers, etc.) and safety regulations, as well as smaller staffs, and FCC rules