Protect Your Assets. Cyber Security Engineering. Control Systems. Power Plants. Hurst Technologies

Similar documents
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

SCADA Security Training

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Roadmaps to Securing Industrial Control Systems

An International Perspective on Security and Compliance

A Regulatory Approach to Cyber Security

Resilient and Secure Solutions for the Water/Wastewater Industry

Cyber Security & Compliance Briefing

Top 10 Compliance Issues for Implementing Security Programs

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

The Importance of Cybersecurity Monitoring for Utilities

Standard CIP 007 3a Cyber Security Systems Security Management

NERC CIP VERSION 5 COMPLIANCE

This chapter provides an overview of cyber security issues and activities by state and federal organizations Cyber security is an ongoing, high

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Standard CIP Cyber Security Systems Security Management

Risk Management in Practice A Guide for the Electric Sector

Regulatory Compliance Management for Energy and Utilities

This is a preview - click here to buy the full publication

Resilient and Secure Solutions for the Water/Wastewater Industry

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

CONCEPTS IN CYBER SECURITY

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012

Nadya Bartol, CISSP, CGEIT VP, Industry Affairs and Cybersecurity Strategist UTC (Utilities Telecom Council) USA Utilities Telecom Council 1

Document ID. Cyber security for substation automation products and systems

Building more resilient and secure solutions for Water/Wastewater Industry

Help for the Developers of Control System Cyber Security Standards

April 28, Dear Mr. Chairman:

CGI Cyber Risk Advisory and Management Services for Insurers

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

What Risk Managers need to know about ICS Cyber Security

N.K. Srivastava GM-R&M-Engg.Services NTPC- CC/Noida

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Effective Use of Assessments for Cyber Security Risk Mitigation

Designing Compliant and Sustainable Security Programs 1 Introduction

Keeping the Lights On

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

Symphony Plus Cyber security for the power and water industries

FERC, NERC and Emerging CIP Standards

AD FERC Technical Conference February 8, 2011 Statement of Ron Litzinger. President, Southern California Edison Company

Cybersecurity & Public Utility Commissions

ABA Section of Public Utility, Communications & Transportation Law Safety and Security in Transport

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

CIP Supply Chain Risk Management (RM ) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

Verve Security Center

PREPARED DIRECT TESTIMONY OF SCOTT KING ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY

Cyber Security and Privacy - Program 183

Maturation of a Cyber Security Incident Prevention and Compliance Program

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Hacking and Hardware: Understanding the Threats, Compliance Obligations, and Cybersecurity Solutions for Utilities

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

NERC CIP Compliance with Security Professional Services

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Cybersecurity in a Mobile IP World

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

White Paper. Cyber Security. Power Industry Locks Down. What s Inside:

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Information Technology

future data and infrastructure

Cyber Security. Doug Houseman Engineering Consulting Research. Modeling Simulation Security. The Practical Grid Visionaries TM

Top Ten Compliance Issues for Implementing the NERC CIP Reliability Standard

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

North American Electric Reliability Corporation (NERC) Cyber Security Standard

BELL LABS ADVISORY SERVICE FOR SMART GRID NETWORK TRANSFORMATION STRATEGIC PLANNING FOR THE MODERNIZATION OF UTILITY COMMUNICATIONS NETWORKS

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

The Anatomy of an Effective Cyber Security Solution: Regulatory Guidelines and the Technology Required for Compliance

IT Security & Compliance Risk Assessment Capabilities

What is Really Needed to Secure the Internet of Things?

OEB Smart Grid Advisory Committee

Department of Management Services. Request for Information

GE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems

Industrial Control Systems Security Guide

Options for Cyber Security. Reactors. April 9, 2015

Building Insecurity Lisa Kaiser

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

PRIORITIZING CYBERSECURITY

ICS Cyber Security Briefing

White Paper. April Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks

Industrial Cyber Security 101. Mike Spear

Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications

NERC-CIP S MOST WANTED

Rethinking Cyber Security for Industrial Control Systems (ICS)

Last year, two security researchers

OPC & Security Agenda

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

Challenges and Opportunities for Aligning the Power System Cybersecurity and Reliability Objectives

Cyber Security Management

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Is it time to audit your customs service provider?

UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments

ABB s approach concerning IS Security for Automation Systems

EFFECTIVE APPROACHES TO CYBERSECURITY FOR UTILITIES TERRY M. JARRETT HEALY & HEALY ATTORNEYS AT LAW, LLC OCTOBER 24, 2013

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Protecting Organizations from Cyber Attack

Consulting International

Cyber Security nei prodotti di automazione

Waterfall for NERC-CIP Compliance

Transcription:

Protect Your Assets Cyber Security Engineering Control Systems. Power Plants. Hurst Technologies

Cyber Security The hackers are out there and the cyber security threats to your power plant are real. That s why you need Hurst Technologies the power plant security experts on your cyber security team. With over two decades of power plant instrumentation and control engineering experience and expertise in both cyber and physical security systems, we have the right combination of qualifications to protect your plant. Cyber security represents new functional requirements at power plants that may not have existed when the plant was designed. Hurst s engineers understand the new requirements and the existing systems into which they must be integrated. Managing cyber security requires: a knowledgeable assessment of vulnerability, strategies for mitigation and compliance, design and engineering of systems, project management, and monitoring and oversight.

Compliance Hurst knows the cyber security rules. We helped review and develop them. Hurst s engineers have acted as reviewers for the North American Electric Reliability Council (NERC) Critical Infrastructure Protection Standards (CIPS), are members of the Nuclear Energy Institute (NEI) Working Groups, and are voting members for International Society for Automation (ISA) 99A, the process control cyber security group. With our knowledge of evolving rule requirements, our power plant expertise, and our cyber security experience, you will save time and money and eliminate the what if? questions that keep you up at night.

Engineering Engineering In-depth defense for critical industries power, nuclear, chemical and petrochemical. Hurst s experience providing in-depth cyber security defense systems includes state-of-the-art cybercompliant systems for many of our nation s critical industries. In particular, our nuclear plant expertise is second to none. From our work on the first digital controls retrofit at a US nuclear plant in the mid1990s, we ve worked with more than half the nuclear plants in the US fleet. We ve worked with I&C and automation systems of every vintage, version, and variation, and understand that they often get extensively modified once installed. DCS systems may lack a configuration management (CM) tool for the DCS, the plant computer, or the myriad software and performance applications and communications gateways. So, when our clients need CM tools, we build them custom designed to meet their specific needs.

Experience Project and audit management for today s plant operating environment. We re already familiar with the audit procedures and paper trail requirements associated with the Nuclear Energy Regulatory Commission (NERC) and the Federal Energy Regulatory Commission (FERC). With Hurst, your paperwork and audit requirements will be done right and done on time the very first time. Hurst s engineers understand that plant DCS operating requirements don t always support the security models used by the rest of the IT industry. We engineer systems to bridge the gap and integrate the two. And, we know how to ensure your plant and your corporate IT systems communicate to share the sensitive security data your team needs. Plus, we understand that your cyber security system must be both robust and fully integrated into today s plant operating environment through wired or wireless connections, to keep all your data safe.

Independent Vendor Independent. System Interconnected. Hurst doesn t sell pre-packaged cyber security solutions we determine the solution that is right for you. Our cyber security experience includes all the vendors supplying I&C, distributed control, and automation systems to the power industry. Hurst is an owner s engineer, not a vendor disguised as a consultant or a rep for a generic cyber-security firm. We know cyber security, we know control systems, and we know power plants. Innovative Solutions. Comprehensive Approach. Hurst s engineers understand that your plant must operate efficiently as a single, self-contained unit, as an integrated part of your generation asset base, and as a seamless part of the grid as a whole. We know everything must work together like a single, seamless unit. So, we don t just layer new cyber security software on top of existing systems; we design and implement unique solutions into your processes from the control architecture up. We even have cyber security solutions that address the islands of automations issues power plants suffer with today. Bottom line: You will find that our cyber security expertise and power plant engineering experience fits your needs and your budget.

Secure Systems. Seamless Integration. Innovative

P.O. Box 1718 Angleton, TX 77516 www.hursttech.com 979.849.5068