Distributed Energy Resource (DER) Cyber Security Working Group
|
|
- Letitia Edwards
- 6 years ago
- Views:
Transcription
1 Distributed Energy Resource (DER) Cyber Security Working Group Kickoff Meeting, 24 Aug 2017 Dr. Kemal Celik, U.S. Department of Energy Jay Johnson, Sandia National Laboratories Cedric Carter, Sandia National Laboratories Tom Tansy, SunSpec Alliance Sandia Na(onal Laboratories is a mul(mission laboratory managed and operated by Na(onal Technology and Engineering Solu(ons of Sandia, LLC, a wholly owned subsidiary of Honeywell Interna(onal, Inc., for the U.S. Department of Energy s Na(onal Nuclear Security Administra(on under contract DE-NA
2 Our presenters Dr. Kemal Celik Technology Manager U.S. Department of Energy SunShot Jay Johnson Principal Member of Technical Staff Sandia National Laboratories Cedric Carter Cyber Security R&D Sandia National Laboratories Tom Tansy Chairman SunSpec Alliance
3 Agenda DOE SunShot systems integration program welcome Program overview Goals & objectives Challenges Choices How to get engaged Who should participate How to sign up How to stay plugged in Appendix Next steps
4 SunShot Program Structure 3 /kwh SunShot 2030 Goal energy.gov/sunshot 4
5 Systems Integra;on Subprogram Funds projects to develop technical solu(ons that enable large scale deployment of solar power onto a modernized electricity grid with improved reliability and resiliency Part of DOE s Grid Moderniza(on Ini(a(ve Solar Forecas(ng Grid Planning and Opera(on Power Electronics Integra(on with Energy Storage Codes and Standards Sensors and Communica(ons Grid Integra(on Analysis energy.gov/sunshot 5
6 Goals & objectives The DER Cyber Security Working Group will bring together DER interoperability and cyber security experts to discuss security for DER devices, gateways, aggregators, utilities and the US power system. Primary Goal: generate a collection of best practices that act as basis for (or input to) national or international DER cyber security standards. Secondary Goal: facilitate DER cyber security discussions between stakeholders to exchange perspectives and gain broad buy-in from the industry.
7 Why is this initiative important?
8 Cyber security working group plan Our objectives Educate DER & power systems communities about cyber security topics Hold technical discussions to advance industry best practices and standards To address this complex challenge, we will structure our effort as follows Two or three initial public meetings Enlist subject matter experts Define scope Twice-per-month working sessions on key topics In-depth explorations led by subject matter experts Groups typically meet ten to twelve times per topic Goal to create best practice or standards recommendations each month Once-per-month group meeting Roadmap review Presentation of key cyber security concepts Work plan status & next steps Periodic public webinars
9 General scope DER Interface U(lity Server Aggregator Server Plant Controller
10 Important decisions to make What is the overall focus for this group? Server considerations and communication interfaces must be prioritized Which IT aspect and protocols aspects do we focus on? Server access and data protection IEEE , IEEE 1815, and/or other for utility connection SunSpec Modbus and/or other for field bus IEEE 1547 full revision allows multiple protocols with vastly different security features Which standards bodies should take precedence? IEEE for DER? NERC CIP for aggregations? Others? Cyber recommendations for IEEE to Modbus communication module J. Henry, F. Cleveland, A. Lee, R. Ramirez, B. Seal, T. Tansy, B. Fox, A. Pochiraju, Cyber Security Requirements and Recommendations for CSI RD&D Solicitation #4 Distributed Energy Resource Communications, Oct 2015.
11 Potential topics to cover Intro to DER Cyber Presentations Confidentiality, integrity, availability Authentication, authorization, accounting/non repudiation Light weight DER cyber assessments with off-the-shelf cyber tools and applications Cyber resilience Encryption Presentations from partners and industry. Development of DER Cyber Best Practices Selecting the appropriate standard for these requirements: IEEE 1547.x, others? Where cyber security requirements will exist (inside/outside of DERs and plants, device vs. system level) Understand/refine IEEE and IEEE 1815 security features Addressing Modbus security challenges Cyber/interoperability certification process Auditing and interoperability (device and network) Assessments (Host based/ad-hoc)
12 How to engage Who are we looking for? Energy domain experts: utilities, manufacturing, aggregators, govt Security experts: threats/countermeasures, protocols, systems Options for engagement Listen & learn once per month Receive a periodic updates Work on a focused task How to get started Sign up at Review the background materials Access workgroup page to track progress & get assignments
13 Cyber Security Workgroup portal
14 Homework: think about questions, review reference documents Given a focus on utility-to-(aggregator-to-)der connections, should our work go deeper or broader? More focus on interface vulnerabilities More focus on specific protocols Given our focus, which standards should we influence? IEEE (1547, , 1815) IETF NERC CIP Other? Review reference materials on workgroup site:
15 Next meeting September 7 at 8 AM PT Agenda Brief orientation and enlist new participants Review questions from today s meeting, discuss priorities Kick off first sub-group nail down priorities To prepare Log on to Download reading material or post comments Contact membership@sunspec.org for enrollment questions. Call or Tom Tansy at or tom@sunspec.org for any other issues. Thank You
Welcome to the webinar! We will start within a few minutes
Welcome to the webinar! We will start within a few minutes Agenda Introduction Solarplaza Presentations Threat assessment - Tom Tansy SunSpec Alliance Cyber Security & Solar A consultant s view - John
More informationSunSpec Alliance. Information Standards for Distributed Energy. October 2015
SunSpec Alliance Information Standards for Distributed Energy October 2015 1 ESNA SunSpec Open Meeting SunSpec Workgroups/Initiatives Overview Tom Tansy (10) Smart Inverter Workgroup, Bob Fox - SunSpec
More informationProcurement Guidance for Energy Storage Projects: Help with RFIs, RFQs and RFPs
Procurement Guidance for Energy Storage Projects: Help with RFIs, RFQs and RFPs April 20, 2016 Hosted by Todd Olinsky-Paul Project Director Clean Energy Group/ Clean Energy States Alliance Housekeeping
More informationUnited States Energy Association Energy Technology and Governance Program REQUEST FOR PROPOSALS
United States Energy Association Energy Technology and Governance Program REQUEST FOR PROPOSALS UTILITY CYBER SECURITY INITIATIVE (UCSI) CYBERSECURITY CAPABILITY MATURITY MODEL (C2M2) ASSESSMENT FOR THE
More informationElectric Sector Security & Privacy Plans for 2011
Electric Sector Security & Privacy Plans for 2011 Galen Rasche Technical Executive Erfan Ibrahim Technical Executive Ad-Hoc Smart Grid Executive Committee 2011-Feb-10 Contents PDU Cyber Security R&D Portfolio
More informationSmart Grid Standards and Certification
Smart Grid Standards and Certification June 27, 2012 Annabelle Lee Technical Executive Cyber Security alee@epri.com Current Environment 2 Current Grid Environment Legacy SCADA systems Limited cyber security
More informationSmart Grid Task Force
Smart Grid Task Force Workshop meeting Mladen Kezunovic Texas A&M University it Coordinator PSerc Workshop August st10-13, 13 2009 Breckenridge CO Agenda 1:30-3:00pm PSerc Smart Grid Task Force PSerc Smart
More informationOPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith
OPUC Workshop March 13, 2015 Cyber Security Electric Utilities Portland General Electric Co. Travis Anderson Scott Smith 1 CIP Version 5 PGE Implementation Understanding the Regulations PGE Attended WECC
More informationNIST SmartGrid Update. Paul Myrda Technical Executive Power Systems Engineering Research Center August 10, 2009
NIST SmartGrid Update Paul Myrda Technical Executive Power Systems Engineering Research Center August 10, 2009 Overview NIST was mandated by Congress in the Energy Independence and Security Act (EISA)
More informationCORE Voluntary Certification: Certification from the Testing Vendor s Perspective. February 18, :00 3:00pm ET
CORE Voluntary Certification: Certification from the Testing Vendor s Perspective February 18, 2015 2:00 3:00pm ET Participating in Today s Session Download a copy of today s presentation on the CAQH.org
More informationLESSONS LEARNED IN SMART GRID CYBER SECURITY
LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com
More informationSmart Grid Task Force Scope
Smart Grid Task Force Scope Purpose and Deliverables The purpose of the Task Force is to assess the reliability impacts of integrating Smart Grid 1 technology on the bulk power system. The Task Force has
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationERO Enterprise IT Projects Update
ERO Enterprise IT Projects Update Stan Hoptroff, Vice President, Chief Technology Officer and Director of Information Technology Technology and Security Committee Meeting November 6, 2018 Agenda ERO IT
More informationWIRAB Report to the Peak RC Board of Directors
WIRAB Report to the Peak RC Board of Directors Eric Baran & Holly Taylor WIRAB Staff December 14, 2017 1 WIRAB Activities Peak RC Activities Outline 2 WIRAB Activities Fall 2017 Leadership Delegation to
More informationCritical Infrastructure Protection Version 5
Critical Infrastructure Protection Version 5 Tobias Whitney, Senior CIP Manager, Grid Assurance, NERC Compliance Committee Open Meeting August 9, 2017 Agenda Critical Infrastructure Protection (CIP) Standards
More informationUCSB IT Forum. April 15, 2014
UCSB IT Forum April 15, 2014 Agenda 1. Announcements 2. IT Governance a. Enterprise IT Governance Overview b. History of Campus IT Governance c. New Approach 3. Discussion ANNOUNCEMENTS IT Needs Assessment
More informationSecure Remote Substation Access Interest Group Kickoff Meeting
Secure Remote Substation Access Interest Group Kickoff Meeting June 5, 2013 Scott Sternfeld, Project Manager Smart Grid Substation & Cyber Security Research Labs ssternfeld@epri.com Utility co-chair: John
More informationCYBERSECURITY MATURITY ASSESSMENT
CYBERSECURITY MATURITY ASSESSMENT ANTICIPATE. IMPROVE. PREPARE. The CrowdStrike Cybersecurity Maturity Assessment (CSMA) is unique in the security assessment arena. Rather than focusing solely on compliance
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 9 Chapter X Security Performance Metrics Background For the past two years, the State of Reliability report has included a chapter for security performance
More informationSheltered Harbor protects public confidence in the financial system if a catastrophic event like a cyber attack causes your critical systems,
Sheltered Harbor protects public confidence in the financial system if a catastrophic event like a cyber attack causes your critical systems, including your backups, to fail. Who We Are Sheltered Harbor
More informationAd Hoc Smart Grid Executive Committee. February 10, 2011 New Orleans, LA
Ad Hoc Smart Grid Executive Committee February 10, 2011 New Orleans, LA Agenda Time Topic and Location Lead 3:00 3:10p Welcome & Introductions George Bjelovuk, AEP 3:10 3:40p Regulatory Trends for Cyber
More informationDr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt
Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?
More informationModernizing the Grid for a Low-Carbon Future. Dr. Bryan Hannegan Associate Laboratory Director
Modernizing the Grid for a Low-Carbon Future Dr. Bryan Hannegan Associate Laboratory Director Aspen Energy Policy Forum July 5, 2016 40 YEARS OF CLEAN ENERGY RESEARCH Founded as Solar Energy Research Institute
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical
More informationSeptember 2010 Version 0.9
TERMS OF REFERENCE September 2010 Version 0.9 Table of Contents Section 1. Purpose... 1 Section 2. Background... 1 Section 3. Scope... 2 Goals and Objectives... 2 Project Deliverables... 3 Deliverables
More informationSite Data Protection (SDP) Program Update
Advanced Payments October 9, 2006 Site Data Protection (SDP) Program Update Agenda Security Landscape PCI Security Standards Council SDP Program October 9, 2006 SDP Program Update 2 Security Landscape
More informationOntario Smart Grid Forum: Support Presentation. Tuesday, March 8 th 2011
Ontario Smart Grid Forum: Support Presentation Tuesday, March 8 th 2011 Agenda Item # 1 S.G.F. Minutes 2 Agenda Item # 1: Minutes January 17 th 2011 minutes: no further comments received. Recommended as
More informationBuilding a Resilient Security Posture for Effective Breach Prevention
SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.
More informationJeff Gooding Southern California Edison. Innovation at Southern California Edison
Jeff Gooding Southern California Edison Innovation at Southern California Edison Understand Cultural Risk Aversion to Innova
More informationNear-port Community Capacity Building Toolkit for Effective EJ Stakeholder Engagement
Near-port Community Capacity Building Toolkit for Effective EJ Stakeholder Engagement Sabrina Johnson, Project Lead EPA Office of Transportation & Air Quality presented at 2016 Urban Waters Federal Partnership
More informationWRI BUILDING EFFICIENCY INITIATIVE BUILDING EFFICIENCY INITIATIVE, WRI ROSS CENTER FOR SUSTAINABLE CITIES
WRI BUILDING EFFICIENCY INITIATIVE BUILDING EFFICIENCY INITIATIVE, WRI ROSS CENTER FOR SUSTAINABLE CITIES WRI ROSS CENTER FOR SUSTAINABLE CITIES 2 Supporting partners to create local solutions by adapting,
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationETIP SNET (European Technology and Innovation Platform for Smart Networks for Energy Transition)
ETIP SNET (European Technology and Innovation Platform for Smart Networks for Energy Transition) Introduction to R&I activities in the scope of the ETIP SNET; presentation of the R&I roadmap 2016-2025.
More informationManaging SCADA Security. NISTIR 7628 and the NIST/SGIP CSWG. Xanthus. May 25, Frances Cleveland
Managing SCADA Security NISTIR 7628 and the NIST/SGIP CSWG May 25, 2011 Frances Cleveland fcleve@xanthus-consulting.com Xanthus Consulting International Topics NISTIR 7628 NIST/SGIP CSWG and its Subgroups
More informationBridging The Gap Between Industry And Academia
Bridging The Gap Between Industry And Academia 14 th Annual Security & Compliance Summit Anaheim, CA Dilhan N Rodrigo Managing Director-Smart Grid Information Trust Institute/CREDC University of Illinois
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More informationRisk Informed Cyber Security for Nuclear Power Plants
Risk Informed Cyber Security for Nuclear Power Plants Phillip L. Turner, Timothy A. Wheeler, Matt Gibson Sandia National Laboratories Electric Power Research Institute Albuquerque, NM USA Charlotte, NC
More informationgridconnext provides an unprecedented
Where Policy & Business Leaders Meet to Build the Next-Generation Grid 2017 gridconnext provides an unprecedented opportunity for diverse industry stakeholders to discuss evolving policies and share best
More informationBig Data Analytics: Research Needs. Ali Ghassemian
Big Data Analytics: Research Needs Ali Ghassemian April 28, 2016 Plan DOE s Grid Modernization Initiative (GMI) represent a comprehensive effort to help shape the future of our nation s grid and solve
More informationExpanding Metering and Telemetry Options Technical Stakeholder Initiative
Expanding Metering and Telemetry Options Technical Stakeholder Initiative April 24, 2013 Todays Agenda Time Topic Presenter 10:00 10:10 Opening Comments/Introductions Khaled Abdul-Rahman 10:10 10:20 Stakeholder
More informationERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford
Cybersecurity is a EU strategic priority DG CONNECT* > The Digital Single Market strategy aims to open up digital opportunities for people and business and enhance Europe's position as a world leader in
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationMicrogrid System Design and Economic Analysis Tools
Microgrid System Design and Economic Analysis Tools DOE Microgrid Workshop 30 August 2011 Jason Stamp, Ph.D. (Sandia National Laboratories) Michael Clark (Encorp) 1 Sandia National Laboratories is a multi-program
More informationNear-port Community Capacity Building Toolkit for Effective EJ Stakeholder Engagement
Near-port Community Capacity Building Toolkit for Effective EJ Stakeholder Engagement Sabrina Johnson, Project Lead EPA Office of Transportation & Air Quality presented at 2016 Southeast Brownfields Conference
More informationCritical Infrastructure Protection Committee Strategic Plan
Critical Infrastructure Protection Committee Strategic Plan 2015-2018 CIPC Executive Committee Updated: December 13, 2016 NERC Report Title Report Date I Table of Contents Preface... iv Executive Summary...
More informationMinneapolis Clean Energy Partnership Energy Vision Advisory Committee (EVAC) 4/16/2015
Minneapolis Clean Energy Partnership Energy Vision Advisory Committee (EVAC) 4/16/2015 Agenda 3:00 Welcome & Introductions 3:15 Update on EVAC co-chair 3:20 CEP Background & Charge 3:35 EVAC Structure
More informationAn Introduction to the SEforALL Building Efficiency Accelerator Belgrade BEA Kick-off Meeting 31 October 2016 Eric Mackres,
An Introduction to the SEforALL Building Efficiency Accelerator Belgrade BEA Kick-off Meeting 31 October 2016 Eric Mackres, emackres@wri.org Manager, Building Efficiency, WRI Ross Center for Sustainable
More informationLeverage SOA for increased business flexibility What, why, how, and when
Leverage SOA for increased business flexibility What, why, how, and when Dr. Bob Sutor Director, IBM WebSphere Product and Market Management sutor@us.ibm.com http://www.ibm.com/developerworks/blogs/dw_blog.jspa?blog=384
More informationCybersecurity program & best practices
Cybersecurity program & best practices How Gogo Business Aviation secures its airborne networks and inflight internet systems Live Webinar Thursday, September 28, 2017 Welcome & housekeeping notes Webinar
More informationService Description: CNS Federal High Touch Technical Support
Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in
More informationSME License Order Working Group Update - Webinar #3 Call in number:
SME License Order Working Group Update - Webinar #3 Call in number: Canada Local: +1-416-915-8942 Canada Toll Free: +1-855-244-8680 Event Number: 662 298 966 Attendee ID: check your WebEx session under
More informationCritical Infrastructure Protection Committee Strategic Plan
Critical Infrastructure Protection Committee Strategic Plan 2013-2016 CIPC Executive Committee 5/14/2013 3353 Peachtree Road NE Suite 600, North Tower Atlanta, Georgia 30326 404-446-2560 www.nerc.com Table
More informationIT Modernization In Brief
IT Modernization In Brief WHAT YOU NEED TO KNOW Quick tips & facts about IT modernization from GovLoop Executive Summary Today, IT modernization the continuous updating of IT and technology infrastructure
More informationStandards and Test Procedures for Interconnection and Interoperability (GMLC 1.4.1)
Standards and Test Procedures for Interconnection and Interoperability (GMLC 1.4.1) DAVID NARANG, NREL April 18-20 Sheraton Pentagon City Arlington, VA Insert Technical Team Area 5/11/2017 1 High Level
More informationCyber Resilience. Think18. Felicity March IBM Corporation
Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack
More informationUpdated Course Access Instructions
Updated Course Access Instructions Transitioning to Canvas Transition Information The Center for Services Leadership partners with the ASU Continuing and Professional Education unit (CPE) to offer our
More informationSecurity and Architecture SUZANNE GRAHAM
Security and Architecture SUZANNE GRAHAM Why What How When Why Information Security Information Assurance has been more involved with assessing the overall risk of an organisation's technology and working
More informationMITIGATE CYBER ATTACK RISK
SOLUTION BRIEF MITIGATE CYBER ATTACK RISK CONNECTING SECURITY, RISK MANAGEMENT & BUSINESS TEAMS TO MINIMIZE THE WIDESPREAD IMPACT OF A CYBER ATTACK DIGITAL TRANSFORMATION CREATES NEW RISKS As organizations
More informationOverview of the Cybersecurity Framework
Overview of the Cybersecurity Framework Implementation of Executive Order 13636 Matt Barrett Program Manager matthew.barrett@nist.gov cyberframework@nist.gov 15 January 2015 Executive Order: Improving
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationMeasurement Challenges and Opportunities for Developing Smart Grid Testbeds
Measurement Challenges and Opportunities for Developing Smart Grid Testbeds 10th Carnegie Mellon Conference on the Electricity Industry April 1, 2015 Paul Boynton boynton@nist.gov Testbed Manager Smart
More informationClient Services Procedure Manual
Procedure: 85.00 Subject: Administration and Promotion of the Health and Safety Learning Series The Health and Safety Learning Series is a program designed and delivered by staff at WorkplaceNL to increase
More informationProtecting Control Systems from Cyber Attack: A Primer on How to Safeguard Your Utility May 15, 2012
Protecting Control Systems from Cyber Attack: A Primer on How to Safeguard Your Utility May 15, 2012 Paul Kalv Electric Director, Chief Smart Grid Systems Architect, City of Leesburg Doug Westlund CEO,
More informationDigital DSOs: key enablers to move smartly towards the Cities of the future
Digital DSOs: key enablers to move smartly towards the Cities of the future João Torres, Chairman of EDSO for Smart Grids and CEO of EDP Distribuição About EDSO for Smart Grids 33 DSOs 20 countries +350
More informationCyber Security Updates and Trends Affecting the Real Estate Industry
Cyber Security Updates and Trends Affecting the Real Estate Industry What, Why, and How? Agenda Cyber Security Today Changes to Security Standards and Trends Protecting Yourself and Your Organization Takeways
More informationRFQ OIT-1 Q&A. Questions and Answers, in the order received.
Question Does the system have an existing SSP? Do they use a system like Xacta or CSAM to generate the SSP. Will they provide us the current POAM list? Will they provide scanning tools or we have to bring
More informationEPRI Smart Grid R&D Overview
EPRI Smart Grid R&D Overview September 5 th 2008 Erfan Ibrahim, Ph. D. Technical Executive CIO Initiative Lead Electric Power Research Institute (EPRI) Electric Power Research Institute Collaboration..Technical
More informationAccess Control and Physical Security Management. Contents are subject to change. For the latest updates visit
Access Control and Physical Security Management Page 1 of 6 Why Attend Today s security landscape requires individuals and businesses to take the threat to safety and security seriously. Safe and secure
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationGRID MODERNIZATION INITIATIVE PEER REVIEW
GRID MODERNIZATION INITIATIVE PEER REVIEW GMLC 1.3.5 DER Siting and Optimization tool for JOHN GROSH & GONÇALO CARDOSO April 18-20, 2017 Sheraton Pentagon City Arlington, VA Planning and Design Tools 4/4/17
More informationToward All-Hazards Security and Resilience for the Power Grid
Toward All-Hazards Security and Resilience for the Power Grid Juan Torres Associate Laboratory Director, Energy Systems Integration National Renewable Energy Laboratory December 6, 2017 1 Grid Modernization
More informationEPA Near-port Community Capacity Building: Tools and Technical Assistance for Collaborative Solutions
EPA Near-port Community Capacity Building: Tools and Technical Assistance for Collaborative Solutions Sabrina Johnson, Project Lead EPA Office of Transportation & Air Quality presented at Southeast Diesel
More informationGRID MODERNIZATION INITIATIVE PEER REVIEW GMLC Industrial Microgrid Analysis and Design for Energy Security and Resiliency
GRID MODERNIZATION INITIATIVE PEER REVIEW GMLC 1.3.4 Industrial Microgrid Analysis and Design for Energy Security and Resiliency BEN OLLIS OAK RIDGE NATIONAL LABORATORY April 18-20, 2017 Sheraton Pentagon
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationCPMA Education Program Guide
CPMA Education Program Guide Contents About CPMA... 2 CPMA Online Training... 2 The CPMA Credentialing Program... 4 Who should pursue the CPMA Credentialing Program?... 5 Recognition of Learning and Accomplishment...
More informationNorth American SynchroPhasor Initiative NASPI & NERC Update and Initiatives. Alison Silverstein NASPI Project Manager March 30, 2011
North American SynchroPhasor Initiative NASPI & NERC Update and Initiatives Alison Silverstein NASPI Project Manager March 30, 2011 Overview NASPI & NERC Initiatives NASPI intro NASPI & NERC priorities
More informationGDPR Update and ENISA guidelines
GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure
More informationFUNDAMENTALS OF CYBER SECURITY FOR UTILITIES
COURSE FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES February 21-22, 2018 Millennium Knickerbocker Hotel Chicago, IL RELATED EVENT: FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS February 22-23, 2018
More informationCyber Security Congress 2017
Cyber Security Congress 2017 A rich agenda covering both technical and management matters with targeted presentations and hands on workshops. Day 1 Conference Morning Session 8.30 9.00 Registration & Coffee
More informationInteractive Remote Access FERC Remote Access Study Compliance Workshop October 27, Eric Weston Compliance Auditor Cyber Security.
Interactive Remote Access Compliance Workshop October 27, 2016 Eric Weston Compliance Auditor Cyber Security 2 Agenda Interactive Remote Access Overview Review of Use Cases and Strategy 1 Interactive Remote
More informationThe Importance of Cybersecurity Threat Detection for Utilities
The Importance of Cybersecurity Threat Detection for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
More informationosparc Open Solar Performance and Reliability Clearinghouse January 2014 osparc.sunspec.org
osparc Open Solar Performance and Reliability Clearinghouse January 2014 osparc.sunspec.org 1 Agenda ² Introduction to SunSpec Alliance ² osparc Overview ² Benefits to Data Owners ² Invitation to get Involved
More informationUpdate from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013
Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S
More information10 Considerations for a Cloud Procurement. March 2017
10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More informationBusiness Architecture Implementation Workshop
Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in
More informationFERC Reliability Technical Conference Panel III: ERO Performance and Initiatives ESCC and the ES-ISAC
: ERO Performance and Initiatives June 4, 2015 Chairman Bay, Commissioners, and fellow panelists, I appreciate the opportunity to address the topics identified for the third panel of today s important
More informationIllinois Cyber Navigator Program
Illinois Cyber Navigator Program Illinois State Board of Elections PA 100-0587 (10 ILCS 5/1A-55) Sec. 1A-55. Cyber security efforts. The State Board of Elections shall provide by rule, after at least 2
More informationInstructor: Eric Rettke Phone: (every few days)
Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the
More informationIT Updates. Maryland Health Benefit Exchange Board Meeting April 15, Presented by: Isabel FitzGerald Secretary, DoIT
IT Updates Maryland Health Benefit Exchange Board Meeting April 15, 2014 Presented by: Isabel FitzGerald Secretary, DoIT A service of Maryland Health Benefit Exchange Agenda Overview of process for CT
More informationThe PCI Security Standards Council
The PCI Security Standards Council 2/29/2008 Agenda The PCI SSC Roles and Responsibilities How To Get Involved PCI SSC Vendor Programs PCI SSC Standards PCI DSS Version 1.1 Revised SAQ 2/29/2008 2 The
More informationBradford J. Willke. 19 September 2007
A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure
More informationBuyer s Guide. What you need to know before selecting a cyber risk analytics solution
Buyer s Guide What you need to kw before selecting a cyber risk analytics solution Introduction Why Cyber Risk Management? 10% Magnified Risk, Amplified Costs In response to the unprecedented acceleration
More informationWhat It Takes to be a CISO in 2017
What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge
More informationERO Compliance Enforcement Authority Staff Training
ERO Compliance Enforcement Authority Staff Training Vision Comprehensive ERO CEA staff training program that promotes high quality and consistency in the conduct of audits The methods to accomplish the
More informationNo IT Audit Staff? How to Hack an IT Audit. Presenters. Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP
No IT Audit Staff? How to Hack an IT Audit Presenters Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP Learning Objectives After this session, participants will be able to: Devise
More informationUnofficial Comment Form Project Modifications to CIP Standards Requirements for Transient Cyber Assets CIP-003-7(i)
Unofficial Comment Form Project 2016-02 Modifications to CIP Standards Requirements for Transient Cyber Assets CIP-003-7(i) Do not use this form for submitting comments. Use the electronic form to submit
More informationASEAN e-authentication Workshop Balwinder Sahota
ASEAN e-authentication Workshop Balwinder Sahota Agenda ASEAN Single Window (ASW) What is ATIGA Form D The information flow of ATIGA Form D and related documents Security Requirements Challenges in Implementation
More information