SmartGrid. Implications of Cloud Computing. New Technology in the Utility Environment
|
|
- Gerard Smith
- 6 years ago
- Views:
Transcription
1 1 SmartGrid Implications of Cloud Computing New Technology in the Utility Environment
2 PG&E Territory Characteristics 70,000 square miles of diverse topography Approximately 20,000 employees Energy Services to approximately 15 million people Over 9 million SmartMeters (Electric & Gas) 1,008,186 Transformers 6,833 MW of Generation 18,616 miles of electric transmission circuits 120,000 miles of electric distribution circuits Regulated by the California Public Utilities Commission (CPUC) 2
3 The Cloud Data at Rest Utility Application Landscape Hosted off site today SmartMeter Systems Demand Response CAISO Electric Head End System Hosted Meter Data Management Gas Head End PG&E Data Center Vendor Hosted Customer 3
4 Security Risk Management PG&E utilizes the following five information classifications: PG&E Public Anything produced for public review and available to anyone inside or outside the company. This includes materials such as press releases, advertisements, or bill inserts. PG&E Internal Information intended primarily for use within PG&E, such as organization charts, personnel numbers, and company messages. Distribution should be limited based on business need to know, and access controls are required. PG&E Confidential Information such as trade secrets, customer or employee information, and passwords that should be shared solely on a business need to know basis. PG&E Confidential data must be encrypted for storage and transmission if electronic and, if printed, protected through controlled physical access, such as a locked filing cabinet. PG&E Restricted or PG&E Privileged (Law only) Information such as Social Security Numbers, undisclosed financial information, and protected health information should be shared solely on a business need to know basis. Data must be for storage and transmission encrypted if electronic and, if printed, protected through controlled physical access. Note that PG&E Privileged is only used by Law. 4
5 Networks - Critical Infrastructure ODN (air-gapped secure network) - SCADA UDN Traditional IT MPLS Physical Isolation and Connectivity Operational Data Network Utility Data Network Multiprotocol Label Switching Packet Level Network Path 5
6 Volt / VAR on the test network Test Network Set Voltage 1 Negotiating Network Access in the test environment is not trivial LabView Interface LabView Driver Set Voltage 2 Set Voltage 3 UPS #1 LabView Driver TCP/IP Meter Farm Read Voltage UIQ System Access Point Node Simulator 4.1 Remote Access Firewall UDN ODN CVR Software Adjust Voltage Load Tap Changer Line Capacitor Line Regulator 6
7 Security is Physical Control of assets is critical to our business: San Jose Mercury News June 4 th, 2013 In the early-morning hours of April 16, someone opened fire at the utility's substation on Metcalf Road near Highway 101. The gunshots damaged five transformers and caused cooling oil to leak from a transformer bank, and the damage prompted state regulators to urge electricity conservation in the ensuing days. AT&T phone service in the area was also affected. 7
8 Safety and Reliability SmartMeter Performance Statistics The Cloud Interval data supplied from SmartMeter systems for billing within 48 hours of expected delivery as a percentage of expected interval data. 8
9 9 Thank you Art Anderson
10 North American Electric Reliability Corporation Critical Infrastructure Protection (CIP) standards Version 5 now requires the following: Encryption Role-based instead of risk-based classifications Multiple levels of compliance Low, Medium and High Impact (in theory, a company could have 10 facilities of which six are low impact facilities, three are medium impact facilities, and one is a high impact facility) New terminology (such as BES Cyber Asset) All serial connections are to be considered Multi-factor authentication requirements Triggers are required to be defined for recovery plans All software (COTS and custom) must be known All security patches from the beginning of time on each device must be known 10
G. Larry Clark Principal Engineer Power Delivery Alabama Power Company, A Southern Company
2014 IEEE PES T&D Conference & Exposition Chicago, IL April 15, 2014 Panel Session: Technologies for Advanced Volt/VAR Control Implementation Volt/VAR Control as Part of an Integrated Distribution Management
More informationWEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP
WEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP San Diego Gas & Electric Subsidiary of Sempra Energy 4100 Full-Time Employees Regulated public utility Providing clean, safe & reliable
More informationSouthern Company Smart Grid
Southern Company Smart Grid Smart Grid Investment Grant Update July 25, 2011 Southern Company Southern Company is one of the nations largest generators of electricity Has 4.4 million retail customers across
More informationNERC CIP Information Protection
NERC CIP Information Protection Eric Ruskamp Manager, Regulatory Compliance September 13, 2017 1 Agenda NERC History NERC Compliance Overview of Reliability Standards Compliance with Reliability Standards
More informationSmart Distribution Technology
Smart Distribution Technology Presentation Agenda Alabama Power Company, A Southern Company Distribution Automation Supervisory Control And Data Acquisition (SCADA) Multiple Address System (MAS) communications
More informationDUKE ENERGY OHIO SMART GRID / GRID MODERNIZATION. Don Schneider GM, Smart Grid Field Deployment May 24, 2012
DUKE ENERGY OHIO SMART GRID / GRID MODERNIZATION Don Schneider GM, Smart Grid Field Deployment May 24, 2012 FACTS ABOUT DUKE ENERGY 150+ years of service 4 million customers Fortune 500 $50 billion in
More informationOPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith
OPUC Workshop March 13, 2015 Cyber Security Electric Utilities Portland General Electric Co. Travis Anderson Scott Smith 1 CIP Version 5 PGE Implementation Understanding the Regulations PGE Attended WECC
More informationLow Impact Generation CIP Compliance. Ryan Walter
Low Impact Generation CIP Compliance Ryan Walter Agenda Entity Overview NERC CIP Introduction CIP-002-5.1, Asset Classification What Should Already be Done CIP-003-7, Low Impact Requirements Tri-State
More informationWhat You Should Know About Communication Systems: Business Strategies and Options
Doug Voda, PPMV Global Segment Leader for Smart Grid February 2015 NRECA TechAdvantage What You Should Know About Communication Systems: Business Strategies and Options The visionary Smart Grid Five Pillars
More informationAccess Control and CIP 10/20/2011
Access Control and CIP 10/20/2011 Agenda Access Control Requirements Impact on Entities Risk Discussion Response Discussion Future pursuit 2 RELIABILITY ACCOUNTABILITY Let s Talk CIP 3 RELIABILITY ACCOUNTABILITY
More informationSmart Grid vs. The NERC CIP
Smart Grid vs. The NERC CIP Tobias Whitney, MBA GE Smart Grid Center of Excellence 1 First The Bottom Line Security & Privacy are paramount Smart Grid concerns of regulators and the public Currently every
More informationData Inventory and Classification, Physical Devices and Systems ID.AM-1, Software Platforms and Applications ID.AM-2 Inventory
Audience: NDCBF IT Security Team Last Reviewed/Updated: March 2018 Contact: Henry Draughon hdraughon@processdeliveysystems.com Overview... 2 Sensitive Data Inventory and Classification... 3 Applicable
More informationSECURITY AND DATA REDUNDANCY. A White Paper
SECURITY AND DATA REDUNDANCY A White Paper Security and Data Redundancy Whitepaper 2 At MyCase, Security is Our Top Priority. Here at MyCase, we understand how important it is to keep our customer s data
More informationCloud-Based Data Security
White Paper Cloud-Based Data Security SaaS-built Galileo collects and analyzes customized performance data efficiently, on-demand, via a secure Internet connection. About Galileo Created by the ATS Group,
More informationEmployee Security Awareness Training Program
Employee Security Awareness Training Program Date: September 15, 2015 Version: 2015 1. Scope This Employee Security Awareness Training Program is designed to educate any InComm employee, independent contractor,
More informationSecuring the Grid and Your Critical Utility Functions. April 24, 2017
Securing the Grid and Your Critical Utility Functions April 24, 2017 1 Securing the Grid Effectively and Efficiently Recent threats to the Electric Grid and the importance of security Standards and Requirements
More informationNERC Monitoring and Situational Awareness Conference: Loss of Control Center Procedures and Testing Practices
NERC Monitoring and Situational Awareness Conference: Loss of Control Center Procedures and Testing Practices Ed Batalla Director of Technology Florida Power & Light Company September 19, 2013 Florida
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationKeys to a more secure data environment
Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting
More informationNORTH AMERICAN ELECTRIC RELIABILITY CORPORATION
NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION NARUC Energy Regulatory Partnership Program The Public Services Regulatory Commission of Armenia and The Iowa Utilities Board Janet Amick Senior Utility
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationGuide to cyber security/cip specifications and requirements for suppliers. September 2016
Guide to cyber security/cip specifications and requirements for suppliers September 2016 Introduction and context The AltaLink cyber security/cip specification and requirements for suppliers (the standard)
More informationAppendix I: LOAD OPERATING AGREEMENT
PG&E Transmission Interconnection Handbook Appendix I: LOAD OPERATING AGREEMENT Purpose The following agreement establishes operating responsibilities and associated procedures for communications between
More informationHIPAA Compliance and OBS Online Backup
WHITE PAPER HIPAA Compliance and OBS Online Backup Table of Contents Table of Contents 2 HIPAA Compliance and the Office Backup Solutions 3 Introduction 3 More about the HIPAA Security Rule 3 HIPAA Security
More informationCybersecurity for the Electric Grid
Cybersecurity for the Electric Grid Electric System Regulation, CIP and the Evolution of Transition to a Secure State A presentation for the National Association of Regulatory Utility Commissioners March
More informationLesson Learned CIP Version 5 Transition Program
Lesson Learned CIP Version 5 Transition Program CIP-002-5: BES Cyber Assets Version: December 7, 2015 This document is designed to convey lessons learned from NERC s various CIP version 5 transition activities.
More informationAMI Applications at SDG&E Metering America March 24, 2009 Ted M. Reguly Smart Meter Program Director SDG&E
AMI Applications at SDG&E Metering America March 24, 2009 Ted M. Reguly Smart Meter Program Director SDG&E 2008 San Diego Gas & Electric Company. All copyright and trademark rights reserved About Sempra
More informationSDG&E s Accomplishments and Future Plans
SDG&E s Accomplishments and Future Plans Tariq Raman and Subbu Sankaran San Diego Gas & Electric Work Group Meeting October 23-24, 2018 San Diego Gas & Electric San Francisco SDG&E Los Angeles San Diego
More informationStandard CIP Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-1 3. Purpose: Standard CIP-007 requires Responsible Entities to define methods, processes, and procedures for securing
More informationNW NATURAL CYBER SECURITY 2016.JUNE.16
NW NATURAL CYBER SECURITY 2016.JUNE.16 ADOPTED CYBER SECURITY FRAMEWORKS CYBER SECURITY TESTING SCADA TRANSPORT SECURITY AID AGREEMENTS CONCLUSION QUESTIONS ADOPTED CYBER SECURITY FRAMEWORKS THE FOLLOWING
More informationTitle. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018.
Critical Infrastructure Protection Getting Low with a Touch of Medium Title CanWEA Operations and Maintenance Summit 2018 January 30, 2018 George E. Brown Compliance Manager Acciona Wind Energy Canada
More informationCyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016
Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations Arkansas Joint Committee on Energy March 16, 2016 CenterPoint Energy, Inc. (NYSE: CNP) Regulated Electric and Natural Gas Utility
More informationConservation Voltage Reduction with AMI
Conservation Voltage Reduction with AMI Ilya Roytelman, Ph.D. Principal Engineer Distribution Systems Applications Engineering Conference June 10, 2013 Trade Secret This document and attachments contain
More informationConsolidated Privacy Notice
Privacy Notice Overview Consolidated Privacy Notice The Southern California Edison Privacy Notice was updated on January 31, 2018 It is important to Southern California Edison (SCE) to protect your information
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationGrid Modernization at SDG&E
Grid Modernization at SDG&E Ali Yari Director, Electric Grid Operations 2017 San Diego Gas & Electric Company. All copyright and trademark rights reserved. SDG&E Service Territory Subsidiary of Sempra
More informationPG&E Advanced Metering Assessment for Residential Electric Customers. September 2, 2010
PG&E Advanced Metering Assessment for Residential Electric Customers September 2, 2010 Structure Overview Deep subject matter expertise with proven delivery methodologies to address energy & utility companies
More informationCIP V5 Implementation Study SMUD s Experience
CIP V5 Implementation Study SMUD s Experience Tim Kelley October 16, 2014 Powering forward. Together. SMUD Fast Facts General Information SMUD employs approximately 2,000 individuals Service area of 900
More informationISO/IEC TR TECHNICAL REPORT
TECHNICAL REPORT ISO/IEC TR 27019 First edition 2013-07-15 Information technology Security techniques Information security management guidelines based on ISO/IEC 27002 for process control systems specific
More informationHigh performance monitoring & Control ACE3600 Remote Terminal Unit
High performance monitoring & Control ACE3600 Remote Terminal Unit Empower Your SCADA Network Utilities, now more than ever, are facing newer and greater hurdles. Multiple wired and wireless communication
More informationHosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
More informationSecurity Standards for Electric Market Participants
Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system
More informationRecent Issues in Electric Grid Physical Security
Recent Issues in Electric Grid Physical Security Paul W. Parfomak, Ph.D. Congressional Research Service pparfomak@crs.loc.gov Carnegie Mellon University Electricity Industry Center October 8, 2014 What
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationCyber Security Updates and Trends Affecting the Real Estate Industry
Cyber Security Updates and Trends Affecting the Real Estate Industry What, Why, and How? Agenda Cyber Security Today Changes to Security Standards and Trends Protecting Yourself and Your Organization Takeways
More informationIEC Vaasa Seminar 21st October Contents
Ethernet In The Substation IEC 61850 Vaasa Seminar 21st October 2008 Contents IEC 61850 Environmental Conditions Communication Requirements Communication Protocols Security Summary Contents IEC 61850 Environmental
More informationRedefining Renewables SCADA
Redefining Renewables SCADA David Jeon, Technical Services Manager - Sempra Renewables #OSIsoftUC #PIWorld 2018 OSIsoft, LLC California Utilities Texas Utility (2) South American Utilities Infrastructure
More informationCyber Security for Renewable Energy Systems
Cyber Security for Renewable Energy Systems Asia Pacific Clean Energy Summit August 31, 2010 Juan J. Torres Manager, Energy Systems Analysis Sandia National Laboratories jjtorre@sandia.gov Sandia is a
More informationUCOP ITS Systemwide CISO Office Systemwide IT Policy. UC Event Logging Standard. Revision History. Date: By: Contact Information: Description:
UCOP ITS Systemwide CISO Office Systemwide IT Policy UC Event Logging Standard Revision History Date: By: Contact Information: Description: 05/02/18 Robert Smith robert.smith@ucop.edu Approved by the CISOs
More informationSouthern California Edison. Leading the Way in Electricity TM
Southern California Edison Leading the Way in Electricity TM Smart Metering Essentials at SCE End-Use Energy Reductions through Monitoring, Feedback, and Behavior Modification Precourt Institute for Energy
More informationEHS Steering Team Meting, 2008
EHS Steering Team Meting t, 2008 Duke Energy Fast Facts Duke Energy Corporation is an energy company headquartered in Charlotte, N.C. Its Regulated Utilities business unit serves 7.3 million retail electric
More informationДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT
ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT ENERGY AUTOMATION - SMART GRID Restricted Siemens AG 20XX All rights reserved. siemens.com/answers Frederic Buchi, Energy Management Division, Siemens AG Cyber
More informationIAM Security & Privacy Policies Scott Bradner
IAM Security & Privacy Policies Scott Bradner November 24, 2015 December 2, 2015 Tuesday Wednesday 9:30-10:30 a.m. 10:00-11:00 a.m. 6 Story St. CR Today s Agenda How IAM Security and Privacy Policies Complement
More informationInterconnection and Transmission
Interconnection and Transmission Gary L. Brown, P.E. Director of Energy Development Gary@ZGlobal.biz 916-985-9461 Kevin Coffee Energy Management Committee Meeting Irvine, California August 26, 2015 Interconnection
More informationHealthcare HIPAA and Cybersecurity Update
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity
More informationSmart Solutions Smarter Grid
Smart Solutions Smarter Grid Optimizing Efficiency, Productivity, and Reliability Stef.Budai@CooperIndustries.com Consultant Grid Automation FECA Conference 2012 Contents Why the Smart Grid? Utility Industry
More information2 nd Annual NERC Monitoring and Situational Awareness Conference: FPL s Operational Technology Center
2 nd Annual NERC Monitoring and Situational Awareness Conference: FPL s Operational Technology Center Ed Batalla Director of Grid Control Systems Florida Power & Light Company Sept. 24, 2014 Florida Power
More informationSecuring IEDs against Cyber Threats in Critical Substation Automation and Industrial Control Systems
Securing IEDs against Cyber Threats in Critical Substation Automation and Industrial Control Systems Eroshan Weerathunga, Anca Cioraca, Mark Adamiak GE Grid Solutions MIPSYCON 2017 Introduction Threat
More informationASERCOM cyber-security guideline for connected HVAC/R equipment
ASERCOM cyber-security guideline for connected HVAC/R equipment Preface Many HVAC/R components like compressors, fans or controllers have connectivity features today. This includes Bluetooth, Wi-Fi or
More informationSacramen Sacr t amen o t Municipal Utility Dis t Dis rict t SMUD May Ma 10,
Sacramento Municipal Utility District SMUD May 10, 2010 1 SMUD Facts and Figures 900 Sq. Miles Service Area 585,500 Customers 1.4 million Area Population 10 Bulk Substations 473 Miles of Transmission Lines
More informationYou Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved.
April 14, 2016 You Might Know Us As. 2012 2014 2 TierPoint Corporate Overview TierPoint Data Center Footprint* TierPoint Key Statistics Employees: 870 Markets: 24 Data Centers: 38 Total Raised Floor: 599,000
More informationThe Terrorism Threat to Physical Assets
The Terrorism Threat to Physical Assets S U B S T A T I O N A T T A C K A N D C O U N T E R M E A S U R E S Howard J. Somers, P.E. Vice President Loss Control / Division Head AEGIS Insurance Services,
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationThe NIS Directive and Cybersecurity in
The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security
More informationIdentity-Based Cyber Defense. March 2017
Identity-Based Cyber Defense March 2017 Attackers Continue to Have Success Current security products are necessary but not sufficient Assumption is you are or will be breached Focus on monitoring, detecting
More informationMarch 6, Dear Electric Industry Vendor Community: Re: Supply Chain Cyber Security Practices
March 6, 2019 Dear Electric Industry Vendor Community: Re: Supply Chain Cyber Security Practices On July 21, 2016, the Federal Energy Regulatory Commission (FERC) directed the North American Electric Reliability
More informationTHE NEXUS OF LEAK DETECTION & ASSET MANAGEMENT
THE NEXUS OF LEAK DETECTION & ASSET MANAGEMENT AN INNOVATIVE AND EFFICIENT APPROACH IN SAN MARCOS, TX & SAN JUAN, PR Wayne Pratt WPratt@wachsws.com (847) 946-5907 Agenda Leak Detection Key Drivers Methodology
More informationStandard CIP 007 4a Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-4a 3. Purpose: Standard CIP-007-4 requires Responsible Entities to define methods, processes, and procedures for
More informationSCADA Training - T&D Automation
SCADA Training - T&D Automation Contact us Today for a FREE quotation to deliver this course at your company?s location. https://www.electricityforum.com/onsite-training-rfq This course covers all the
More informationNERC Transmission Availability Data System (TADS): Element Identifier Data Submission Addendum
Transmission Availability Data System (TADS) Element Identifier Data Submission Addendum May 28, 2013 3353 Peachtree Road NE NERC Transmission Availability Data System (TADS): Element Identifier Data Submission
More informationSmartSacramento Distribution Automation
SmartSacramento Distribution Automation Presented by Michael Greenhalgh, Project Manager Lora Anguay, Sr. Project Manager Agenda 1. About SMUD 2. Distribution Automation Project Overview 3. Data Requirements
More informationThis webinar brought to you by the Relion product family
This webinar brought to you by the Relion product family Relion. Thinking beyond the box. Designed to seamlessly consolidate functions, Relion relays are smarter, more flexible and more adaptable. Easy
More informationData Centers & Technology:
Data Centers & Technology: Risk in the digital landscape Presented by; Ralph de Mesquita Principal Risk Analyst, Risk Engineering UK Agenda Rise of cloud providers Four scenarios: where are the insurable
More informationEvaluation of Business Cases for Smart Grid Solutions Kenny Mercado, Senior VP Electric Operations
Evaluation of Business Cases for Smart Grid Solutions Kenny Mercado, Senior VP Electric Operations April 21, 2015 CenterPoint Energy (CNP) Headquartered in Houston, Texas Serving 5.7 million electric &
More informationLTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security
LTI Security Intelligent & integrated Approach to Cyber & Digital Security Overview As businesses are expanding globally into new territories, propelled and steered by digital disruption and technological
More informationCIP Cyber Security Personnel & Training
A. Introduction 1. Title: Cyber Security Personnel & Training 2. Number: CIP-004-5.1 3. Purpose: To minimize the risk against compromise that could lead to misoperation or instability in the BES from individuals
More informationCalifornia State Polytechnic University, Pomona. Server and Network Security Standard and Guidelines
California State Polytechnic University, Pomona Server and Network Security Standard and Guidelines Version 1.7 April 4, 2008 Table of Contents OVERVIEW...3 AUDIENCE...3 MINIMUM NETWORK AND SERVER SECURITY
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More informationOur Power & Control line of Business offers solutions that safely distribute power to your home or business. Our product range includes Low/Medium
Our Power & Control line of Business offers solutions that safely distribute power to your home or business. Our product range includes Low/Medium Voltage Panels and Enclosures designed and built with
More informationData Classification, Security, and Privacy
Data Classification, Security, and Privacy Jennifer Bayuk Securities Industry and Financial Markets Association Internal Audit Division October, 2007 Overview of Information Classification Logical Relationship
More informationPhasor Technology Research Road Map to Improve Grid Reliability and Market Efficiency. Presented to TAC on April 5, 2005 and PAC on April 22, 2005
Phasor Technology Research Road Map to Improve Grid Reliability and Market Efficiency Presented to TAC on April 5, 2005 and PAC on April 22, 2005 Background Power Grid has evolved from a vertically integrated
More informationOctober 05, ECE 421 Session 12. Utility SCADA and Automation. Presented by: Chris Dyer
ECE 421 Session 12 October 05, 2017 Utility SCADA and Automation Presented by: Chris Dyer Utility SCADA & Automation Chris Dyer, P.E. BSEE University of Idaho, 1997 SCADA & Automation Engineer POWER Engineers,
More informationStem Beach Solar 1041 Application
Stem Beach Solar 1041 Application September 18 th, 2018 By: Stem Beach Solar LLC, Invenergy LLC 1401 17 th Street, Ste 1100 Denver, Colorado 80202 For: Pueblo County Agenda 1. About Invenergy 2. Project
More informationQuestion 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:
Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,
More informationFDIC InTREx What Documentation Are You Expected to Have?
FDIC InTREx What Documentation Are You Expected to Have? Written by: Jon Waldman, CISA, CRISC Co-founder and Executive Vice President, IS Consulting - SBS CyberSecurity, LLC Since the FDIC rolled-out the
More informationCIP Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security System Security Management 2. Number: CIP-007-5 3. Purpose: To manage system security by specifying select technical, operational, and procedural requirements in
More informationCopyright 2013 OSIsoft, LLC. 1
1 Industry Benefits and Trends of "PI" for Utilities Presented by Ann Moore, OSIsoft, LLC PI System for Transmission 3 California ISO On the front Lines of the Power Grid - New York Times, October 2011
More informationMission Critical MPLS in Utilities
Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Application Note February 2017 Mission Critical MPLS in Utilities The Technology to Support Evolving Networks Abstract This
More informationMONITORING SOLUTIONS FOR Power & Utilities
MONITORING SOLUTIONS FOR Power & Utilities SMART MONITORING SOLUTIONS FOR THE INTELLIGENT GRID Informed decision making from integrated monitoring at all points on the network and critical infrastructure
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationMemorandum. This memorandum requires Committee action.
California Independent System Operator Corporation Memorandum To: ISO Operations Committee From: Dariush Shirmohammadi, Director of Regional Transmission - South Armando Perez, VP, Planning & Infrastructure
More informationHIPAA COMPLIANCE AND DATA PROTECTION Page 1
HIPAA COMPLIANCE AND DATA PROTECTION info@resultstechnology.com 877.435.8877 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and RESULTS Cloud
More informationCyber Threats? How to Stop?
Cyber Threats? How to Stop? North American Grid Security Standards Jessica Bian, Director of Performance Analysis North American Electric Reliability Corporation AORC CIGRE Technical Meeting, September
More informationNew York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines
New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationGE Enterprise Solutions. Digital Energy
GE Enterprise Solutions Digital Energy g Digital Energy we protect and connect the world s critical equipment to ensure safe, reliable power Our strength lies in the innovative people who deliver solutions
More informationPeter Overgaauw Pascal Stijns 27 Oct 2016 EXPERION PKS CONTROLS ELECTRICAL SYSTEMS TOO!
Peter Overgaauw Pascal Stijns 27 Oct 2016 EXPERION PKS CONTROLS ELECTRICAL SYSTEMS TOO! Abstract Gain a basic understanding of an electrical control management system Exposure to a number of technology
More informationSecurity in grid control centers: Spectrum Power TM Cyber Security
Security in grid control centers: Spectrum Power TM Cyber Security Thomas Schmidt, Information Security Manager siemens.at/future-of-energy Spectrum Power TM 7 Historical Information System Table of content
More information2017 Annual Meeting of Members and Board of Directors Meeting
2017 Annual Meeting of Members and Board of Directors Meeting Dan Domagala; "Cybersecurity: An 8-Point Checklist for Protecting Your Assets" Join this interactive discussion about cybersecurity trends,
More informationJose Molina Sales Manager, Global Asset - RTU500 Series (Germany)
X JORNADAS TECNICAS - ABB EN CHILE, 12 DE ABRIL 2017 Distribution Automation Solution with RTU500 series Jose Molina Sales Manager, Global Asset - RTU500 Series (Germany) Agenda Why RTUs in Distribution
More information