GIS Applications to Cyber Security and Critical Infrastructure Protection
|
|
- Giles Carr
- 6 years ago
- Views:
Transcription
1 GIS Applications to Cyber Security and Critical Infrastructure Protection Brian Biesecker, Esri Paul Geraci, OSIsoft Shane Cherry, Idaho National Labs
2 Threats to Critical Infrastructure are Increasing Subhead Here
3 Devices and Networks exist in Space and Time and integrate together Missions / Operations Information Technology Operations Technology Critical Infrastructure
4 ArcGIS Integration for Critical Infrastructure Protection Subhead Here Executive Dashboards - Status Reports, Trends, Brand Sentiment, Financials Cyber Tools & Data- IDS/IPS, HBSS, Virus Scanning, Patch Monitoring Desktop Web Device Ops Data - Mission Activity, Status Reports, Real-time monitoring Portal Ops Dashboard IT Tools & Databases - IT Inventory, Device Locations, Health and Status Monitoring Sensor Networks - SCADA, ICS Server Online Content and Services Facilities Data - CAD & GIS of Buildings and Campuses, Electric, Water, HVAC, Facilities Monitoring, Physical Security
5 Operations Dashboard for Cyber Security
6 OSIsoft Paul Geraci Senior Director, Intelligence and National Security
7 THE PI SYSTEM: THE CRITICAL INFRASTRUCTURE FOR OUR NATION S CRITICAL INFRASTRUCTURE REAL-TIME COLLECTION, ANALYTICS, AND DISSEMINATION
8 OSIsoft and The PI System Mission Critical Infrastructure Bring Your Maps to Life Questions Copyright 28 OSIsoft, LLC
9 A Unique and Proven Vision For over 37 years OSIsoft has provided: Infrastructure for consolidation and centralization of sensor based data Open infrastructure to support best of breed Public and Private ecosystems Near limitless deployment scalability Connected Digital and Physical assets for Real Time Intelligence for Situational Awareness and Decision Support Copyright 28 OSIsoft, LLC
10
11 Providing Operational Intelligence on a Global Scale Moscow, Russia Calgary, Alberta Mayfield Heights, OH San Leandro, CA Phoenix, AZ Montreal, Quebec Philadelphia, PA Johnson City, TN Savannah, GA Washington, DC London, UK Paris, France Madrid, Spain Frankfurt, Germany Ostrava, Czech Republic Beijing, China Shanghai, China Seoul, South Korea (AID) Tokyo, Japan Mexico City, Mexico Houston & Longview, TX Manama, Bahrain Singapore São Paulo, Brazil Durban, South Africa Perth, Australia Sydney, Australia OSIsoft Headquarters DC Regional Office OSIsoft Offices Copyright 28 OSIsoft, LLC
12 The Global Leader Enabling Operational Intelligence Over, of the world s leading Power & Utilities companies 95% of the Global Fortune Top 4 Oil & Gas companies 4+ Pulp & Paper sites deployed worldwide % of the Global Fortune Top Metals & Mining companies 37 of 5 of the World s Largest Chemical & Petro- Chemical companies 9 / of the Global Fortune Top Pharma companies Copyright 28 OSIsoft, LLC
13 % of the ISOs/RTOs in the United States of America Use the PI System for Real Time Situational Awareness Copyright 28 OSIsoft, LLC
14 The PI System Server - Straight Forward - Uncomplicated - Invaluable Copyright 28 OSIsoft, LLC
15 Silos to Standards / Complexity to Simplicity PLC SCADA Historian Excel PLC2 SCADA 2 DCS DCS 2 Asset Reliability ERP Traditional Strategy Instrument PAT CAPA Planning and Scheduling Instrument PAT 2 CBM Learning Mgmt. Controller EMS LIMS Copyright 28 OSIsoft, LLC
16 Silos to Standards / Complexity to Simplicity PLC SCADA PLC2 SCADA 2 IPC IPC 2 Instrument PAT Collect Enhance Deliver ERP Instrument PAT 2 Asset Reliability Controllers Energy Efficiency LIMS Copyright 28 OSIsoft, LLC
17 A Real-Time Operations Data Infrastructure For Federal Mission-Critical Global Infrastructures Automation/Control Systems New Sensor Technologies Remote and Mobile Assets Enterprise Operations Infrastructure Real-time Monitoring Vendor Applications Analytics 3 rd Party Services +45 connectors Copyright 28 OSIsoft, LLC
18 Deliver Real-time Analytics from the Operator to Headquarters Executive Dashboards Visibility Situational awareness Drill into the Problem Multiple layers of information Data Analysis Ad-hoc trending Model training Take Action, Track & Document Copyright 28 OSIsoft, LLC
19 The PI System as a Central Data Infrastructure Vital reporting on key Data Center business metrics All critical data sources feed into the PI System IT data Electricity data Building Management System data All analysis applications read from one central source: the PI System * Permitted for use by Ebay Corp. Copyright 28 OSIsoft, LLC
20 Our Federal Mission at OSIsoft Empower stakeholders, agencies, and communities to transform their operational data into real-time operational intelligence. Operations Missions Multiple Sensors Multiple Assets Multiple Operations Multiple Missions and Operations Copyright 28 OSIsoft, LLC
21 A Real Time Data Infrastructure: The Agent for Federal Enterprise Transformation Energy Asset Health Energy Process Efficiency Holistic Cyber Security & Asset Safety Health Quality Regulation Regulation PI System Software Infrastructure Copyright 28 OSIsoft, LLC
22 The White House Office of the Press Secretary For Immediate Release February 2, 23 Presidential Policy Directive Critical Infrastructure Security and Resilience PRESIDENTIAL POLICY DIRECTIVE/PPD-2 SUBJECT: Critical Infrastructure Security and Resilience The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure. 22
23 PPD-2 Introduction The Nation's critical infrastructure provides the essential services that underpin American society. Proactive and coordinated efforts are necessary to strengthen and maintain secure, functioning, and resilient critical infrastructure including assets, networks, and systems that are vital to public confidence and the Nation's safety, prosperity, and wellbeing. The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. Critical infrastructure must be secure and able to withstand and rapidly recover from all hazards. Achieving this will require integration with the national preparedness system across prevention, protection, mitigation, response, and recovery. This directive establishes national policy on critical infrastructure security and resilience. This endeavor is a shared responsibility among the Federal, state, local, tribal, and territorial (SLTT) entities, and public and private owners and operators of critical infrastructure (herein referred to as "critical infrastructure owners and operators"). This directive also refines and clarifies the critical infrastructure-related functions, roles, and responsibilities across the Federal Government, as well as enhances overall coordination and collaboration. The Federal Government also has a responsibility to strengthen the security and resilience of its own critical infrastructure, for the continuity of national essential functions, and to organize itself to partner effectively with and add value to the security and resilience efforts of critical infrastructure owners and operators. Copyright 28 OSIsoft, LLC
24 Threats to U.S. Critical Infrastructure Insider Threats Natural Disasters Terrorism Malicious/Non-Malicious Hacktavists Organizational / State Sponsored Copyright 28 OSIsoft, LLC
25 IT OT IT connects people with each other via , web collaboration tools and even voice communications - with information, via various databases, etc. Malware, data theft and corrupted data or devices can disrupt user productivity and even a stakeholder s transactional capabilities. This is one of the biggest differences between enterprise network security and industrial network security. If a deliberate hacker-saboteur, or an Insider Threat penetrates an industrial network and disrupts critical processes or controls, and even automated life safety protections, the populace could get seriously or even mortally hurt and our nation could come to standstill. Copyright 28 OSIsoft, LLC
26 Pervasive Data Collection Real-time sensor-based data from: Distributed Remote Mobile Assets May be collected, stored, analyzed, and streamed into the PI System Uncover hidden patterns, correlations and other strategic operational and business intelligence Copyright 28 OSIsoft, LLC
27 Gain Visibility Into Operational IT Assets Asset-based PI tools can help you monitor the status, health, and performance of IT assets in real-time PI AF Element Templates -build an AF Element hierarchy around enterprise IT assets to create and configure PI Tags for: standard IT Monitor PI Interfaces Ping TCP Response Performance Monitor SNMP Copyright 28 OSIsoft, LLC
28 PI Framing the Puzzle Connecting and framing data for a complete, reliable, valid, timely, accurate and analytically real-time and predictive picture. Copyright 28 OSIsoft, LLC
29 The PI System: A Data Infrastructure for Global Mission Critical Infrastructure Process Efficiency Maintenance Asset Health Equipment Energy Infrastructure Quality Utilities 3 rd Party Services Holistic Cyber Security & Safety Compliance Compliance Officer Mission Critical Infrastructure Copyright 28 OSIsoft, LLC
30 Real-time Data in Spatial Context Copyright 28 OSIsoft, LLC
31 Copyright 28 OSIsoft, LLC
32 (Video) 32
33 The PI System: A True Global Situational Awareness Architecture Eliminating your data silos: Anywhere Anytime Real-Time Copyright 28 OSIsoft, LLC
34 Idaho National Labs Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate
35 Understanding Holistic Effects of Cyber Events on Critical Infrastructure Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate March 2, 28 INL/CON
36 Information Technology vs. Operational Technology Information Technology: The study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information Oxford Dictionary Operational Technology: The hardware and software dedicated to detecting or causing changes in physical processes through direct monitoring and/or control of physical devices such as switches, pumps, valves, etc. such as those used in critical infrastructure systems. International Society of Automation
37 Increased IT-OT Connectivity Our national critical infrastructure consists of systems of geographically distributed assets, from regional and national networks to micro-scale controllers and sensors Increasingly, these assets, across all scales, are connected via IT and OT networks and thus potential cyber targets
38 Increased Focus on OT Related Cyber Activity
39 Increase in Cyber Events Related to Operational Technologies In Fiscal Year 26, DHS ICS-CERT coordinated 35 unique vulnerabilities and responded to 29 incidents associated with industrial control systems ICS-CERT Year in Review, 26 Large-scale cyberattack to electrical grid could lead to $243B - $T loss to the U.S. economy Health and safety impacts would include increased rate of illness and death in impacted areas Impact to DoD (and DHS) missions would significantly impact the security of the United States Lloyd s and University of Cambridge Centre for Risk Studies; President s Council of Economic Advisors, February 28
40 Elements of Cyber Physical Interactions
41 Interdependency Discovery Approach All-Hazards Analysis Framework (A-HA)
42 Interdependency Mapping
43 Developing Multi-Scale Facility Profiles Regional Scale Dependencies Process Scale Dependencies Control System Scale Dependencies Notional System
44 Modeling Functional Impacts
45 Holistic Cyber-Physical Analysis Process Reported OT Vulnerabilities or Threats Identify Standard OT Components Across Sectors Potentially Affected and Model Functional Impacts Link to Potential Facility Locations Model Potential Cascading Impacts Provide Actionable Information to Decision Makers and Stakeholders
46 Esri and INL: Partnering for Cyber Resilience
47
48 Print Your Certificate of Attendance Print stations located in the 4 Concourse Tuesday 2:3 pm 6:3 pm GIS Solutions Expo Hall B Wednesday :3 am 5:5 pm GIS Solutions Expo Hall B 5: pm 6:3 pm GIS Solutions Expo Social Hall B 6:3 pm 9: pm Networking Reception Smithsonian National Portrait Gallery
49 Download the Esri Events app and find your event Please Take Our Survey in the Esri Events App Select the session you attended Scroll down to find the feedback section Complete answers and select Submit
50 Brian Biesecker, Esri Paul J. Geraci, OSIsoft Shane Cherry, INL
Understanding Holistic Effects of Cyber Events on Critical Infrastructure
Understanding Holistic Effects of Cyber Events on Critical Infrastructure Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate March 20, 2018 INL/CON-17-42513
More informationIntroducing OSIsoft. Presented by Zsolt Oros, Regional Manager DACH & EE
Introducing OSIsoft Presented by Zsolt Oros, Regional Manager DACH & EE Who we are? Copyr i ght 2014 O SIs oft, LLC. 2 OSIsoft is a company with a focus One System. Singular focus. 1980 20% Founded Revenue
More informationApplication of GIS to Cybersecurity. Brian Biesecker Ken Mitchell
Application of GIS to Cybersecurity Brian Biesecker Ken Mitchell Fundamental Problems that GIS can help you solve What are the impacts to your mission, operations, business activities, critical systems,
More informationWelcome to the Second Annual Intelligence & National Security Forum
Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationTHE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS
THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical
More informationStatement for the Record
Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before
More informationOSIsoft PI System Usage For Academia
OSIsoft PI System Usage For Academia Jim O Rourke, Academic Acct. Mgr. OSIsoft jorourke@osisoft.com 281-433-3399 Mike Mihuc, Academic Principal OSIsoft mmihuc@osisoft.com 412-779-6804 March 17, 2016 We
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationDHS Cybersecurity: Services for State and Local Officials. February 2017
DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated
More informationCritical Infrastructure Resilience
Critical Infrastructure Resilience Climate Resilience Webinar Series U.S. Department of Housing and Urban Development Disclaimer This presentation is intended to provide communities and states with the
More informationQuadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters
Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland
More informationImplementing Executive Order and Presidential Policy Directive 21
March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy
More informationCyber Security & Homeland Security:
Cyber Security & Homeland Security: Cyber Security for CIKR and SLTT Michael Leking 19 March 2014 Cyber Security Advisor Northeast Region Office of Cybersecurity and Communications (CS&C) U.S. Department
More informationThe Australian Government s Approach to Critical Infrastructure Resilience
The Australian Government s Approach to Critical Infrastructure Resilience GNSS Workshop University of New South Wales 4 December 2013 Mr Kris Garred, Director Critical Infrastructure Policy Attorney-General
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationHomeland Security and Geographic Information Systems
Page 1 of 5 Homeland Security and Geographic Information Systems How GIS and mapping technology can save lives and protect property in post-september 11th America Introduction Timely, accurate information,
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Regional Resiliency Assessment Program 2015 State Energy Risk Assessment Workshop April
More informationHigh Availability & Disaster Recovery. Witt Mathot
High Availability & Disaster Recovery Witt Mathot Managing the Twin Risks to your Operations Data Loss Down Time Business Continuity Terminology Resiliency High Availability RTO Round Robin Cost Business
More informationAndroid Team Awareness Kit (ATAK) and ArcGIS
Android Team Awareness Kit (ATAK) and ArcGIS Darron Pustam Product Manager, Esri Craig Cleveland Product Engineer, Esri Verne LaClair Product Manager, PAR Agenda Connecting Intel and Operations in Real
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationOutreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness
2011/EPWG/WKSP/020 Session 4 Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness Submitted by: Australia Workshop on Private Sector Emergency Preparedness Sendai,
More informationJune 5, 2018 Independence, Ohio
June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga
More informationImplementing the Administration's Critical Infrastructure and Cybersecurity Policy
Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated
More informationIndustrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets
Industrial Cyber Security ICS SHIELD Top-down security for multi-vendor OT assets OT SECURITY NEED Industrial organizations are increasingly integrating their OT and IT infrastructures. The huge benefits
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationExecutive Order on Coordinating National Resilience to Electromagnetic Pulses
Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationNational Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015
National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationTestimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON
Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America
More informationCritical Infrastructure Sectors and DHS ICS CERT Overview
Critical Infrastructure Sectors and DHS ICS CERT Overview Presented by Darryl E. Peek II REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM 2 2 Authorities and Related Legislation Homeland Security
More informationPD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection
PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationToward All-Hazards Security and Resilience for the Power Grid
Toward All-Hazards Security and Resilience for the Power Grid Juan Torres Associate Laboratory Director, Energy Systems Integration National Renewable Energy Laboratory December 6, 2017 1 Grid Modernization
More information2014 Sector-Specific Plan Guidance. Guide for Developing a Sector-Specific Plan under NIPP 2013 August 2014
2014 -Specific Plan Guidance Guide for Developing a -Specific Plan under NIPP 2013 August 2014 How to Use this Guidance This page provides a roadmap to assist critical infrastructure partners in navigating
More informationTIES for Microsoft CityNext Next-Generation Situational Awareness
BROCHURE A CLOSER LOOK AT! TIES for Microsoft CityNext Next-Generation Situational Awareness INTRODUCTION! TIES for Microsoft CityNext (TMCN) is an all-hazard threat monitoring and situation awareness
More informationCritical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,
More informationThe IBM Platform Computing HPC Cloud Service. Solution Overview
The IBM Platform Computing HPC Cloud Service Solution Overview Industry-leading workload management 20 years managing distributed scale-out systems with 2000+ customers in many industries High performance
More informationIndustry role moving forward
Industry role moving forward Discussion with National Research Council, Workshop on the Resiliency of the Electric Power Delivery System in Response to Terrorism and Natural Disasters February 27-28, 2013
More informationUNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21
National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security
More informationNATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC
NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationOverview of the Federal Interagency Operational Plans
Overview of the Federal Interagency Operational Plans July 2014 Table of Contents Introduction... 1 Federal Interagency Operational Plan Overviews... 2 Prevention Federal Interagency Operational Plan...2
More informationBusiness Continuity: How to Keep City Departments in Business after a Disaster
Business Continuity: How to Keep City Departments in Business after a Disaster Shannon Spence, PE Red Oak Consulting, an ARCADIS group Agenda Security, Resilience and All Hazards The Hazards Cycle and
More informationEnergy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials
+ NGA State Learning Lab on Energy Assurance Coordination May 13-15, 2015 Trenton, New Jersey Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National
More informationEPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS
EPRO Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS The Role of Systems Engineering in Addressing Black Sky Hazards
More informationManaging Security, Risk and Compliance for Critical Assets on the Smart Grid
Managing Security, Risk and Compliance for Critical Assets on the Smart Grid Kshamit Dixit Toronto Hydro Toronto Hydro A snapshot Worldwide Employees: 1,700 Revenues: $2.3 Billion Headquarters: Toronto,
More informationOffice of Infrastructure Protection Overview
Office of Infrastructure Protection Overview Harvey Perriott Protective Security Advisor North Texas District U.S. Department of Homeland Security Vision and Mission Vision A safe, secure, and resilient
More informationThe Power of Data: Thriving in a World of Change
The Power of Data: Thriving in a World of Change Presented by Brett Higgins Vice President Asia Pacific Copyright 2013 OSIsoft, LLC. About OSIsoft Founded in 1980 14 000 Sites, 4 000 Customers 123 Countries
More informationCritical Infrastructure
Critical Infrastructure 1 Critical Infrastructure Can be defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and
More informationThe Power of Connection
The Power of Connection Presented by Mana Afshari, Systems Engineer mafshari@osisoft.com Why is Connectivity Important? Context Need Solution More data sources available Advanced analyses require information
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationBradford J. Willke. 19 September 2007
A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure
More informationFACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008
FACTS AND OPPORTUNITIES IN BRAZIL Gartner IT Security Summit Washington DC, June 2008 OUR OBJECTIVE TODAY Raise your awareness that there are several Brazilian IT Services and Solutions Providers that
More informationUsing Operations Dashboard for ArcGIS: An Introduction
FedGIS Conference February 24 25, 2016 Washington, DC Using Operations Dashboard for ArcGIS: An Introduction Ken Gorton Carmella A. Burdi, GISP Solution Engineer Esri National Government Team kgorton@esri.com
More informationAdministering Your ArcGIS Enterprise Portal Bill Major Craig Cleveland
Administering Your ArcGIS Enterprise Portal Bill Major Craig Cleveland Agenda Welcome & Introduction to ArcGIS Enterprise Portal for ArcGIS Administration - Basic Configuration - Advanced Configuration
More informationSimple Preparedness Steps Toward Resilience
Simple Preparedness Steps Toward Resilience Matt Lyttle Individual and Community Preparedness Division What is Resilience? Economic? Climate? Disaster? Environmental? Ability of individuals, communities,
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationCyber Attacks & Breaches It s not if, it s When
` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,
More informationBusiness Continuity Planning
Business Continuity Planning The Unexpected Happens Be Ready Copyright -Business Survival Partners, llc. 2011 - All Rights Reserved www.survivalpartners.biz RISK 2 Risks to National Security A secure and
More informationSurvey123 for ArcGIS: An Introduction. James Tedrick Erin Densford
Survey123 for ArcGIS: An Introduction James Tedrick Erin Densford Smart Forms for ArcGIS Easily convert paper forms into Digital Smart ArcGIS Forms Why Smart Forms in ArcGIS? Reduce Errors During Data
More informationBUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS
BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS SAFETY AND SECURITY IN THE 21ST CENTURY National security, defense, and public safety agencies face challenges and threats that
More informationDOE s Roles and Responsibilities for Energy Sector Cybersecurity
Written Testimony of Under Secretary Mark Menezes U.S. Department of Energy Before the Subcommittee on Energy Committee on Energy and Commerce U.S. House of Representatives March 14, 2018 Introduction
More informationEmergency Management Response and Recovery. Mark Merritt, President September 2011
Emergency Management Response and Recovery Mark Merritt, President September 2011 Evolution of Response and Recovery Emergency Management Pendulum Hurricane Andrew August 24, 1992 9/11 Terrorist Attacks
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationFederal Civilian Executive branch State, Local, Tribal, Territorial government (SLTT) Private Sector (PS) Unclassified / Business Networks
Brownsville Public Utilities Board Cyber Security Initiative A result of the BPUB IT Strategic Plan implemented a Cyber Security Framework (CSF) that utilizes : Security standards Tools and Best practices
More informationWhy trading firms choose... Connexus Voice. For Traders
Why trading firms choose... Connexus Voice For Traders Intelligent SIP based Voice Services Financial traders need instant connectivity to their counterparties, and private Connexus Voice circuits provide
More informationRegional Resilience: Prerequisite for Defense Industry Base Resilience
Regional Resilience: Prerequisite for Defense Industry Base Resilience Paula Scalingi, Director Pacific Northwest Center for Regional Disaster Resilience Vice Chair, The Infrastructure Security Partnership
More informationAlternative Fuel Vehicles in State Energy Assurance Planning
+ Alternative Fuel Vehicles in State Energy Assurance Planning July 17, 2014 Webinar hosted by the National Association of State Energy Officials (NASEO), with support from the U.S. Department of Energy
More informationSTRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government
ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents
More informationEnergy Assurance Plans
Energy Assurance Plans funded through the American Reinvestment and Recovery Act (ARRA) - Stimulus $$ to help create jobs to enhance energy reliability and facilitate recovery from disruptions to the energy
More informationArcGIS Solutions for Community Resilience. Matthew S Deal
ArcGIS Solutions for Community Resilience Matthew S Deal Solutions Overview Leverage hundreds of ready-to-use maps, apps, and platform configurations to meet your needs, delivering innovation and best
More informationMonthly Cyber Threat Briefing
Monthly Cyber Threat Briefing January 2016 1 Presenters David Link, PM Risk and Vulnerability Assessments, NCATS Ed Cabrera: VP Cybersecurity Strategy, Trend Micro Jason Trost: VP Threat Research, ThreatStream
More informationDr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt
Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?
More informationAddressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting
Addressing Vulnerabilities By Integrating Your Incident Response Plans Brian Coates Enaxis Consulting Contents Enaxis Introduction Presenter Bio: Brian Coates Incident Response / Incident Management in
More informationPresidential Documents
Federal Register Vol. 84, No. 61 Friday, March 29, 2019 Presidential Documents 12041 Title 3 Executive Order 13865 of March 26, 2019 The President Coordinating National Resilience to Electromagnetic Pulses
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationCyber Resilience. Think18. Felicity March IBM Corporation
Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack
More informationInternet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi
Internet of Things The Digital Oilfield: Security in SCADA and Process Control Mahyar Khosravi makhosra@cisco.com Critical infrastructures worldwide not ready to battle cyber attacks, claims new study.
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference
More informationControl Systems Cyber Security Awareness
Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security
More informationEfikasniji modeli IT usluga: Managed Services and Cloud Jedna platforma-neograničene mogućnosti. Hrvoje Supić Maks Strajher
Efikasniji modeli IT usluga: Managed Services and Cloud Jedna platforma-neograničene mogućnosti Hrvoje Supić Maks Strajher What is a Managed Services? Taking responsibility for daily operations of parts
More informationNew Partners Join Charter of Trust to Protect Critical Infrastructure
Siemens, The AES Corporation, Airbus, Allianz, Atos, Enel, Daimler Press Houston, March 8, 2018 New Partners Join Charter of Trust to Protect Critical Infrastructure The AES Corporation, Atos and Enel
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationEnergy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013
+ Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 Jeffrey R. Pillon, Director, Energy Assurance Programs National Association of State
More informationShared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay
Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Assistant Director General Office of State Security and Emergency Coordination Department of the Premier and Cabinet
More informationJOINT UNITED STATES-CANADA ELECTRIC GRID SECURITY AND RESILIENCE STRATEGY
JOINT UNITED STATES-CANADA ELECTRIC GRID SECURITY AND RESILIENCE STRATEGY Product of the Governments of the United States and Canada DECEMBER 2016 Table of Contents Executive Summary 1 Introduction 3
More informationFebruary 21, pm ET
February 21, 2018 1-2 pm ET Agenda Introduction Overview of the NISC G&H International Services: Practical Tools for Better Decision- Making Q&A Quiz for those seeking Continuing Education Units (CEUs)
More informationArcGIS Enterprise: Performance and Scalability Best Practices. Darren Baird, PE, Esri
ArcGIS Enterprise: Performance and Scalability Best Practices Darren Baird, PE, Esri dbaird@esri.com What is ArcGIS Enterprise What s Included with ArcGIS Enterprise ArcGIS Server the core web services
More informationHomeland Security Perspectives: Oregon Fire District Directors Association October 25, 2018
Perspectives: Oregon Fire District Directors Association October 25, 2018 Ronald D. Watters Jr M.Ed GSLC Cybersecurity Advisor Region X Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR)
More informationTHE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationMarch 21, 2016 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES. Building National Capabilities for Long-Term Drought Resilience
This document is scheduled to be published in the Federal Register on 03/25/2016 and available online at http://federalregister.gov/a/2016-06901, and on FDsys.gov March 21, 2016 MEMORANDUM FOR THE HEADS
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview MTIA St Louis 03 MAY 2016 Role of
More informationContinuity of Business
White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be
More information