GIS Applications to Cyber Security and Critical Infrastructure Protection

Size: px
Start display at page:

Download "GIS Applications to Cyber Security and Critical Infrastructure Protection"

Transcription

1 GIS Applications to Cyber Security and Critical Infrastructure Protection Brian Biesecker, Esri Paul Geraci, OSIsoft Shane Cherry, Idaho National Labs

2 Threats to Critical Infrastructure are Increasing Subhead Here

3 Devices and Networks exist in Space and Time and integrate together Missions / Operations Information Technology Operations Technology Critical Infrastructure

4 ArcGIS Integration for Critical Infrastructure Protection Subhead Here Executive Dashboards - Status Reports, Trends, Brand Sentiment, Financials Cyber Tools & Data- IDS/IPS, HBSS, Virus Scanning, Patch Monitoring Desktop Web Device Ops Data - Mission Activity, Status Reports, Real-time monitoring Portal Ops Dashboard IT Tools & Databases - IT Inventory, Device Locations, Health and Status Monitoring Sensor Networks - SCADA, ICS Server Online Content and Services Facilities Data - CAD & GIS of Buildings and Campuses, Electric, Water, HVAC, Facilities Monitoring, Physical Security

5 Operations Dashboard for Cyber Security

6 OSIsoft Paul Geraci Senior Director, Intelligence and National Security

7 THE PI SYSTEM: THE CRITICAL INFRASTRUCTURE FOR OUR NATION S CRITICAL INFRASTRUCTURE REAL-TIME COLLECTION, ANALYTICS, AND DISSEMINATION

8 OSIsoft and The PI System Mission Critical Infrastructure Bring Your Maps to Life Questions Copyright 28 OSIsoft, LLC

9 A Unique and Proven Vision For over 37 years OSIsoft has provided: Infrastructure for consolidation and centralization of sensor based data Open infrastructure to support best of breed Public and Private ecosystems Near limitless deployment scalability Connected Digital and Physical assets for Real Time Intelligence for Situational Awareness and Decision Support Copyright 28 OSIsoft, LLC

10

11 Providing Operational Intelligence on a Global Scale Moscow, Russia Calgary, Alberta Mayfield Heights, OH San Leandro, CA Phoenix, AZ Montreal, Quebec Philadelphia, PA Johnson City, TN Savannah, GA Washington, DC London, UK Paris, France Madrid, Spain Frankfurt, Germany Ostrava, Czech Republic Beijing, China Shanghai, China Seoul, South Korea (AID) Tokyo, Japan Mexico City, Mexico Houston & Longview, TX Manama, Bahrain Singapore São Paulo, Brazil Durban, South Africa Perth, Australia Sydney, Australia OSIsoft Headquarters DC Regional Office OSIsoft Offices Copyright 28 OSIsoft, LLC

12 The Global Leader Enabling Operational Intelligence Over, of the world s leading Power & Utilities companies 95% of the Global Fortune Top 4 Oil & Gas companies 4+ Pulp & Paper sites deployed worldwide % of the Global Fortune Top Metals & Mining companies 37 of 5 of the World s Largest Chemical & Petro- Chemical companies 9 / of the Global Fortune Top Pharma companies Copyright 28 OSIsoft, LLC

13 % of the ISOs/RTOs in the United States of America Use the PI System for Real Time Situational Awareness Copyright 28 OSIsoft, LLC

14 The PI System Server - Straight Forward - Uncomplicated - Invaluable Copyright 28 OSIsoft, LLC

15 Silos to Standards / Complexity to Simplicity PLC SCADA Historian Excel PLC2 SCADA 2 DCS DCS 2 Asset Reliability ERP Traditional Strategy Instrument PAT CAPA Planning and Scheduling Instrument PAT 2 CBM Learning Mgmt. Controller EMS LIMS Copyright 28 OSIsoft, LLC

16 Silos to Standards / Complexity to Simplicity PLC SCADA PLC2 SCADA 2 IPC IPC 2 Instrument PAT Collect Enhance Deliver ERP Instrument PAT 2 Asset Reliability Controllers Energy Efficiency LIMS Copyright 28 OSIsoft, LLC

17 A Real-Time Operations Data Infrastructure For Federal Mission-Critical Global Infrastructures Automation/Control Systems New Sensor Technologies Remote and Mobile Assets Enterprise Operations Infrastructure Real-time Monitoring Vendor Applications Analytics 3 rd Party Services +45 connectors Copyright 28 OSIsoft, LLC

18 Deliver Real-time Analytics from the Operator to Headquarters Executive Dashboards Visibility Situational awareness Drill into the Problem Multiple layers of information Data Analysis Ad-hoc trending Model training Take Action, Track & Document Copyright 28 OSIsoft, LLC

19 The PI System as a Central Data Infrastructure Vital reporting on key Data Center business metrics All critical data sources feed into the PI System IT data Electricity data Building Management System data All analysis applications read from one central source: the PI System * Permitted for use by Ebay Corp. Copyright 28 OSIsoft, LLC

20 Our Federal Mission at OSIsoft Empower stakeholders, agencies, and communities to transform their operational data into real-time operational intelligence. Operations Missions Multiple Sensors Multiple Assets Multiple Operations Multiple Missions and Operations Copyright 28 OSIsoft, LLC

21 A Real Time Data Infrastructure: The Agent for Federal Enterprise Transformation Energy Asset Health Energy Process Efficiency Holistic Cyber Security & Asset Safety Health Quality Regulation Regulation PI System Software Infrastructure Copyright 28 OSIsoft, LLC

22 The White House Office of the Press Secretary For Immediate Release February 2, 23 Presidential Policy Directive Critical Infrastructure Security and Resilience PRESIDENTIAL POLICY DIRECTIVE/PPD-2 SUBJECT: Critical Infrastructure Security and Resilience The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure. 22

23 PPD-2 Introduction The Nation's critical infrastructure provides the essential services that underpin American society. Proactive and coordinated efforts are necessary to strengthen and maintain secure, functioning, and resilient critical infrastructure including assets, networks, and systems that are vital to public confidence and the Nation's safety, prosperity, and wellbeing. The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. Critical infrastructure must be secure and able to withstand and rapidly recover from all hazards. Achieving this will require integration with the national preparedness system across prevention, protection, mitigation, response, and recovery. This directive establishes national policy on critical infrastructure security and resilience. This endeavor is a shared responsibility among the Federal, state, local, tribal, and territorial (SLTT) entities, and public and private owners and operators of critical infrastructure (herein referred to as "critical infrastructure owners and operators"). This directive also refines and clarifies the critical infrastructure-related functions, roles, and responsibilities across the Federal Government, as well as enhances overall coordination and collaboration. The Federal Government also has a responsibility to strengthen the security and resilience of its own critical infrastructure, for the continuity of national essential functions, and to organize itself to partner effectively with and add value to the security and resilience efforts of critical infrastructure owners and operators. Copyright 28 OSIsoft, LLC

24 Threats to U.S. Critical Infrastructure Insider Threats Natural Disasters Terrorism Malicious/Non-Malicious Hacktavists Organizational / State Sponsored Copyright 28 OSIsoft, LLC

25 IT OT IT connects people with each other via , web collaboration tools and even voice communications - with information, via various databases, etc. Malware, data theft and corrupted data or devices can disrupt user productivity and even a stakeholder s transactional capabilities. This is one of the biggest differences between enterprise network security and industrial network security. If a deliberate hacker-saboteur, or an Insider Threat penetrates an industrial network and disrupts critical processes or controls, and even automated life safety protections, the populace could get seriously or even mortally hurt and our nation could come to standstill. Copyright 28 OSIsoft, LLC

26 Pervasive Data Collection Real-time sensor-based data from: Distributed Remote Mobile Assets May be collected, stored, analyzed, and streamed into the PI System Uncover hidden patterns, correlations and other strategic operational and business intelligence Copyright 28 OSIsoft, LLC

27 Gain Visibility Into Operational IT Assets Asset-based PI tools can help you monitor the status, health, and performance of IT assets in real-time PI AF Element Templates -build an AF Element hierarchy around enterprise IT assets to create and configure PI Tags for: standard IT Monitor PI Interfaces Ping TCP Response Performance Monitor SNMP Copyright 28 OSIsoft, LLC

28 PI Framing the Puzzle Connecting and framing data for a complete, reliable, valid, timely, accurate and analytically real-time and predictive picture. Copyright 28 OSIsoft, LLC

29 The PI System: A Data Infrastructure for Global Mission Critical Infrastructure Process Efficiency Maintenance Asset Health Equipment Energy Infrastructure Quality Utilities 3 rd Party Services Holistic Cyber Security & Safety Compliance Compliance Officer Mission Critical Infrastructure Copyright 28 OSIsoft, LLC

30 Real-time Data in Spatial Context Copyright 28 OSIsoft, LLC

31 Copyright 28 OSIsoft, LLC

32 (Video) 32

33 The PI System: A True Global Situational Awareness Architecture Eliminating your data silos: Anywhere Anytime Real-Time Copyright 28 OSIsoft, LLC

34 Idaho National Labs Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate

35 Understanding Holistic Effects of Cyber Events on Critical Infrastructure Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate March 2, 28 INL/CON

36 Information Technology vs. Operational Technology Information Technology: The study or use of systems (especially computers and telecommunications) for storing, retrieving, and sending information Oxford Dictionary Operational Technology: The hardware and software dedicated to detecting or causing changes in physical processes through direct monitoring and/or control of physical devices such as switches, pumps, valves, etc. such as those used in critical infrastructure systems. International Society of Automation

37 Increased IT-OT Connectivity Our national critical infrastructure consists of systems of geographically distributed assets, from regional and national networks to micro-scale controllers and sensors Increasingly, these assets, across all scales, are connected via IT and OT networks and thus potential cyber targets

38 Increased Focus on OT Related Cyber Activity

39 Increase in Cyber Events Related to Operational Technologies In Fiscal Year 26, DHS ICS-CERT coordinated 35 unique vulnerabilities and responded to 29 incidents associated with industrial control systems ICS-CERT Year in Review, 26 Large-scale cyberattack to electrical grid could lead to $243B - $T loss to the U.S. economy Health and safety impacts would include increased rate of illness and death in impacted areas Impact to DoD (and DHS) missions would significantly impact the security of the United States Lloyd s and University of Cambridge Centre for Risk Studies; President s Council of Economic Advisors, February 28

40 Elements of Cyber Physical Interactions

41 Interdependency Discovery Approach All-Hazards Analysis Framework (A-HA)

42 Interdependency Mapping

43 Developing Multi-Scale Facility Profiles Regional Scale Dependencies Process Scale Dependencies Control System Scale Dependencies Notional System

44 Modeling Functional Impacts

45 Holistic Cyber-Physical Analysis Process Reported OT Vulnerabilities or Threats Identify Standard OT Components Across Sectors Potentially Affected and Model Functional Impacts Link to Potential Facility Locations Model Potential Cascading Impacts Provide Actionable Information to Decision Makers and Stakeholders

46 Esri and INL: Partnering for Cyber Resilience

47

48 Print Your Certificate of Attendance Print stations located in the 4 Concourse Tuesday 2:3 pm 6:3 pm GIS Solutions Expo Hall B Wednesday :3 am 5:5 pm GIS Solutions Expo Hall B 5: pm 6:3 pm GIS Solutions Expo Social Hall B 6:3 pm 9: pm Networking Reception Smithsonian National Portrait Gallery

49 Download the Esri Events app and find your event Please Take Our Survey in the Esri Events App Select the session you attended Scroll down to find the feedback section Complete answers and select Submit

50 Brian Biesecker, Esri Paul J. Geraci, OSIsoft Shane Cherry, INL

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

Understanding Holistic Effects of Cyber Events on Critical Infrastructure Understanding Holistic Effects of Cyber Events on Critical Infrastructure Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate March 20, 2018 INL/CON-17-42513

More information

Introducing OSIsoft. Presented by Zsolt Oros, Regional Manager DACH & EE

Introducing OSIsoft. Presented by Zsolt Oros, Regional Manager DACH & EE Introducing OSIsoft Presented by Zsolt Oros, Regional Manager DACH & EE Who we are? Copyr i ght 2014 O SIs oft, LLC. 2 OSIsoft is a company with a focus One System. Singular focus. 1980 20% Founded Revenue

More information

Application of GIS to Cybersecurity. Brian Biesecker Ken Mitchell

Application of GIS to Cybersecurity. Brian Biesecker Ken Mitchell Application of GIS to Cybersecurity Brian Biesecker Ken Mitchell Fundamental Problems that GIS can help you solve What are the impacts to your mission, operations, business activities, critical systems,

More information

Welcome to the Second Annual Intelligence & National Security Forum

Welcome to the Second Annual Intelligence & National Security Forum Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical

More information

Statement for the Record

Statement for the Record Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before

More information

OSIsoft PI System Usage For Academia

OSIsoft PI System Usage For Academia OSIsoft PI System Usage For Academia Jim O Rourke, Academic Acct. Mgr. OSIsoft jorourke@osisoft.com 281-433-3399 Mike Mihuc, Academic Principal OSIsoft mmihuc@osisoft.com 412-779-6804 March 17, 2016 We

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

Critical Infrastructure Resilience

Critical Infrastructure Resilience Critical Infrastructure Resilience Climate Resilience Webinar Series U.S. Department of Housing and Urban Development Disclaimer This presentation is intended to provide communities and states with the

More information

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland

More information

Implementing Executive Order and Presidential Policy Directive 21

Implementing Executive Order and Presidential Policy Directive 21 March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy

More information

Cyber Security & Homeland Security:

Cyber Security & Homeland Security: Cyber Security & Homeland Security: Cyber Security for CIKR and SLTT Michael Leking 19 March 2014 Cyber Security Advisor Northeast Region Office of Cybersecurity and Communications (CS&C) U.S. Department

More information

The Australian Government s Approach to Critical Infrastructure Resilience

The Australian Government s Approach to Critical Infrastructure Resilience The Australian Government s Approach to Critical Infrastructure Resilience GNSS Workshop University of New South Wales 4 December 2013 Mr Kris Garred, Director Critical Infrastructure Policy Attorney-General

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

Homeland Security and Geographic Information Systems

Homeland Security and Geographic Information Systems Page 1 of 5 Homeland Security and Geographic Information Systems How GIS and mapping technology can save lives and protect property in post-september 11th America Introduction Timely, accurate information,

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Regional Resiliency Assessment Program 2015 State Energy Risk Assessment Workshop April

More information

High Availability & Disaster Recovery. Witt Mathot

High Availability & Disaster Recovery. Witt Mathot High Availability & Disaster Recovery Witt Mathot Managing the Twin Risks to your Operations Data Loss Down Time Business Continuity Terminology Resiliency High Availability RTO Round Robin Cost Business

More information

Android Team Awareness Kit (ATAK) and ArcGIS

Android Team Awareness Kit (ATAK) and ArcGIS Android Team Awareness Kit (ATAK) and ArcGIS Darron Pustam Product Manager, Esri Craig Cleveland Product Engineer, Esri Verne LaClair Product Manager, PAR Agenda Connecting Intel and Operations in Real

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness 2011/EPWG/WKSP/020 Session 4 Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness Submitted by: Australia Workshop on Private Sector Emergency Preparedness Sendai,

More information

June 5, 2018 Independence, Ohio

June 5, 2018 Independence, Ohio June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga

More information

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Implementing the Administration's Critical Infrastructure and Cybersecurity Policy Cybersecurity Executive Order and Critical Infrastructure Security & Resilience Presidential Policy Directive Integrated

More information

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets Industrial Cyber Security ICS SHIELD Top-down security for multi-vendor OT assets OT SECURITY NEED Industrial organizations are increasingly integrating their OT and IT infrastructures. The huge benefits

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

Executive Order on Coordinating National Resilience to Electromagnetic Pulses Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the

More information

Securing Industrial Control Systems

Securing Industrial Control Systems L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting

More information

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America

More information

Critical Infrastructure Sectors and DHS ICS CERT Overview

Critical Infrastructure Sectors and DHS ICS CERT Overview Critical Infrastructure Sectors and DHS ICS CERT Overview Presented by Darryl E. Peek II REGIONAL INTELLIGENCE SEMINAR AND NATIONAL SECURITY FORUM 2 2 Authorities and Related Legislation Homeland Security

More information

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Toward All-Hazards Security and Resilience for the Power Grid

Toward All-Hazards Security and Resilience for the Power Grid Toward All-Hazards Security and Resilience for the Power Grid Juan Torres Associate Laboratory Director, Energy Systems Integration National Renewable Energy Laboratory December 6, 2017 1 Grid Modernization

More information

2014 Sector-Specific Plan Guidance. Guide for Developing a Sector-Specific Plan under NIPP 2013 August 2014

2014 Sector-Specific Plan Guidance. Guide for Developing a Sector-Specific Plan under NIPP 2013 August 2014 2014 -Specific Plan Guidance Guide for Developing a -Specific Plan under NIPP 2013 August 2014 How to Use this Guidance This page provides a roadmap to assist critical infrastructure partners in navigating

More information

TIES for Microsoft CityNext Next-Generation Situational Awareness

TIES for Microsoft CityNext Next-Generation Situational Awareness BROCHURE A CLOSER LOOK AT! TIES for Microsoft CityNext Next-Generation Situational Awareness INTRODUCTION! TIES for Microsoft CityNext (TMCN) is an all-hazard threat monitoring and situation awareness

More information

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

The IBM Platform Computing HPC Cloud Service. Solution Overview

The IBM Platform Computing HPC Cloud Service. Solution Overview The IBM Platform Computing HPC Cloud Service Solution Overview Industry-leading workload management 20 years managing distributed scale-out systems with 2000+ customers in many industries High performance

More information

Industry role moving forward

Industry role moving forward Industry role moving forward Discussion with National Research Council, Workshop on the Resiliency of the Electric Power Delivery System in Response to Terrorism and Natural Disasters February 27-28, 2013

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

Overview of the Federal Interagency Operational Plans

Overview of the Federal Interagency Operational Plans Overview of the Federal Interagency Operational Plans July 2014 Table of Contents Introduction... 1 Federal Interagency Operational Plan Overviews... 2 Prevention Federal Interagency Operational Plan...2

More information

Business Continuity: How to Keep City Departments in Business after a Disaster

Business Continuity: How to Keep City Departments in Business after a Disaster Business Continuity: How to Keep City Departments in Business after a Disaster Shannon Spence, PE Red Oak Consulting, an ARCADIS group Agenda Security, Resilience and All Hazards The Hazards Cycle and

More information

Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials

Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials + NGA State Learning Lab on Energy Assurance Coordination May 13-15, 2015 Trenton, New Jersey Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National

More information

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS EPRO Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS The Role of Systems Engineering in Addressing Black Sky Hazards

More information

Managing Security, Risk and Compliance for Critical Assets on the Smart Grid

Managing Security, Risk and Compliance for Critical Assets on the Smart Grid Managing Security, Risk and Compliance for Critical Assets on the Smart Grid Kshamit Dixit Toronto Hydro Toronto Hydro A snapshot Worldwide Employees: 1,700 Revenues: $2.3 Billion Headquarters: Toronto,

More information

Office of Infrastructure Protection Overview

Office of Infrastructure Protection Overview Office of Infrastructure Protection Overview Harvey Perriott Protective Security Advisor North Texas District U.S. Department of Homeland Security Vision and Mission Vision A safe, secure, and resilient

More information

The Power of Data: Thriving in a World of Change

The Power of Data: Thriving in a World of Change The Power of Data: Thriving in a World of Change Presented by Brett Higgins Vice President Asia Pacific Copyright 2013 OSIsoft, LLC. About OSIsoft Founded in 1980 14 000 Sites, 4 000 Customers 123 Countries

More information

Critical Infrastructure

Critical Infrastructure Critical Infrastructure 1 Critical Infrastructure Can be defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and

More information

The Power of Connection

The Power of Connection The Power of Connection Presented by Mana Afshari, Systems Engineer mafshari@osisoft.com Why is Connectivity Important? Context Need Solution More data sources available Advanced analyses require information

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008 FACTS AND OPPORTUNITIES IN BRAZIL Gartner IT Security Summit Washington DC, June 2008 OUR OBJECTIVE TODAY Raise your awareness that there are several Brazilian IT Services and Solutions Providers that

More information

Using Operations Dashboard for ArcGIS: An Introduction

Using Operations Dashboard for ArcGIS: An Introduction FedGIS Conference February 24 25, 2016 Washington, DC Using Operations Dashboard for ArcGIS: An Introduction Ken Gorton Carmella A. Burdi, GISP Solution Engineer Esri National Government Team kgorton@esri.com

More information

Administering Your ArcGIS Enterprise Portal Bill Major Craig Cleveland

Administering Your ArcGIS Enterprise Portal Bill Major Craig Cleveland Administering Your ArcGIS Enterprise Portal Bill Major Craig Cleveland Agenda Welcome & Introduction to ArcGIS Enterprise Portal for ArcGIS Administration - Basic Configuration - Advanced Configuration

More information

Simple Preparedness Steps Toward Resilience

Simple Preparedness Steps Toward Resilience Simple Preparedness Steps Toward Resilience Matt Lyttle Individual and Community Preparedness Division What is Resilience? Economic? Climate? Disaster? Environmental? Ability of individuals, communities,

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

Cyber Attacks & Breaches It s not if, it s When

Cyber Attacks & Breaches It s not if, it s When ` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,

More information

Business Continuity Planning

Business Continuity Planning Business Continuity Planning The Unexpected Happens Be Ready Copyright -Business Survival Partners, llc. 2011 - All Rights Reserved www.survivalpartners.biz RISK 2 Risks to National Security A secure and

More information

Survey123 for ArcGIS: An Introduction. James Tedrick Erin Densford

Survey123 for ArcGIS: An Introduction. James Tedrick Erin Densford Survey123 for ArcGIS: An Introduction James Tedrick Erin Densford Smart Forms for ArcGIS Easily convert paper forms into Digital Smart ArcGIS Forms Why Smart Forms in ArcGIS? Reduce Errors During Data

More information

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS SAFETY AND SECURITY IN THE 21ST CENTURY National security, defense, and public safety agencies face challenges and threats that

More information

DOE s Roles and Responsibilities for Energy Sector Cybersecurity

DOE s Roles and Responsibilities for Energy Sector Cybersecurity Written Testimony of Under Secretary Mark Menezes U.S. Department of Energy Before the Subcommittee on Energy Committee on Energy and Commerce U.S. House of Representatives March 14, 2018 Introduction

More information

Emergency Management Response and Recovery. Mark Merritt, President September 2011

Emergency Management Response and Recovery. Mark Merritt, President September 2011 Emergency Management Response and Recovery Mark Merritt, President September 2011 Evolution of Response and Recovery Emergency Management Pendulum Hurricane Andrew August 24, 1992 9/11 Terrorist Attacks

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

Federal Civilian Executive branch State, Local, Tribal, Territorial government (SLTT) Private Sector (PS) Unclassified / Business Networks

Federal Civilian Executive branch State, Local, Tribal, Territorial government (SLTT) Private Sector (PS) Unclassified / Business Networks Brownsville Public Utilities Board Cyber Security Initiative A result of the BPUB IT Strategic Plan implemented a Cyber Security Framework (CSF) that utilizes : Security standards Tools and Best practices

More information

Why trading firms choose... Connexus Voice. For Traders

Why trading firms choose... Connexus Voice. For Traders Why trading firms choose... Connexus Voice For Traders Intelligent SIP based Voice Services Financial traders need instant connectivity to their counterparties, and private Connexus Voice circuits provide

More information

Regional Resilience: Prerequisite for Defense Industry Base Resilience

Regional Resilience: Prerequisite for Defense Industry Base Resilience Regional Resilience: Prerequisite for Defense Industry Base Resilience Paula Scalingi, Director Pacific Northwest Center for Regional Disaster Resilience Vice Chair, The Infrastructure Security Partnership

More information

Alternative Fuel Vehicles in State Energy Assurance Planning

Alternative Fuel Vehicles in State Energy Assurance Planning + Alternative Fuel Vehicles in State Energy Assurance Planning July 17, 2014 Webinar hosted by the National Association of State Energy Officials (NASEO), with support from the U.S. Department of Energy

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

Energy Assurance Plans

Energy Assurance Plans Energy Assurance Plans funded through the American Reinvestment and Recovery Act (ARRA) - Stimulus $$ to help create jobs to enhance energy reliability and facilitate recovery from disruptions to the energy

More information

ArcGIS Solutions for Community Resilience. Matthew S Deal

ArcGIS Solutions for Community Resilience. Matthew S Deal ArcGIS Solutions for Community Resilience Matthew S Deal Solutions Overview Leverage hundreds of ready-to-use maps, apps, and platform configurations to meet your needs, delivering innovation and best

More information

Monthly Cyber Threat Briefing

Monthly Cyber Threat Briefing Monthly Cyber Threat Briefing January 2016 1 Presenters David Link, PM Risk and Vulnerability Assessments, NCATS Ed Cabrera: VP Cybersecurity Strategy, Trend Micro Jason Trost: VP Threat Research, ThreatStream

More information

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?

More information

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting Addressing Vulnerabilities By Integrating Your Incident Response Plans Brian Coates Enaxis Consulting Contents Enaxis Introduction Presenter Bio: Brian Coates Incident Response / Incident Management in

More information

Presidential Documents

Presidential Documents Federal Register Vol. 84, No. 61 Friday, March 29, 2019 Presidential Documents 12041 Title 3 Executive Order 13865 of March 26, 2019 The President Coordinating National Resilience to Electromagnetic Pulses

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi Internet of Things The Digital Oilfield: Security in SCADA and Process Control Mahyar Khosravi makhosra@cisco.com Critical infrastructures worldwide not ready to battle cyber attacks, claims new study.

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview ND Safety Council Annual Conference

More information

Control Systems Cyber Security Awareness

Control Systems Cyber Security Awareness Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security

More information

Efikasniji modeli IT usluga: Managed Services and Cloud Jedna platforma-neograničene mogućnosti. Hrvoje Supić Maks Strajher

Efikasniji modeli IT usluga: Managed Services and Cloud Jedna platforma-neograničene mogućnosti. Hrvoje Supić Maks Strajher Efikasniji modeli IT usluga: Managed Services and Cloud Jedna platforma-neograničene mogućnosti Hrvoje Supić Maks Strajher What is a Managed Services? Taking responsibility for daily operations of parts

More information

New Partners Join Charter of Trust to Protect Critical Infrastructure

New Partners Join Charter of Trust to Protect Critical Infrastructure Siemens, The AES Corporation, Airbus, Allianz, Atos, Enel, Daimler Press Houston, March 8, 2018 New Partners Join Charter of Trust to Protect Critical Infrastructure The AES Corporation, Atos and Enel

More information

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University

More information

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 + Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 Jeffrey R. Pillon, Director, Energy Assurance Programs National Association of State

More information

Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay

Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Assistant Director General Office of State Security and Emergency Coordination Department of the Premier and Cabinet

More information

JOINT UNITED STATES-CANADA ELECTRIC GRID SECURITY AND RESILIENCE STRATEGY

JOINT UNITED STATES-CANADA ELECTRIC GRID SECURITY AND RESILIENCE STRATEGY JOINT UNITED STATES-CANADA ELECTRIC GRID SECURITY AND RESILIENCE STRATEGY Product of the Governments of the United States and Canada DECEMBER 2016 Table of Contents Executive Summary 1 Introduction 3

More information

February 21, pm ET

February 21, pm ET February 21, 2018 1-2 pm ET Agenda Introduction Overview of the NISC G&H International Services: Practical Tools for Better Decision- Making Q&A Quiz for those seeking Continuing Education Units (CEUs)

More information

ArcGIS Enterprise: Performance and Scalability Best Practices. Darren Baird, PE, Esri

ArcGIS Enterprise: Performance and Scalability Best Practices. Darren Baird, PE, Esri ArcGIS Enterprise: Performance and Scalability Best Practices Darren Baird, PE, Esri dbaird@esri.com What is ArcGIS Enterprise What s Included with ArcGIS Enterprise ArcGIS Server the core web services

More information

Homeland Security Perspectives: Oregon Fire District Directors Association October 25, 2018

Homeland Security Perspectives: Oregon Fire District Directors Association October 25, 2018 Perspectives: Oregon Fire District Directors Association October 25, 2018 Ronald D. Watters Jr M.Ed GSLC Cybersecurity Advisor Region X Stakeholder Engagement and Cyber Infrastructure Resilience (SECIR)

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

March 21, 2016 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES. Building National Capabilities for Long-Term Drought Resilience

March 21, 2016 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES. Building National Capabilities for Long-Term Drought Resilience This document is scheduled to be published in the Federal Register on 03/25/2016 and available online at http://federalregister.gov/a/2016-06901, and on FDsys.gov March 21, 2016 MEMORANDUM FOR THE HEADS

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Coordination Division Overview MTIA St Louis 03 MAY 2016 Role of

More information

Continuity of Business

Continuity of Business White Paper Continuity of Business SAS Continuity of Business initiative reflects our commitment to our employees, to our customers, and to all of the stakeholders in our global business community to be

More information