Communications and Cyber Security
|
|
- Sheryl Barton
- 6 years ago
- Views:
Transcription
1 Communications and Cyber Security Satya Gupta Head(IT) & CISO Tata Power Delhi Distribution Ltd 10 th March 2017
2 Tata Power-DDL BUSINESS OVERVIEW Parameter Values (Jul'02) Values (Mar'16) AT&C Loss 53.10% 8.88% Annual Energy Requirement 970 MW 1791 MW Total Registered Customers 7 Lakhs 15.3 Lakhs Number of Employees Joint Venture of Tata Power Company and Govt. of NCT of Delhi (51: 49) Licensed for distribution of power in North and North West Delhi Certifications : ISO 9001, 14001, 27001, 22301, 31000, SA 8000 & OHSAS Turnover Area INR 6174 Crs 510 SQ KMS
3 TPDDL Turnaround Story-Brief Snapshot What TPDDL had inherited Current scenario AT&C losses: > 50% No concept of consumer service and IT interface Lack of performance orientation AT&C losses: 8.88 % Parameter UoM One stop solution: State-of-the-art Integrated Call Centers & Consumer Care Centers AT&C Losses % % System Reliability ASAI % % Electricity supply system on the Number verge of of collapse Employees Nos Number of Consumers Mln Remarkable improvement in System Reliability: DT losses <1% Performance orientation through Change Management & Balanced Scorecard Approach Multi-pronged approach adopted by Management to turnaround a traditional Government setup into a role model for private sector efficiency in only 10 years 3
4 Vision 2022
5 Industry s Shift Towards Smart Grid Power Sector s move towards Smart Grid Practices has resulted in steep rise in adoption of various advance IT & OT technologies. Communication technology plays a key role in the implementation of various Smart Grid Technologies. Robust Cyber Security practices are required to ensure all systems & services are up and running(24x7).
6 Communication a Key Enabler of Smart-Grid Smart Grid requires a robust and a two-way communication system. Applications like AMI, ADR, ADMS etc.. requires information to communicated on a real time basis. Communication system acts as the cornerstone for successful implementation of various Smart Grid applications. Any failure in ensuring an effective communication system will have severe impact on reliability and services.
7 TPDDL Communication System: Objectives TPDDL established its Communication Network (in FY ) across its area of operation ; to support Operational applications like SCADA/ Tele-protection / GIS /OMS/ Commercial and Billing applications Enterprise applications SAP CRM/ SAP BCM/SAP ERP, etc. TPDDL has upgraded its Communication Network support to TP-MPLS (in FY ) ; to forthcoming Smart grid applications such as AMI, EV charging stations, MWM, ADR and Integrated security solution etc.
8 TP-DDL Communication Landscape The Communications landscape consists of laying its own OFC network covering all main offices, data-centers, stores, district offices and Zonal Offices.
9 Redundant Communication Network DSIDC1 NARELA NARELA DO BAWANA WATER WORKS and Bawana DO POOTH KHURD GRID 2 DSIDC2 NARELA 2 BAWANA GRID- 6 RG-23 DSIDC A7, NARELA SGTN JAHANGIR PURI AIR KHAMPUR BADLI Grids Fiber Sub Ring Fiber Main Ring SUB Ring 5 STM 4 RG-22 RG-5 HDR PUR SUB Ring 4 STM 4 RG-6 RG-IV PP-1 2 Enterprise DATA 2 Enterprise and Grid VSNL VSNL Gateway for internet FIBER RING - TPDDL SHAKTI NAGAR DO GTK Grid 2 RG-3 SUB Ring 1 SHALIMAR 2 BAGH 2 PITAM PURA DO STM 4 2 RANIBAGH CCC PP III 2 2 RG-1 PP II WZP-I CORE RING MGP-II STM 16 SUB Ring 3 HUDSON LINES INDER PURI RG-II STM 4 MGP-1 2 VSNL PANDU NAGAR GULABI BAGH CIVIL LINES SUB Ring 2 STM 4 SHEHJADA BAGH SARASWATI GARDEN NEW ROHTAK ROAD PUSA ROAD RANIBAGH GRID WAZIRABAD RAMA ROAD NARAYANA PH-I Saraswati garden INDER VIHAR S PARK WZP-II AZAD PUR ROHTAK ROAD ASHOK VIHAR GRID RAM PURA 2 ASHOK VIHAR H BLOCK CCC 2 TRI NAGAR KESHAV PURAM DO
10 Adoption of Technology OFFICES TRANSCO Grid Stations Sub Transmission Grid Stations Distribution Stations CUSTOMERS WEB D A T A C E N T E R O N E D A T A C E N T E R T W O SAP-ISU (CRM/BILLING) SAP (PM/PS/MM/HR/FICO) AMR/PG/SPT BILL SCADA/ DMS/DA GIS OMS Call Centre COMMUNICATION NETWORK ISO 9001, ISO & BCMS (ISO 22301:2012) certified
11 Integrated Communications Architecture External Data Access Field Crew 3 rd Parties Customers Web Access Internet, HTTPS, VPN Back-Office & Operational Systems AMI Mgmt System T&D Management System Field Workforce Automation Ethernet LAN Control & Monitoring Centers Back Haul Communication Utility Wide Comm. Monitoring SA, DA T&D Equipment Microwave, SDH,MPLS,MPLS-TP, CE Neighborhood Aggregation Access Communication Monitoring, DA Monitoring AMI Local Field Comms Distribution Equipment WiFi, WiMax, PLC, RF Mesh, GSM, CDMA Meters & Premise Gateways Home Network Home /Customer Network 200kW Phosphoric Acid Fuel Cell DG PEV $ /kW Zigbee, Bluetooth, HomePlug The power plant in Santa Clara is rated at 1.8 MW AC net It contains more than 4,000 cells
12 Cyber Security-Vital for Survival Mail service on mobile and web(external/internal) Website Consumers accessing connection, reading, bill, payment details,etc. On line bill payment SMS services for consumers E-procurement Smart Grid Applications require to communicate with various field based devices IT & OT Integration for enhancing consumer experience FFA for improving field based operations
13 Cyber Security Challenges Highly exposed and distributed environment Technology Obsolescence Separate IT & OT Verticals with limited coordination Less awareness about cyber security practices among OT team members Cyber Security not considered during fundamental design phase Fast and constantly evolving nature of security risks Ever evolving standards, technologies, services, applications Increasing complexity of systems Mobile & Wireless Everywhere Heterogeneous Systems Multiple Interfaces
14 Cyber Security for Smart Grid Change in traditional scenario Grid automation systems use public networks due to lower costs Increases the vulnerability of grids to cyber attacks Classification of Attacks Component Wise Protocol Wise Field components like RTU are attacked through remote access Using communication protocols available in public domain, an intruder can reverse engineer the data acquisition protocols & exploit them Topology Wise Network topology vulnerability is exploited e.g. DOS attack
15 Strategies to detect & Mitigate Network Segmentation Effective network segmentation restricts communication between networks and reduces the extent to which an adversary can move across the network Strict Role-Based Access Control Grants or denies access to resources based on job function Active Directory (AD) implements role-based user access control through group policies. Application Whitelisting Permits the execution of explicitly allowed (or whitelisted) software and blocks execution of everything else Eliminates the execution of unknown executable, including malware
16 Multiple Layers of Security Firewall based security Intrusion Detection System Threat Management Gateway(Proxy Server) Demilitarized zone for all public portals Single sign-on Secure tunnel via two factor authentication for Remote Access Vulnerability assessment & Penetration Testing
17 Operationalizing Information Security Regular Review meeting of Information Security Council (ISC) for identifying new risks, mitigating them and discussing Incidents Involvement of Top Management Cyber Security Awareness through TIPS, Quiz, sessions etc. Involvement of all major departments like OT, HR, Finance, Administration, Safety, Legal, etc. in Council Annual Plan for review and implementation - - Review and update processes - Focus on creating awareness on IT Security - DR Drill at regular intervals - Pro-active approach before implementing any new solution System driven implementation of various policies Password & patch management, anti-virus, etc
18 Cyber Security Control Room EMS, NMS and SIEM generates huge logs. Cyber Security Control Room required for real time monitoring and analysis to decide and quickly take preventive and corrective actions in case of any event / incident and activating Emergency Response Team, if required
19 IT OT Technology Segregation at DCs ISP DC1 Segregation of IT & OT MUX ISP router (CENNET) DMZ Enterprise Router SCADA Router ISA 6509 Switch 4507 Switch SCADA Switch OMS Switch SAP/R3 Application servers CHECKPOINT (4800 series) Websense Ironport Exchange server Local LAN for CENNET Crystal Reports SCADA Servers OMS Servers Database Servers Mailbox IT Network OT Network 19
20 Risk Mitigation Penetration Testing followed by Grey Box testing, through CERT approved agency for all portals on public domain e.g. Website, Customer Portal, E-tendering, etc. to ensure that - Public portals are Secured to avoid hacking. - Consumer data remains confidential. Training team members to develop secure web enabled S/W s Robust Change Management Process for H/W & S/W Pro-active approach for Security of System before implementing any new solution in both IT & OT side
21 Best Practices at TPDDL ISO certification for both IT & OT Systems HR directly activates and de-activates mail-ids on joining and separation Revalidation of User ids, VPN access specially for critical roles or discontinuation of BA services Regur DR Drill for all critical applications, network, electrical equipment's, etc. n-1 for all elements i.e. IT Infra, Communication, Data Center, Application and Manpower Use of BitLocker Drive Encryption to protect hard disk on laptops to protect Enterprise Data Security Incidents handled by Information Security Council Measurement of Information Security parameters through Departmental Balanced Score Card 3/16/
22 THANK YOU
Smart Grid Communication Systems. 11- November-2016 Sanjeev Rana
Smart Grid Communication Systems. 11- November-2016 Sanjeev Rana Flow Of The Presentation Role of Communications in Smart Grid Smart Grid Communication Architecture Smart Grid Communication Technologies
More informationCESC Limited Power Distribution for the Future August BCC & I - Power Distribution for the Future
CESC Limited Power Distribution for the Future August 2016 www.cesc.co.in debasis.gupta@rp-sg.in 1 1 Power Distribution for the Future In the coming years, Utilities would need to: Expand the network to
More informationIndustrial Security - Protecting productivity. Industrial Security in Pharmaanlagen
- Protecting productivity Industrial Security in Pharmaanlagen siemens.com/industrialsecurity Security Trends Globally we are seeing more network connections than ever before Trends Impacting Security
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationPresenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.
Presenter Jakob Drescher Industry Cyber Security 1 Cyber Security? Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Malware or network traffic
More informationDefense in Depth Security in the Enterprise
Defense in Depth Security in the Enterprise Mike Mulville SAIC Cyber Chief Technology Officer MulvilleM@saic.com Agenda The enterprise challenge - threat; vectors; and risk Traditional data protection
More informationIndustrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets
Industrial Cyber Security ICS SHIELD Top-down security for multi-vendor OT assets OT SECURITY NEED Industrial organizations are increasingly integrating their OT and IT infrastructures. The huge benefits
More informationPower System Control And Smart Grid
Power System Control And Smart Grid The Technology Journey so far... 2005-07 2007-09 2009-11 2011-12 OMS Implementation ISO 27001- Security certification Basic DMS Application,SPM JGC DMS System & Distribution
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationTop 10 ICS Cybersecurity Problems Observed in Critical Infrastructure
SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationTestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified
TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145
More informationAMI: Communications and Integration Options
AMI: Communications and Integration Options Vinod Namboodiri Wichita State University Additional Team Members: Ward Jewell, Visvakumar Aravinthan Wichita State University PSERC Future Grid Initiative Webinar
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationSCADA Overview. Presented By- Amit Mazumdar Technical Services - Automation
SCADA Overview Presented By- Amit Mazumdar Technical Services - Automation TATA POWER DELHI DISTRIBUTION LIMITED Parameter FY 16 Turnover Peak Load Annual energy requirement INR 6890 Cr 1783 MW 7762 MUs
More informationKCP&L SmartGrid Demonstration
KCP&L SmartGrid Demonstration Kansas House Energy & Environment Committee Bill Menge Director, SmartGrid February 7, 2013 Topeka, KS What is SmartGrid? SmartGrid is basically the integration of digital
More informationNew security solutions enabled by 5G
New security solutions enabled by 5G 1. About Ericson 2. What is 5G? 3. 5G and related energy solutions 4. Live testbed and field trials in the SUCCESS project Ericsson at a glance Enabling the full value
More informationSubstation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities
Power Utilities Application Brochure Communications Typical users: Transmission & distribution power utilities For more than 30 years, RAD has worked closely with its worldwide energy utility customers
More informationHikCentral V.1.1.x for Windows Hardening Guide
HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote
More informationIntroduction to ICS Security
Introduction to ICS Security Design. Build. Protect. Presented by Jack D. Oden, June 1, 2018 ISSA Mid-Atlantic Information Security Conference, Rockville, MD Copyright 2018 Parsons Federal 2018 Critical
More informationAn Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist
An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Bryan L. Singer, CISM, CISSP, CAP
More informationHikCentral V1.3 for Windows Hardening Guide
HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote
More informationK12 Cybersecurity Roadmap
K12 Cybersecurity Roadmap Introduction Jason Brown, CISSP Chief Information Security Officer Merit Network, Inc jbrown@merit.edu @jasonbrown17 https://linkedin.com/in/jasonbrown17 2 Agenda 3 Why Use the
More informationSmart Grid Operations - Combining the Power of Smart Meters and The Control Room ADMS
Smart Grid Operations - Combining the Power of Smart Meters and The Control Room ADMS United Energy case study Andrew Steer Manager - Network Control Centre Support United Energy Bradley Williams, P.E.
More informationBob Warden. IP Metering and the Smart Grid WAN Revolution October 27, 2008
Bob Warden IP Metering and the Smart Grid WAN Revolution October 27, 2008 Creating a Digital Grid A Smart Grid is the foundation for a next-generation utility: The central nervous system." A single NETWORK
More informationMethods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment
S&L Logo Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment Date: October 24, 2017 Authors/Presenters: J. Matt Cole, PE
More informationComprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017
Comprehensive Cyber Security Features in SIPROTEC & SICAM SIPROTEC Dag 11. Mei 2017 siemens.tld/keyword Changes to Substation Automation and Protection over Time Evolving Threat Landscape (tomorrow today...)
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationIC32E - Pre-Instructional Survey
Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into
More informationConnectivity 101 for Remote Monitoring Systems
Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance
More informationCybersecurity and Communications Based Train Control
Cybersecurity and Communications Based Train Control RAHEEL QURESHI CYBERSECURITY AUTHORITY URBAN RAIL SIGNALLING (URS) 2016 Thales Canada, Transportation Solutions. All rights reserved. Passing on or
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationTABLE OF CONTENTS. Section Description Page
GPA Cybersecurity TABLE OF CONTENTS Section Description Page 1. Cybersecurity... 1 2. Standards... 1 3. Guides... 2 4. Minimum Hardware/Software Requirements For Secure Network Services... 3 4.1. High-Level
More informationBSES Smart Grid Road Map
BSES Smart Grid Road Map Rajesh Bansal, Head (Network Operations), BSES Delhi BSES Delhi Discoms A Synopsis NDPL BRPL BYPL Reliance Infrastructure Ltd. acquired 51% stake in July 2002 in two Discoms MES
More informationCyber Security: What s the Big Deal?
Cyber Security: What s the Big Deal? (and why it matters to you!) Debasis Bhattacharya, UHMC Jodi Ito, CISO, UH ITS maui.hawaii.edu/cybersecurity What is Cybersecurity? cy ber: adjective of, relating to,
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationCYBERSECURITY RISK LOWERING CHECKLIST
CYBERSECURITY RISK LOWERING CHECKLIST The risks from cybersecurity attacks, whether external or internal, continue to grow. Leaders must make thoughtful and informed decisions as to the level of risk they
More informationCertified Cyber Security Specialist
Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal
More informationTOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION
INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security
More informationChapter 16: Advanced Security
: Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including
More informationSecurity Principles for Stratos. Part no. 667/UE/31701/004
Mobility and Logistics, Traffic Solutions Security Principles for Stratos Part no. THIS DOCUMENT IS ELECTRONICALLY APPROVED AND HELD IN THE SIEMENS DOCUMENT CONTROL TOOL. All PAPER COPIES ARE DEEMED UNCONTROLLED
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationIndustrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017
Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017 Unrestricted Siemens 2017 usa.siemens.com/mia Table of contents Industrial
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationCOMPASS FOR THE COMPLIANCE WORLD. Asia Pacific ICS Security Summit 3 December 2013
COMPASS FOR THE COMPLIANCE WORLD Asia Pacific ICS Security Summit 3 December 2013 THE JOURNEY Why are you going - Mission Where are you going - Goals How will you get there Reg. Stnd. Process How will
More informationHow will cyber risk management affect tomorrow's business?
How will cyber risk management affect tomorrow's business? The "integrated" path towards continuous improvement of information security Cyber Risk as a Balance Sheet Risk exposing Board and C-Levels 2018
More informationMark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services
Mark Littlejohn June 23, 2016 DON T GO IT ALONE Achieving Cyber Security using Managed Services Speaker: Mark Littlejohn 1 Mark is an industrial technology professional with over 30 years of experience
More informationIntroduction. The Safe-T Solution
Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,
More informationCyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities
SESSION ID: SBX3-W1 Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities Gary Hayslip Deputy Director, CISO City of San Diego, CA @ghayslip City of San Diego by the Numbers 11,000+
More informationTranslating lessons learned from TNBR-UNITEN s fully integrated smart grid test-bed to large scale deployments
Translating lessons learned from TNBR-UNITEN s fully integrated smart grid test-bed to large scale deployments Metering Asia 2013 Dr. Ong Hang See: Department Head, UNITEN TNB Bryan Spear: Trilliant, Managing
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationMeeting PCI DSS 3.2 Compliance with RiskSense Solutions
Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business
More informationIntroduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike
Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations
More information90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government
More informationJuniper Vendor Security Requirements
Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks
More informationHow can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits
How can I use ISA/IEC- 62443 (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits What is ISA 62443? A series of ISA standards that addresses
More informationNo IT Audit Staff? How to Hack an IT Audit. Presenters. Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP
No IT Audit Staff? How to Hack an IT Audit Presenters Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP Learning Objectives After this session, participants will be able to: Devise
More informationWho Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom
WEAT Webinar Who Goes There? Access Control in Water/Wastewater Siemens AG 2018. siemens.com/ruggedcom ACCESS CONTROL WEBINAR TABLE OF CONTENTS TOPIC Why Access Control? Risks If Not Used Factors of Authentication
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationLESSONS LEARNED IN SMART GRID CYBER SECURITY
LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com
More informationTestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified
TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:
More informationService. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution
Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being
More informationSecurity Standards for Electric Market Participants
Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system
More informationSecurity Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management
Seven Habits of Cyber Security for SMEs Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management Security Policy is an important
More informationStrategy Consulting Digital Technology Operations. Transmission Distribution SCADA Separation 2017 EMMOS Conference
Strategy Consulting Digital Technology Operations Transmission Distribution SCADA Separation 2017 EMMOS Conference SCADA for Electric Utility Operations The SCADA platform is at the heart of Electric Utility
More informationNetworking Fundamentals Training
Networking Fundamentals Training INNOVATIVE ACADEMY s Best Computer Networking Training in Bangalore is designed so Innovative to help you clear the Comp-TIA s N+ Certification. You will gain excellent
More informationSEGRID storyline. Workshop SEGRID November 14 th, 2016, Barcelona, Spain
Workshop SEGRID November 14 th, 2016, Barcelona, Spain SEGRID storyline This project has received funding from the European Union s Seventh Framework Programme for research, technological development and
More informationAutomation in Large Urban Power Distribution System. Dr. K Rajamani CENTRAL TECHNICAL SERVICES, RELIANCE ENERGY LIMITED, MUMBAI
Automation in Large Urban Power Distribution System Dr. K Rajamani CENTRAL TECHNICAL SERVICES, RELIANCE ENERGY LIMITED, MUMBAI Need for Automation and Current trends Automation Systems and Functionality
More informationProgressing AMI in Asia Pacific Mike Wetselaar Director Sales South East ASia
Progressing AMI in Asia Pacific Mike Wetselaar Director Sales South East ASia 1 Landis+Gyr Smart Grid 09.05.2012 Table of Content I. The AMI network II. III. The Challenges Addressing your requirements
More informationEstablishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security
Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Michael John SmartSec 2016, Amsterdam www.encs.eu European Network for Cyber Security The European
More informationSecuring the North American Electric Grid
SESSION ID: TECH-R02 Securing the North American Electric Grid Marcus H. Sachs, P.E. SVP and CSO North American Electric Reliability Corporation @MarcusSachs Critical Infrastructure s Common Denominator
More informationExpanding Cyber Security Management for Critical Infrastructure
Expanding Cyber Security Management for Critical Infrastructure ISSE Wednesday 15 th November 17, Brussels Dr Andrew Hutchison, Telekom Security andrew.hutchison@t-systems.com OVERVIEW Attack Surface expands
More informationInformation Security at the IEA DPC. IEA General Assembly October 10 12, 2011 Malahide, Ireland
Information Security at the IEA DPC IEA General Assembly October 10 12, 2011 Malahide, Ireland General remarks Impossible to cover all aspects of information security in a short presentation Only sketch
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationPT Unified Application Security Enforcement. ptsecurity.com
PT Unified Application Security Enforcement ptsecurity.com Positive Technologies: Ongoing research for the best solutions Penetration Testing ICS/SCADA Security Assessment Over 700 employees globally Over
More informationCyber Security for Process Control Systems ABB's view
Kaspersky ICS Cybersecurity 2017, 2017-09-28 Cyber Security for Process Control Systems ABB's view Tomas Lindström, Cyber Security Manager, ABB Control Technologies Agenda Cyber security for process control
More informationLindström Tomas Cyber security from ABB System 800xA PA-SE-XA
Lindström Tomas 2013-09-02 Cyber security from ABB System 800xA PA-SE-XA-015963 Cyber Security solutions from ABB Agenda Cyber Security in ABB: general view, activities, organization How we work with Cyber
More informationCIT 480: Securing Computer Systems. Putting It All Together
CIT 480: Securing Computer Systems Putting It All Together Assurance 1. Asset identification 1. Systems and information assets. 2. Infrastructure model and control 1. Network diagrams and inventory database.
More informationPayment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard
Payment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard Systems Security Standard ( v3.2) Page 1 of 11 Version and Ownership Version Date Author(s) Comments 0.01 26/9/2016
More informationRemote networks. Easy remote access to machines and plants. Industrial Remote Communication. Edition 03/2017. Brochure. siemens.com/remote-networks
Industrial Remote Communication Remote networks Easy remote access to machines and plants Brochure Edition 03/2017 siemens.com/remote-networks Many ways of connecting to remote networks Increasing bandwidths,
More informationIEEE-SA Standardization Activities for Smart Grid in Communications & Networking. Max Riegel Nokia Siemens Networks Chair IEEE 802 OmniRAN EC SG
IEEE-SA Standardization Activities for Smart Grid in Communications & Networking Max Riegel Nokia Siemens Networks Chair IEEE 802 OmniRAN EC SG 2 Smart Grid Conceptual Model Priority areas of focus: Demand
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationWhat It Takes to be a CISO in 2017
What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge
More informationENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE
ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE INTRODUCTION In line with commercial industry standards, the data center used by EndNote employs a dedicated security team to protect our
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationNAVIGATING THE WATERS OF THE NEW EU NIS 2016/1148 CYBERSECURITY DIRECTIVE FOR ESSENTIAL SERVICE OPERATORS WHITE PAPER
NAVIGATING THE WATERS OF THE NEW EU NIS 2016/1148 CYBERSECURITY DIRECTIVE FOR ESSENTIAL SERVICE OPERATORS WHITE PAPER MAY 2018 2018 Radiflow, Ltd. All Rights reserved. The information in this document
More informationSecurity In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.
Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property
More informationRoad Map to Grid Modernization
Road Map to Grid Modernization APIC, University of Alberta May 5 th, 2016 Presenter: Chris Chapelsky, MSc., P.Eng. Operations 1 Engineer About EPCOR Water & Power Transmission & Distribution in Edmonton
More informationSOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE
SOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE SECURE AIRBORNE CONNECTIVITY: OVERVIEW Gogo Business Aviation realizes the ever-pressing need to be vigilant in staying ahead of potential
More informationSummary of Cyber Security Issues in the Electric Power Sector
Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationComptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam
Comptia.Certkey.SY0-401.v2014-09-23.by.SANFORD.362q Number: SY0-401 Passing Score: 800 Time Limit: 120 min File Version: 18.5 Exam Code: SY0-401 Exam Name: CompTIA Security+ Certification Exam Exam A QUESTION
More informationCloud Security Whitepaper
Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4
More informationTHE ULTIMATE SOLUTION TO SECURE MOBILE COMMUNICATIONS AND DEVICES
THE ULTIMATE SOLUTION TO SECURE MOBILE COMMUNICATIONS AND DEVICES Mobility and cybersecurity concerns Why is it important? + 38% worldwide annual growth in enterprise cyber-attacks in 2015. Source : PwC
More informationUnderstanding Holistic Effects of Cyber Events on Critical Infrastructure
Understanding Holistic Effects of Cyber Events on Critical Infrastructure Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate March 20, 2018 INL/CON-17-42513
More informationTitle. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018.
Critical Infrastructure Protection Getting Low with a Touch of Medium Title CanWEA Operations and Maintenance Summit 2018 January 30, 2018 George E. Brown Compliance Manager Acciona Wind Energy Canada
More informationMove & More. Challenges for Information Security. Hansjörg Kalcher (CISO) OMV Aktiengesellschaft. FH St. Pölten, Jänner 2013
OMV Aktiengesellschaft Challenges for Information Security Hansjörg Kalcher (CISO) FH St. Pölten, Jänner 2013 Sec_rity is not complete without U! Move & More. OMV GROUP, ORGANIZATION DISCIPLINES AWARENESS
More informationA MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE
SESSION ID: SPO2-W12 A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE Frank Bunton VP, CISO MedImpact Healthcare Systems, Security @frankbunton Larry Biggs Security Engineer III - Threat
More information