Communications and Cyber Security

Size: px
Start display at page:

Download "Communications and Cyber Security"

Transcription

1 Communications and Cyber Security Satya Gupta Head(IT) & CISO Tata Power Delhi Distribution Ltd 10 th March 2017

2 Tata Power-DDL BUSINESS OVERVIEW Parameter Values (Jul'02) Values (Mar'16) AT&C Loss 53.10% 8.88% Annual Energy Requirement 970 MW 1791 MW Total Registered Customers 7 Lakhs 15.3 Lakhs Number of Employees Joint Venture of Tata Power Company and Govt. of NCT of Delhi (51: 49) Licensed for distribution of power in North and North West Delhi Certifications : ISO 9001, 14001, 27001, 22301, 31000, SA 8000 & OHSAS Turnover Area INR 6174 Crs 510 SQ KMS

3 TPDDL Turnaround Story-Brief Snapshot What TPDDL had inherited Current scenario AT&C losses: > 50% No concept of consumer service and IT interface Lack of performance orientation AT&C losses: 8.88 % Parameter UoM One stop solution: State-of-the-art Integrated Call Centers & Consumer Care Centers AT&C Losses % % System Reliability ASAI % % Electricity supply system on the Number verge of of collapse Employees Nos Number of Consumers Mln Remarkable improvement in System Reliability: DT losses <1% Performance orientation through Change Management & Balanced Scorecard Approach Multi-pronged approach adopted by Management to turnaround a traditional Government setup into a role model for private sector efficiency in only 10 years 3

4 Vision 2022

5 Industry s Shift Towards Smart Grid Power Sector s move towards Smart Grid Practices has resulted in steep rise in adoption of various advance IT & OT technologies. Communication technology plays a key role in the implementation of various Smart Grid Technologies. Robust Cyber Security practices are required to ensure all systems & services are up and running(24x7).

6 Communication a Key Enabler of Smart-Grid Smart Grid requires a robust and a two-way communication system. Applications like AMI, ADR, ADMS etc.. requires information to communicated on a real time basis. Communication system acts as the cornerstone for successful implementation of various Smart Grid applications. Any failure in ensuring an effective communication system will have severe impact on reliability and services.

7 TPDDL Communication System: Objectives TPDDL established its Communication Network (in FY ) across its area of operation ; to support Operational applications like SCADA/ Tele-protection / GIS /OMS/ Commercial and Billing applications Enterprise applications SAP CRM/ SAP BCM/SAP ERP, etc. TPDDL has upgraded its Communication Network support to TP-MPLS (in FY ) ; to forthcoming Smart grid applications such as AMI, EV charging stations, MWM, ADR and Integrated security solution etc.

8 TP-DDL Communication Landscape The Communications landscape consists of laying its own OFC network covering all main offices, data-centers, stores, district offices and Zonal Offices.

9 Redundant Communication Network DSIDC1 NARELA NARELA DO BAWANA WATER WORKS and Bawana DO POOTH KHURD GRID 2 DSIDC2 NARELA 2 BAWANA GRID- 6 RG-23 DSIDC A7, NARELA SGTN JAHANGIR PURI AIR KHAMPUR BADLI Grids Fiber Sub Ring Fiber Main Ring SUB Ring 5 STM 4 RG-22 RG-5 HDR PUR SUB Ring 4 STM 4 RG-6 RG-IV PP-1 2 Enterprise DATA 2 Enterprise and Grid VSNL VSNL Gateway for internet FIBER RING - TPDDL SHAKTI NAGAR DO GTK Grid 2 RG-3 SUB Ring 1 SHALIMAR 2 BAGH 2 PITAM PURA DO STM 4 2 RANIBAGH CCC PP III 2 2 RG-1 PP II WZP-I CORE RING MGP-II STM 16 SUB Ring 3 HUDSON LINES INDER PURI RG-II STM 4 MGP-1 2 VSNL PANDU NAGAR GULABI BAGH CIVIL LINES SUB Ring 2 STM 4 SHEHJADA BAGH SARASWATI GARDEN NEW ROHTAK ROAD PUSA ROAD RANIBAGH GRID WAZIRABAD RAMA ROAD NARAYANA PH-I Saraswati garden INDER VIHAR S PARK WZP-II AZAD PUR ROHTAK ROAD ASHOK VIHAR GRID RAM PURA 2 ASHOK VIHAR H BLOCK CCC 2 TRI NAGAR KESHAV PURAM DO

10 Adoption of Technology OFFICES TRANSCO Grid Stations Sub Transmission Grid Stations Distribution Stations CUSTOMERS WEB D A T A C E N T E R O N E D A T A C E N T E R T W O SAP-ISU (CRM/BILLING) SAP (PM/PS/MM/HR/FICO) AMR/PG/SPT BILL SCADA/ DMS/DA GIS OMS Call Centre COMMUNICATION NETWORK ISO 9001, ISO & BCMS (ISO 22301:2012) certified

11 Integrated Communications Architecture External Data Access Field Crew 3 rd Parties Customers Web Access Internet, HTTPS, VPN Back-Office & Operational Systems AMI Mgmt System T&D Management System Field Workforce Automation Ethernet LAN Control & Monitoring Centers Back Haul Communication Utility Wide Comm. Monitoring SA, DA T&D Equipment Microwave, SDH,MPLS,MPLS-TP, CE Neighborhood Aggregation Access Communication Monitoring, DA Monitoring AMI Local Field Comms Distribution Equipment WiFi, WiMax, PLC, RF Mesh, GSM, CDMA Meters & Premise Gateways Home Network Home /Customer Network 200kW Phosphoric Acid Fuel Cell DG PEV $ /kW Zigbee, Bluetooth, HomePlug The power plant in Santa Clara is rated at 1.8 MW AC net It contains more than 4,000 cells

12 Cyber Security-Vital for Survival Mail service on mobile and web(external/internal) Website Consumers accessing connection, reading, bill, payment details,etc. On line bill payment SMS services for consumers E-procurement Smart Grid Applications require to communicate with various field based devices IT & OT Integration for enhancing consumer experience FFA for improving field based operations

13 Cyber Security Challenges Highly exposed and distributed environment Technology Obsolescence Separate IT & OT Verticals with limited coordination Less awareness about cyber security practices among OT team members Cyber Security not considered during fundamental design phase Fast and constantly evolving nature of security risks Ever evolving standards, technologies, services, applications Increasing complexity of systems Mobile & Wireless Everywhere Heterogeneous Systems Multiple Interfaces

14 Cyber Security for Smart Grid Change in traditional scenario Grid automation systems use public networks due to lower costs Increases the vulnerability of grids to cyber attacks Classification of Attacks Component Wise Protocol Wise Field components like RTU are attacked through remote access Using communication protocols available in public domain, an intruder can reverse engineer the data acquisition protocols & exploit them Topology Wise Network topology vulnerability is exploited e.g. DOS attack

15 Strategies to detect & Mitigate Network Segmentation Effective network segmentation restricts communication between networks and reduces the extent to which an adversary can move across the network Strict Role-Based Access Control Grants or denies access to resources based on job function Active Directory (AD) implements role-based user access control through group policies. Application Whitelisting Permits the execution of explicitly allowed (or whitelisted) software and blocks execution of everything else Eliminates the execution of unknown executable, including malware

16 Multiple Layers of Security Firewall based security Intrusion Detection System Threat Management Gateway(Proxy Server) Demilitarized zone for all public portals Single sign-on Secure tunnel via two factor authentication for Remote Access Vulnerability assessment & Penetration Testing

17 Operationalizing Information Security Regular Review meeting of Information Security Council (ISC) for identifying new risks, mitigating them and discussing Incidents Involvement of Top Management Cyber Security Awareness through TIPS, Quiz, sessions etc. Involvement of all major departments like OT, HR, Finance, Administration, Safety, Legal, etc. in Council Annual Plan for review and implementation - - Review and update processes - Focus on creating awareness on IT Security - DR Drill at regular intervals - Pro-active approach before implementing any new solution System driven implementation of various policies Password & patch management, anti-virus, etc

18 Cyber Security Control Room EMS, NMS and SIEM generates huge logs. Cyber Security Control Room required for real time monitoring and analysis to decide and quickly take preventive and corrective actions in case of any event / incident and activating Emergency Response Team, if required

19 IT OT Technology Segregation at DCs ISP DC1 Segregation of IT & OT MUX ISP router (CENNET) DMZ Enterprise Router SCADA Router ISA 6509 Switch 4507 Switch SCADA Switch OMS Switch SAP/R3 Application servers CHECKPOINT (4800 series) Websense Ironport Exchange server Local LAN for CENNET Crystal Reports SCADA Servers OMS Servers Database Servers Mailbox IT Network OT Network 19

20 Risk Mitigation Penetration Testing followed by Grey Box testing, through CERT approved agency for all portals on public domain e.g. Website, Customer Portal, E-tendering, etc. to ensure that - Public portals are Secured to avoid hacking. - Consumer data remains confidential. Training team members to develop secure web enabled S/W s Robust Change Management Process for H/W & S/W Pro-active approach for Security of System before implementing any new solution in both IT & OT side

21 Best Practices at TPDDL ISO certification for both IT & OT Systems HR directly activates and de-activates mail-ids on joining and separation Revalidation of User ids, VPN access specially for critical roles or discontinuation of BA services Regur DR Drill for all critical applications, network, electrical equipment's, etc. n-1 for all elements i.e. IT Infra, Communication, Data Center, Application and Manpower Use of BitLocker Drive Encryption to protect hard disk on laptops to protect Enterprise Data Security Incidents handled by Information Security Council Measurement of Information Security parameters through Departmental Balanced Score Card 3/16/

22 THANK YOU

Smart Grid Communication Systems. 11- November-2016 Sanjeev Rana

Smart Grid Communication Systems. 11- November-2016 Sanjeev Rana Smart Grid Communication Systems. 11- November-2016 Sanjeev Rana Flow Of The Presentation Role of Communications in Smart Grid Smart Grid Communication Architecture Smart Grid Communication Technologies

More information

CESC Limited Power Distribution for the Future August BCC & I - Power Distribution for the Future

CESC Limited Power Distribution for the Future August BCC & I - Power Distribution for the Future CESC Limited Power Distribution for the Future August 2016 www.cesc.co.in debasis.gupta@rp-sg.in 1 1 Power Distribution for the Future In the coming years, Utilities would need to: Expand the network to

More information

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen - Protecting productivity Industrial Security in Pharmaanlagen siemens.com/industrialsecurity Security Trends Globally we are seeing more network connections than ever before Trends Impacting Security

More information

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.

Securing the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1. Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change

More information

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Presenter Jakob Drescher Industry Cyber Security 1 Cyber Security? Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks. Malware or network traffic

More information

Defense in Depth Security in the Enterprise

Defense in Depth Security in the Enterprise Defense in Depth Security in the Enterprise Mike Mulville SAIC Cyber Chief Technology Officer MulvilleM@saic.com Agenda The enterprise challenge - threat; vectors; and risk Traditional data protection

More information

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets Industrial Cyber Security ICS SHIELD Top-down security for multi-vendor OT assets OT SECURITY NEED Industrial organizations are increasingly integrating their OT and IT infrastructures. The huge benefits

More information

Power System Control And Smart Grid

Power System Control And Smart Grid Power System Control And Smart Grid The Technology Journey so far... 2005-07 2007-09 2009-11 2011-12 OMS Implementation ISO 27001- Security certification Basic DMS Application,SPM JGC DMS System & Distribution

More information

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies

More information

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure

Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

AMI: Communications and Integration Options

AMI: Communications and Integration Options AMI: Communications and Integration Options Vinod Namboodiri Wichita State University Additional Team Members: Ward Jewell, Visvakumar Aravinthan Wichita State University PSERC Future Grid Initiative Webinar

More information

Cybersecurity Overview

Cybersecurity Overview Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where

More information

SCADA Overview. Presented By- Amit Mazumdar Technical Services - Automation

SCADA Overview. Presented By- Amit Mazumdar Technical Services - Automation SCADA Overview Presented By- Amit Mazumdar Technical Services - Automation TATA POWER DELHI DISTRIBUTION LIMITED Parameter FY 16 Turnover Peak Load Annual energy requirement INR 6890 Cr 1783 MW 7762 MUs

More information

KCP&L SmartGrid Demonstration

KCP&L SmartGrid Demonstration KCP&L SmartGrid Demonstration Kansas House Energy & Environment Committee Bill Menge Director, SmartGrid February 7, 2013 Topeka, KS What is SmartGrid? SmartGrid is basically the integration of digital

More information

New security solutions enabled by 5G

New security solutions enabled by 5G New security solutions enabled by 5G 1. About Ericson 2. What is 5G? 3. 5G and related energy solutions 4. Live testbed and field trials in the SUCCESS project Ericsson at a glance Enabling the full value

More information

Substation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities

Substation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities Power Utilities Application Brochure Communications Typical users: Transmission & distribution power utilities For more than 30 years, RAD has worked closely with its worldwide energy utility customers

More information

HikCentral V.1.1.x for Windows Hardening Guide

HikCentral V.1.1.x for Windows Hardening Guide HikCentral V.1.1.x for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1 Strict Password Policy... 2 1.2 Turn Off Windows Remote

More information

Introduction to ICS Security

Introduction to ICS Security Introduction to ICS Security Design. Build. Protect. Presented by Jack D. Oden, June 1, 2018 ISSA Mid-Atlantic Information Security Conference, Rockville, MD Copyright 2018 Parsons Federal 2018 Critical

More information

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist

An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Bryan L. Singer, CISM, CISSP, CAP

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

K12 Cybersecurity Roadmap

K12 Cybersecurity Roadmap K12 Cybersecurity Roadmap Introduction Jason Brown, CISSP Chief Information Security Officer Merit Network, Inc jbrown@merit.edu @jasonbrown17 https://linkedin.com/in/jasonbrown17 2 Agenda 3 Why Use the

More information

Smart Grid Operations - Combining the Power of Smart Meters and The Control Room ADMS

Smart Grid Operations - Combining the Power of Smart Meters and The Control Room ADMS Smart Grid Operations - Combining the Power of Smart Meters and The Control Room ADMS United Energy case study Andrew Steer Manager - Network Control Centre Support United Energy Bradley Williams, P.E.

More information

Bob Warden. IP Metering and the Smart Grid WAN Revolution October 27, 2008

Bob Warden. IP Metering and the Smart Grid WAN Revolution October 27, 2008 Bob Warden IP Metering and the Smart Grid WAN Revolution October 27, 2008 Creating a Digital Grid A Smart Grid is the foundation for a next-generation utility: The central nervous system." A single NETWORK

More information

Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment

Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment S&L Logo Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment Date: October 24, 2017 Authors/Presenters: J. Matt Cole, PE

More information

Comprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017

Comprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017 Comprehensive Cyber Security Features in SIPROTEC & SICAM SIPROTEC Dag 11. Mei 2017 siemens.tld/keyword Changes to Substation Automation and Protection over Time Evolving Threat Landscape (tomorrow today...)

More information

AUTHORITY FOR ELECTRICITY REGULATION

AUTHORITY FOR ELECTRICITY REGULATION SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...

More information

IC32E - Pre-Instructional Survey

IC32E - Pre-Instructional Survey Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into

More information

Connectivity 101 for Remote Monitoring Systems

Connectivity 101 for Remote Monitoring Systems Connectivity 101 for Remote Monitoring Systems Paul Wacker Moxa, Inc. Manager - Edge Connectivity Ariana Drivdahl Moxa, Inc. Product Marketing Manager Pain Points of Remote Monitoring Pressure to enhance

More information

Cybersecurity and Communications Based Train Control

Cybersecurity and Communications Based Train Control Cybersecurity and Communications Based Train Control RAHEEL QURESHI CYBERSECURITY AUTHORITY URBAN RAIL SIGNALLING (URS) 2016 Thales Canada, Transportation Solutions. All rights reserved. Passing on or

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

TABLE OF CONTENTS. Section Description Page

TABLE OF CONTENTS. Section Description Page GPA Cybersecurity TABLE OF CONTENTS Section Description Page 1. Cybersecurity... 1 2. Standards... 1 3. Guides... 2 4. Minimum Hardware/Software Requirements For Secure Network Services... 3 4.1. High-Level

More information

BSES Smart Grid Road Map

BSES Smart Grid Road Map BSES Smart Grid Road Map Rajesh Bansal, Head (Network Operations), BSES Delhi BSES Delhi Discoms A Synopsis NDPL BRPL BYPL Reliance Infrastructure Ltd. acquired 51% stake in July 2002 in two Discoms MES

More information

Cyber Security: What s the Big Deal?

Cyber Security: What s the Big Deal? Cyber Security: What s the Big Deal? (and why it matters to you!) Debasis Bhattacharya, UHMC Jodi Ito, CISO, UH ITS maui.hawaii.edu/cybersecurity What is Cybersecurity? cy ber: adjective of, relating to,

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Securing Industrial Control Systems

Securing Industrial Control Systems L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting

More information

CYBERSECURITY RISK LOWERING CHECKLIST

CYBERSECURITY RISK LOWERING CHECKLIST CYBERSECURITY RISK LOWERING CHECKLIST The risks from cybersecurity attacks, whether external or internal, continue to grow. Leaders must make thoughtful and informed decisions as to the level of risk they

More information

Certified Cyber Security Specialist

Certified Cyber Security Specialist Certified Cyber Security Specialist Page 1 of 7 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal

More information

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION INFORMATION TECHNOLOGY SECURITY GUIDANCE TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION ITSM.10.189 October 2017 INTRODUCTION The Top 10 Information Technology (IT) Security

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

Security Principles for Stratos. Part no. 667/UE/31701/004

Security Principles for Stratos. Part no. 667/UE/31701/004 Mobility and Logistics, Traffic Solutions Security Principles for Stratos Part no. THIS DOCUMENT IS ELECTRONICALLY APPROVED AND HELD IN THE SIEMENS DOCUMENT CONTROL TOOL. All PAPER COPIES ARE DEEMED UNCONTROLLED

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017

Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017 Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017 Unrestricted Siemens 2017 usa.siemens.com/mia Table of contents Industrial

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

COMPASS FOR THE COMPLIANCE WORLD. Asia Pacific ICS Security Summit 3 December 2013

COMPASS FOR THE COMPLIANCE WORLD. Asia Pacific ICS Security Summit 3 December 2013 COMPASS FOR THE COMPLIANCE WORLD Asia Pacific ICS Security Summit 3 December 2013 THE JOURNEY Why are you going - Mission Where are you going - Goals How will you get there Reg. Stnd. Process How will

More information

How will cyber risk management affect tomorrow's business?

How will cyber risk management affect tomorrow's business? How will cyber risk management affect tomorrow's business? The "integrated" path towards continuous improvement of information security Cyber Risk as a Balance Sheet Risk exposing Board and C-Levels 2018

More information

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services Mark Littlejohn June 23, 2016 DON T GO IT ALONE Achieving Cyber Security using Managed Services Speaker: Mark Littlejohn 1 Mark is an industrial technology professional with over 30 years of experience

More information

Introduction. The Safe-T Solution

Introduction. The Safe-T Solution Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,

More information

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities SESSION ID: SBX3-W1 Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities Gary Hayslip Deputy Director, CISO City of San Diego, CA @ghayslip City of San Diego by the Numbers 11,000+

More information

Translating lessons learned from TNBR-UNITEN s fully integrated smart grid test-bed to large scale deployments

Translating lessons learned from TNBR-UNITEN s fully integrated smart grid test-bed to large scale deployments Translating lessons learned from TNBR-UNITEN s fully integrated smart grid test-bed to large scale deployments Metering Asia 2013 Dr. Ong Hang See: Department Head, UNITEN TNB Bryan Spear: Trilliant, Managing

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business

More information

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

How can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits

How can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits How can I use ISA/IEC- 62443 (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits What is ISA 62443? A series of ISA standards that addresses

More information

No IT Audit Staff? How to Hack an IT Audit. Presenters. Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP

No IT Audit Staff? How to Hack an IT Audit. Presenters. Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP No IT Audit Staff? How to Hack an IT Audit Presenters Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP Learning Objectives After this session, participants will be able to: Devise

More information

Who Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom

Who Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom WEAT Webinar Who Goes There? Access Control in Water/Wastewater Siemens AG 2018. siemens.com/ruggedcom ACCESS CONTROL WEBINAR TABLE OF CONTENTS TOPIC Why Access Control? Risks If Not Used Factors of Authentication

More information

Education Network Security

Education Network Security Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or

More information

LESSONS LEARNED IN SMART GRID CYBER SECURITY

LESSONS LEARNED IN SMART GRID CYBER SECURITY LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com

More information

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management Seven Habits of Cyber Security for SMEs Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management Security Policy is an important

More information

Strategy Consulting Digital Technology Operations. Transmission Distribution SCADA Separation 2017 EMMOS Conference

Strategy Consulting Digital Technology Operations. Transmission Distribution SCADA Separation 2017 EMMOS Conference Strategy Consulting Digital Technology Operations Transmission Distribution SCADA Separation 2017 EMMOS Conference SCADA for Electric Utility Operations The SCADA platform is at the heart of Electric Utility

More information

Networking Fundamentals Training

Networking Fundamentals Training Networking Fundamentals Training INNOVATIVE ACADEMY s Best Computer Networking Training in Bangalore is designed so Innovative to help you clear the Comp-TIA s N+ Certification. You will gain excellent

More information

SEGRID storyline. Workshop SEGRID November 14 th, 2016, Barcelona, Spain

SEGRID storyline. Workshop SEGRID November 14 th, 2016, Barcelona, Spain Workshop SEGRID November 14 th, 2016, Barcelona, Spain SEGRID storyline This project has received funding from the European Union s Seventh Framework Programme for research, technological development and

More information

Automation in Large Urban Power Distribution System. Dr. K Rajamani CENTRAL TECHNICAL SERVICES, RELIANCE ENERGY LIMITED, MUMBAI

Automation in Large Urban Power Distribution System. Dr. K Rajamani CENTRAL TECHNICAL SERVICES, RELIANCE ENERGY LIMITED, MUMBAI Automation in Large Urban Power Distribution System Dr. K Rajamani CENTRAL TECHNICAL SERVICES, RELIANCE ENERGY LIMITED, MUMBAI Need for Automation and Current trends Automation Systems and Functionality

More information

Progressing AMI in Asia Pacific Mike Wetselaar Director Sales South East ASia

Progressing AMI in Asia Pacific Mike Wetselaar Director Sales South East ASia Progressing AMI in Asia Pacific Mike Wetselaar Director Sales South East ASia 1 Landis+Gyr Smart Grid 09.05.2012 Table of Content I. The AMI network II. III. The Challenges Addressing your requirements

More information

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Michael John SmartSec 2016, Amsterdam www.encs.eu European Network for Cyber Security The European

More information

Securing the North American Electric Grid

Securing the North American Electric Grid SESSION ID: TECH-R02 Securing the North American Electric Grid Marcus H. Sachs, P.E. SVP and CSO North American Electric Reliability Corporation @MarcusSachs Critical Infrastructure s Common Denominator

More information

Expanding Cyber Security Management for Critical Infrastructure

Expanding Cyber Security Management for Critical Infrastructure Expanding Cyber Security Management for Critical Infrastructure ISSE Wednesday 15 th November 17, Brussels Dr Andrew Hutchison, Telekom Security andrew.hutchison@t-systems.com OVERVIEW Attack Surface expands

More information

Information Security at the IEA DPC. IEA General Assembly October 10 12, 2011 Malahide, Ireland

Information Security at the IEA DPC. IEA General Assembly October 10 12, 2011 Malahide, Ireland Information Security at the IEA DPC IEA General Assembly October 10 12, 2011 Malahide, Ireland General remarks Impossible to cover all aspects of information security in a short presentation Only sketch

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

PT Unified Application Security Enforcement. ptsecurity.com

PT Unified Application Security Enforcement. ptsecurity.com PT Unified Application Security Enforcement ptsecurity.com Positive Technologies: Ongoing research for the best solutions Penetration Testing ICS/SCADA Security Assessment Over 700 employees globally Over

More information

Cyber Security for Process Control Systems ABB's view

Cyber Security for Process Control Systems ABB's view Kaspersky ICS Cybersecurity 2017, 2017-09-28 Cyber Security for Process Control Systems ABB's view Tomas Lindström, Cyber Security Manager, ABB Control Technologies Agenda Cyber security for process control

More information

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA Lindström Tomas 2013-09-02 Cyber security from ABB System 800xA PA-SE-XA-015963 Cyber Security solutions from ABB Agenda Cyber Security in ABB: general view, activities, organization How we work with Cyber

More information

CIT 480: Securing Computer Systems. Putting It All Together

CIT 480: Securing Computer Systems. Putting It All Together CIT 480: Securing Computer Systems Putting It All Together Assurance 1. Asset identification 1. Systems and information assets. 2. Infrastructure model and control 1. Network diagrams and inventory database.

More information

Payment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard

Payment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard Payment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard Systems Security Standard ( v3.2) Page 1 of 11 Version and Ownership Version Date Author(s) Comments 0.01 26/9/2016

More information

Remote networks. Easy remote access to machines and plants. Industrial Remote Communication. Edition 03/2017. Brochure. siemens.com/remote-networks

Remote networks. Easy remote access to machines and plants. Industrial Remote Communication. Edition 03/2017. Brochure. siemens.com/remote-networks Industrial Remote Communication Remote networks Easy remote access to machines and plants Brochure Edition 03/2017 siemens.com/remote-networks Many ways of connecting to remote networks Increasing bandwidths,

More information

IEEE-SA Standardization Activities for Smart Grid in Communications & Networking. Max Riegel Nokia Siemens Networks Chair IEEE 802 OmniRAN EC SG

IEEE-SA Standardization Activities for Smart Grid in Communications & Networking. Max Riegel Nokia Siemens Networks Chair IEEE 802 OmniRAN EC SG IEEE-SA Standardization Activities for Smart Grid in Communications & Networking Max Riegel Nokia Siemens Networks Chair IEEE 802 OmniRAN EC SG 2 Smart Grid Conceptual Model Priority areas of focus: Demand

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

What It Takes to be a CISO in 2017

What It Takes to be a CISO in 2017 What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge

More information

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE INTRODUCTION In line with commercial industry standards, the data center used by EndNote employs a dedicated security team to protect our

More information

Itu regional workshop

Itu regional workshop Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on

More information

Mobility, Security Concerns, and Avoidance

Mobility, Security Concerns, and Avoidance By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to

More information

NAVIGATING THE WATERS OF THE NEW EU NIS 2016/1148 CYBERSECURITY DIRECTIVE FOR ESSENTIAL SERVICE OPERATORS WHITE PAPER

NAVIGATING THE WATERS OF THE NEW EU NIS 2016/1148 CYBERSECURITY DIRECTIVE FOR ESSENTIAL SERVICE OPERATORS WHITE PAPER NAVIGATING THE WATERS OF THE NEW EU NIS 2016/1148 CYBERSECURITY DIRECTIVE FOR ESSENTIAL SERVICE OPERATORS WHITE PAPER MAY 2018 2018 Radiflow, Ltd. All Rights reserved. The information in this document

More information

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery. Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property

More information

Road Map to Grid Modernization

Road Map to Grid Modernization Road Map to Grid Modernization APIC, University of Alberta May 5 th, 2016 Presenter: Chris Chapelsky, MSc., P.Eng. Operations 1 Engineer About EPCOR Water & Power Transmission & Distribution in Edmonton

More information

SOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE

SOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE SOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE SECURE AIRBORNE CONNECTIVITY: OVERVIEW Gogo Business Aviation realizes the ever-pressing need to be vigilant in staying ahead of potential

More information

Summary of Cyber Security Issues in the Electric Power Sector

Summary of Cyber Security Issues in the Electric Power Sector Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam Comptia.Certkey.SY0-401.v2014-09-23.by.SANFORD.362q Number: SY0-401 Passing Score: 800 Time Limit: 120 min File Version: 18.5 Exam Code: SY0-401 Exam Name: CompTIA Security+ Certification Exam Exam A QUESTION

More information

Cloud Security Whitepaper

Cloud Security Whitepaper Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4

More information

THE ULTIMATE SOLUTION TO SECURE MOBILE COMMUNICATIONS AND DEVICES

THE ULTIMATE SOLUTION TO SECURE MOBILE COMMUNICATIONS AND DEVICES THE ULTIMATE SOLUTION TO SECURE MOBILE COMMUNICATIONS AND DEVICES Mobility and cybersecurity concerns Why is it important? + 38% worldwide annual growth in enterprise cyber-attacks in 2015. Source : PwC

More information

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

Understanding Holistic Effects of Cyber Events on Critical Infrastructure Understanding Holistic Effects of Cyber Events on Critical Infrastructure Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate March 20, 2018 INL/CON-17-42513

More information

Title. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018.

Title. Critical Infrastructure Protection Getting Low with a Touch of Medium. CanWEA Operations and Maintenance Summit 2018. Critical Infrastructure Protection Getting Low with a Touch of Medium Title CanWEA Operations and Maintenance Summit 2018 January 30, 2018 George E. Brown Compliance Manager Acciona Wind Energy Canada

More information

Move & More. Challenges for Information Security. Hansjörg Kalcher (CISO) OMV Aktiengesellschaft. FH St. Pölten, Jänner 2013

Move & More. Challenges for Information Security. Hansjörg Kalcher (CISO) OMV Aktiengesellschaft. FH St. Pölten, Jänner 2013 OMV Aktiengesellschaft Challenges for Information Security Hansjörg Kalcher (CISO) FH St. Pölten, Jänner 2013 Sec_rity is not complete without U! Move & More. OMV GROUP, ORGANIZATION DISCIPLINES AWARENESS

More information

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE SESSION ID: SPO2-W12 A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE Frank Bunton VP, CISO MedImpact Healthcare Systems, Security @frankbunton Larry Biggs Security Engineer III - Threat

More information