TechAdvantage March 5, Mark Peterson Supervisor of Operations Engineering. Ron Schmitz Manager of Information Services
|
|
- Ralph Cook
- 5 years ago
- Views:
Transcription
1 TechAdvantage March 5, 2014 Mark Peterson Supervisor of Operations Engineering Ron Schmitz Manager of Information Services
2 Agenda Great River Energy Overview Background on SCADA Background on IT Functions Alignment Lessons Learned Conclusion
3 Great River Energy Overview 28 member cooperatives 1.7 million people 4 th largest G&T in the nation $3.7 billion total assets $2.8 billion total debt $921.2 million revenue 880+ employees MN and ND 3,619 MW generation 468 MW wind 4,600+ miles transmission
4 SCADA Functions
5 Drivers for SCADA Support Data Center Changes Metering and SCADA IP Conversion EMS Replacement Backup Control Center Organizational Changes
6 IT Functions
7 Drivers for IT Support IT Division Created Data Center Changes IP Network Organizational Changes
8 2011 & Beyond: Time for Alignment Data Center Changes EMS Replacement IP Conversion Backup Control Center Organizational Changes O P E R A T I O N S F U N C T I O N T I M E L I N E IT Division Created Data Center Changes IP Network Organizational Changes I T F U N C T I O N T I M E L I N E APPROX 4 YEARS START OF CONVERGENCE ALIGNMENT OCCURRED
9 Before Alignment RESPONSIBILITIES FOR SCADA IT DEPARTMENT FIELD SERVICES Change management Database support Server support Storage support Telecommunications Incident response Cyber security Equipment deployment & support SYSTEM OPERATIONS Project engineering Application engineering Data management Incident response Cyber security Application support Software development
10 Factors Driving Alignment PEOPLE Changing Workforce
11 Factors Driving Alignment TECHNOLOGY Communications Convergence
12 Factors Driving Alignment INFORMATION Enterprise Availability of Data
13 Factors Driving Alignment FINANCIALS Reducing overall costs
14 Factors Driving Alignment REGULATORY Complying with Increased Cyber Security Requirements Actual GRE Compliance Specialist
15 Past Shortcomings Minimal standardization of configurations and technology Minimal change control for data or technology changes Minimal process documentation Effort to hold onto the past New SCADA Vendor features were not incorporated. Legacy displays still have masked issues. Enhanced SCADA database tools not utilized.
16 Challenges Loss of control of the SCADA (perception) EMS asset owned by Transmission department Mistrust of IT in general (they re taking over the world!) Legacy employees resistant to change Prior internal department was handson, IT more structured with job scope Job functions changed, reduced scope in some cases.
17 Overcoming Challenges Clearly defined roles and responsibilities Created trusting relationships Deliver on commitments IT leadership and staff need to understand importance of energy management Gained understanding of functions IT: system support, operational procedures OT: CIP, SCADA, 24/7 operation
18 Alignment Goals Better alignment with existing IT support functions Service desk System administration Formal on-call policy Former structure relied on the person who lived in town to address critical issues after hours. Processes created for escalating issues Clearly defined roles Staff can focus on their areas of expertise Excitement for clean up and standardization
19 After Alignment RESPONSIBILITIES FOR SCADA IT DEPARTMENT FIELD SERVICES Change management Database support Server support Storage support Telecommunications Incident response Cyber security Equipment deployment & support SYSTEM OPERATIONS Project engineering Application engineering Data management Incident response Cyber security Application support Software development
20 Another Example Metering IP connectivity drove change Operator visibility of the electric system increased Meter callout/interrogation improved Data management and reporting improved Metering support is split the same as SCADA
21 Other Areas of Alignment Custom Applications Distribution Automation Load Management
22 Lessons Learned 1. TEAMWORK IS KEY Projects Support Vendor management Staff meetings 2. Make incremental changes 3. Build trusting relationships 4. Cohesive support for energy management, metering, load management
23 Conclusion Started IT/OT alignment with IP convergence Multiple factors drove alignment Addressed shortcomings and challenges Improved situational awareness Will continue to grow and adapt TEAMWORK IS KEY!
Certified Information Security Manager (CISM) Course Overview
Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,
More informationLESSONS LEARNED IN SMART GRID CYBER SECURITY
LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com
More informationSecuring the Grid and Your Critical Utility Functions. April 24, 2017
Securing the Grid and Your Critical Utility Functions April 24, 2017 1 Securing the Grid Effectively and Efficiently Recent threats to the Electric Grid and the importance of security Standards and Requirements
More informationCisco Smart Grid. Powering End-to-End Communications. Annette Winston Sr. Mgr., Product Operations Customer Value Chain Management
Cisco Smart Grid Powering End-to-End Communications Annette Winston Sr. Mgr., Product Operations Customer Value Chain Management 21 October 2010 What is the Smart Grid? A digital superstructure which uses
More informationEXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.
EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT An Insight Cyber White Paper Copyright Insight Cyber 2018. All rights reserved. The Need for Expert Monitoring Digitization and external connectivity
More informationHow to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.
How to implement NIST Cybersecurity Framework using ISO 27001 WHITE PAPER Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.
More informationBuilding a Resilient Security Posture for Effective Breach Prevention
SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.
More informationSRS Overview. Dave Hepner. Looking toward the future of the Savannah River Site
SRS Overview Looking toward the future of the Savannah River Site Dave Hepner Department of Energy-Savannah River Director, Acquisition Operations Division Savannah River Site March 19, 2012 SRS: We know
More informationOPPD s Change Management Program. Mike Fitzpatrick Manager EMS Operations Omaha Public Power District September 2013
OPPD s Change Management Program Mike Fitzpatrick Manager EMS Operations Omaha Public Power District September 2013 Anything is possible, everything is possible and nothing is impossible. OPPD Overview
More informationFive Key Considerations for Selecting Cloud Recovery Services
Five Key Considerations for Selecting Cloud Recovery Services Looking for a cloud-based solution for backup and recovery? Here are some important things to keep in mind when interviewing providers. By
More informationplaybook OpShield for NERC CIP 5 sales PlAy
playbook OpShield for NERC CIP 5 sales PlAy OpShield for NERC CIP 5 The Problem U.S. bulk power entities are federally mandated to comply with NERC CIP requirements that dictate industrial security and
More informationCritical Cyber Asset Identification Security Management Controls
Implementation Plan Purpose On January 18, 2008, FERC (or Commission ) issued Order. 706 that approved Version 1 of the Critical Infrastructure Protection Reliability Standards, CIP-002-1 through CIP-009-1.
More informationCyber Attacks & Breaches It s not if, it s When
` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationManaged Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts
Managed Enterprise Phishing Protection Comprehensive protection delivered 24/7 by anti-phishing experts MANAGED ENTERPRISE PHISHING PROTECTION 24/7 expert protection against phishing attacks that get past
More informationSPP RTO Compliance Forum Western Area Power Administration March 11, 2015
SPP RTO Compliance Forum Western Area Power Administration March 11, 2015 Mark Buchholz WAPA Upper Great Plains Region Compliance Manager What is Western? One of four Power Marketing Administration within
More informationSwedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation
Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking
More informationPOSITION DESCRIPTION
Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose
More informationCIP V5 Implementation Study SMUD s Experience
CIP V5 Implementation Study SMUD s Experience Tim Kelley October 16, 2014 Powering forward. Together. SMUD Fast Facts General Information SMUD employs approximately 2,000 individuals Service area of 900
More informationEPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use
EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission
More informationCritical Security Controls. COL Stef Horvath MNARNG Oct 21, 2015
Critical Security Controls COL Stef Horvath MNARNG Oct 21, 2015 Agenda Security Controls the Good, the Bad, the Ugly Emerging Security Controls Critical Security Controls Methodology and Contributors Supporting
More informationREPORT 2015/149 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationMetro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government
Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government Why You Should Choose Cox Metro Ethernet To meet the critical demands of better supporting local emergency
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationALBEMARLE COUNTY SERVICE AUTHORITY
ALBEMARLE COUNTY SERVICE AUTHORITY AGENDA ITEM EXECUTIVE SUMMARY AGENDA TITLE: Strategic Plan Process STAFF CONTACT(S)/PREPARER: Gary O Connell, Executive Director AGENDA DATE: September 20, 2018 ACTION:
More informationApplying Forensic Methodologies to Bill Print Review
Applying Forensic Methodologies to Bill Print Review Monica O Brien Burbank Water and Power Customer Service Division Derek Somerville Sure Power Consulting Chief Executive Officer Monica O Brien Derek
More informationChapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS
Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power
More informationEmpowering Operations with the PI System
Empowering Operations with the PI System Presented by Thomas Marshall, IT Manager, PI Support NRG Energy Agenda o About NRG Energy o History of the NRG PI System Fleet Program o Timeline \ Milestones o
More informationAUTHORITY FOR ELECTRICITY REGULATION
SULTANATE OF OMAN AUTHORITY FOR ELECTRICITY REGULATION SCADA AND DCS CYBER SECURITY STANDARD FIRST EDITION AUGUST 2015 i Contents 1. Introduction... 1 2. Definitions... 1 3. Baseline Mandatory Requirements...
More informationImprove Internal Controls with Governance, Risk, and Compliance Solutions
Improve Internal Controls with Governance, Risk, and Compliance Solutions Jay Castleberry Director, Technology Delivery & Maintenance 0 (SCE) Company Overview One of the largest electric utilities in North
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationMETER INSTALLATION VENDOR MANAGEMENT NIPSCO - NORTHERN INDIANA PUBLIC SERVICE COMPANY
METER INSTALLATION VENDOR MANAGEMENT NIPSCO - NORTHERN INDIANA PUBLIC SERVICE COMPANY Phil Winter Manager, Distribution Major Projects NIPSCO a division of NiSource Inc. INSTALLATION VENDOR MANAGEMENT
More informationIntro to the NERC/NIPC Indications, Analysis & Warnings Program
Intro to the NERC/NIPC Indications, Analysis & Warnings Program (IAW Program - Electric Power Sector) Before Seeing this Presentation, Make Sure Everyone Has a Copy of Each of the Following: Job Aid (NIPC
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationLoss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP September 30, 2014
Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP-009-3 September 30, 2014 James Williams Lead Compliance Specialist jwilliams.re@spp.org 501.614.3261 Jeremy Withers Senior Compliance Specialist
More informationFDIC InTREx What Documentation Are You Expected to Have?
FDIC InTREx What Documentation Are You Expected to Have? Written by: Jon Waldman, CISA, CRISC Co-founder and Executive Vice President, IS Consulting - SBS CyberSecurity, LLC Since the FDIC rolled-out the
More informationPosition Title: IT Security Specialist
Position Title: IT Security Specialist SASRIA SOC LIMITED Sasria, a state-owned company, is the only short-term insurer in South Africa that provides affordable voluntary cover against special risks such
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationIndustry Sector. Zug (Switzerland), July 4, Security in an IT world
Technical Article Industry Sector Building Technologies Division Zug (Switzerland), July 4, 2011 Security in an IT world There is a move towards more integrated solutions in security, with security management
More informationTable of Contents. Sample
TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationPeter J. Buerling Director, Records & Information Compliance. ReliabilityFirst Workshop April 15, 2016
Peter J. Buerling Director, Records & Information Compliance April 15, 2016 Opening Comments Presentation Topic Disclaimer Presentation Support Introductions Mark Koziel Consultant, CIP Compliance Don
More informationKentucky IT Consolidation
2007 NASCIO Recognition Awards Nomination Category: Enterprise IT Management Initiatives Kentucky IT Consolidation Commonwealth Office of Technology The Commonwealth of Kentucky is nearing completion of
More informationDigital Wind Cyber Security from GE Renewable Energy
Digital Wind Cyber Security from GE Renewable Energy BUSINESS CHALLENGES The impact of a cyber attack to power generation operations has the potential to be catastrophic to the renewables industry as well
More informationCyber Security Update. Bennett L. Gaines Senior Vice President, Corporate Services, CIO, FirstEnergy 2012 Summer Seminar August 5-7, 2012
Cyber Security Update Bennett L. Gaines Senior Vice President, Corporate Services, CIO, FirstEnergy 2012 Summer Seminar August 5-7, 2012 Agenda Timeline Regulatory / Compliance Environment Smart Grid Threats
More informationNew York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief
Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced
More information2 nd Annual NERC Monitoring and Situational Awareness Conference: FPL s Operational Technology Center
2 nd Annual NERC Monitoring and Situational Awareness Conference: FPL s Operational Technology Center Ed Batalla Director of Grid Control Systems Florida Power & Light Company Sept. 24, 2014 Florida Power
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationCorporate Information Security Policy
Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed
More informationManaging Security, Risk and Compliance for Critical Assets on the Smart Grid
Managing Security, Risk and Compliance for Critical Assets on the Smart Grid Kshamit Dixit Toronto Hydro Toronto Hydro A snapshot Worldwide Employees: 1,700 Revenues: $2.3 Billion Headquarters: Toronto,
More informationThe five questions I am being asked by National Policy Makers and Utility CEOs; My Best Answers; And Where the Questions Don't Have Answers
The five questions I am being asked by National Policy Makers and Utility CEOs; My Best Answers; And Where the Questions Don't Have Answers The 7th Annual North American SCADA and Process Control Summit
More informationGrid Modernization in New York: The Role of New Technologies and Early Lessons Learned
Grid Modernization in New York: The Role of New Technologies and Early Lessons Learned James T. Gallagher, Executive Director New York State Smart Grid Consortium April 11, 2018 New York State Smart Grid
More informationAn Integrated Approach to Technology Risk Management and Compliance
An Integrated Approach to Technology Risk Management and Compliance Kerry Bryan, Sr. Manager Policy & Guidance Michael Makstman, Sr. Director Sherrie Osborne, Director, HIPAA Security Program Technology
More informationbuilding a security culture to counter emerging cybersecurity threats
Academic Medical Center Security and Privacy Conference June 2017 building a security culture to counter emerging cybersecurity threats Chuck Kesler, MBA, CISSP, CISM Chief Information Security Officer
More informationSecurity Awareness Compliance Requirements. Updated: 11 October, 2017
Security Awareness Compliance Requirements Updated: 11 October, 2017 Executive Summary The purpose of this document is to identify different standards and regulations that require security awareness programs.
More informationIntegrated Assurance Across the Three Lines of #CW2017
Integrated Assurance Across the Three Lines of Defence @ComplianceWeek #CW2017 Speaker Panel Liv Watson Sr. Director of Strategic Customer Initiatives Workiva, Inc. Valeria Locatelli Audit Director M&G
More informationDisaster Recovery and Business Continuity Planning (Mile2)
Disaster Recovery and Business Continuity Planning (Mile2) Course Number: DRBCP Length: 4 Day(s) Certification Exam This course will help you prepare for the following exams: ABCP: Associate Business Continuity
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationCritical Infrastructure Protection Version 5
Critical Infrastructure Protection Version 5 Tobias Whitney, Senior CIP Manager, Grid Assurance, NERC Compliance Committee Open Meeting August 9, 2017 Agenda Critical Infrastructure Protection (CIP) Standards
More informationTHE TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED BUSINESS INTELLIGENCE SOLUTION BRIEF THE TRIPWIRE NERC SOLUTION SUITE A TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on
More informationPosition Description IT Auditor
Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership
More informationWhat You Should Know About Communication Systems: Business Strategies and Options
Doug Voda, PPMV Global Segment Leader for Smart Grid February 2015 NRECA TechAdvantage What You Should Know About Communication Systems: Business Strategies and Options The visionary Smart Grid Five Pillars
More informationAn Introduction to the ISO Security Standards
An Introduction to the ISO Security Standards Agenda Security vs Privacy Who or What is the ISO? ISO 27001:2013 ISO 27001/27002 domains Building Blocks of Security AVAILABILITY INTEGRITY CONFIDENTIALITY
More informationDistribution Fault Locating with PI
Distribution Fault Locating with PI Presented by Cameron D. Sherding, Sr. Software Engineer DTE Energy is an Integrated Energy Company Strong, Stable and Growing Utilities Complementary Non-Utility Businesses
More informationSeven Requirements for Successfully Implementing Information Security Policies and Standards
Seven Requirements for Successfully Implementing and Standards A guide for executives Stan Stahl, Ph.D., President, Citadel Information Group Kimberly A. Pease, CISSP, Vice President, Citadel Information
More informationCYBER SECURITY WORKSHOP NOVEMBER 2, Anurag Sharma [CISA, CISSP, CRISC] Principal Cyber & Information Security Services
0 CYBER SECURITY WORKSHOP NOVEMBER 2, 2016 Anurag Sharma [CISA, CISSP, CRISC] Principal Cyber & Information Security Services VIDEO: CAN IT HAPPEN TO ME? 1 2 AGENDA CYBERSECURITY WHY SUCH A BIG DEAL? INFORMATION
More informationB O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N
B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N NERC Monitoring and Situational Awareness Conference Bonneville Power Administration Loss of EMS:
More informationCYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017
CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November
More informationUSERS CONFERENCE Copyright 2016 OSIsoft, LLC
HRSD - Bringing Time and Space Together for Operational Awareness in Waste Water Presented by Kimberly Peterson, Data Analysis Manager, HRSD Clay Wise, Chief of IT Operations & Support, HRSD Agenda Outline
More informationTAN Jenny Partner PwC Singapore
1 Topic: Cybersecurity Risks An Essential Audit Consideration TAN Jenny Partner PwC Singapore PwC Singapore is honoured to be invited to contribute to the development of this guideline. Cybersecurity Risks
More informationLow Impact Generation CIP Compliance. Ryan Walter
Low Impact Generation CIP Compliance Ryan Walter Agenda Entity Overview NERC CIP Introduction CIP-002-5.1, Asset Classification What Should Already be Done CIP-003-7, Low Impact Requirements Tri-State
More informationBetter skilled workforce
Better skilled workforce for the New Style of Business HPE Education Services November 20, 2015 Education is the most powerful weapon which you can use to change the world Nelson Mandela The New Style
More informationStrategy Consulting Digital Technology Operations. Transmission Distribution SCADA Separation 2017 EMMOS Conference
Strategy Consulting Digital Technology Operations Transmission Distribution SCADA Separation 2017 EMMOS Conference SCADA for Electric Utility Operations The SCADA platform is at the heart of Electric Utility
More informationA revolutionary visual security and analytics solution
A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing
More informationThe Automation of Converting SCADA EMS Displays to PI WebParts
The Automation of Converting SCADA EMS Displays to PI WebParts Presented by Linda Stevens, Pepco Holdings, Inc Li Luo, Pepco Holdings, Inc Pepco Holdings, Inc Pepco Holdings, Inc. (PHI) is a holding company
More informationISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationBuilding a Threat Intelligence Program
WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351
More informationOPERATIONS CONTROL CENTER
OPERATIONS CONTROL CENTER STANDARD SERVICES 24/7/365 Remote Monitoring Fault Notification & Remote Resets Curtailment Management ADVANCED SERVICES In addition to our Standard Services, Advanced Services
More informationPRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources
PRODUCT OVERVIEW On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources What is a Threat Hunting service? ESET Threat Hunting service
More informationVersion: V2.0. Integrated Building. Architecture. 19 April dimension data advanced infrastructure
Version: V2.0 Integrated Building 19 April 2013 Architecture dimension data advanced infrastructure Agenda Framework for Implementation Case Studies Copyright Dimension Data 19 April 2013 2 Question Given
More informationBusiness continuity management and cyber resiliency
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationLeveraging Existing Customers to Find New Revenue Streams
ChannelCon.org Leveraging Existing Customers to Find New Revenue Streams Session Expediter Colleen Howley Vice President, Business Development Marathon Deployment Presenters Mark DiGregorio Tolt Solutions
More informationThe Common Controls Framework BY ADOBE
The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.
More information01.0 Policy Responsibilities and Oversight
Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities
More informationImproving Cybersecurity through the use of the Cybersecurity Framework
Improving Cybersecurity through the use of the Cybersecurity Framework March 11, 2015 Tom Conkle G2, Inc. Agenda Cybersecurity Framework Why it was created What is it Why it matters How do you use it 2
More informationHow To Reduce the IT Budget and Still Keep the Lights On
How To Reduce the IT Budget and Still Keep the Lights On By Charles Williams and John Carnegie CIOs are now more challenged than ever to demonstrate mature financial management disciplines, greater transparency,
More informationGO15 Reliable & Sustainable Power Grids
Travis Rouillard Markets & Distributed Resources GE Grid Solutions GO15 Reliable & Sustainable Power Grids April 13, 2016 Corporate Enterprise February 2014 1 2040 GLOBAL POPULATION: 9 billion INCREASED
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationPrinciples of Protection: Cybersecurity Data Protection. 11/01/2017 Julia Breaux William Sellers
Principles of Protection: Cybersecurity Data Protection 11/01/2017 Julia Breaux William Sellers Introductions Julia Breaux Internal Controls and Compliance Manager (225) 214-3898 Julia.Breaux@eatel.com
More informationOrganizational Privacy Transformation: A case study from Critical Issues to Award Winning Success
Organizational Privacy Transformation: A case study from Critical Issues to Award Winning Success Norine Primeau-Menzies VP Customer Services, Chief Privacy Officer May 2012 Agenda Overview of OTN Setting
More informationCyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.
Cyber Security For Utilities Risks, Trends & Standards IEEE Toronto March 22, 2017 Doug Westlund Senior VP, AESI Inc. Agenda Cyber Security Risks for Utilities Trends & Recent Incidents in the Utility
More informationWeighing in on the Benefits of a SAS 70 Audit for Third Party Administrators
Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators With increasing oversight and growing demands for industry regulations, third party assurance has never been under a keener
More informationNERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS
NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements
More informationCyber Diligence. EY Deals Forum Ian McCaw EY Transaction Advisory Services
Cyber Diligence EY Deals Forum 2018 Ian McCaw EY Transaction Advisory Services Finance & Commercial Diligence 2 B COMPANY: Power Life INDUSTRY: ENERGY REVENUE: 192m EBITDA: 875k (35% growth in 5 years)
More informationBYOD Policy. Table of Contents
Version 1.6 Table of Contents Bring Your Own Device (BYOD) Access and Use Policy... 3 Overview... 3 Components of the BYOD Strategy and Basics for BYOD Policy... 4 Device Choices... 4 User Experience and
More informationHow to get the Enterprise to Understand the Value of Security
PART 1 of 2 Insight into Security Leader Success How to get the Enterprise to Understand the Value of Security A SEC Research Finding Intended Audience This presentation is intended for security leaders
More information