K. Eric Harper, Senior Principal Scientist, ABB US Corporate Research
|
|
- Fay McKinney
- 5 years ago
- Views:
Transcription
1 10 NOVEMBER 2017 Cyber Security and Data Analytics CAPER IAB Meeting Session V Power System Data Applications K. Eric Harper, Senior Principal Scientist, ABB US Corporate Research
2 CODEF video
3 Agenda Cybersecurity Data and Analytics Questions
4 Cyber Security What does it mean? NERC CIP? Measures taken to protect power and automation systems against unauthorized access, attacks, disruption or loss. November 28, 2017
5 Cyber Security Back to the basics Security is about awareness, policy and process Ignore compliance - at least at first Focus on risk mitigation and management Assess your maturity model and then improve There is no such thing as 100% security Actors and threats constantly changing Deploy Defense in Depth Deter, Detect and Delay the bad guys Security does not come for free
6 The growing impact of cyber security Vulnerabilities in protection and control systems ICS (SCADA/DCS) disclosures per year ICS Vulnerabilities % 87.5% 2015 incidents Ukraine - BlackEnergy1 APT Verizon Data Breach Germany - Steel mill Poland - Major airport * Since 2010 vulnerabilities in control system are increasing. Never touch a running system methodology does not work anymore November 28, 2017 Slide 6
7 Cultural: Enterprise IT vs. Control Systems A different set of challenges Education and Teamwork Primary object under protection Primary risk impact Main security objective Security focus Availability requirements Problem response Enterprise IT Information Information disclosure, financial Confidentiality Central Servers (fast CPU, lots of memory, ) 95 99% (accept. downtime/year: days) Reboot, patching/upgrade, isolation Control Systems Physical process Safety, health, environment, financial Availability Distributed System (possibly limited resources) % (accept. downtime/year: 8.76 hrs 5.25 minutes) Fault tolerance, online repair
8 Challenges Balance between Reliability and Security Air gap is not the solution Enablement of the information flow is critical for today and tomorrow s success in proactive wide area applications Power System Reliability Reliability Critical Infrastructure Protection (CIP) Security Communications Infrastructure November 28, 2017 Slide 8
9 The growing impact of cyber security Maintenance Center Network Control Center Network disturbance, malware, Cyber attacks Unauthorized access or attack The increasing risks Legal and illegal penetration and hacking tools are freely available today Penetration testing software Firewall VPN Engineering Workstation Computer HMI Router Gateway GPS Time Server Vulnerability Scanner Network discovery and security auditing Internet of Things (IoT) Unauthorized Person Station LAN Infected Mobile data storage USB Data storm by a Faulty Device IEC / Station bus Infected Notebook Electronic Security perimeter Physical Security perimeter Unauthorized Person November 28, 2017 Slide 9
10 CODEF Security Features Distributed. Collaborative. Cyber- and Physics-Based Distributed intelligence between substation intelligent electronic devices (IEDs) Collaborative mechanism for detecting cyber attacks Domain based cyber security layer for electrical substations and intelligent electronic devices (IEDs) Additional cyber-layer for enhanced security November 28, 2017 Slide 10
11 CODEF Technical Approach Use physics to block malicious cyber attacks Detect and block malicious attempts to control circuit breakers and malicious device configuration settings Reinforce existing solutions and provide another security layer in case of breach of IT security layer November 28, 2017 Slide 11
12 Grid Automation Cyber Security Layered Architecture Remote Support Maintenance Center Network Control Center Enterprise Network Secure SW/FW Layering a communication networks physically and/or logically can considerably improves network security Multi technology based operational utility core network www. Service PC Redundant & reliable clock & time distribution (not only GPS) Individual User Accounts Removable Media Access USB Core network element PDH, SDH Optical, MPLS, L2 optical / el. Radio; Wi-Fi, PLC Any Substation, Control-Center; Power-Plant down to private consumer Disable Ports / services Malware Protection Patch management Firewall Local security logging Central security logging /Account Management Secure Communication DMZ SDM 600 November 28, 2017 IDS
13 Agenda Cybersecurity Data and Analytics Questions
14 Challenges and changes utilities face Aging infrastructure Nearly 70% of the transformers in the US are more than 25 years old 1 Risk Avoid Manage Cost Minimize Optimize Cyber security Through 2018, 50% of IoT device manufacturers will not be able to address threats from weak authentication practices 7 Reliability Aging workforce Up to 55% reduction in unexpected failures with predictive maintenance solutions 2 40% of the workforce at America s electric and natural gas utilities will be eligible for retirement in the next five years 6 Asset information everywhere 25 billion devices (not counting smartphones, tablets or computers) will be connected to the IoT by Performance Exceed Meet or beat Distributed energy By 2020, 2.5 GW of electricity will be generated by 20% of Fortune 500 companies, which will wholesale their distributed energy resource excess power through utility-independent subsidiaries 4 Spending justification Companies investing in IoT-based operational sensing and cognitive-based situational awareness will see 30% improvements in the cycle times of impacted critical processes 5 November 28, 2017 Slide 14 1 Harris Williams & Co. 2 ARC Advisory Group, November Gartner. Predicts 2016: Unexpected Implications Arising From the Internet of Things. December IDC FutureScape: Worldwide Utilities 2017 Predictions 5 IDC Energy IDC FutureScape: Worldwide Digital Transformation 2017 Predictions 6 APPA 7 Gartner. Predicts 2016: Unexpected Implications Arising From the Internet of Things. December 2015
15 Grid Automation Timeline ABB leading the world since 1905 ABB s first electromechanical relays introduced IEC founded ABB is a leading member ABB introduces COMBIFLEX electronic relays ABB s first optical FOX link installed on HV lines with integrated teleprotection ABB develops integrated protection and control First distributed busbar protection REB500 ABB s first fully integrated analog and digital Power Line Communication (PLC) ABB introduces the Relion family of IEC compliant relays and compliant substation automation systems ABB Commissions 1 st IEC (multi vendor) SA System Laufenberg, CH. ABB acquires Tropos Wireless Networks National Grid Saudi Arabia partners with ABB to introduce IEC Substation Automation Systems ABB launches it s pioneering Standalone merging unit - SAM600 ABB s first digital substation in the UK ABB partners with Microsoft s Azure Cloud based platform to launch ABB Ability ABB invests in Enbala Power Networks to codevelop cutting-edge grid software ABB Ability Digital Substation & Asset Health Center launched at ABB Customer World ABB installs first Power Line Communication (PLC) and protection Signaling Equipment ABB introduces first SCADA and network management systems ABB launches Micro-processor based relays ABB introduces EMS, GMS and DMS applications ABB introduces first computer based substation control system First redundant RTU supporting Ethernet communication (RTU500 series) First NCIT installations in ABB substation automation systems ABB pioneers Wide Area Monitoring System (WAMS) Between ABB acquires Ventyx & Mincom ABB s first IEC digital substation installation - Loganlea, Australia ABB introduces worlds first Asset Health Center solution 100,000 th RTU sold ABB sells its 100,000th Relion 670 unit ABB sells its 10,000th MicroSCADA Pro license ABB launches it s pioneering Microgrid enabling product - PowerStore Battery ABB recognized for the world s first conformance tested system engineering tools 28 November 2017 Slide 15
16 Digital Substation Shift from a conventional to a digital substation Primary components stand alone Small foot-print: Integration Conventional Substation Customer Values Lower OPEX for operators Health and safety Less and smaller control cubicles Linear NCIT / no saturation Less cabling Less material Shorter cycle times Smaller foot-print Future proof thanks to IEC Station local or remote HMI with asset management Digital Substation CT & VT November 28, 2017 Slide 16
17 Digital Substation For higher reliability in operation and efficiency in fleet service Expert systems Fleet health Guide for optimized selective fleet maintenance planning based on risks versus importance of assets Plant/Substation information Diagnosis and visual risk status information of equipment at plant level X X X X X Other equipment Product information Product level analysis and storage of data Product specific fingerprint Data capture Signals from sensors Off line maintenance, field testing and product data Data Data X X X X X X November 28, 2017
18 Evolution of digital business and analytics Need for operational improvement steers analytics from descriptive to predictive Analytics Human input Descriptive What happened? Diagnostic Why did it happen? Data Predictive What will happen? Decision Action Prescriptive What should I do? Decision support Decision automation ABB analytics portfolio November 28, 2017 Slide 18 Source: Gartner (February 2015)
19 What does this mean for utilities? Utility-izing data With the continued deployment of intelligent equipment, utilities can collect and analyze far more data than ever before This data can be utilized to identify the most critical assets for repair and replace decisions, thereby reducing operations and maintenance spending 10x For example, predictive maintenance can save up to 10x more than corrective maintenance and can mitigate catastrophic failures that can cost as much as $25 million November 28, 2017 Slide 19
20 ABB Ability Asset Health Center A fleet-wide analytics platform to improve processes through risk-based optimization Expert models (ABB, third party) Statistical models (Azure Machine Learning) All data sources: Sensors Historian Databases EAM Continuous optimization and improvement Advanced operational business intelligence Enterprise asset and work management November 28, 2017 Slide 20
21 Benefits One source of IT/OT truth means better decision-making and improved execution Business is driving the push towards digitalization with the reward of improved operations, lower costs and increased agility. Digitalization will help: Identify risks early so they can be reliably resolved or mitigated Enable riskoptimized maintenance schedules Make more informed longterm investment decisions Facilitate the adoption of accepted industry standards such as ISO Quickly establish an asset performance management solution that grows with you Replace time-based maintenance with condition-based maintenance for cost-effective reliability November 28, 2017 Slide 21
22 Case study US transmission owner Territory in multiple states Millions of customers 10 s of thousand miles of electric transmission lines 100 s of thousand miles of electric distribution line 8,800 transformers 20,000 breakers 3,300 batteries 33% Transformers over 50 years old 18% Transformers over 60 years old Prevented at least one major transformer failure in the first year! November 28, 2017 Slide 22
23 Potential annual savings 8% O&M +3 years Optimized maintenance strategy Increased life of assets 2% Overtime costs 4% O&M Optimized labor Risk Safety Environmental Regulatory millions Capital replacement & deferred depreciation November 28, 2017 Slide 23
24 November 28, 2017 Slide 24
25 Agenda Cybersecurity Data and Analytics Questions
26
Digital substations. Introduction, benefits, offerings
Digital substations Introduction, benefits, offerings Outline What is a digital substation? Benefits of digital substations ABB offering for digital substations Substation evolution June 26, 2017 Slide
More informationHugo E. Meier, Heidelberg, Germany, June 2014 Integrator Partner Seminar2014 Substation automation trends
Hugo E. Meier, Heidelberg, Germany, June 2014 Integrator Partner Seminar2014 Substation automation trends Substation automation trends Contents Product Portfolio Trends in substation automation Cyber Security
More informationJULIO OLIVEIRA, ABB POWER GRIDS GRID AUTOMATION, DECEMBER 01 ST ABB Ability - Digital Substations. FISE 7a Edición
JULIO OLIVEIRA, ABB POWER GRIDS GRID AUTOMATION, DECEMBER 01 ST ABB Ability - Digital Substations FISE 7a Edición Current challenges and changes facing utilities Aging infrastructure Legecy systems with
More informationDigital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation
Digital Substation A Substation Why Should We Make It Digital? Adopt new business models Time to operation Quality assurance Business agility Avoid outages Investment security Ensuring grid availability
More informationIEC in Digital Substation and Cyber security
ABB GRID AUTOMATION IEC 61850 in Digital Substation and Cyber security 72 nd Annual Georgia Tech Protective Relaying Conference Steven Kunsman, May 4, 2018 The digital systems Communication services SV,
More informationPOWER GRIDS. We are bridging the gap. Enabling Digital Substations.
POWER GRIDS We are bridging the gap. Enabling Digital s. 2 A B B D i g i ta l S u b s tat i o n s ABB s Digital provides customers in the utility sector with unmatched control and efficiency. The digital
More informationFuture Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group
Future Challenges and Changes in Industrial Cybersecurity Sid Snitkin VP Cybersecurity Services ARC Advisory Group Srsnitkin@ARCweb.com Agenda Industrial Cybersecurity Today Scope, Assumptions and Strategies
More informationIEC A cybersecurity standard approaching the Rail IoT
IEC 62443 A cybersecurity standard approaching the Rail IoT siemens.com/communications-for-transportation Today s Siemens company structure focusing on several businesses Siemens AG Power and Gas (PG)
More informationIndustrial Security - Protecting productivity. Industrial Security in Pharmaanlagen
- Protecting productivity Industrial Security in Pharmaanlagen siemens.com/industrialsecurity Security Trends Globally we are seeing more network connections than ever before Trends Impacting Security
More informationDmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices
Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Against Cyber Attacks (CODEF) Cyber Security of the
More informationThe debut of Relion 2.2 The new IEDs generation A suitable portfolio for your digital substation
RELAY DAY 2017 The debut of Relion 2.2 The new IEDs generation A suitable portfolio for your digital substation Miguel Lara Mendoza Sales Manager Factory worldwide Caribbean & Central America Suriname,
More informationLESSONS LEARNED IN SMART GRID CYBER SECURITY
LESSONS LEARNED IN SMART GRID CYBER SECURITY Lynda McGhie CISSP, CISM, CGEIT Quanta Technology Executive Advisor Smart Grid Cyber Security and Critical Infrastructure Protection lmcghie@quanta-technology.com
More informationCyber security for digital substations. IEC Europe Conference 2017
Cyber security for digital substations IEC 61850 Europe Conference 2017 Unrestricted Siemens 2017 siemens.com/gridsecurity Substation Digitalization process From security via simplicity 1st generation:
More informationCyber Security for Process Control Systems ABB's view
Kaspersky ICS Cybersecurity 2017, 2017-09-28 Cyber Security for Process Control Systems ABB's view Tomas Lindström, Cyber Security Manager, ABB Control Technologies Agenda Cyber security for process control
More informationABB Process Automation, September 2014
ABB Process Automation, September 2014 ABB Process Automation Services Services that add life to your products, systems and processes September 26, 2014 Slide 1 1 ABB Process Automation Services A proven
More informationABB Ability Cyber Security Services Protection against cyber threats takes ability
ABB Ability Cyber Security Services Protection against cyber threats takes ability In today s business environment, cyber security is critical for ensuring reliability of automation and control systems.
More informationDesigning and Building a Cybersecurity Program
Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity
More informationNERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS
NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements
More informationNIST Cybersecurity Framework Protect / Maintenance and Protective Technology
NIST Cybersecurity Framework Protect / Maintenance and Protective Technology Presenter Charles Ritchie CISSP, CISA, CISM, GSEC, GCED, GSNA, +6 Information Security Officer IT experience spanning two centuries
More informationAddressing Cyber Threats in Power Generation and Distribution
Addressing Cyber Threats in Power Generation and Distribution VEO, Asko Tuomela o Bachelor of Science in Electrical Power Engineering o Over 6 years experience in power projects, PLCs and supervision systems
More informationIndustrial Defender ASM. for Automation Systems Management
Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping
More informationCyber Security Brian Bostwick OSIsoft Market Principal for Cyber Security
Cyber Security Presented by Brian Bostwick OSIsoft Market Principal for Cyber Security Cyber Security Trauma in the News Saudi Aramco Restores Network After Shamoon Malware Attack Hacktivist-launched virus
More informationCyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.
Cyber Security For Utilities Risks, Trends & Standards IEEE Toronto March 22, 2017 Doug Westlund Senior VP, AESI Inc. Agenda Cyber Security Risks for Utilities Trends & Recent Incidents in the Utility
More informationIndustry Best Practices for Securing Critical Infrastructure
Industry Best Practices for Securing Critical Infrastructure Cyber Security and Critical Infrastructure AGENDA - Difference between IT and OT - Real World Examples of Cyber Attacks Across the IT/OT Boundary
More informationSubstation automation products. MicroSCADA Pro for substation automation
Substation automation products for substation automation Perfect control anywhere, anytime is an investment for today and tomorrow. Start, for instance, with monitoring or gateway functionality and integrate
More informationENERGY MANAGEMENT SYSTEM. ABB Ability Network Manager EMS Operational confidence.
ENERGY MANAGEMENT SYSTEM ABB Ability Network Manager EMS Operational confidence. 2 ABB ABILITY NETWORK MANAGER EMS ABB Ability Network Manager Energy Management System The ever-increasing demand for power
More informationSecuring the Grid and Your Critical Utility Functions. April 24, 2017
Securing the Grid and Your Critical Utility Functions April 24, 2017 1 Securing the Grid Effectively and Efficiently Recent threats to the Electric Grid and the importance of security Standards and Requirements
More informationSubstation Automation based on IEC Claes Rytoft ABB Power Systems
Substation Automation based on IEC 61850 Claes Rytoft ABB Power Systems BayNetworks Development of SA SA conventional MMI / Control Board NCC SA with interbay bus NCC SA with interbay & process bus NCC
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationDigital Wind Cyber Security from GE Renewable Energy
Digital Wind Cyber Security from GE Renewable Energy BUSINESS CHALLENGES The impact of a cyber attack to power generation operations has the potential to be catastrophic to the renewables industry as well
More informationSANS SCADA and Process Control Europe Rome 2011
SANS SCADA and Process Control Europe Rome 2011 Ian Buffey Director International Services Industrial Defender ibuffey@industrialdefender.com A Holistic Approach Planning, training and governance Cybersecurity
More informationWEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP
WEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP San Diego Gas & Electric Subsidiary of Sempra Energy 4100 Full-Time Employees Regulated public utility Providing clean, safe & reliable
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationDefense in Depth Security in the Enterprise
Defense in Depth Security in the Enterprise Mike Mulville SAIC Cyber Chief Technology Officer MulvilleM@saic.com Agenda The enterprise challenge - threat; vectors; and risk Traditional data protection
More informationCyber Security Update. Bennett L. Gaines Senior Vice President, Corporate Services, CIO, FirstEnergy 2012 Summer Seminar August 5-7, 2012
Cyber Security Update Bennett L. Gaines Senior Vice President, Corporate Services, CIO, FirstEnergy 2012 Summer Seminar August 5-7, 2012 Agenda Timeline Regulatory / Compliance Environment Smart Grid Threats
More informationAddressing NERC-CIP Compliance Challenge for Utilities through IT Service Management. Patrik Ringqvist Principal Solution Consultant
Addressing NERC-CIP Compliance Challenge for Utilities through IT Service Management Patrik Ringqvist Principal Solution Consultant Utility IT Service Management Challenges NERC Compliance ITIL Compliance
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationJust How Vulnerable is Your Safety System?
Theme 3: Cyber Security Just How Vulnerable is Your Safety System? Colin Easton MSc, CEng, FInstMC, MIET, ISA Senior Member TUV Rhienland FS Senior Expert PHRA & SIS 6 th July 2017 1 Safety System Security
More informationPlant Security Services Protecting productivity in the digital era October
Plant Security Services Protecting productivity in the digital era October2017 Restricted www.siemens.com/plant-security-services Internet of (hacked) Things Page 2 Use case - No OT cybersecurity company
More informationComprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017
Comprehensive Cyber Security Features in SIPROTEC & SICAM SIPROTEC Dag 11. Mei 2017 siemens.tld/keyword Changes to Substation Automation and Protection over Time Evolving Threat Landscape (tomorrow today...)
More informationCyber Risk and Networked Medical Devices
Cyber Risk and Networked Medical Devices Hot Topics Deloitte & Touche LLP February 2016 Copyright Scottsdale Institute 2016. All Rights Reserved. No part of this document may be reproduced or shared with
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationHow will cyber risk management affect tomorrow's business?
How will cyber risk management affect tomorrow's business? The "integrated" path towards continuous improvement of information security Cyber Risk as a Balance Sheet Risk exposing Board and C-Levels 2018
More informationCybersecurity Vulnerabilities and Process Frameworks for Oil and Gas
Cybersecurity Vulnerabilities and Process Frameworks for Oil and Gas Presentation to WVONGA Jack L. Shaffer, Jr. Business Transformation Director vcio/ vciso 2017 Cybersecurity in the news Ransomware Wanacry,
More informationGrid Automation Products. MicroSCADA Pro Substation automation applications.
Grid Automation Products Substation automation applications. 2 Substation automation applications Automate, control and optimize your operations. is an investment for today and tomorrow. Start, for instance,
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationNovember 29, ECE 421 Session 28. Utility SCADA and Automation. Presented by: Chris Dyer
ECE 421 Session 28 November 29, 2018 Utility SCADA and Automation Presented by: Chris Dyer Utility SCADA & Automation Chris Dyer, P.E. BSEE University of Idaho, 1997 SCADA & Automation Engineer POWER Engineers,
More informationTransforming Utility Grid Operations with the Internet of Things
Solution Brief Internet of Things Energy Industry Transforming Utility Grid Operations with the Internet of Things Access key process data in real time to increase situational awareness of grid operations.
More informationPractical SCADA Cyber Security Lifecycle Steps
Practical SCADA Cyber Security Lifecycle Steps Standards Certification Jim McGlone CMO, Kenexis Education & Training Publishing Conferences & Exhibits Bio Jim McGlone, CMO, Kenexis GICSP ISA Safety & Security
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationApril 2010 Power Systems division A brief introduction. ABB Group August 25, 2011 Slide 1
April 2010 Power Systems division A brief introduction August 25, 2011 Slide 1 Facts about ABB 117,000 employees in about 100 countries $32 billion in revenue (2009) Formed in 1988 merger of Swiss and
More informationIC32E - Pre-Instructional Survey
Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into
More informationSecurity in a Converging IT/OT World
Security in a Converging IT/OT World Introduction Around the winter solstice, darkness comes early to the citizens of Ukraine. On December 23, 2015, it came a little earlier than normal. In mid-afternoon,
More informationCyber Security of Industrial Control Systems (ICSs)
Cyber Security of Industrial Control Systems (ICSs) February 23, 2016 Joe Weiss PE, CISM, CRISC, ISA Fellow Managing Partner Applied Control Solutions, LLC (408) 253-7934 joe.weiss@realtimeacs.com Applied
More informationHow can I use ISA/IEC (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits
How can I use ISA/IEC- 62443 (Formally ISA 99) to minimize risk? Standards Certification Education & Training Publishing Conferences & Exhibits What is ISA 62443? A series of ISA standards that addresses
More informationEXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.
EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT An Insight Cyber White Paper Copyright Insight Cyber 2018. All rights reserved. The Need for Expert Monitoring Digitization and external connectivity
More informationBenefits, offering and references
DOC ID: 9AKK107045A9180 DISTRIBUTION SOLUTIONS Digital medium-voltage switchgear Benefits, offering and references Contents Digital switchgear for medium-voltage applications Digital switchgear definition
More informationThe Connected Water Plant. Immediate Value. Long-Term Flexibility.
The Connected Water Plant Immediate Value. Long-Term Flexibility. The Water Industry is Evolving Reliable, safe and affordable access to water is not solely on the minds of water and wastewater managers.
More informationIndustrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets
Industrial Cyber Security ICS SHIELD Top-down security for multi-vendor OT assets OT SECURITY NEED Industrial organizations are increasingly integrating their OT and IT infrastructures. The huge benefits
More informationAsia Clean Energy Forum, Manila
JUNE, 2018 Opportunities for Digitalization in Power Sector Asia Clean Energy Forum, Manila Yogendra Patwardhan Digitalization Field to Board room The need for faster decisions and increased business agility
More informationMicroSCADA Pro Substation automation applications.
G R I D AUTO M ATI O N PRO D U C T S Substation automation applications. ABB Oy Finland Power Grids Grid Automation P.O. Box 614 FI-65101 Vaasa, Finland Phone: +358 10 22 21999 (Customer Support Center)
More informationBack to the Future Cyber Security
Back to the Future Cyber Security A manifesto for Cyber Security and the Industrial Legacy Introduction Industrial facilities and infrastructure form the core of our economy and society. These advanced
More informationARC VIEW. Honeywell s New PLC Brings Digital Transformation to the ControlEdge. Keywords. Summary. The Edge and IIoT.
ARC VIEW AUGUST 3, 2017 Honeywell s New PLC Brings Digital Transformation to the ControlEdge By Craig Resnick Keywords IIoT, PLC, DCS, Digital Transformation, Mobility, OPC UA, Cybersecurity Summary IIoT
More informationNEXT GENERATION SECURITY OPERATIONS CENTER
DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting
More informationSECURING THE SUPPLY CHAIN
SECURING THE SUPPLY CHAIN BY Jerome Farquharson, CISSP, Donald Dustin Williams, PE, AND Courtney Buser The advance of smart grids, smart devices and increasingly interconnected systems provides exceptional
More informationSecuring the North American Electric Grid
SESSION ID: TECH-R02 Securing the North American Electric Grid Marcus H. Sachs, P.E. SVP and CSO North American Electric Reliability Corporation @MarcusSachs Critical Infrastructure s Common Denominator
More informationAT&T Endpoint Security
AT&T Endpoint Security November 2016 Security Drivers Market Drivers Online business 24 x 7, Always on Globalization Virtual Enterprise Business Process / IT Alignment Financial Drivers CapEx / OpEx Reduction
More informationSTANDARD ELECTRIC UNIVERSITY
STANDARD ELECTRIC UNIVERSITY Technical Classes Catalog 2018 Bringing YOU the training you asked for! WHAT? Standard Electric Supply Co. offers numerous training opportunities to keep our customers as up-todate
More informationThe current state of the electrical grid And the technologies that will enable its transformation
ABB POWER GRIDS The current state of the electrical grid And the technologies that will enable its transformation IEEE POWER & ENERGY SOCIETY - SUBSTATIONS COMMITTEE May 7-11 th Agenda State of the Industry
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationB O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N
B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N NERC Monitoring and Situational Awareness Conference Bonneville Power Administration Self-Monitoring:
More informationFault and outage management
WEBINAR, SEPTEMBER 2017 Distribution Automation for electrical grids Fault and outage management Alain Aurus, Theodoros Oikonomou, Yasmine Vögele Introduction Facility Management Use the detach button
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationPOWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security. Business, Opportunities and Risks
POWER-ONE ITALY, 5 TH JUNE 2018 Cloud, Big Data & Cyber Security Business, Opportunities and Risks Overview Cloud, Big Data & Cyber Security Summary Cloud: scalable, adaptable, cost effective but not under
More informationCYBER SECURITY AIR TRANSPORT IT SUMMIT
CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER
More informationIntroducing Cyber Observer
"Organizations are failing at early breach detection, with more than 92% of breaches undetected by the breached organization. The situation can be improved with stronger threat intelligence, the addition
More informationSubstation. Communications. Power Utilities. Application Brochure. Typical users: Transmission & distribution power utilities
Power Utilities Application Brochure Communications Typical users: Transmission & distribution power utilities For more than 30 years, RAD has worked closely with its worldwide energy utility customers
More informationReinvent Your 2013 Security Management Strategy
Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for
More informationNon-conventional instrument transformers Advanced GIS substations with IEC LE process bus
Non-conventional instrument transformers Advanced GIS substations with IEC 61850-9-2LE process bus Content Towards the digital GIS substations Optimized substation design NCIT for gas-insulated switchgears
More informationThe Information Age has brought enormous
Cyber threat to ships real but manageable KAI hansen, akilur rahman If hackers can cause laptop problems and access online bank accounts or credit card information, imagine the havoc they can wreak on
More informationAn Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist
An Overview of ISA-99 & Cyber Security for the Water or Wastewater Specialist Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Bryan L. Singer, CISM, CISSP, CAP
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationCyber Security Solutions Mitigating risk and enhancing plant reliability
P OW E R G E N E R AT I O N Cyber Security Solutions Mitigating risk and enhancing plant reliability 2 CYBER SECURITY SOLUTIONS MITIGATING RISK AND ENHANCING PLANT RELIABILITY Providing a roadmap to achieve
More informationSecuring the Internet of Things (IoT) at the U.S. Department of Veterans Affairs
Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber
More informationOctober 05, ECE 421 Session 12. Utility SCADA and Automation. Presented by: Chris Dyer
ECE 421 Session 12 October 05, 2017 Utility SCADA and Automation Presented by: Chris Dyer Utility SCADA & Automation Chris Dyer, P.E. BSEE University of Idaho, 1997 SCADA & Automation Engineer POWER Engineers,
More informationBoston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018
Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your
More informationSmart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center
Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the
More informationIndustrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017
Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017 Unrestricted Siemens 2017 usa.siemens.com/mia Table of contents Industrial
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationChristian Pinzon, ABB Power Grids The power of one solution for distributed busbar protection What s new in Relion REB500 version 8?
Christian Pinzon, ABB Power Grids The power of one solution for distributed busbar protection What s new in Relion REB500 version 8? Slide 1 4CAE000262 The power of one Presenter Christian Pinzon Global
More informationThiago Lopes Gerente Regional de Ventas Protección, Contról y Comunicaciones.
ABRIL 2017 Subestaciones Digitales Jornadas Técnicas ABB Thiago Lopes Gerente Regional de Ventas Protección, Contról y Comunicaciones. ABB Slide 1 ABB Digital Substations Thiago Lopes 36 años edad Brasileiro
More informationGUIDE. MetaDefender Kiosk Deployment Guide
GUIDE MetaDefender Kiosk Deployment Guide 1 SECTION 1.0 Recommended Deployment of MetaDefender Kiosk(s) OPSWAT s MetaDefender Kiosk product is deployed by organizations to scan portable media and detect
More informationPREPARE & PREVENT. The SD Comprehensive Cybersecurity Portfolio for Business Aviation
PREPARE & PREVENT The SD Comprehensive Cybersecurity Portfolio for Business Aviation SD CYBERSECURITY SERVICES At SD, security isn t a slogan, it is our culture. Just because you are in a business jet
More informationTHE TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED BUSINESS INTELLIGENCE SOLUTION BRIEF THE TRIPWIRE NERC SOLUTION SUITE A TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on
More informationNEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?
NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:
More informationPROTECTING MANUFACTURING and UTILITIES Industrial Control Systems
PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems Mati Epstein Global Sales Lead, Critical Infrastructure and ICS [Internal Use] for Check Point employees 1 Industrial Control Systems (ICS)/SCADA
More informationThe SANS Institute Top 20 Critical Security Controls. Compliance Guide
The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise
More information