Intro to the NERC/NIPC Indications, Analysis & Warnings Program

Size: px
Start display at page:

Download "Intro to the NERC/NIPC Indications, Analysis & Warnings Program"

Transcription

1 Intro to the NERC/NIPC Indications, Analysis & Warnings Program (IAW Program - Electric Power Sector) Before Seeing this Presentation, Make Sure Everyone Has a Copy of Each of the Following: Job Aid (NIPC Electric Utility Reporting for Unknown/Malicious Acts Impacting Operations) NIPC Electric Utility Incident Report NIPC Contact Information Sheet Participant Responsibilities 1

2 At the End of This Session, You Will: Know what the IAW Program is Have information needed to ensure your company is set up to participate in this program Have information needed to recognize & report applicable cyber/physical threats and incidents Know how to get additional information about this program What Do You Want to See? Part 1 - What is the IAW - EPS Part 2 - How do you Recognize & Respond to Cyber & Physical Acts of Sabotage Part 3 - How to get started in your company - and where to get more information about the NIPC IAW EPS 2

3 What is the IAW Program? A program developed because Industry & Government recognized the increased risk of physical & cyber threats Working independently, neither the government nor industries have enough financial or human resources to deal with the growing threat of physical/cyber attack The Electric Power participants are the most critical because all other industries and government rely upon electricity! Electric Utilities Are CRITICAL to Government and Other Critical Industries Telecom Gov t Electricity Transportation Banking & Finance Water Emergency Services 3

4 How Does the Program Work A company agrees to participate and distributes job aids and forms so employees know how to recognize & report incidents When there is an incident, you fill out a report, and send it to NIPC and NERC At the same time, NIPC is collecting data from numerous other organizations Industry experts review the data and look for trends - and send out warnings if warranted #1 NIPC Incident Report Report Incident InfraGard- - FAX- voice- Other Industries #2 NERC -SCIS posting - Incident Report - -auto page NERC Post on InfraGard - Warning Products NIPC Watch When You Recognize an Incident Draft warning product Coordinate w/industry Clear final final product (with NERC & Govt) Analysis & Warning Section FUSION Government Agencies Law Enforcement Internal NIPC 4

5 Utilities are Being Targeted! Deliberate cut of fiber optic line supporting SCADA control and other essential utility communications Alleged sabotage-improper mix of pellets in fuels fabricated for commercial nuclear plants Around 230,000 unauthorized attempts during one month to connect to company computers via the Internet Over 86,000 attempts from China! This is Just an Extension of Existing NERC Policy 5G - Reporting Acts of Sabotage Existing Policy 5G Criteria: Disturbances or unusual occurrences, suspected or determined to be caused by sabotage, shall be reported to the appropriate systems, government agencies and regulatory bodies Existing Policy 5G Requirements: Recognizing Sabotage Reporting Guidelines Contact with FBI and/or Royal Canadian Mounted Police 5

6 What are Benefits of IAW Program? Information sharing - you get more than just warnings Security trends & techniques Timely, accurate & actionable warnings Training tools to improve security & response to security violations Updates on new/revised programs and activities to minimize the impact of sabotage What Do You Want to See Next? Return to Part 1 - What is the IAW EPS Go to Part 2 - How to Recognize & Respond to Cyber & Physical Acts of Sabotage Go to Part 3 - How to get started in your company - and where to get more information about the NIPC IAW EPS 6

7 How do You Recognize Acts of Sabotage? Sabotage can look just like everyday abnormal operations - anything abnormal! Loss of a line or major piece of equipment Trip of a major unit Loss of EMS functionality Relay mis-operations Loss of RTU communication circuitry Incident Reporting Job Aid The Job Aid lists 15 different types of incidents and associated reporting thresholds Additional copies of the Job Aid are available from the NERC IAW EPS Web Page Ideally, you would have someone in your company ready to recognize and respond to each of these incidents - physical, cyber and operational - however don t wait for this before moving forward - start reporting operational incidents right now! 7

8 Job Aid for Recognizing Reportable Incidents NIPC Electric Utility Reporting for Unknown/Malicious Acts Impacting Operations Incident Incident Criteria Threshold 1 Loss of 500 MW of Generation 30 Min or Longer 2 Loss of 230 kv or Larger: Substation Transmission Line HV Tie Line Loss of any operationally essential line 60 Min or Longer What Kinds of Things Do You Report? If it impacts the electric system for the time period specified and: You know it is an act of sabotage OR You suspect it is an act of sabotage OR It might be an act of sabotage - but you don t have enough information to be sure 8

9 What Kinds of Things Should be Reported from Others in Your Company? Intelligence Gathering (People asking explicit questions about operations, software, telecommunications, etc.) Unauthorized physical surveillance Planting code in software used for your operating systems or market operations Intrusions into computer systems used to operate the electric system or markets Threats to security, software, operations, physical facilities There are Several Reporting Methods Security Coordinators can make their initial report through SCIS Members of InfraGard can report using the form resident on the electric power sector s portion of their web site The easiest is to use the Word Form from the NERC IAW Web page Fill in the applicable data and fax the form to NIPC AND NERC (Details on all reporting methods are available through the NERC IAW Web Page) 9

10 No Matter Which Reporting Method You Use - Both NIPC and NERC Need to Know... When you first become aware of the incident (Stage 1 Report - usually done by the System Operator) When you have more information (Stage 2 Report - usually done by someone other than the System Operator) When you resolve the incident (Stage 3 Report - usually done by someone other than the System Operator) (Sometimes the situation is resolved with the 2nd report - then you don t need to file a Stage 3 Report) How Long Does it Take to Fill Out a Report? Different reports at different stages of the process The biggest report probably doesn t take 3 minutes to complete! NIPC doesn t care if it isn t pretty - all they care about is receiving the data in the shortest time frame possible -the sooner they get the data, the better the chances they can fuse it with other data to prevent or minimize a disaster 10

11 NIPC Has 24/7 Desk NIPC has a 24/7 desk - like firefighters or system operators - just sitting there waiting for the fax machine to shoot out a new report It is better to make a timely report of an incident that MIGHT be caused by sabotage than to wait until you have all the facts - the information you provide could help one of your neighbor utilities! Which Reporting Method do You Want to Review? Return to Part 1 - What is the IAW EPS How to File a Report via SCIS How to File a Report via InfraGard How to File a Report via Fax or See Part 3 - How do you get started in your company - and where to get more information about the NIPC IAW EPS 11

12 What is the NERC SCIS? Security Coordinator Information System This "messaging" site is used by Security Coordinators to share information in a near-real-time environment. This includes TLR events, transmission and generation outages, Control Area ACE and Frequency, weather advisories, and known or suspected acts of physical or cyber sabotage. Access is login/password controlled and limited to Security Coordinators To File a CIP Incident Report

13

14 What Do You Want to See Next? Go Back to Part 1 - What is the IAW - EPS Go Back to Review Reporting Via SCIS See How to Report Via InfraGard See How to Report Via or Fax Part 3 - How do you get started in your company - and where to get more information about the NIPC IAW EPS What is InfraGard? Local Groups of Companies Working with the FBI, Committed to Sharing Security Information Locally as Well as Nationally via a Secure Link Local InfraGard: - ACE Bank - Ryder Trucking - E-biz - ABC Elec Co - Local FBI 14

15 15

16 16

17 17

18 18

19 19

20 20

21 21

22 22

23 23

24 24

25 What do You Want to See Next Go Back to Part 1 - What is the IAW - EPS Review Reporting Via SCIS Review Reporting Via InfraGard See How to Report Via or Fax Part 3 - How do you get started in your company - and where to get more information about the NIPC IAW EPS 25

26 File a NIPC Electric Utility Incident Report via Fax or Download or copy an incident report and have it partially completed before any incident occurs Faxing a report may be the quickest way to submit a report, because you don t have to sign onto a computer system to NIPC address on Incident Job Aid ( If your fax isn t working, or if you are stressed for time - or don t have an incident report form available - just call one of the NIPC voice mail numbers on the bottom of your Job Aid - there is always someone in the NIPC office! ACE Power Co John Smith Jsmith@acepower.com

27 ? Loss of Greene Sub supplying FEMA Seamus MD DC, MD Seamus Train Station 1 Gov t 27

28 NIPC Electric Utility Incident Report for Unknown/Malicious Acts Impacting Operations Section 3 Cyber Incident Data Obtains System/User Information Through Random Probes /Scans/Sniffers Identify Probe/Exploit by Name (if known if unknown, enter Unknown ) Date/time of occurrence Time Zone Network Address/Source Name (Only if external) # of Hits/period Target System Name/Platform: Target system Function Within Power Operations (Enter all that apply) EMS SCADA Substation Other Impact on Target System & Power Operations (Actual or Potential) Obtains Root, User or Mixed Access Causes Denial of Service Theft of Service/Theft of Information NIPC Electric Utility Incident Report for Unknown/Malicious Acts Impacting Operations Section 3 Cyber Incident Data, Continued Identify Probe/Exploit by Name (if known if unknown, enter Unknown Tool ) Date/time of occurrence Time Zone Network Address/Source Name (Only if external) # of hits/period Target System Name/Platform: Target system Function Within Power Operations (Enter all that apply) EMS SCADA Substation Other Impact on Target System & Power Operations (Actual or Potential) Removal/Modification /Corruption of System, User Data System Modification /Augmentation (malicious code insert, etc.) Identifies Critical System Supporting Power Operations 28

29 What Do You Want to See Now? Go Back to Part 1 - What is the IAW - EPS Review Reporting Via SCIS Review Reporting Via InfraGard Review Reporting Via or Fax Part 3 - How do you get started in your company - and where to get more information about the NIPC IAW EPS What you Need to Get Started in Your Company Contact Form for IAW - EPS (So NERC/NIPC know how to send you updates) Job Aid for Recognizing Reportable Incidents (So your employees know how to recognize Incidents ) NIPC Electric Utility Incident Report (So you have a form ready to fax to NIPC) Participant Responsibilities (To give to people in your organization) 29

30 Step 1 - Complete the NERC/NIPC Contact Information Form! Contact your Control Center Manager/Security Coordinator and see who will serve as your company s Main contact (usually Control Center Manager or Security Coordinator) Find out who else in your organization is willing to report cyber and physical threats Contact for IT Contact for Physical Security Send your contact information form to NERC Step 2 - Get Your Employees Ready to Recognize & Report Incidents! Let your employees see this PPT presentation Hand out copies of: Job Aid for Recognizing NIPC Reportable Incidents NIPC Incident Report Participant Responsibilities 30

31 Step 3 - Decide How to Communicate Incidents Within Your Company Who needs to recognize Incidents? Cyber, Physical, Operational Who will report Incidents? Cyber Contact, Physical Security Contact, System Operations Contact Who should receive notices from NIPC? Cyber Contact, Physical Security Contact, System Operations Contact When a message is received from NIPC, who should be notified? A Model for Internal Communications An An Incident Occurs: Notify: Cyber -Operators Event -Physical Sec Sec How would this work best for my company? Respond IAW Threshold? Yes Notify: -NIPC -NERC 31

32 A Model for Internal Communications An An Incident Occurs: How would this work best for my company? Physical Event Notify: -Operators -Cyber -Police/FBI Respond IAW Threshold? Yes Notify: -NIPC -NERC A Model for Internal Communications An An Incident Occurs: How would this work best for my company? Respond Operational Event Notify: -Security Coor Coor -Cyber -Physical IAW Threshold? Yes Notify: -NIPC -NERC 32

33 A Model for Internal Communications How would this work best for my company? Cyber Event Physical Event Operational Event Notify: -Operators -Physical Sec Sec Notify: -Operators -Cyber -Police/FBI Notify: -Security Coor Coor -Cyber -Physical Respond IAW Threshold? Yes Notify: -NIPC -NERC A Model for Internal Communications NIPC Issues a Warning: How would this work best for my company? Cyber Event Physical Event Notify: -Operators -Physical Sec Sec Notify: -Operators -Cyber -Police/FBI Respond Operational Event Notify: -Security Coor Coor -Cyber -Physical 33

34 More Info Available Through NERC Web Site Documents Providing Background on the IAW-EPS Details on all reporting methods Reports to distribute to other members of your company Forms to formally sign up to participate in the IAW-EPS Etc, Etc, Etc Review of Objectives Know what the IAW Program is Have information needed to ensure your company is set up to participate in this program Have information needed to recognize & report applicable cyber/physical threats and incidents Know how to get additional information about this program 34

35 Questions? 35

Critical Infrastructure

Critical Infrastructure Critical Infrastructure 1 Critical Infrastructure Can be defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics DRAFT February 19, 15 BES Security s Working Group Page 1 of 7 Chapter X Security Performance s 1 3 3 3 3 0 Background The State of Reliability 1 report noted that the NERC PAS was collaborating with the

More information

Security Standards for Electric Market Participants

Security Standards for Electric Market Participants Security Standards for Electric Market Participants PURPOSE Wholesale electric grid operations are highly interdependent, and a failure of one part of the generation, transmission or grid management system

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

Project Physical Security Directives Mapping Document

Project Physical Security Directives Mapping Document Document Background In Order No. 802 (final order on CIP-014-1 Physical Security), issued on November 20, 2014, FERC directed NERC to remove the term widespread from Reliability Standard CIP-014-1 or,

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010 Standard CIP 011 1 Cyber Security Protection Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes

More information

Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk

Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk Standards Certification Education & Training Publishing Conferences & Exhibits Steve Liebrecht W/WW Industry

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-6 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan

More information

Cyber Threats? How to Stop?

Cyber Threats? How to Stop? Cyber Threats? How to Stop? North American Grid Security Standards Jessica Bian, Director of Performance Analysis North American Electric Reliability Corporation AORC CIGRE Technical Meeting, September

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 9 Chapter X Security Performance Metrics Background For the past two years, the State of Reliability report has included a chapter for security performance

More information

Standard CIP Cyber Security Critical Cyber As s et Identification

Standard CIP Cyber Security Critical Cyber As s et Identification A. Introduction 1. Title: Cyber Security Critical Cyber Asset Identification 2. Number: CIP-002-4 3. Purpose: NERC Standards CIP-002-4 through CIP-009-4 provide a cyber security framework for the identification

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season IBERIA PARISH STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-5 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

2013 US State of Cybercrime Survey

2013 US State of Cybercrime Survey 2013 US State of Cybercrime Survey Unknown How 24 % Bad is the Insider Threat? Insiders 51% 2007-2013 Carnegie Mellon University Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting

More information

B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N

B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N B O N N E V I L L E A D M I N I S T R A T I O N B O N N E V I L L E P O W E R A D M I N I S T R A T I O N NERC Monitoring and Situational Awareness Conference Bonneville Power Administration Self-Monitoring:

More information

Standard Authorization Request Form

Standard Authorization Request Form Title of Proposed Standard Cyber Security Request Date May 2, 2003 SAR Requestor Information Name Charles Noble (on behalf of CIPAG) Company Telephone SAR Type (Check box for one of these selections.)

More information

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE Information Technology Services Administrative Regulation ITS-AR-1506 INFORMATION SECURITY-SECURITY INCIDENT RESPONSE 1.0 Purpose and Scope The purpose of the Security Response Administrative Regulation

More information

Control Systems Cyber Security Awareness

Control Systems Cyber Security Awareness Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security

More information

Cyber Security. June 2015

Cyber Security. June 2015 Cyber Security June 2015 Table of contents Section Pages Introduction and methodology 3 Key findings 4 Respondent profile 5-9 Cyber security practices 10-25 Resources for monitoring cyber security events

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Donor Credit Card Security Policy

Donor Credit Card Security Policy Donor Credit Card Security Policy INTRODUCTION This document explains the Community Foundation of Northeast Alabama s credit card security requirements for donors as required by the Payment Card Industry

More information

CIP V5 Implementation Study SMUD s Experience

CIP V5 Implementation Study SMUD s Experience CIP V5 Implementation Study SMUD s Experience Tim Kelley October 16, 2014 Powering forward. Together. SMUD Fast Facts General Information SMUD employs approximately 2,000 individuals Service area of 900

More information

Standard Development Timeline

Standard Development Timeline CIP-008-6 Incident Reporting and Response Planning Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard

More information

Employee Security Awareness Training

Employee Security Awareness Training Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical

More information

Standard EOP Disturbance Reporting

Standard EOP Disturbance Reporting A. Introduction 1. Title: Disturbance Reporting 2. Number: EOP-004-1 3. Purpose: Disturbances or unusual occurrences that jeopardize the operation of the Bulk Electric System, or result in system equipment

More information

Panel 1 National CSIRT Experience

Panel 1 National CSIRT Experience Panel 1 National CSIRT Experience 2 nd Meeting of Government Cybersecurity Practitioners Sao Paulo, Brazil September 14-16, 2005 Andrew McAllister Senior Advisor, Cyber Security Public Safety and Emergency

More information

DRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1

DRAFT. Cyber Security Communications between Control Centers. March May Technical Rationale and Justification for Reliability Standard CIP-012-1 DRAFT Cyber Security Communications between Control Centers Technical Rationale and Justification for Reliability Standard CIP-012-1 March May 2018 NERC Report Title Report Date I Table of Contents Preface...

More information

ELECTRIC UTILITY SECTOR PHYSICAL THREATS (DBT) & RESPONSE PLANNING

ELECTRIC UTILITY SECTOR PHYSICAL THREATS (DBT) & RESPONSE PLANNING ELECTRIC UTILITY SECTOR PHYSICAL THREATS (DBT) & RESPONSE PLANNING Helping to keep the lights on, businesses running and communities strong 1 Objectives The Utility Business has Changed Methodology Program

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Securing Industrial Control Systems

Securing Industrial Control Systems L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting

More information

Cybersecurity: Incident Response Short

Cybersecurity: Incident Response Short Cybersecurity: Incident Response Short August 2017 Center for Development of Security Excellence Contents Lesson 1: Incident Response 1-1 Introduction 1-1 Incident Definition 1-1 Incident Response Capability

More information

Standards Authorization Request Form

Standards Authorization Request Form Standards Authorization Request Form When completed, email this form to: sarcomm@nerc.com NERC welcomes suggestions to improve the reliability of the bulk power system through improved reliability standards.

More information

Standard CIP Cyber Security Critical Cyber As s et Identification

Standard CIP Cyber Security Critical Cyber As s et Identification A. Introduction 1. Title: Cyber Security Critical Cyber Asset Identification 2. Number: CIP-002-4 3. Purpose: NERC Standards CIP-002-4 through CIP-009-4 provide a cyber security framework for the identification

More information

Reliability Standard Audit Worksheet 1

Reliability Standard Audit Worksheet 1 Reliability Standard Audit Worksheet 1 CIP-002-5.1 Cyber Security BES Cyber System Categorization This section to be completed by the Compliance Enforcement Authority. Audit ID: Registered Entity: NCR

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies: ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications

More information

CIP V5 Updates Midwest Energy Association Electrical Operations Conference

CIP V5 Updates Midwest Energy Association Electrical Operations Conference CIP V5 Updates Midwest Energy Association Electrical Operations Conference May 2015 Bob Yates, CISSP, MBA Principal Technical Auditor ReliabilityFirst Corporation Agenda Cyber Security Standards Version

More information

OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY

OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY MEMORANDUM OF UNDERSTANDING between the MINISTERIO DE ELECTRICIDAD Y ENERGIA RENOVABLE DEL ECUADOR and the INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS POWER & ENERGY SOCIETY This Memorandum of Understanding

More information

Grid Security & NERC. Council of State Governments. Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016

Grid Security & NERC. Council of State Governments. Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016 Grid Security & NERC Council of State Governments The Future of American Electricity Policy Academy Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016 1965 Northeast blackout

More information

The Terrorism Threat to Physical Assets

The Terrorism Threat to Physical Assets The Terrorism Threat to Physical Assets S U B S T A T I O N A T T A C K A N D C O U N T E R M E A S U R E S Howard J. Somers, P.E. Vice President Loss Control / Division Head AEGIS Insurance Services,

More information

TechAdvantage March 5, Mark Peterson Supervisor of Operations Engineering. Ron Schmitz Manager of Information Services

TechAdvantage March 5, Mark Peterson Supervisor of Operations Engineering. Ron Schmitz Manager of Information Services TechAdvantage March 5, 2014 Mark Peterson Supervisor of Operations Engineering Ron Schmitz Manager of Information Services Agenda Great River Energy Overview Background on SCADA Background on IT Functions

More information

Lesson Learned CIP Version 5 Transition Program

Lesson Learned CIP Version 5 Transition Program Lesson Learned CIP Version 5 Transition Program CIP-002-5: BES Cyber Assets Version: December 7, 2015 This document is designed to convey lessons learned from NERC s various CIP version 5 transition activities.

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD) COUNCIL OF THE EUROPEAN UNION Brussels, 24 May 2013 Interinstitutional File: 2013/0027 (COD) 9745/13 TELECOM 125 DATAPROTECT 64 CYBER 10 MI 419 CODEC 1130 NOTE from: Presidency to: Delegations No. Cion

More information

Cyber Security Update. Bennett L. Gaines Senior Vice President, Corporate Services, CIO, FirstEnergy 2012 Summer Seminar August 5-7, 2012

Cyber Security Update. Bennett L. Gaines Senior Vice President, Corporate Services, CIO, FirstEnergy 2012 Summer Seminar August 5-7, 2012 Cyber Security Update Bennett L. Gaines Senior Vice President, Corporate Services, CIO, FirstEnergy 2012 Summer Seminar August 5-7, 2012 Agenda Timeline Regulatory / Compliance Environment Smart Grid Threats

More information

GridEx IV Panel Discussion

GridEx IV Panel Discussion GridEx IV Panel Discussion NERC GridSecCon October, 2016 1 Generation 254 GW Transmission Geography 120,000 Miles 22 States GridEx IV Panel Discussion Focus on Operations NERC GridSecCon October 20, 2016

More information

May SCADA Testbed Cyber-Security Evaluation. Iowa State University. Advisor: Members: Manimaran Govindarasu

May SCADA Testbed Cyber-Security Evaluation. Iowa State University. Advisor: Members: Manimaran Govindarasu Iowa State University SCADA Testbed Cyber-Security Evaluation Members: Justin Fitzpatrick Rafi Adnan Michael Higdon Ben Kregel Advisor: Manimaran Govindarasu May 1013 Project Overview Problem/Need statement

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015 Federal Energy Regulatory Commission Order No. 791 January 23, 2015 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently

More information

Communications and Electric Power Sectors:

Communications and Electric Power Sectors: Communications and Electric Power Sectors: Need for Common Situation Awareness and Tools DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid October 25, 2010 Daniel C. Hurley, Jr. Director,

More information

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE

NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE NATIONAL STRATEGY:- MALAYSIAN EXPERIENCE Devi Annamalai Security, Trust and Governance MCMC 28th August 2007 Hanoi. Vietnam BACKGROUND MCMC is a statutory body established under the Malaysian Communications

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

Control System Security SCADA/DCS. By Chaiyakorn Apiwathanokul,, CISSP Chief Security Officer PTT ICT Solutions Company Limited

Control System Security SCADA/DCS. By Chaiyakorn Apiwathanokul,, CISSP Chief Security Officer PTT ICT Solutions Company Limited Control System Security SCADA/DCS By Chaiyakorn Apiwathanokul,, CISSP Chief Security Officer PTT ICT Solutions Company Limited Objectives To understand the current situation and threats against Control

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

i-pcgrid Workshop 2014 PG&E Order No. 754 Analysis: Protection

i-pcgrid Workshop 2014 PG&E Order No. 754 Analysis: Protection i-pcgrid Workshop 2014 PG&E Order No. 754 Analysis: Protection 1 Process PG&E Order No. 754 Analysis Receive Bus List from Planning that Meet the Criteria in Table A Protection Computes Actual Clearing

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Aristotelis Tzafalias Programme Officer, Trust and Security DG Communications Networks,

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Railroad Infrastructure Security

Railroad Infrastructure Security TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

2015 Risk Element: Extreme Physical Events

2015 Risk Element: Extreme Physical Events 2015 Risk Element: Extreme Physical Events Industry Webinar October 15, 2015 Administrative Items NERC Antitrust Guidelines It is NERC s policy and practice to obey the antitrust laws fully and to avoid

More information

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response CYBER INCIDENT REPORTING GUIDANCE Industry Reporting Arrangements for Incident Response DfT Cyber Security Team CYBER@DFT.GSI.GOV.UK Introduction The Department for Transport (DfT) has produced this cyber

More information

PIPELINE SECURITY An Overview of TSA Programs

PIPELINE SECURITY An Overview of TSA Programs PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the

More information

NERCPI Regional Cyber Disruption Planning.

NERCPI Regional Cyber Disruption Planning. NERCPI Regional Cyber Disruption Planning www.newenglandrcpi.org Cyber Disruption Planning Catastrophic cyber planning is an evolving concept True emergencies vs. inconveniences Fully interconnected world

More information

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra

CIP-014. JEA Compliance Approach. FRCC Fall Compliance Workshop Presenter Daniel Mishra CIP-014 JEA Compliance Approach FRCC Fall Compliance Workshop Presenter Daniel Mishra Acronyms & Terminologies DHS Department of Homeland Security JEA It s not an acronym JSO Jacksonville Sheriff's Office

More information

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government

More information

SECURING THE SUPPLY CHAIN

SECURING THE SUPPLY CHAIN SECURING THE SUPPLY CHAIN BY Jerome Farquharson, CISSP, Donald Dustin Williams, PE, AND Courtney Buser The advance of smart grids, smart devices and increasingly interconnected systems provides exceptional

More information

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+ CompTIA Security Research Study 2007 Trends and Observations on Organizational Security Carol Balkcom, Product Manager, Security+ Goals of this session To share some trends and observations related to

More information

EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1,

EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1, EEI Fall 2008 Legal Conference Boston, Massachusetts Stephen M. Spina November 1, 2008 www.morganlewis.com Overview Reliability Standards Enforcement Framework Critical Infrastructure Protection (CIP)

More information

NFPA 3000 (PS) Standard for an Active Shooter / Hostile Event Response (ASHER) Program IT S A BIG WORLD. LET S PROTECT IT TOGETHER.

NFPA 3000 (PS) Standard for an Active Shooter / Hostile Event Response (ASHER) Program IT S A BIG WORLD. LET S PROTECT IT TOGETHER. NFPA 3000 (PS) Standard for an Active Shooter / Hostile Event Response (ASHER) Program IT S A BIG WORLD. LET S PROTECT IT TOGETHER. TM Active Shooter Incidents: 2000-2017 2 Active Shooter Incidents: 2016

More information

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Against Cyber Attacks (CODEF) Cyber Security of the

More information

OPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith

OPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith OPUC Workshop March 13, 2015 Cyber Security Electric Utilities Portland General Electric Co. Travis Anderson Scott Smith 1 CIP Version 5 PGE Implementation Understanding the Regulations PGE Attended WECC

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

ipcgrid 2015 March 26, 2015 David Roop Director Electric Transmission Operations Dominion Virginia Power

ipcgrid 2015 March 26, 2015 David Roop Director Electric Transmission Operations Dominion Virginia Power Substation Security and Resiliency Update on Accomplishments thus far ipcgrid 2015 March 26, 2015 David Roop Director Electric Transmission Operations Dominion Virginia Power Dominion Profile Leading provider

More information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

CIP Cyber Security Configuration Change Management and Vulnerability Assessments CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

NERC Overview and Compliance Update

NERC Overview and Compliance Update NERC Overview and Compliance Update Eric Ruskamp Manager, Regulatory Compliance August 17, 2018 1 Agenda NERC Overview History Regulatory Hierarchy Reliability Standards Compliance Enforcement Compliance

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014 Federal Energy Regulatory Commission Order No. 791 June 2, 2014 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently proposed

More information

PTLGateway Acceptable Use Policy

PTLGateway Acceptable Use Policy 1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS

More information

The Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security

The Office of Infrastructure Protection. Background. Purpose 6/13/2016. National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Measures for Public Gatherings Western Region Healthcare Emergency Preparedness

More information

Energy Security: A Global Challenge

Energy Security: A Global Challenge A presentation from the 2009 Topical Symposium: Energy Security: A Global Challenge Hosted by: The Institute for National Strategic Studies of The National Defense University 29-30 September 2009 By SCOTT

More information

DRAFT Risks and Mitigations for Losing EMS Functions

DRAFT Risks and Mitigations for Losing EMS Functions DRAFT Risks and Mitigations for Losing EMS Functions 1.0 Executive Summary Energy Management System (EMS) is a system of computer-aided tools used by System Operators to monitor, control, and optimize

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

Critical Asset Identification Methodology. William E. McEvoy Northeast Utilities

Critical Asset Identification Methodology. William E. McEvoy Northeast Utilities Critical Asset Identification Methodology William E. McEvoy Northeast Utilities Disclaimer This NPCC TFIST workshop provides a forum for the presentation and discussion of member experience in the implementation

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

Standard CIP-006-4c Cyber Security Physical Security

Standard CIP-006-4c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-4c 3. Purpose: Standard CIP-006-4c is intended to ensure the implementation of a physical security

More information

Heavy Vehicle Cyber Security Bulletin

Heavy Vehicle Cyber Security Bulletin Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin

More information

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry

More information

Alberta Reliability Standard Cyber Security Incident Reporting and Response Planning CIP-008-AB-5

Alberta Reliability Standard Cyber Security Incident Reporting and Response Planning CIP-008-AB-5 A. Introduction Consultation Draft April 5, 2016 1. Title: 2. Number: 3. Purpose: To mitigate the risk to the reliable operation of the bulk electric system as the result of a cyber security incident by

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Bradford J. Willke. 19 September 2007

Bradford J. Willke. 19 September 2007 A Critical Information Infrastructure Protection Approach to Multinational Cyber Security Events Bradford J. Willke 19 September 2007 Overview A framework for national Critical Information Infrastructure

More information

INFORMATION TECHNOLOGY POLICY

INFORMATION TECHNOLOGY POLICY COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF HUMAN SERVICES, INSURANCE AND AGING INFORMATION TECHNOLOGY POLICY Name Of Policy: Physical and Environmental Security Policy Domain: Security Date Issued: 06/09/11

More information

Supplemental Information

Supplemental Information Retirement of NPCC Directory# 3 Supplemental Information On April 1, 2015, NPCC Directory# 3 was retired upon the effective date of PRC-005-2 Protection System Maintenance which is subject to a 12 year

More information

Standard CIP-006-3c Cyber Security Physical Security

Standard CIP-006-3c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-3c 3. Purpose: Standard CIP-006-3 is intended to ensure the implementation of a physical security

More information