Smart Cities and Security. Security - 1
|
|
- Harry Benjamin Waters
- 6 years ago
- Views:
Transcription
1 Smart Cities and Security Security - 1
2 Where are we in 2013? Security - 2
3 Where are we in 2050? Security - 3
4 Our Topics Who is concerned? Security of the electric grid Security of the water supply Security of the medicine supply Cybersecurity Wrapup Security - 4
5 Who is concerned? National Climate Assessment AUG. 7, 2017 (4 th annual report) A final draft report by scientists from 13 federal agencies concludes that Americans are feeling the effects of climate change right now. The report was completed this year and is part of the National Climate Assessment, which is congressionally mandated every four years. Security - 5
6 Who is concerned about urban areas? Security - 6
7 Key Message 1: 11.Urban Systems, Infrastructure, and Vulnerability Climate change and its impacts threaten the well-being of urban residents in all U.S. regions. Essential infrastructure systems such as water, energy supply, and transportation will increasingly be compromised by interrelated climate change impacts. The nation s economy, security, and culture all depend on the resilience of urban infrastructure systems. Security - 7
8 Key Message 2: 11.Urban Systems, Infrastructure, and Vulnerability In urban settings, climate-related disruptions of services in one infrastructure system will almost always result in disruptions in one or more other infrastructure systems. Security - 8
9 Key Message 3: 11.Urban Systems, Infrastructure, and Vulnerability Climate vulnerability and adaptive capacity of urban residents and communities are influenced by pronounced social inequalities that reflect age, ethnicity, gender, income, health, and (dis)ability differences. Security - 9
10 Key Message 4: 11.Urban Systems, Infrastructure, and Vulnerability City government agencies and organizations have started adaptation plans that focus on infrastructure systems and public health. To be successful, these adaptation efforts require cooperative private sector and governmental activities, but face many barriers to implementing these combined efforts. Security - 10
11 Urban winter Security - 11
12 Urban power outage Security - 12
13 Urban sea power Security - 13
14 Urban flooding Security - 14
15 Who is concerned? Some individuals want to be prepared - Security - 15
16 Our Topics Who is concerned? Security of the electric grid Security of the water supply Security of the medicine supply Cybersecurity Wrapup Security - 16
17 Major sections of the national grid Security - 17
18 Security of the electric grid A grid that incorporates computing and communications intelligence unfortunately presents potential attackers with many new opportunities, requiring a holistic approach to security that takes hardware infrastructure and software into account. Security - 18
19 The emerging electric grid Bulk electric power system elements Supervisory Control And Data Acquisition (SCADA) system general layout Concept of a smart grid network Security - 19
20 Bulk electric power grid system elements Security - 20
21 SCADA system general layout Security - 21
22 Concept of a smart grid network Security - 22
23 Major types of vulnerability Physical vulnerability High-voltage transformer units Major towers in sparse areas Cyber vulnerability Disrupt electricity flow Transmit false data Disable protective systems Personnel vulnerability Security - 23
24 Damage management factors Increase system robustness Distributed generation Harden key sites Strong encryption, etc. Allow for graceful degradation Rapid subsystem isolation Skeleton operations Security - 24
25 Damage management factors Accelerate restoration of service Reserve equipment stocks Trained personnel on call Maintain critical services Water supplies and sewage Hospital services Police and fire services Traffic controls Security - 25
26 Our Topics Security of the electric grid Security of the water supply Security of the medicine supply Cybersecurity Smart Cities and security Security - 26
27 Security of the water supply The urban water crisis With more people living in cities than ever before, securing future water supplies is a matter of conservation. Water and terrorism How big is the risk? Security - 27
28 The urban water situation Large cities are facing both a rising demand for water in a time of (increasing) scarcity and threats to the quality of the water Security - 28
29 The urban water situation Improve quality by better management of watersheds Threats are erosion and sedimentation Threats are pollution from farms and ranches Threats come from discarded medicines in the urban water supply Security - 29
30 The urban water situation Example: northeast Ohio stormwater and watersheds // Example: Los Angeles Security - 30
31 Los Angeles River watershed Security - 31
32 Los Angeles water supplies Security - 32
33 Los Angeles Aqueduct The aqueduct was opened by chief engineer William Mulholland in He said we are here consecrating this water supply and dedicating the Aqueduct to you and your children and your children s children for all time. Security - 33
34 Water and terrorism: how big the risk? Attack the infrastructure: pumps, aqueducts, piping, treatment plants Attack water quality: poisons, diseasecausing agents Damage results from lack of clean water, which is a health risk; water so contaminated that it can cause death. Security - 34
35 Water and terrorism: how big the risk? Risk of massive social disruption Compared to other types of risks, water risk is not so high as an acute problem Security - 35
36 Our Topics Security of the electric grid Security of the water supply Security of the medicine supply Cybersecurity Smart Cities and security Security - 36
37 Security of our medicine supply US medicine supply is one of the safest in the world. But the supply chain is increasingly complex as it becomes more global. The US Food and Drug Administration (FDA) guards the integrity of our supply. What are some of the threats How widespread could the damage be? Security - 37
38 Threats to our medicine supply Counterfeiting Ranges from adulteration (lower impact) to danger of death Diversion of supplies Can distort markets by going to the highest bidder (esp. during crisis) Cargo theft Can result in dangerous short supplies (e.g., for hospitals) Security - 38
39 Our Topics Security of the electric grid Security of the water supply Security of the medicine supply Cybersecurity Smart Cities and security Security - 39
40 Cybersecurity NIST Tackles Cybersecurity in the Smart City: (National Institute for Standards and Technology). Cybersecurity issues: o Numerous points of attack o Exploitation of city data o Physical consequences o Data collection and transmission compromise Security - 40
41 Smart cities vulnerability Vulnerable energy system compromises fundamental operations Vulnerable IT system compromises o Mobility o Health o Infrastructure operations o Security (fire and police dispatch) Security - 41
42 Thanks for listening Security - 42
Critical Infrastructure
Critical Infrastructure 1 Critical Infrastructure Can be defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and
More informationDoug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017
Cyber Concerns of Local Government and What Does It Mean to Transportation Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017 Transportation and Infrastructure
More informationToward All-Hazards Security and Resilience for the Power Grid
Toward All-Hazards Security and Resilience for the Power Grid Juan Torres Associate Laboratory Director, Energy Systems Integration National Renewable Energy Laboratory December 6, 2017 1 Grid Modernization
More informationINTRODUCING RESILIENT LOS ANGELES
INTRODUCING RESILIENT LOS ANGELES Resilience is a value that guides everything we do in Los Angeles, because we know that the decisions we make today will shape the future our children and grandchildren
More informationSouth East Region THIRA
South East Region THIRA The THIRA follows a four-step process, as described in Comprehensive Preparedness Guide 201, Second Edition: 1. Identify the Threats and Hazards of Concern. Based on a combination
More informationStephanie Stuckey Chief Resilience Officer
Stephanie Stuckey Chief Resilience Officer Helping cities around the world become more resilient to the physical, social and economic challenges that are a growing part of the 21st century. 2 100RC MEMBER
More informationAn Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)
An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for
More informationEnergy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013
+ Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 Jeffrey R. Pillon, Director, Energy Assurance Programs National Association of State
More informationWritten Statement of. Timothy J. Scott Chief Security Officer The Dow Chemical Company
Written Statement of Timothy J. Scott Chief Security Officer The Dow Chemical Company Representing The Dow Chemical Company and the American Chemistry Council To the United States Senate Committee on Homeland
More informationCyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference
Cyber Security Experts Association of Nigeria (CSEAN) CYBER SECURE NIGERIA 2016 Conference Threat of Cyber- Terrorism to Critical Infrastructures Presented by Iyke Ezeugo Cyber-warfare Strategist Definitions
More informationControl Systems Cyber Security Awareness
Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical
More informationEPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS
EPRO Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS The Role of Systems Engineering in Addressing Black Sky Hazards
More informationPresented by Joe Burns Kentucky Rural Water Association July 19, 2005
Infrastructure Security for Public Water and Wastewater Utilities Presented by Joe Burns Kentucky Rural Water Association July 19, 2005 Public Health Security and Bioterrorism Preparedness and Response
More informationBCP At Bangkok Bank, Thailand
BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in
More information100 Resilient Cities. 15 June 2016 Sylvester Timothy Wong AICP LEED AP Assoc. AIA Vice President Strategies + Development Buildings + Places Asia
100 Resilient Cities 15 June 2016 Sylvester Timothy Wong AICP LEED AP Assoc. AIA Vice President Strategies + Development Buildings + Places Asia Urban Resilience The capacity of individuals, communities,
More informationBuilding Resilience to Disasters for Sustainable Development: Visakhapatnam Declaration and Plan of Action
Building Resilience to Disasters for Sustainable Development: Visakhapatnam Declaration and Plan of Action Adopted at the Third World Congress on Disaster Management Visakhapatnam, Andhra Pradesh, India
More informationShared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay
Shared Responsibility: Roles and Responsibilities in Emergency Management Geoff Hay Assistant Director General Office of State Security and Emergency Coordination Department of the Premier and Cabinet
More informationCritical Infrastructure Analysis and Protection - A Case for Secure Information Exchange. August 16, 2016
Critical Infrastructure Analysis and Protection - A Case for Secure Information Exchange Dennis Denham Ssempereza - CISA, CISM, CRISC August 16, 2016 About me! Involved in Risk Management and Security
More informationSecure Societies Work Programme Call
Secure Societies Work Programme 2018-2020 2019 Call Andrea DE CANDIDO Deputy Head of Unit Innovation and Industry for Security European Commission andrea.de-candido@ec.europa.eu Outline 1. Policy context
More informationAmerican Association of Port Authorities. Navigating the Cyber Domain. Homeland Security UNCLASSIFIED
American Association of Port Authorities Navigating the Cyber Domain Captain James Cash Deputy Director U.S. Coast Guard Cyber Command Vision & Mission VISION A safe, secure and resilient cyber operating
More informationCybersecurity Overview
Cybersecurity Overview DLA Energy Worldwide Energy Conference April 12, 2017 1 Enterprise Risk Management Risk Based: o Use of a risk-based approach for cyber threats with a focus on critical systems where
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More information2 1 S T C E NTURY INFRASTRUCTURE C OMMI S SION EXECUTIVE SUMMARY
2 1 S T C E NTURY INFRASTRUCTURE C OMMI S SION EXECUTIVE SUMMARY Prepared for Governor Rick Snyder The 21st Century Infrastructure Commission's research is composed of two major works: a full report and
More informationCalifornia Cybersecurity Integration Center (Cal-CSIC)
California Cybersecurity Integration Center (Cal-CSIC) Agenda Mission and Scope Whole of State Government Approach Where is the Cal-CSIC? Cal-CSIC Partners Attaining Cyber Maturity in Parallel Machine
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationSummary of Cyber Security Issues in the Electric Power Sector
Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov
More informationMulti-Sector Urban System Initiatives
Multi-Sector Urban System Initiatives Colin Harrison IBM Distinguished Engineer Emeritus colinh@us.ibm.com Regional Approaches to Urban Sustainability A National Academies Workshop Portland, OR May 28-29,
More informationCRITICAL INFRASTRUCTURE AND KEY RESOURCES
AGRICULTURE AND FOOD SECTOR The Agriculture and Food Sector has the capacity to feed and clothe people well beyond the boundaries of the nation. The sector is almost entirely under private ownership and
More informationCritical Infrastructure Resilience
Critical Infrastructure Resilience Climate Resilience Webinar Series U.S. Department of Housing and Urban Development Disclaimer This presentation is intended to provide communities and states with the
More informationNavigation and Vessel Inspection Circular (NVIC) 05-17; Guidelines for Addressing
This document is scheduled to be published in the Federal Register on 07/12/2017 and available online at https://federalregister.gov/d/2017-14616, and on FDsys.gov 9110-04-P DEPARTMENT OF HOMELAND SECURITY
More informationCyber Security in Europe
Cyber Security in Europe ENISA supporting the National Cyber Security Strategies An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer www.enisa.europa.eu Securing
More informationCybersecurity Risk Management:
Cybersecurity Risk Management: Building a Culture of Responsibility G7 ICT and Industry Multistakeholder Conference September 25 2017 Adam Sedgewick asedgewick@doc.gov Cybersecurity in the Department of
More informationExploring threats and opportunities through Mega Trends in the Space 4.0 era
Exploring threats and opportunities through Mega Trends in the Space 4.0 era ESA Mega Trends Team Gianluigi Baldesi 06/03/2018 Objectives of this initiative sharing global mega trends across the Agency
More informationCyber Resilience. Think18. Felicity March IBM Corporation
Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack
More informationRESILIENT AMERICA ROUNDTABLE: PARTNERING WITH COMMUNITIES TO BUILD RESILIENCE
RESILIENT AMERICA ROUNDTABLE: PARTNERING WITH COMMUNITIES TO BUILD PRESENTATION TO THE PUGET SOUND REGIONAL COUNCIL TRANSPORTATION POLICY BOARD SEATTLE, WA MARCH 10, 2016 RESILIENCE OF THE NATIONAL ACADEMIES
More informationAll-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011
All-Hazards Approach to Water Sector Security & Preparedness ANSI-HSSP Arlington, VA November 9, 2011 Copyright 2009 American Water Works Association Copyright 2011 American Water Works Association Security
More informationUnderstanding Holistic Effects of Cyber Events on Critical Infrastructure
Understanding Holistic Effects of Cyber Events on Critical Infrastructure Shane Cherry Infrastructure Analysis and Technology Development National and Homeland Security Directorate March 20, 2018 INL/CON-17-42513
More informationTHE LINK BETWEEN ENTERPRISE RISK MANAGEMENT AND DISASTER MANAGEMENT
THE LINK BETWEEN ENTERPRISE RISK MANAGEMENT AND DISASTER MANAGEMENT International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationCIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS. Overview of CIP in Australia
CIPMA CRITICAL INFRASTRUCTURE PROTECTION MODELLING & ANALYSIS Overview of CIP in Australia Greg Scott Leader, Critical Infrastructure Project Risk & Impact Analysis Group Geoscience Australia Greg.Scott@ga.gov.au
More informationEnhancing the cyber security &
Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities
More informationGujarat Forensic Sciences University
Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat
More informationThinking cities. Khalil Laaboudi. Smart & Sustainable Cities. Global Marketing
Thinking cities Khalil Laaboudi Smart & Sustainable Cities Global Marketing Thinking Cities -- Agenda I. Ericsson in the World and in Hong Kong II. III. IV. Networked Society and other global trends New
More informationCONE 2019 Project Proposal on Cybersecurity
CONE 2019 Project Proposal on Cybersecurity Project title: Comprehensive Cybersecurity Platform for Bangladesh and its Corporate Environments Sector or area: Cybersecurity for IT, Communications, Transportation,
More informationDon t Fail to Prepare for Failure Key Issues in Energy Assurance and Cybersecurity and Related NGA Center Activities
Don t Fail to Prepare for Failure Key Issues in Energy Assurance and Cybersecurity and Related NGA Center Activities Governors Energy Advisors Policy Institute June 24, 2016 Washington, DC Topics Threats
More informationIntroduction to Business Continuity Management
Introduction to Business Continuity Management Audio Presented by ABD s Occupational Health and Safety Team Featuring The Cross Connection JULY 24, 2018 Speaker Panel ABD Insurance & Financial Services
More informationToronto s Resilience Strategy. Preliminary Resilience Assessment DRIE December
Toronto s Resilience Strategy Preliminary Resilience Assessment DRIE December 12 2017 Purpose 1. Introduce Urban Resilience and the 100 Resilient Cities network 2. Share findings from our Preliminary Resilience
More informationCybersecurity for the Electric Grid
Cybersecurity for the Electric Grid Electric System Regulation, CIP and the Evolution of Transition to a Secure State A presentation for the National Association of Regulatory Utility Commissioners March
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationDISASTER RISK MANAGEMENT (DRM/DRR) TEAM
SPARC LABORATORY DISASTER RISK MANAGEMENT (DRM/DRR) TEAM Summary of Research Directions Presented by Sayanti Mukhopadhyay, PhD Candidate Date: 12/14/2016 Director: Makarand (Mark) Hastak, Ph.D., PE, CCP
More informationResilience for Installations and Communities
Resilience for Installations and Communities Threats to Power Systems FY 18 NDAA Definition Resilience: The ability to avoid or prepare for, minimize, adapt to, and recover from anticipated and unanticipated
More informationINTRODUCING RESILIENT LOS ANGELES
INTRODUCING RESILIENT LOS ANGELES Resilience is a value that guides everything we do in Los Angeles, because we know that the decisions we make today will shape the future our children and grandchildren
More informationPIPELINE SECURITY An Overview of TSA Programs
PIPELINE SECURITY An Overview of TSA Programs Jack Fox Pipeline Industry Engagement Manager Surface Division Office of Security Policy & Industry Engagement May 5, 2014 TSA and Pipeline Security As the
More informationThe J100 RAMCAP Method
The J100 RAMCAP Method 2012 ORWARN Conference Kevin M. Morley, PhD Security & Preparedness Program Manager AWWA--Washington, DC Water is Key to Daily Life Potable drinking water Sanitation Public Health
More informationAlternative Fuel Vehicles in State Energy Assurance Planning
+ Alternative Fuel Vehicles in State Energy Assurance Planning July 17, 2014 Webinar hosted by the National Association of State Energy Officials (NASEO), with support from the U.S. Department of Energy
More informationBusiness Continuity: How to Keep City Departments in Business after a Disaster
Business Continuity: How to Keep City Departments in Business after a Disaster Shannon Spence, PE Red Oak Consulting, an ARCADIS group Agenda Security, Resilience and All Hazards The Hazards Cycle and
More informationJune 5, 2018 Independence, Ohio
June 5, 2018 Independence, Ohio The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Securing the Nation at the Community Level 2018 Cuyahoga
More informationApplying Mitigation. to Build Resilient Communities
Applying Mitigation to Build Resilient Communities The Hazards Around Us Think about the natural hazard that... poses the greatest risk to where you live or work OR has had the greatest impact on you personally
More informationThe Water Sector Approach to Cybersecurity
The Water Sector Approach to Cybersecurity Standards Certification Education & Training Publishing Conferences & Exhibits Kevin M. Morley, PhD American Water Works Association 2016 ISA Water / Wastewater
More informationWELCOME TO A SILVER JACKETS WEBINAR ON:
WELCOME TO A SILVER JACKETS WEBINAR ON: Flood Vulnerability Assessment for Critical Facilities For audio, call 877-336-1839 Access code: 8165946 Security Code: 4567 MOLLY WOLOSZYN Extension Climate Specialist
More informationCybersecurity Vulnerabilities and Process Frameworks for Oil and Gas
Cybersecurity Vulnerabilities and Process Frameworks for Oil and Gas Presentation to WVONGA Jack L. Shaffer, Jr. Business Transformation Director vcio/ vciso 2017 Cybersecurity in the news Ransomware Wanacry,
More informationMax Security Solutions
Max Security Solutions Max Security Solutions Proactive Risk Management What we do Max Security provides comprehensive security and risk management solutions for the business sector, private clients and
More informationSharing of Information & Intelligence on the Importation & Transportation of Food
Sharing of Information & Intelligence on the Importation & Transportation of Food Dr. Sharon Thompson, Director Center for Agriculture & Food Security & Preparedness University of Tennessee College of
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 9 Chapter X Security Performance Metrics Background For the past two years, the State of Reliability report has included a chapter for security performance
More informationPublic and Private Interdependencies Filling a Gap in Most Continuity Plans
Public and Private Interdependencies Filling a Gap in Most Continuity Plans John A Jackson Executive Vice President Fusion Risk Management, Inc. The evolution of the continuity industrytechnology advancement
More informationThe CEO Water Mandate:
The CEO Water Mandate: 1) Managing Water in the Supply Chain 2) Transparency Stockholm, 21-22 August 2008 1 UN and Business: A Strengthening Partnership Business United Nations Growth & Returns Good Governance
More informationEuropean Union Agency for Network and Information Security
Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency
More informationH2020 Opportunities in the Area of Security and Critical Infrastructure Protection
H2020 Opportunities in the Area of Security and Critical Infrastructure Protection Angelo MARINO Head of Unit Security Research AIIC General Assembly Rome, 26/10/2013 NOT LEGALLY BINDING Outline The context:
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationDepartment of Homeland Security
Department of Homeland Security Science & Technology Directorate Emergency Preparedness & Response Christopher Doyle Deputy Program Director A Roadmap for Integrated Modeling & Simulation for Emergency
More informationPROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK
PROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK 23.11.2015 DEFINITION OF CRITICAL INFRASTRUCTURE US EU The nation's
More informationTrends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk
Trends in Cybersecurity in the Water Industry A Strategic Approach to Mitigate Control System Risk Standards Certification Education & Training Publishing Conferences & Exhibits Steve Liebrecht W/WW Industry
More informationNational Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015
National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the
More informationCREATE INNOVATION AT THE CORE
CREATE INNOVATION AT THE CORE Introduction From smart railway stations and connected lighting to high-speed train carriage WiFi and data security frameworks, Cisco CREATE (Collaborative Research and Emerging
More informationDelivering urban efficiency through collaboration. Today. 林美真
Delivering urban efficiency through collaboration. Today. 林美真 0918179366 veronica.lin.vlin@gmail.com Cities need to become smarter by becoming more efficient, more sustainable and more liveable Efficient
More informationFINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION
FINNISH APPROACH TO CRITICAL INFRASTRUCTURE PROTECTION Katri Liekkilä, M.M.Sc., M.Sc. (Econ) Special Adviser IMPROVER Operators workshop, Lisbon 2018 NATIONAL DOCUMENTS RELATED TO CIP SECURITY STRATEGY
More informationSecuring Industrial Control Systems
L OCKHEED MARTIN Whitepaper Securing Industrial Control Systems The Basics Abstract Critical infrastructure industries such as electrical power, oil and gas, chemical, and transportation face a daunting
More informationTop 10 ICS Cybersecurity Problems Observed in Critical Infrastructure
SESSION ID: SBX1-R07 Top 10 ICS Cybersecurity Problems Observed in Critical Infrastructure Bryan Hatton Cyber Security Researcher Idaho National Laboratory In support of DHS ICS-CERT @phaktor 16 Critical
More informationSecuring the Smart Grid. Understanding the BIG Picture 11/1/2011. Proprietary Information of Corporate Risk Solutions, Inc. 1.
Securing the Smart Grid Understanding the BIG Picture The Power Grid The electric power system is the most capital-intensive infrastructure in North America. The system is undergoing tremendous change
More informationFirewalls (IDS and IPS) MIS 5214 Week 6
Firewalls (IDS and IPS) MIS 5214 Week 6 Agenda Defense in Depth Evolution of IT risk in automated control systems Security Domains Where to put firewalls in an N-Tier Architecture? In-class exercise Part
More informationResolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]
United Nations A/RES/64/211 General Assembly Distr.: General 17 March 2010 Sixty-fourth session Agenda item 55 (c) Resolution adopted by the General Assembly on 21 December 2009 [on the report of the Second
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationEnergy Assurance Plans
Energy Assurance Plans funded through the American Reinvestment and Recovery Act (ARRA) - Stimulus $$ to help create jobs to enhance energy reliability and facilitate recovery from disruptions to the energy
More informationHigh performance monitoring & Control ACE3600 Remote Terminal Unit
High performance monitoring & Control ACE3600 Remote Terminal Unit Empower Your SCADA Network Utilities, now more than ever, are facing newer and greater hurdles. Multiple wired and wireless communication
More informationEmergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies:
Emergency Support Function #12 Energy Annex ESF Coordinator: Department of Energy Primary Agency: Department of Energy Support Agencies: Department of Agriculture Department of Commerce Department of Defense
More informationWorldcast Research M-PRESS
Worldcast Research M-PRESS Describing need and method for enhanced security in point-to-multipoint IP communications using SMART(p) technology By Ian A. Stewart Table of Contents Contents Forward... 1
More informationCyber Security: Threat and Prevention
Expand Your Horizons Webinar Series Cyber Security: Threat and Prevention February 24, 2015 1:00 1:45pm The Webinar will begin shortly. You can ask a question in the box on the right hand side. We will
More informationEnhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationLegislative Framework
Legislative Framework forcip in Austria Sylvia Mayer Federal Agency for State Protection and Counter Terrorism Damage of 21 transmission masts Development in Europe andaustria EU, 2005: EPCIP(European
More informationEMP and Our Food Infrastructure
EMP and Our Food Infrastructure EMPact America is: non-partisan non-profit grass roots, for citizens dedicated to instilling awareness among Americans and fostering protection of America from a man-made
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationAAPA Smart Ports. Cyber Management for Ports Panel. Small Port Cyber Security Workshops. March 6, 2018
AAPA Smart Ports Cyber Management for Ports Panel Small Port Cyber Security Workshops March 6, 2018 1200 New Jersey Ave., SE Washington DC 20590 w w w. d o t. g o v Port Infrastructure Development More
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationHow AlienVault ICS SIEM Supports Compliance with CFATS
How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal
More informationBrussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER
COUNCIL OF THE EUROPEAN UNION Brussels, 19 May 2011 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66 NOTE From : COREPER To: COUNCIL No Cion. prop.: 8548/11 TELECOM 40 DATAPROTECT 27 JAI 213 PROCIV38
More informationDigital solutions for water: linking the physical and digital world
Digital solutions for water: linking the physical and digital world Evdokia Achilleos Senior Project Adviser Horizon 2020 Environment and Resources Connected Smart Cities Conference 2018 Brussels, 11 January
More informationPortSec: A Port Security Risk Analysis and Resource Allocation System
PortSec: A Port Security Risk Analysis and Resource Allocation System Michael D. Orosz, Ph.D. Computer Scientist Lead, Decision Systems Group mdorosz@isi.edu 310-448-8266 Information Sciences Institute
More informationNATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC
NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable
More informationCritical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.
Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,
More information