Pipe Replacement & DIMP. Omni Hotel, Fort Worth, TX September 12, 2011

Size: px
Start display at page:

Download "Pipe Replacement & DIMP. Omni Hotel, Fort Worth, TX September 12, 2011"

Transcription

1 Pipe Replacement & DIMP AGA Management of Vintage Pipelines Workshop Omni Hotel, Fort Worth, TX September 12, 2011

2 Company Overview Atmos Energy serves 3.2 million customers in 12 States Atmos Energy provides natural gas marketing and procurement services to industrial, commercial and municipal customers in 22 states Atmos Energy manages company-owned owned natural gas pipeline and storage assets, including one of the largest intrastate natural gas pipeline systems in Texas 2

3 Service Territory 3

4 Historical Replacement Projects/Programs Mid-Tex early generation poly pipe replacement Mississippi cast iron replacement Georgia cast iron replacement Tennessee bare steel replacement Mid-Tex pre-bent riser replacement Mid-Tex steel service line replacement Kentucky bare steel Operational segment replacements 4

5 Atmos Energy DIM Program Leverage our expertise as an operator in conjunction with software tools to: 1. Identify risks to the integrity of our distribution infrastructure 2. Rank the risks 3. Designate measures to reduce or mitigate risk as appropriate (including pipe replacement) 5

6 Enterprise DIM Program Town level risk analysis (i.e. IP Bare Steel in Fort Worth) In-house software solution to aid in risk assessment Mathematical calculation; numerical score for each threat Risk = Likelihood (of a given threat causing a failure) x Consequence (impact in event of a failure) Calculation considers large volume of information from company databases and public sources Complements the assessment process of a local decision maker Local Subject Matter Expert (SME) identifies specific facilities/segments within given town 6

7 Texas Regulatory Requirements Federal (DOT CFR 192) State of Texas (TAC Title 16) State of Texas (TAC Title 16) Distribution Integrity Risk-Based Leak Distribution Facilities Management Plan Survey Replacement Identification of high risk facilities per Federal DIM Measures Operator takes to mitigate risk largely at our discretion Texas State Regulators promulgated rules that require Operator to take specific measures to mitigate risk Adjust survey frequency based on risk Replace service lines or 5% of high risk facilities Includes special accounting treatment for costs incurred 7

8 Atmos Energy Mid-Tex Division Acquired by Atmos Energy in M 1.5M customers Primarily serves North, Central, and East Texas 8

9 Service Line Replacement Replacing 100,000 steel service lines by September 2012 per agreements with cities Affecting 44 cities in Texas Approximately 1/5 th of steel service line inventory Verifying poly services tied to steel mains Replacing every steel service line on identified map sheets 9

10 Mid-Tex DIM Program Segment level risk analysis (i.e. IP Bare Steel along Houston St. from 11 th St. to 14 th St. in Fort Worth) Purchased commercially available software tool Groups segments of pipe by physical and operational characteristics Mathematical calculation; consolidated numerical score for all threats Numerical Risk Score = Likelihood (of a failure from all threats) x Consequence (impact in event of a failure) Calculation considers large volume of information from company databases and public sources Aids assessment process for the local decision maker by performing preliminary identification of facilities based on risk Local Subject Matter Expert (SME) reviews facilities identified by the tool and adds other facilities based on local knowledge 10

11 Mid-Tex DIM Project Pool Mid-Tex DIM Program establishes a pool of piping segments with indications of risk that will be tracked and are candidates for replacement under Texas Rule DIM/Risk-based replacements scoped around identified segments Risk may not be constrained to exact footage identified; conversely, risk may only affect a small portion of the footage identified Variety of references and exhibits prepared to increase awareness of the locations of identified segments and those slated for replacement for use by field personnel, management, engineers, etc. Recognize that we need to be responsive to discoveries in the field and/or changing conditions 11

12 Questions & Comments? THANKS FOR YOUR ATTENTION! Lance Andrews Director, Operations Atmos Energy Mid-Tex Division Andrew Marshall, P.E. Manager, Compliance Atmos Energy Mid-Tex Division 12

Overview of PECO s Distribution Integrity Management Plan

Overview of PECO s Distribution Integrity Management Plan Overview of PECO s Distribution Integrity Management Plan PUC Gas Safety Seminar September 8, 2016 David Bonner, PE Robert Ridgeway, PE Agenda PECO Distribution System Overview DIMP Pillar #1 DIMP DIMP

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Risk Assessment ID.RA

Information Technology Security Plan Policies, Controls, and Procedures Identify Risk Assessment ID.RA Information Technology Security Plan Policies, Controls, and Procedures Identify Risk Assessment ID.RA Information Security Policy and Procedures Identify Risk Assessment ID.RA Table of Contents Identify

More information

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY

EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY EMERGENCY SUPPORT FUNCTION (ESF) 13 PUBLIC SAFETY AND SECURITY PRIMARY AGENCY: SUPPORT AGENCIES: Savannah-Chatham Metropolitan Police Department Armstrong-Atlantic Campus Police Department Bloomingdale

More information

Technology Solutions Group Specialized Real Estate Services

Technology Solutions Group Specialized Real Estate Services COLLIERS INTERNATIONAL Technology Solutions Group Specialized Real Estate Services Accelerating success. Colliers International Technology Solutions P. 1 This document has been prepared by Colliers International

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

Improving the Security of Radioactive Sources in Industrial Radiography in South East Asia

Improving the Security of Radioactive Sources in Industrial Radiography in South East Asia Improving the Security of Radioactive Sources in Industrial Radiography in South East Asia Presented by Andrew Popp Regional Security of Radioactive Sources Project Andrew Popp, Allan Murray 13 th International

More information

ORA DATA REQUEST ORA-SCG-072-NS4 SOCALGAS 2019 GRC A SOCALGAS RESPONSE DATE RECEIVED: JANUARY 5, 2018 DATE RESPONDED: JANUARY 22, 2018

ORA DATA REQUEST ORA-SCG-072-NS4 SOCALGAS 2019 GRC A SOCALGAS RESPONSE DATE RECEIVED: JANUARY 5, 2018 DATE RESPONDED: JANUARY 22, 2018 Exhibit Reference: Ex. SCG-14 SCG Witness: Martinez Subject: TIMP/DIMP Please provide the following: ORA DATA REQUEST 1. Please provide a list of all DIMP PAARs (Programs/Projects to Address Risk) that

More information

Agenda. TÜV Secure it GmbH short introduction. Risk Analysis Case Study. Certification Procedure. w w w. t u v. c o m 2/ 18. TÜV Secure it GmbH 2003

Agenda. TÜV Secure it GmbH short introduction. Risk Analysis Case Study. Certification Procedure. w w w. t u v. c o m 2/ 18. TÜV Secure it GmbH 2003 Agenda TÜV Secure it GmbH short introduction Risk Analysis Case Study Certification Procedure 2/ 18 Let TÜV Secure it Be Your Guide Who we are. Subsidiary of TÜV Rheinland Group TÜV Secure it: Specialists

More information

Information Technology Procedure IT 3.4 IT Configuration Management

Information Technology Procedure IT 3.4 IT Configuration Management Information Technology Procedure IT Configuration Management Contents Purpose and Scope... 1 Responsibilities... 1 Procedure... 1 Identify and Record Configuration... 2 Document Planned Changes... 3 Evaluating

More information

Table of Contents. Sample

Table of Contents. Sample TABLE OF CONTENTS... 1 CHAPTER 1 INTRODUCTION... 4 1.1 GOALS AND OBJECTIVES... 5 1.2 REQUIRED REVIEW... 5 1.3 APPLICABILITY... 5 1.4 ROLES AND RESPONSIBILITIES SENIOR MANAGEMENT AND BOARD OF DIRECTORS...

More information

The City of St. Petersburg (City) initiated

The City of St. Petersburg (City) initiated FWRJ Remote Facility Condition Inspections and Subsequent Integration into the City of St. Petersburg s Asset Management Program Laura Baumberger, Robert Labrie, and Rebecca Overacre The City of St. Petersburg

More information

01.0 Policy Responsibilities and Oversight

01.0 Policy Responsibilities and Oversight Number 1.0 Policy Owner Information Security and Technology Policy Policy Responsibility & Oversight Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 1. Policy Responsibilities

More information

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:

More information

Threat and Vulnerability Assessment Tool

Threat and Vulnerability Assessment Tool TABLE OF CONTENTS Threat & Vulnerability Assessment Process... 3 Purpose... 4 Components of a Threat & Vulnerability Assessment... 4 Administrative Safeguards... 4 Logical Safeguards... 4 Physical Safeguards...

More information

Physical Security Reliability Standard Implementation

Physical Security Reliability Standard Implementation Physical Security Reliability Standard Implementation Attachment 4b Action Information Background On March 7, 2014, the Commission issued an order directing NERC to submit for approval, within 90 days,

More information

Control Systems Cyber Security Awareness

Control Systems Cyber Security Awareness Control Systems Cyber Security Awareness US-CERT Informational Focus Paper July 7, 2005 Produced by: I. Purpose Focus Paper Control Systems Cyber Security Awareness The Department of Homeland Security

More information

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets. REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January

More information

Alternative Fuel Vehicles in State Energy Assurance Planning

Alternative Fuel Vehicles in State Energy Assurance Planning + Alternative Fuel Vehicles in State Energy Assurance Planning July 17, 2014 Webinar hosted by the National Association of State Energy Officials (NASEO), with support from the U.S. Department of Energy

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

Enterprise GRC Implementation

Enterprise GRC Implementation Enterprise GRC Implementation Our journey so far implementation observations and learning points Derek Walker Corporate Risk Manager National Grid 1 Introduction to National Grid One of the world s largest

More information

ASSET INTEGRITY & CORROSION CONTROL.

ASSET INTEGRITY & CORROSION CONTROL. 1 ASSET INTEGRITY & CORROSION CONTROL 2 THE VALUE OF EXCELLENCE MEARS TURNKEY SERVICES Mears Integrity Solutions provides turnkey prevention, inspection, and remediation services. Corrosion prevention

More information

Statement for the Record

Statement for the Record Statement for the Record of Seán P. McGurk Director, Control Systems Security Program National Cyber Security Division National Protection and Programs Directorate Department of Homeland Security Before

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

ITG. Information Security Management System Manual

ITG. Information Security Management System Manual ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005

More information

The Chuandongbei Gas Project

The Chuandongbei Gas Project The Chuandongbei Gas Project Dr. Min Chen Vice President Chevron China Energy Company September 2016 Project Overview 30-year Production Sharing Contract (PSC) signed between Unocal East China Sea, Ltd.

More information

NW NATURAL CYBER SECURITY 2016.JUNE.16

NW NATURAL CYBER SECURITY 2016.JUNE.16 NW NATURAL CYBER SECURITY 2016.JUNE.16 ADOPTED CYBER SECURITY FRAMEWORKS CYBER SECURITY TESTING SCADA TRANSPORT SECURITY AID AGREEMENTS CONCLUSION QUESTIONS ADOPTED CYBER SECURITY FRAMEWORKS THE FOLLOWING

More information

Transportation Security Risk Assessment

Transportation Security Risk Assessment Transportation Security Risk Assessment Presented to: Nuclear Waste Technical Review Board Presented by: Nancy Slater Thompson Office of National Transportation October 13, 2004 Salt Lake City, Utah Introduction

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Gas Infrastructure Europe. Security Risk Assessment Methodology

Gas Infrastructure Europe. Security Risk Assessment Methodology Gas Infrastructure Europe Security Risk Assessment Methodology May 2015 Introduction Gas Infrastructure Europe (GIE) is an association representing the interests of European natural gas infrastructure

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Security techniques Information security management guidelines for financial services

ISO/IEC TR TECHNICAL REPORT. Information technology Security techniques Information security management guidelines for financial services TECHNICAL REPORT ISO/IEC TR 27015 First edition 2012-12-01 Information technology Security techniques Information security management guidelines for financial services Technologies de l'information Techniques

More information

CIP Standards Development Overview

CIP Standards Development Overview CIP Standards Development Overview CSSDTO706 Meeting with FERC Technical Staff July 28, 2011 Objectives Historical Timeline CIP-002-4 CIP-005-4 CIP Version 5 2 Project 2008-06 Overview FERC Order 706 SDT

More information

Emergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies:

Emergency Support Function #12 Energy Annex. ESF Coordinator: Support Agencies: Emergency Support Function #12 Energy Annex ESF Coordinator: Department of Energy Primary Agency: Department of Energy Support Agencies: Department of Agriculture Department of Commerce Department of Defense

More information

Department of Management Services REQUEST FOR INFORMATION

Department of Management Services REQUEST FOR INFORMATION RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President

More information

Critical Infrastructure Protection Version 5

Critical Infrastructure Protection Version 5 Critical Infrastructure Protection Version 5 Tobias Whitney, Senior CIP Manager, Grid Assurance, NERC Compliance Committee Open Meeting August 9, 2017 Agenda Critical Infrastructure Protection (CIP) Standards

More information

ERO Reliability Risk Priorities Report. Peter Brandien, RISC Chair Member Representatives Committee Meeting November 1, 2016

ERO Reliability Risk Priorities Report. Peter Brandien, RISC Chair Member Representatives Committee Meeting November 1, 2016 ERO Reliability Risk Priorities Report Peter Brandien, RISC Chair Member Representatives Committee Meeting November 1, 2016 RISC s Proposed 2016 Risk Profiles Changing Resource Mix Bulk Power System Planning

More information

Mississippi Emergency Support Function #12 Energy Annex

Mississippi Emergency Support Function #12 Energy Annex ESF #12 Coordinator Mississippi Public Utilities Staff Primary Agencies Mississippi Public Utilities Staff Support Agencies Mississippi Emergency Management Agency Mississippi Public Service Commission

More information

European Responsible Care Forum. Security & Safe Maintenance

European Responsible Care Forum. Security & Safe Maintenance European Responsible Care Forum Security & Safe Maintenance Brussels, Thursday 7 April 2011 Mike Zeegers - Director Europe Agenda: History IMPROVE PROJECT To enhance Secure infrastructure Objective of

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

Internal Audit Report. Electronic Bidding and Contract Letting TxDOT Office of Internal Audit

Internal Audit Report. Electronic Bidding and Contract Letting TxDOT Office of Internal Audit Internal Audit Report Electronic Bidding and Contract Letting TxDOT Office of Internal Audit Objective Review of process controls and service delivery of the TxDOT electronic bidding process. Opinion Based

More information

How to Conduct a Business Impact Analysis and Risk Assessment

How to Conduct a Business Impact Analysis and Risk Assessment How to Conduct a Business Impact Analysis and Risk Assessment By Larry Pedrazoli Business Recovery Analyst Miller Brewing Company February 2006 Project Management Institute, La Crosse, WI Chapter Agenda

More information

Chemical Facility Anti- Terrorism Standards

Chemical Facility Anti- Terrorism Standards SATA Presentation Regarding Chemical Facility Anti- Terrorism Standards Joe Hartline, CHMM Rindt-McDuff Associates Marietta, Georgia October 6, 2007 Presentation Outline Introduction Rule Requirements

More information

Business Continuity: How to Keep City Departments in Business after a Disaster

Business Continuity: How to Keep City Departments in Business after a Disaster Business Continuity: How to Keep City Departments in Business after a Disaster Shannon Spence, PE Red Oak Consulting, an ARCADIS group Agenda Security, Resilience and All Hazards The Hazards Cycle and

More information

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance

More information

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS Information Technology Shared Service Team North Dakota Cyber Security Across North Dakota Threats and Opportunities 15 September 2018 EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS AGENDA SIRN / FirstNet

More information

Information Technology Branch Organization of Cyber Security Technical Standard

Information Technology Branch Organization of Cyber Security Technical Standard Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:

More information

CA ELAP Expert Review Panel Meeting January 31, EPA Perspective: Effective Laboratory Certification Program Implementation

CA ELAP Expert Review Panel Meeting January 31, EPA Perspective: Effective Laboratory Certification Program Implementation CA ELAP Expert Review Panel Meeting January 31, 2017 EPA Perspective: Effective Laboratory Certification Program Implementation Daniel P. Hautman, Deputy Director Technical Support Center Cincinnati, OH

More information

The Convergence of Security and Compliance

The Convergence of Security and Compliance ebook The Convergence of Security and Compliance How Next Generation Endpoint Security Manages 5 Core Compliance Controls Table of Contents Introduction....3 Positive versus Negative Application Security....3

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

Intelligent Enterprise meets Science of Where. Anand Raisinghani Head Platform & Data Management SAP India 10 September, 2018

Intelligent Enterprise meets Science of Where. Anand Raisinghani Head Platform & Data Management SAP India 10 September, 2018 Intelligent Enterprise meets Science of Where Anand Raisinghani Head Platform & Data Management SAP India 10 September, 2018 Value The Esri & SAP journey Customer Impact Innovation Track Record Customer

More information

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA

The Experience of Generali Group in Implementing COBIT 5. Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA The Experience of Generali Group in Implementing COBIT 5 Marco Salvato, CISA, CISM, CGEIT, CRISC Andrea Pontoni, CISA Generali Group at a glance Let me introduce myself Marco Salvato CISA, CISM, CGEIT,

More information

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network Critical Infrastructure Protection for the Energy Industries Building Identity Into the Network Executive Summary Organizations in the oil, gas, and power industries are under increasing pressure to implement

More information

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21 National and Cyber Security Branch Presentation for Gridseccon Quebec City, October 18-21 1 Public Safety Canada Departmental Structure 2 National and Cyber Security Branch National and Cyber Security

More information

RELIABILITY OF THE BULK POWER SYSTEM

RELIABILITY OF THE BULK POWER SYSTEM RELIABILITY OF THE BULK POWER SYSTEM Jim Burley, VP of Compliance, Mitigation and Standards October 26, 2011 Promoting RELIABILITY and Mitigating RISKS to the Bulk Power System Context In the Beginning-2003

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

RCMP Capital Improvements

RCMP Capital Improvements Prepared by: D. R. Duckworth, Corporate Services and Community Safety Director Improvements_BUS_1.docx Executive Summary This business case seeks approval for additional funding of $1,000,000 for capital

More information

Breaking Through the Cloud: A LABORATORY GUIDE TO CLOUD COMPUTING

Breaking Through the Cloud: A LABORATORY GUIDE TO CLOUD COMPUTING Breaking Through the Cloud: A LABORATORY GUIDE TO CLOUD COMPUTING Seeing these IT issues/challenges in your laboratory? Balancing the cost of purchasing, housing, implementing and maintaining servers with

More information

Influence and Implementation

Influence and Implementation Influence and Implementation Wes Earnest April 2017 GSEC/GCIA/GCIH/ GWAPT/GPEN/GCCC/GSNA/ PMP/CISA/CISM/CGEIT SANS Technology Institute - Candidate for Master of Science Degree 1 1 Objective What does

More information

KIPDA ITS Architecture Update Kick-off Meeting

KIPDA ITS Architecture Update Kick-off Meeting KIPDA ITS Architecture Update Kick-off Meeting September 8. 2016 Agenda Overview Intelligent Transportation Systems ITS Architectures Purpose & Limits Development Tasks Review of Current Architecture-

More information

Subsea Performance Bolt Workshop

Subsea Performance Bolt Workshop Subsea Performance Bolt Workshop API Spec Q1, Specification for Quality Management System Requirements for Manufacturing Organizations for the Petroleum and Natural Gas Industry, 9 th Edition API Spec

More information

HPE Data Center Operations Consulting Service

HPE Data Center Operations Consulting Service Data sheet HPE Data Center Operations Consulting Service HPE Packaged Consulting Services Data centers are large-scale capital investments that may not meet their capacity, availability, and operational

More information

ITC HOLDINGS, CORP. Edison Electric Institute 9

ITC HOLDINGS, CORP. Edison Electric Institute 9 ITC HOLDINGS, CORP. Company Background: ITC Holdings, Corp. is in the business of investing in electricity transmission infrastructure as a means to improve electric reliability, connect renewable energy

More information

TRB WORKSHOP ON CRITICAL INFRASTRUCTURE PROTECTION: A NATIONAL PRIORITY

TRB WORKSHOP ON CRITICAL INFRASTRUCTURE PROTECTION: A NATIONAL PRIORITY TRB WORKSHOP ON CRITICAL INFRASTRUCTURE PROTECTION: A NATIONAL PRIORITY Summary Report SUNDAY, JANUARY 13, 2002 1:30 5:00 P.M. OMNI SHOREHAM HOTEL WASHINGTON, D.C. W27 Critical Infrastructure Protection

More information

CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management

CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management Instructor: Dr. Kun Sun Outline 1. Risk management 2. Standards on Evaluating Secure System 3. Security Analysis using Security Metrics

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

ITG. Information Security Management System Manual

ITG. Information Security Management System Manual ITG Information Security Management System Manual This manual describes the ITG Information Security Management system and must be followed closely in order to ensure compliance with the ISO 27001:2005

More information

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 + Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013 Jeffrey R. Pillon, Director, Energy Assurance Programs National Association of State

More information

DEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for

DEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for DEPARTMENT OF HEALTH and HUMAN SERVICES HANDBOOK for FEDERAL ACQUISITION CERTIFICATION PROGRAM/PROJECT MANAGERS Issuer Office of the Secretary Office of the Assistant Secretary for Financial Resources

More information

Privacy Data Sheet. This Privacy Data Sheet describes the processing of personal data (or personal identifiable information) by Cisco Threat Grid.

Privacy Data Sheet. This Privacy Data Sheet describes the processing of personal data (or personal identifiable information) by Cisco Threat Grid. Cisco Privacy Data Sheet This Privacy Data Sheet describes the processing of personal data (or personal identifiable information) by Cisco Threat Grid. Overview of Cisco Capabilities Cisco offers a cloud

More information

Internal Controls Evaluation (ICE) Processing

Internal Controls Evaluation (ICE) Processing Internal Controls Evaluation (ICE) September 28, 2017 RAM-102 3000 Bayport Drive, Suite 600 Tampa, Florida 33607-8411 (813) 289-5644 - Phone (813) 289-5646 Fax www.frcc.com Table of Contents Page 3 of

More information

BALTIMORE UTILITY ASSET MANAGEMENT DIVISION

BALTIMORE UTILITY ASSET MANAGEMENT DIVISION BALTIMORE UTILITY ASSET MANAGEMENT DIVISION Baltimore City s Asset Management Program Sustainable Best Management Practices in Transportation Workshop July 16, 2013 Rudy S. Chow, P.E. Bureau Head Alfred

More information

ELECTRICAL ENGINEERING & INSTRUMENTATION MECHANICAL ENGINEERING BIOLOGICAL & INDUSTRIAL ENGINEERING NUCLEAR ENGINEERING STRUCTURAL & CIVIL

ELECTRICAL ENGINEERING & INSTRUMENTATION MECHANICAL ENGINEERING BIOLOGICAL & INDUSTRIAL ENGINEERING NUCLEAR ENGINEERING STRUCTURAL & CIVIL ELECTRICAL ENGINEERING & INSTRUMENTATION MECHANICAL ENGINEERING BIOLOGICAL & INDUSTRIAL ENGINEERING NUCLEAR ENGINEERING STRUCTURAL & CIVIL ENGINEERING SYSTEMS INTEGRATION ELECTRONIC DATA MANAGEMENT PROJECT

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

Intelligent Risk Identification and Analysis in IT Network Systems

Intelligent Risk Identification and Analysis in IT Network Systems Intelligent Risk Identification and Analysis in IT Network Systems Masoud Mohammadian University of Canberra, Faculty of Information Sciences and Engineering, Canberra, ACT 2616, Australia masoud.mohammadian@canberra.edu.au

More information

Best Practices for Campus Security. January 26, 2017

Best Practices for Campus Security. January 26, 2017 Best Practices for Campus Security January 26, 2017 Welcome to Safe University (Safe U ) Protecting People, Property, and Tradition: The Safe University (Safe U SM ) Program By G. Michael Verden, Owner

More information

DLTD S COMMUNITY SERVICES MANUAL DRUMMOND LTD. USER SERVICES CENTER. Calle 4 N La Loma Office SENA facilities La Jagua de Ibirico

DLTD S COMMUNITY SERVICES MANUAL DRUMMOND LTD. USER SERVICES CENTER. Calle 4 N La Loma Office SENA facilities La Jagua de Ibirico DLTD S COMMUNITY SERVICES MANUAL DRUMMOND LTD. USER SERVICES CENTER Calle 4 N 4-104 La Loma 5533244 Office SENA facilities La Jagua de Ibirico Cesar Department, Colombia Colombia, 2013 TABLE OF CONTENTS

More information

Compliance Program Design Lessons learned from a COSO framework

Compliance Program Design Lessons learned from a COSO framework Compliance Program Design Lessons learned from a COSO framework Joseph Walsh President, Legacy Detroit Medical Center Christina DuVall Corporate Compliance Director CMS Overview Electric Gas Combination

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

Federal Civilian Executive branch State, Local, Tribal, Territorial government (SLTT) Private Sector (PS) Unclassified / Business Networks

Federal Civilian Executive branch State, Local, Tribal, Territorial government (SLTT) Private Sector (PS) Unclassified / Business Networks Brownsville Public Utilities Board Cyber Security Initiative A result of the BPUB IT Strategic Plan implemented a Cyber Security Framework (CSF) that utilizes : Security standards Tools and Best practices

More information

ABB Ability Cyber Security Services Protection against cyber threats takes ability

ABB Ability Cyber Security Services Protection against cyber threats takes ability ABB Ability Cyber Security Services Protection against cyber threats takes ability In today s business environment, cyber security is critical for ensuring reliability of automation and control systems.

More information

Advanced IT Risk, Security management and Cybercrime Prevention

Advanced IT Risk, Security management and Cybercrime Prevention Advanced IT Risk, Security management and Cybercrime Prevention Course Goal and Objectives Information technology has created a new category of criminality, as cybercrime offers hackers and other tech-savvy

More information

Conformity assessment Requirements for bodies providing audit and certification of management systems. Part 6:

Conformity assessment Requirements for bodies providing audit and certification of management systems. Part 6: TECHNICAL SPECIFICATION ISO/IEC TS 17021-6 First edition 2014-12-01 Conformity assessment Requirements for bodies providing audit and certification of management systems Part 6: Competence requirements

More information

ERO Reliability Risk Priorities Report. Peter Brandien, Reliability Issues Steering Committee Chair WECC Reliability Workshop March 21, 2018

ERO Reliability Risk Priorities Report. Peter Brandien, Reliability Issues Steering Committee Chair WECC Reliability Workshop March 21, 2018 ERO Reliability Risk Priorities Report Peter Brandien, Reliability Issues Steering Committee Chair WECC Reliability Workshop March 21, 2018 Reliability Issues Steering Committee (RISC) Background 2 RISC

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar Course Outline CISM - Certified Information Security Manager 22 Mar 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

Report. Diemer Plant Improvements Program Audit Report. Internal Audit Report for January 2011

Report. Diemer Plant Improvements Program Audit Report. Internal Audit Report for January 2011 Report Office of the General Auditor January 31, 2011 Internal Audit Report for January 2011 Summary Three reports were issued during the month: Diemer Plant Improvements Program Audit Report Business

More information

Improve Internal Controls with Governance, Risk, and Compliance Solutions

Improve Internal Controls with Governance, Risk, and Compliance Solutions Improve Internal Controls with Governance, Risk, and Compliance Solutions Jay Castleberry Director, Technology Delivery & Maintenance 0 (SCE) Company Overview One of the largest electric utilities in North

More information

Business Context: Key for Successful Risk Management

Business Context: Key for Successful Risk Management Business Context: Key for Successful Risk Management Philip Aldrich, CISSP, CISM, CISA, CRISC, CIPP Program Director, Risk Management EMC Event Alert Finding Incident Law Vulnerability Regulation Audit

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Microsoft Software Asset Management (SAM) - Core.

Microsoft Software Asset Management (SAM) - Core. Microsoft 70-713 Software Asset Management (SAM) - Core http://killexams.com/exam-detail/70-713 QUESTION: 42 DRAG DROP You need to help an organization program through each level of the Microsoft SAM Optimization

More information

Security Master Planning to Protect Water Resources Lara Kammereck John Saunders May 1, 2015

Security Master Planning to Protect Water Resources Lara Kammereck John Saunders May 1, 2015 Security Master Planning to Protect Water Resources Lara Kammereck John Saunders May 1, 2015 Who is Cascade Water Alliance? Joined together in 1999 350,000 residents 20,000 businesses City of Bellevue

More information

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13 I. Vision A highly reliable and secure bulk power system in the Electric Reliability Council of Texas

More information

Cyber Threats? How to Stop?

Cyber Threats? How to Stop? Cyber Threats? How to Stop? North American Grid Security Standards Jessica Bian, Director of Performance Analysis North American Electric Reliability Corporation AORC CIGRE Technical Meeting, September

More information

A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING.

A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING. A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING www.consultmipl.com MIPL is a security consulting company from India, offering sustainable designs and solutions for security management.

More information

Universal Model Framework -- An Introduction

Universal Model Framework -- An Introduction Universal Model Framework -- An Introduction By Visible Systems Corporation www.visible.com This document provides an introductory description of the Universal Model Framework an overview of its construct

More information

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED.

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED. Assistant Deputy Minister (Review Services) Reviewed by in accordance with the Access to Information Act. Information UNCLASSIFIED. Security Audits: Management Action Plan Follow-up December 2015 1850-3-003

More information

EU General Data Protection Regulation (GDPR) Achieving compliance

EU General Data Protection Regulation (GDPR) Achieving compliance EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,

More information

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

E-guide CISSP Prep: 4 Steps to Achieve Your Certification CISSP Prep: 4 Steps to Achieve Your Certification Practice for the exam and keep your skills sharp : Thank you for downloading our CISSP certification guide. Aside from this handy PDF, you can also access

More information

THE NEXUS OF LEAK DETECTION & ASSET MANAGEMENT

THE NEXUS OF LEAK DETECTION & ASSET MANAGEMENT THE NEXUS OF LEAK DETECTION & ASSET MANAGEMENT AN INNOVATIVE AND EFFICIENT APPROACH IN SAN MARCOS, TX & SAN JUAN, PR Wayne Pratt WPratt@wachsws.com (847) 946-5907 Agenda Leak Detection Key Drivers Methodology

More information

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates Corporate Security & Emergency Management Summary of Submitted 2015 From Rates Service Expense 2014 2015 Revised Non Tax Revenue Net Tax Supported Expense Draft Non Tax Revenue Net Tax Supported Increase

More information