WHITE PAPER. Distribution Substation Outage Investigations. Overview. Introduction. By Ahmad Shahsiah, Ph.D., P.E. March 2018

Size: px
Start display at page:

Download "WHITE PAPER. Distribution Substation Outage Investigations. Overview. Introduction. By Ahmad Shahsiah, Ph.D., P.E. March 2018"

Transcription

1 WHITE PAPER Distribution Substation Outage Investigations By Ahmad Shahsiah, Ph.D., P.E. March 2018 Overview Electrical distribution systems in the United States served approximately 152 million customers in i A large portion of the electricity delivered by the utility companies is generated in power plants, brought to main distribution hubs, and then distributed to the utility customers from the central hubs known as distribution substations. Therefore, if a distribution substation is lost due to a major failure, service to a large number of customers can be disrupted. Major failures such as these are rare, but when they occur, post-failure investigations of the events are of paramount importance to reduce the likelihood of such incidents from happening again. The investigations should include not only the technical aspects of the failures but also the organizational factors contributing to the failures. Suggested corrective actions should also be outlined and discussed. This article is an overview of components of such types of investigations with reference to a substation outage that occurred in a large metropolitan area in the United States. The outage resulted in the loss of tens of thousands of customers for multiple hours. The Exponent investigative team was dispatched to the incident scene the same day and started the investigations immediately. Exponent performed a thorough investigation related to the root cause and other contributing factors including the emergency response and customer restoration time after the incident. The Exponent report in this case outlined the findings, discussed contributing factors, and recommended corrective actions, all of which were implemented. Introduction Electrical substations incorporate redundancies and have automated protection systems to increase safety and minimize customer outage in case of a failure. Several protection layers, known as protection zones, are monitored by automatic protective devices that can isolate sections of a substation and its feeders within a fraction of a second if a failure occurs. These systems help to minimize the number of the customers lost in case of the failure of one section. Some of the substation designs include automatic load transfer to the operating sections of a substation in case of the failure of other sections. Sophisticated protection and load transfer schemes are also programmed into the protection system to ensure reliable transfer of loads and to minimize the total duration of outages.

2 For the reasons mentioned above, electrical substations are highly reliable, and outage events are relatively rare. However, equipment failures do occur within substations that result in the loss of power to the substation. These events usually include multiple failures leading to the substation outage. More often than not, there are opportunities to detect the initial failures and prevent them from cascading to a major event leading to the loss of the substation. Study of past failures provides valuable lessons to prevent future similar events. However, two major substation failures are rarely identical. The failures are also usually unique to the substations and their components. This makes the study of the organizational and operational barriers against total substation loss important. Therefore, after analyzing the substation failure incidents, an important part of the lessons learned is to identify gaps in the organizational and operational procedures that could lead to such failures. Methodology The recommended causal assessment methodology is a structured approach for causal analysis and consists of the following five steps: 1. Data Collection 2. Reconstruction of Problem Scenarios 3. Performance of Causal Analysis a. Direct cause b. Root cause 4. Review of Restorations and Extent of Condition 5. Development of Recommended Actions to Prevent Recurrence These steps are described below. Data Collection Data collection is performed through site inspections, review of event-related documents, digitally recorded data, recorded voice conversations, public records, and interviews. The collected data includes the digitally recorded data at the time of the incident by the digital protection and the Supervisory Control and Data Acquisition (SCADA) system or Distributed Control System (DCS). Important information is typically available to be collected at early stages following an incident; therefore, it is important that the investigative team be at the site of the incident as soon as possible. The investigative team at the site typically interviews the available personnel, collects data, and photographically documents the substation condition. Following the initial site visit, the investigative team needs continued access to the site for follow up data collection and personnel interviews. Exponent performed numerous site inspections in the case of the above-mentioned substation investigation during the months following the incident. During those site visits important data were collected regarding the configuration of different systems and during the removal and replacement of the failed components. All removed components were tagged as evidence and preserved. Later inspection and testing of those components provided valuable clues about the cause of the incident.

3 Of particular importance during the substation failure investigation was the inspection of the hardware of the protection and SCADA systems. This was to ensure that they operated as intended. Subsequent interviews of the personnel who either witnessed the failure, or were knowledgeable about the substation operational and historical problems, helped in determining the direct cause of the failure. In addition, collected information was not limited to the events leading to the incident; it also included the reactions after the incident and the restoration process to evaluate the effectiveness of recovery. Publically available information about the incident were also included in the data collection process as part of the investigation. This included media reports, police and fire department reports, personal cell phone photos, and information posted on social media. Reconstruction of Problem Scenarios As a result of the data collection activities, Exponent developed an event timeline during the substation investigation to identify the relative timing of events for use in evaluating the events. The detailed timeline included the emergency actions after the incident until the restoration was complete. The timeline was constructed using all available data, including SCADA logs, audio recordings, phone records, cell phone photographs following the incident, security camera footage, badge reader logs, the station logbook, fire alarm panel logs, the fire department s Computer-aided dispatch (CAD), and the fire department s radio recordings. Performance of Causal Analysis There are different known methods of causal analysis for determining root causes. Causal analysis is not limited to the technical aspects of the failure, herein referred to as the direct cause. It also includes other factors such as processes, policies, human factors, and organizational factors. A commonly used method is the Events and Causal Factors Analysis (ECFA) approach. Exponent used this method to identify potential systemic incident causes (e.g., management policies and organization) for each initiating event during the substation failure investigations. It involved repeatedly asking why the event or precondition existed and providing evidence to support the why, in order to identify the underlying causes. The outcome of the above causal analyses was the identification of the causes including the technical cause. This information formed the basis for developing recommended corrective actions. Causal Analysis Direct Cause The direct cause of the failure is the technical reason for the failure, such as failing equipment or a malfunctioning protection device. The direct cause does not include other factors such as processes, policies, human factors, and organizational factors. An engineering review of the collected data after the incident is important to determine the direct cause of the incident. This usually involves review of the digitally collected data as well as the system protection targets. The direct cause analysis also requires understanding the system design. Often the investigative team has to review technical documents such as the station one-line and direct current (DC) diagrams to fully understand the extent of the conditions leading to the incident and to interpret the collected data. The direct cause should include not only the review of relevant electrical and protection designs but also the actual installations and their consistency with the designs and their intended function. This may include inspecting relevant control wires in the substation, since in some of the older installations, wiring and equipment age and wear could be a contributing factor. The investigative team can potentially perform tests on the DC

4 control system to ensure correct functionality of the system; although, such tests after the incident in an active substation may be difficult and may require coordination with the distribution control center. The direct cause of the incident is identified when the underlying technical cause of the incident is determined. The underlying technical cause must explain all the available evidences including the digitally collected data. Causal Analysis Root Cause The causal analysis was performed using a methodology similar to the direct cause analysis; however, the process was not limited to the technical aspects leading to the incident. The potential systemic causes and contributing factors included process, policies, human factors, and organizational factors for each initiating event. Causal analysis charts are important tools that were used to identify the underlying causes of the incident in a structured way. Restorations and Extent of Condition The investigative team also performed analysis of the response after the incident including the emergency actions and restorations. As the substation failure involved a fire, important lessons were learned to improve effectiveness of the substation crew response and coordination with the fire department. This analysis revealed gaps in the utility s fire response procedure and personnel training regarding following procedures in case of a substations fire. It also revealed gaps in the coordination and training with the first responders. Suggested corrective actions were applicable to the other substations as well. Review for Extent of Condition and Extent of Cause An outcome of the causal analysis was to identify the potential for a condition or cause to exist elsewhere, which could lead to a similar failure. During this review, it was important to consider what other events would occur as a result of similar organizational or management factors. Development of Recommended Actions to Prevent Recurrence The desired outcome of causal analysis is to identify recommended corrective actions to prevent recurrence of the problem and to identify lessons learned. Effective corrective actions are those that address the causes, are implementable by the organization, and are consistent with company business goals and strategies. All of the Exponent recommendations in the abovementioned substation failure case were implemented. Conclusion Electrical substation failures are rare events, but when they occur, they need to be thoroughly investigated. Important information can be lost if the causal investigation is limited to the technical aspects of the failure or the direct cause. Other contributing factors such as human factors, policies, and organizational factors should also be included in the causal analysis. Investigative teams should have access to the site to conduct the investigations as soon as possible after the incident. Investigative teams should also have unrestricted access to relevant design documentations of the substations and site access during the replacement of the failed units for site inspections and personnel interviews. A structured approach is

5 suggested in this article consisting of several steps. The process involves repeatedly asking why the initiating event existed and providing evidence for each why in order to identify the underlying causes. Exponent Team Exponent consultants have comprehensive expertise in the planning, construction, operation, and maintenance of traditional utility systems and their components and newly emergent technologies reshaping the industry. We apply this knowledge to solve complex problems such as substation failures. Exponent has performed several substation failure investigations. Our team responded to the substation outage discussed here on the same day. Investigations continued for several months, and the final report included recommended corrective actions after identifying the underlying causes. i e=linechart&ltype=pin&rtype=s&maptype=0&rse=0&pin= (Last accessed 9 January 2018).

A Strong Response Before, During and After. Hurricane Sandy. West Penn Power, Penelec and Met-Ed

A Strong Response Before, During and After. Hurricane Sandy. West Penn Power, Penelec and Met-Ed A Strong Response Before, During and After Hurricane Sandy West Penn Power, Penelec and Met-Ed January 10, 2013 FirstEnergy s Presence in Pennsylvania Erie Towanda New Castle Easton Greensburg Johnstown

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information

REGIONAL UTILITY COORDINATION PLAN. Portland, Oregon / Vancouver, Washington Metropolitan Area

REGIONAL UTILITY COORDINATION PLAN. Portland, Oregon / Vancouver, Washington Metropolitan Area REGIONAL UTILITY COORDINATION PLAN Portland, Oregon / Vancouver, Washington Metropolitan Area I. PURPOSE The purpose of this plan is to outline procedures for coordination between local governments and

More information

Security and Disaster Preparedness: New York s Experience. Presented by: New York Department of Public Service. December 7, James T.

Security and Disaster Preparedness: New York s Experience. Presented by: New York Department of Public Service. December 7, James T. Security and Disaster Preparedness: New York s Experience Presented by: James T. Gallagher New York Department of Public Service james_gallagher@dps.state.ny.us December 7, 2001 Rome, Italy 1 Security

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 9 Chapter X Security Performance Metrics Background For the past two years, the State of Reliability report has included a chapter for security performance

More information

Standard Development Timeline

Standard Development Timeline Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive

More information

NATURAL AWARENESS TRACKING SCHOOL, LLC STANDARD 7400

NATURAL AWARENESS TRACKING SCHOOL, LLC STANDARD 7400 NATURAL AWARENESS TRACKING SCHOOL, LLC STANDARD 7400 TYPE 3 - OPERATIONAL TRACKER Speiden, et al This is based on the final document submitted to and approved by the Virginia Search and Rescue Council

More information

DRAFT Risks and Mitigations for Losing EMS Functions

DRAFT Risks and Mitigations for Losing EMS Functions DRAFT Risks and Mitigations for Losing EMS Functions 1.0 Executive Summary Energy Management System (EMS) is a system of computer-aided tools used by System Operators to monitor, control, and optimize

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents Services to Help You Prepare for and Quickly Respond to Security Incidents The Challenge The threat landscape is always evolving and adversaries are getting harder to detect; and with that, cyber risk

More information

UF CEMP Support Group Annex: IT Group

UF CEMP Support Group Annex: IT Group UF CEMP Support Group Annex: IT Group Lead Representatives Office of Vice President and Chief Information Officer (CIO) Supporting Departments External Partners Academic Technology Computing and Networking

More information

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business

More information

CIP Cyber Security Configuration Management and Vulnerability Assessments

CIP Cyber Security Configuration Management and Vulnerability Assessments Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power

More information

Substation SCADA Monitoring

Substation SCADA Monitoring Substation SCADA Monitoring Contact us Today for a FREE quotation to deliver this course at your company?s location. https://www.electricityforum.com/onsite-training-rfq Substations are a critical component

More information

UF CEMP Support Group Annex: Public Safety

UF CEMP Support Group Annex: Public Safety UF CEMP Support Group Annex: Public Safety Lead Representatives University of Supporting Departments External Partners Enrollment Management Shands Hospital Safety & Security Alachua County Emergency Management

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed

More information

Managing Hazards and Incidents Managers, Supervisors and SHR Guide

Managing Hazards and Incidents Managers, Supervisors and SHR Guide 1.1. Introduction This guide is for Managers, Supervisors and Safety and Health Representatives to help navigate the functions used to manage hazards and incidents in your role as a Manger, Supervisor

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

SCADA Software. 3.1 SCADA communication architectures SCADA system

SCADA Software. 3.1 SCADA communication architectures SCADA system 3 SCADA Software 3.1 SCADA communication architectures 3.1.1 SCADA system A supervisory control and data acquisition (SCADA) system means a system consisting of a number of remote terminal units (RTUs)

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-6 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan

More information

Sapphire Wind Farm 330/33kV Substation

Sapphire Wind Farm 330/33kV Substation Signature projects: Projects: Project Edison AusNet Sapphire Wind Farm 330/33kV Substation TransGrid Zinfra constructed 330/33kV substation and transmission line as part of the cut in works for the Sapphire

More information

Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP September 30, 2014

Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP September 30, 2014 Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP-009-3 September 30, 2014 James Williams Lead Compliance Specialist jwilliams.re@spp.org 501.614.3261 Jeremy Withers Senior Compliance Specialist

More information

CITY OF WINSTON-SALEM, NORTH CAROLINA Public Safety Needs Assessment Study Phase One EXECUTIVE SUMMARY

CITY OF WINSTON-SALEM, NORTH CAROLINA Public Safety Needs Assessment Study Phase One EXECUTIVE SUMMARY EXECUTIVE SUMMARY I. Documentation and Current Conditions Establishment Process II. Existing Public Safety Facilities Analysis III. Space Allocation, Co-Location and Potential Site Location Analysis IV.

More information

(JSA) Job Safety Analysis Program. Safety Manual. 1.0 Purpose. 2.0 Scope. 3.0 Regulatory References. 4.0 Policy

(JSA) Job Safety Analysis Program. Safety Manual. 1.0 Purpose. 2.0 Scope. 3.0 Regulatory References. 4.0 Policy Page 1 of 7 1.0 Purpose Job Safety Analysis is a primary element of the Hazard Identification and Mitigation Management Process. JSA s are completed daily to identify and evaluate hazards associated with

More information

BCP At Bangkok Bank, Thailand

BCP At Bangkok Bank, Thailand BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in

More information

Florida Power & Light Company Hurricane Response Update. Eric Silagy President and CEO Florida Power & Light Company

Florida Power & Light Company Hurricane Response Update. Eric Silagy President and CEO Florida Power & Light Company Florida Power & Light Company Hurricane Response Update Eric Silagy President and CEO Florida Power & Light Company 35 counties Serving more than half of Florida 4.9 million customer accounts Majority

More information

CHART BOOK: HAND-HELD MOBILE DEVICE USE TRENDS FOR MISSISSIPPI ADULTS

CHART BOOK: HAND-HELD MOBILE DEVICE USE TRENDS FOR MISSISSIPPI ADULTS CHART BOOK: HAND-HELD MOBILE DEVICE USE TRENDS FOR MISSISSIPPI ADULTS March 2018 Overview issue brief HAND-HELD MOBILE DEVICE USE WHILE DRIVING Policy Considerations in Mississippi Published december 2017

More information

Washington Metropolitan Area Transit Authority Board Action/Information Summary

Washington Metropolitan Area Transit Authority Board Action/Information Summary Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: Resolution: Yes No TITLE: Incident Customer Communications PURPOSE: To provide an update

More information

Auditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance

Auditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance Accountability Modules Auditing in an Automated Environment: Agency Prepared By Initials Date Reviewed By Audit Program - System Design, Development, and Maintenance W/P Ref Page 1 of 1 Procedures Initials

More information

Standard TOP Transmission Operations

Standard TOP Transmission Operations A. Introduction 1. Title: Transmission Operations 2. Number: TOP-001-34 3. Purpose: To prevent instability, uncontrolled separation, or Cascading outages that adversely impact the reliability of the Interconnection

More information

Toronto Hydro Response to December 2013 Ice Storm Independent Review Panel Report

Toronto Hydro Response to December 2013 Ice Storm Independent Review Panel Report Toronto Hydro Response to December 2013 Ice Storm Independent Review Panel Report Media Briefing Toronto, ON June 18, 2014 Part 1: Introduction David McFadden Chair, Independent Review Panel 3 Independent

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

2010 HURRICANE SEASON PREPARATION BRIEFING

2010 HURRICANE SEASON PREPARATION BRIEFING 2010 HURRICANE SEASON PREPARATION BRIEFING PSC Workshop May 17, 2010 Barbara Quinones, Director City of Homestead, Homestead Energy Services Today s Presentation System Overview Hurricane Experience Storm

More information

Halifax Regional Municipality

Halifax Regional Municipality Halifax Regional Municipality Challenge Leverage existing IT infrastructure to design a high-definition surveillance system that helps protect corporate assets across the Halifax Regional Municipality

More information

OEMC 2016 Budget Statement of Executive Director Gary W. Schenkel to the Committee on Budget and Operations September 30, 2015

OEMC 2016 Budget Statement of Executive Director Gary W. Schenkel to the Committee on Budget and Operations September 30, 2015 OEMC 2016 Budget Statement of Executive Director Gary W. Schenkel to the Committee on Budget and Operations September 30, 2015 Good morning, Chairman Austin, Vice Chairman Ervin and members of the City

More information

Washington Metropolitan Area Transit Authority Board Action/Information Summary

Washington Metropolitan Area Transit Authority Board Action/Information Summary Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 201697 Resolution: Yes No TITLE: MTPD Security Updates PRESENTATION SUMMARY: The Metro Transit

More information

Distributed Control Systems (DCS)

Distributed Control Systems (DCS) Training Title Distributed Control Systems (DCS) Training Duration 5 days Training Venue and Dates Distributed Control Systems (DCS) 5 13-17 May $3,300 Abu Dhabi In any of the 5 star hotel. The exact venue

More information

Use of Personal Mobile Phone Whilst on Duty

Use of Personal Mobile Phone Whilst on Duty Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland

More information

Health Facilities and Utility Providers

Health Facilities and Utility Providers Health Facilities and Utility Providers Strengthening the Partnership Ann Steeves, CEO HC-EMI November 2017 National Healthcare Coalition Preparedness Conference 2017 HC-EMI. All rights reserved. 1 Learning

More information

Information Security Incident

Information Security Incident Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body

More information

FDA 483 The Definitive Guide to Responding to FDA 483 and Warning Letters

FDA 483 The Definitive Guide to Responding to FDA 483 and Warning Letters FDA 483! The Definitive Guide to Responding to FDA 483 and Warning Letters Jon Speer Founder & VP of QA/RA greenlight.guru Table of Contents 1 Introduction 2 What Is an FDA 483 Observation? 3 Know Who

More information

LFI Learning from Incidents

LFI Learning from Incidents LFI Learning from Incidents 1 Current State Good systems with analysis exist Generally good culture of reporting Areas for Enhancement Not shared between organizations Safety culture could further encourage

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction

The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction 29 February 2016 The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction 2015-2030 The Sendai Framework for Disaster Risk Reduction 2015-2030

More information

Introduction to UKAS Accreditation Fire Scene Development Programme. David Compton November 2017

Introduction to UKAS Accreditation Fire Scene Development Programme. David Compton November 2017 Introduction to UKAS Accreditation Fire Scene Development Programme David Compton November 2017 What is UKAS Accreditation? Procedure by which an authoritative body gives formal recognition that a body

More information

FRAMEWORK FOR CYBER INCIDENT RESPONSE TRAINING

FRAMEWORK FOR CYBER INCIDENT RESPONSE TRAINING Safety and Security Engineering VII 273 FRAMEWORK FOR CYBER INCIDENT RESPONSE TRAINING HIDEKAZU HIRAI, TOMOMI AOYAMA, DAVAADORJ NYAMBAYAR & ICHIRO KOSHIJIMA Industrial Management Engineering, Nagoya Institute

More information

Arizona State Troopers Highway Patrol Division Sergeant John Paul Cartier

Arizona State Troopers Highway Patrol Division Sergeant John Paul Cartier Arizona State Troopers Highway Patrol Division Sergeant John Paul Cartier Average Annual Number of Responders Struck and Killed Nationally 12 Law Enforcement Officers 5 Fire and Rescue Personnel 60 Towing

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs

Response to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs Response to Wood Buffalo Wildfire KPMG Report Alberta Municipal Affairs Background To ensure continuous enhancement and improvement of Alberta s public safety system, the Alberta Emergency Management Agency

More information

Telecommunications Network Reliability

Telecommunications Network Reliability Telecommunications Network Reliability Office of Telecommunications NYS Department of Public Service Background Major Outages in 1999, 2000, and 2001 9/11 Telecommunications Severely Disrupted Infrastructure

More information

Perspectives from the U.S. Federal Communications Commission: Lessons Learned on ICTs in Disaster Prevention and Relief

Perspectives from the U.S. Federal Communications Commission: Lessons Learned on ICTs in Disaster Prevention and Relief Perspectives from the U.S. Federal Communications Commission: Lessons Learned on ICTs in Disaster Prevention and Relief Thomas Sullivan International Bureau Federal Communications Commission July 2012

More information

Volt/VAR Control Options and How to Leverage AMI Data

Volt/VAR Control Options and How to Leverage AMI Data By Tom Helmer, Executive Consultant and Joseph Sottnik, P.E., Project Manager, Black & Veatch Published in the August 2012 issue of PowerGrid International Energy efficiency and operational optimization

More information

Next Generation Emergency Communications Intelligent Migration

Next Generation Emergency Communications Intelligent Migration 2010 Texas NENA Conference Next Generation Emergency Communications Intelligent Migration A Well-Managed Path from Enhanced 9-1-1 to Integrated Next Generation 9-1-1 Services Mart D. Nelson Consulting

More information

KEDS DSO Development Plan. George Karagutoff, KEDS CEO Prishtina, Kosovo 20 March, 2018

KEDS DSO Development Plan. George Karagutoff, KEDS CEO Prishtina, Kosovo 20 March, 2018 KEDS DSO Development Plan George Karagutoff, KEDS CEO Prishtina, Kosovo 20 March, 2018 1 INVESTMENTS AT A GLANCE KEDS begun its operations after the successful unbundling of Distribution and Supply business

More information

POLICE QUICK REPORTING SYSTEM (PQRS)

POLICE QUICK REPORTING SYSTEM (PQRS) POLICE QUICK REPORTING SYSTEM (PQRS) PROJECT REFERENCE NO. : 37S1140 COLLEGE : ADICHUNCHANAGIRI INSTITUTE OF TECHNOLOGY, CHIKAMAGALUR BRANCH : COMPUTER SCIENCE AND ENGINEERING GUIDES : DARSHAN L.M STUDENTS

More information

Wireless LAN Example Scenario

Wireless LAN Example Scenario CHAPTER 5 The wireless LAN relies on high-speed wireless hot spots. Unlike public hot spots which have begun to appear in airports, hotel lobbies, and coffee shops, allowing anyone with a wireless-enabled

More information

CIP Cyber Security Recovery Plans for BES Cyber Systems

CIP Cyber Security Recovery Plans for BES Cyber Systems A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-5 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan

More information

Process Definition: Security Services

Process Definition: Security Services Process Definition: Services 1. SUMMARY Process Definition: Services 1.1. This document defines the processes provided by the Services team in detail. 1.2. The relationship between this Business Unit process

More information

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014 Computer Security Incident Response Plan Name of Approver: Mary Ann Blair Date of Approval: 23-FEB-2014 Date of Review: 31-MAY-2016 Effective Date: 23-FEB-2014 Name of Reviewer: John Lerchey Table of Contents

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

The Missouri Department of Transportation, in cooperation with its regional partners Illinois Department of Transportation, Metro and East West

The Missouri Department of Transportation, in cooperation with its regional partners Illinois Department of Transportation, Metro and East West The Future of St. Louis Intelligent Transportation The ITS Heart Of St. Louis The Missouri Department of Transportation, in cooperation with its regional partners Illinois Department of Transportation,

More information

On-Officer Body Camera Program

On-Officer Body Camera Program 1 of 7 1. PURPOSE This order establishes the Mesa Police (MPD) operational and submission guidelines for the "On-Officer" Body Camera (OBC) Pilot, which will be implemented for one year ending October

More information

Skills Academy. Forensic Studies Courses

Skills Academy. Forensic Studies Courses Skills Academy Forensic Studies Courses www.skillsacademy.co.za Forensic Science Programmes Forensic Science Studies is for the person who wants to work in a laboratory or as a crime scene technician and

More information

INFORMATION SECURITY- DISASTER RECOVERY

INFORMATION SECURITY- DISASTER RECOVERY Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy

More information

ENGINEERING AND SERVICES FIRM THAT SPECIALIZES IN HYDROELECTRIC POWER AND CONTROL SYSTEM DESIGN, OUR TEAM OF PROFESSIONALS HAVE WORKED TOGETHER

ENGINEERING AND SERVICES FIRM THAT SPECIALIZES IN HYDROELECTRIC POWER AND CONTROL SYSTEM DESIGN, OUR TEAM OF PROFESSIONALS HAVE WORKED TOGETHER smallhydro PRIME ENGINEERING LIMITED IS AN ELECTRICAL ENGINEERING AND SERVICES FIRM THAT SPECIALIZES IN HYDROELECTRIC POWER AND CONTROL SYSTEM DESIGN, IMPLEMENTATION AND MAINTENANCE. OUR TEAM OF PROFESSIONALS

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

II. Investigative Methodology

II. Investigative Methodology I. Introduction 1. Indicate the date and time the incident allegedly occurred, if known. 2. Indicate time the incident was reported to facility personnel. 3. List name(s) of the person(s) reporting the

More information

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017

FEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017 FEMA Update Tim Greten Technological Hazards Division Deputy Director NREP April 2017 FEMA Strategic Priorities Priority 1: Be survivor-centric in mission and program delivery. Priority 2: Become an expeditionary

More information

Chapter 2 State Estimation and Visualization

Chapter 2 State Estimation and Visualization Chapter 2 State Estimation and Visualization One obvious application of GPS-synchronized measurements is the dynamic monitoring of the operating conditions of the system or the dynamic state estimation

More information

M E M O R A N D U M. Summary

M E M O R A N D U M. Summary M E M O R A N D U M EUGENE WATER & ELECTRIC BOARD TO: FROM: Commissioners Helgeson, Brown, Mital, Simpson and Carlson Rod Price, Chief Engineering & Operations Officer Rene González, Customer Solutions

More information

HIPAA RISK ADVISOR SAMPLE REPORT

HIPAA RISK ADVISOR SAMPLE REPORT HIPAA RISK ADVISOR SAMPLE REPORT HIPAA Security Analysis Report The most tangible part of any annual security risk assessment is the final report of findings and recommendations. It s important to have

More information

Demand management Policy

Demand management Policy Demand management Policy Policy summary This policy provides guidance on all aspects of demand management from taking of the initial call to the completion of tasks following attendance at incidents. Aim

More information

BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY

BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY Manual OCTOBER 2, 2016 CHILDREN IN FREEDOM (CIF) CIF P.O.Box 25286-00100, Kenya, Africa, NY, USA (c) 2016 Page 1 Contents ACKNOWLEDGEMENT... 0 1.0 STATEMENT...

More information

SurvalentONE Distribution Management System

SurvalentONE Distribution Management System SurvalentONE Distribution Management System Analyze & Optimize Critical Grid Functions for Advanced System Monitoring & Control SurvalentONE ADMS The SurvalentONE ADMS platform is a fully integrated SCADA,

More information

primary Control Center, for the exchange of Real-time data with its Balancing

primary Control Center, for the exchange of Real-time data with its Balancing A. Introduction 1. Title: Reliability Coordination Monitoring and Analysis 2. Number: IRO-002-5 3. Purpose: To provide System Operators with the capabilities necessary to monitor and analyze data needed

More information

Industry Standards Utilities Engineering Technician

Industry Standards Utilities Engineering Technician Industry Standards Utilities Engineering Technician Utilities engineering technicians create and test technological equipment for consumer and commercial use. In the utilities industry, engineering technicians

More information

Models 300, 310, 320, 330 PROTECTIVE AND SUPERVISION STORAGE CABINET FOR AUTOMATED EXTERNAL DEFIBRILLATORS (AED)

Models 300, 310, 320, 330 PROTECTIVE AND SUPERVISION STORAGE CABINET FOR AUTOMATED EXTERNAL DEFIBRILLATORS (AED) Models 300, 310, 320, 330 PROTECTIVE AND SUPERVISION STORAGE CABINET FOR AUTOMATED EXTERNAL DEFIBRILLATORS (AED) PUBLIC ACCESS DEFIBRILLATION (PAD) PROGRAMS CRA (Cardio-Respiratory Arrest) more commonly

More information

April Appendix 3. IA System Security. Sida 1 (8)

April Appendix 3. IA System Security. Sida 1 (8) IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA

More information

Kansas City s Metropolitan Emergency Information System (MEIS)

Kansas City s Metropolitan Emergency Information System (MEIS) Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

CCM APPLICATION FORM

CCM APPLICATION FORM CCM APPLICATION FORM You must: 1. Complete all of the information required in sections 1.1 to 1.6 of this form 2. Read, sign and date the declaration in section 1.3 and 1.6 3. Attach one passport sized

More information

PECO 2013 Summer Readiness Overview June 28, 2013

PECO 2013 Summer Readiness Overview June 28, 2013 PECO June 28, 2013 Summer is here and PECO is ready. PECO bases its readiness on its reliability enhancement programs, preventative maintenance programs, and capacity planning. In addition, PECO initiated

More information

Redundancy Concepts. INTRON-D plus. Single System with N+1 Components Duplicated Control System (hot stand-by operation) A+B System (shared operation)

Redundancy Concepts. INTRON-D plus. Single System with N+1 Components Duplicated Control System (hot stand-by operation) A+B System (shared operation) Redundancy Concepts INTRON-D plus Single System with N+1 Components Duplicated Control System (hot stand-by operation) A+B System (shared operation) THE ENGINEERS OF COMMUNICATION Optimum Protection -

More information

Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities

Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities This Implementation Plan applies to Cyber Security Standards CIP-002-2 through CIP-009-2 and CIP-002-3 through

More information

Overview of PECO s Distribution Integrity Management Plan

Overview of PECO s Distribution Integrity Management Plan Overview of PECO s Distribution Integrity Management Plan PUC Gas Safety Seminar September 8, 2016 David Bonner, PE Robert Ridgeway, PE Agenda PECO Distribution System Overview DIMP Pillar #1 DIMP DIMP

More information

DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK

DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK GOODS AND SERVICES CONTRACTS Page 1 of 5 RFP 16-PR-DEM-33 Comprehensive All-Hazards

More information

FEATURES & BENEFITS. Key word search function both inside and outside projects. Intuitive application makes creating profiles quick and easy

FEATURES & BENEFITS. Key word search function both inside and outside projects. Intuitive application makes creating profiles quick and easy R2S Forensic provides R2S software and media support capabilities that assist in effective law enforcement, criminal investigation and public protection. We work with police forces, legal bodies, government

More information

Standard EOP Disturbance Reporting

Standard EOP Disturbance Reporting A. Introduction 1. Title: Disturbance Reporting 2. Number: EOP-004-1 3. Purpose: Disturbances or unusual occurrences that jeopardize the operation of the Bulk Electric System, or result in system equipment

More information

NUKG Business Solutions Pvt Ltd. Information Security Incident Management Procedure (IS-IMG)

NUKG Business Solutions Pvt Ltd. Information Security Incident Management Procedure (IS-IMG) NUKG Business Solutions Pvt Ltd Information Security Incident Management Procedure (IS-IMG) Version No 1.0 Document Classification Prepared by Vasu Reviewed by Ravi Kanduri Approved by Ravi Kanduri Date

More information

Railroad Infrastructure Security

Railroad Infrastructure Security TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of

More information

Symantec Data Center Migration Service

Symantec Data Center Migration Service Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration

More information

VERTIV SERVICE CAPABILITY

VERTIV SERVICE CAPABILITY VERTIV SERVICE CAPABILITY VERTIV SERVICE CAPABILITY Service Offering Manage the health of your entire critical infrastructure with a service partner who can offer you business continuity. Exactly the level

More information

Certification. Forensic Certification Management Board. Robert J. Garrett, Director

Certification. Forensic Certification Management Board. Robert J. Garrett, Director Certification Forensic Certification Management Board Robert J. Garrett, Director Crime Lab Accreditation and Certification Essentials National Clearinghouse for Science, Technology, and the Law What is

More information