NERC Staff Organization Chart Budget 2019

Similar documents
NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2018

NERC Staff Organization Chart Budget 2017

NERC Staff Organization Chart Budget 2017

NERC Staff Organization Chart 2015 Budget

NERC Staff Organization Chart

NERC Staff Organization Chart Budget

Critical Infrastructure Protection Version 5

Multi-Region Registered Entity Coordinated Oversight Program

Governance, Risk & Compliance - Management Commitment; Building a GRC Aware Culture.

Reliability Standards Development Plan

IT Audit Process. Prof. Mike Romeu. January 30, IT Audit Process. Prof. Mike Romeu

Security and Privacy Governance Program Guidelines

System Chief Business Officer - B. J. Crain The Texas A&M University System Position Description--January 13, 2010

Grid Security & NERC

Grid Security & NERC. Council of State Governments. Janet Sena, Senior Vice President, Policy and External Affairs September 22, 2016

CIP Version 5 Transition. Steven Noess, Director of Compliance Assurance Member Representatives Committee Meeting November 12, 2014

Chief Executive Officer. Pacific Northwest Utilities Conference Committee Portland, Oregon March 8, 2013

ERO Enterprise IT Projects Update

MNsure Privacy Program Strategic Plan FY

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

FERC Reliability Technical Conference Panel III: ERO Performance and Initiatives ESCC and the ES-ISAC

ERO Enterprise Strategic Planning Redesign

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification

Agenda Technology and Security Committee November 6, :15 a.m.-12:00 p.m. Eastern

Statement of Organization, Functions, and Delegations of Authority: Office of the

OPERS Position Titles and Incumbent Count

CYBER RISK MANAGEMENT

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

Standards. Howard Gugel, Director of Standards Board of Trustees Meeting February 11, 2016

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

Bringing Cybersecurity to the Boardroom Bret Arsenault

Certified Information Security Manager (CISM) Course Overview

Critical Infrastructure Sectors and DHS ICS CERT Overview

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

RISK INTELLIGENCE Assurance and efficiency improvement through a robust Enterprise Risk Management approach

HCPC's Risk Assurance Part 1

falanx Cyber ISO 27001: How and why your organisation should get certified

Getting Your Privacy House in Order

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

National Strategy for CBRNE Standards

ISAO SP 4000: Protecting Consumer Privacy in Cybersecurity Information Sharing v1.0

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

IT Audit Process Prof. Liang Yao Week Six IT Audit Planning

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Risk Advisory Academy Training Brochure

A Global Look at IT Audit Best Practices

Compliance Monitoring and Enforcement Program Technology Project Update

VII. GUIDE TO AGENCY PROGRAMS

<< Practice Test Demo - 2PassEasy >> Exam Questions CISM. Certified Information Security Manager.

Cybersecurity and the Board of Directors

Aboriginal Affairs and Northern Development Canada. Internal Audit Report Summary. Audit of Information Technology Security.

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Appendix 2.2 November 30, 2018 CORPORATE ORGANIZATIONAL STRUCTURE

UNIVERSITY OF VIRGINIA BOARD OF VISITORS MEETING OF THE AUDIT, COMPLIANCE, AND RISK COMMITTEE DECEMBER 9, 2016

What It Takes to be a CISO in 2017

Information Security Officer (ISO) Education

ISACA. Certification Details for Certified in the Governance of Enterprise IT (CGEIT )

Agenda Technology and Security Committee

Sarawak State Government Strategic ICT Planning Vision

The Role of the American National Standards Institute (ANSI) Irwin Silverstein, Ph.D. IPEA

OF ACCOUNTANTS IAASB CAG MEETING MARCH 7, 2011

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Session 5: Business Continuity, with Business Impact Analysis

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

The Evolving Threat to Corporate Cyber & Data Security

NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION

Decentralized IT General Controls Review: Student Affairs Systems Group

Meeting of the BBC Audit and Risk Committee SUMMARY MINUTES. Thursday 22 June, 2017 New Broadcasting House, London

CHARTERING SITE QUICK START GUIDE

354 & Index Board of Directors Responsibilities Audit Committee and Risk Committee Coordination, 244 Audit Committee Functions and Responsibilities, 2

Critical Infrastructure Protection Committee Strategic Plan

Reliability & Resiliency in the US Capitol Region/Hardening the Grid One Year after Hurricane Sandy

Session ID: CISO-W22 Session Classification: General Interest

VALUE OF A CYBERSECURITY SELF-ASSESSMENT

CYBERSECURITY. Protecting Against the Financial, Regulatory and Reputational Impacts of Cyber Attack

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

Memphis Chapter. President s Message. This annual event is designed to provide students with a

ECCouncil EC-Council Certified CISO (CCISO) Download Full Version :

Integrated Assurance Across the Three Lines of #CW2017

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

Turning Risk into Advantage

RELIABILITY COMPLIANCE ENFORCEMENT IN ONTARIO

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

HPH SCC CYBERSECURITY WORKING GROUP

Higher Education Privacy Update

Cyber Security Standards Drafting Team Update

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Credit Card Data Compromise: Incident Response Plan

Membership

Standard for Security of Information Technology Resources

Introduction. Angela Holzworth, RHIA, CISA, GSEC. Kimberly Gray, Esq., CIPP/US. Sr. IT Infrastructure Analyst

3/13/2015. COSO Revised: Implications for Compliance and Ethics Programs. Session Agenda. The COSO Framework

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

Data Governance Framework

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

CYBERSECURITY AND THE BOARD OF DIRECTORS TIPS FOR SECURING SUPPORT FOR YOUR CYBER RISK MANAGEMENT PROGRAM

Exhibit to Agenda Item #3

Transcription:

NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate Secretary Senior Vice President and Chief Enterprise Risk and Strategic Development Officer Senior Vice President and Director of Policy and External Affairs Sr. VP and Chief Security Officer VP and Chief E-ISAC Operations Officer Senior Vice President, Chief Financial and Administrative Officer, and Treasurer Director of Reliability Risk Management Vice President, Deputy General Counsel, and Director of Enforcement Vice President, Chief Technology Officer, and Director of Information Technology Director of Standards and Compliance

Reliability Standards, Reliability Assurance, Reliability Assessment and System Oversight, Performance Analysis, Event Analysis, Situation Awareness, Operator Certification Senior Chief Reliability Officer Director of Reliability Assessment and System Analysis Senior Director of Engineering and Reliability Initiatives Director of Standards and Compliance Director of Reliability Risk Management System Analysis 6 people Reliability Assessments 6 people Registration Manager Director, Compliance Assurance and Program Oversight Sr. Director, Standards, and Education Associate Director, Reliability Assurance Performance Analysis 11 People Sr. Manager of Operating Committee Support Advanced Analytics and Modeling Registration 3 People Compliance Assurance 16 people Standards Development 7 people Reliability Assurance 5 people CIPC Advisor Associate Director of BPSA Certification 2 People Associate Director, Event Analysis Situation Awareness 5 people Standards Information 7 people Event Analysis

Electricity Information Sharing and Analysis Center Sr. VP and Chief Security Officer VP and Chief Special Operations Officer Sr. Director, E-ISAC Government Intelligence Interface 2 person Director, Programs and Engagement Director, Operations Programs and Engagement Watch Operations 10 people Physical Security Cyber Analysis and Context 10 people CRISP 1 Person Strategic Initiatives 1 Person

Legal and Regulatory Compliance Enforcement Senior Vice President, General Counsel and Corporate Secretary Director of Internal Audit and Corporate Risk Management Deputy General Counsel and VP of Enforcement General Counsel Internal Audit and Corporate Risk Management Enforcement Actions Compliance Enforcement Analysis Reporting and Tracking 1 person

Policy and External Affairs Senior Director for Policy and External Affairs Sr. Director of Communication Director of Legislative and Regulatory Affairs Director of International Relations Communications 7 people

Information Technology, Human Resources, and Accounting & Finance Senior Vice President, Chief Financial and Administrative Officer, and Treasurer Controller Director of Human Resources Chief Technology Officer Regional and Stakeholder Relations 2 People Meeting Planning and Facilities Services 5 people Finance and Accounting 6 people Human Resources Project Management Information Technology and Services 1 Education and Training Cyber Infrastructure 4 people Enterprise IT Architecture Business Process Improvements