Cyber Resilient Energy Delivery Consortium

Slides:



Advertisements
Similar presentations
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Advertisements

Cyber and Maritime Infrastructure
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
Security Controls – What Works
Sabre employees—Montevideo, Uruguay TRENDS THAT CHANGE EVERYTHING Tom Klein, CEO and President,
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
DOE’s Smart Grid R&D Needs Steve Bossart Energy Analyst U.S. Department of Energy National Energy Technology Laboratory Materials Challenges in Alternative.
Getting Smarter with Information An Information Agenda Approach
Lessons Learned in Smart Grid Cyber Security
CSIAC is a DoD Information Analysis Center (IAC) sponsored by the Defense Technical Information Center (DTIC) Presentation to: Insider Threat SOAR Workshop.
Wireless Networks Breakout Session Summary September 21, 2012.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
1 FTA Research Programs Ronald Hynes Acting Associate Administrator for Research, Demonstration, and Innovation April 17, 2007.
June 17, 2009 Michael W. Howard, Ph.D. Sr. Vice President The Interoperable Smart Grid Evolving.
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Alex Adamec.  Any physical or virtual information system that controls, processes, transmits, receives, or stores electronic information in any form.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Big Data Quality Challenges for the Internet of Things (IoT) Vassilis Christophides INRIA Paris (MUSE team)
Sensing and Measurements Tom King Oak Ridge National Laboratory April 2016.
Dell Software Unified Communications Command Suite (UCCS) Provides Flexible, Cross-Platform Management, Reporting and Data Diagnostics MICROSOFT AZURE.
11/03/2016.
Principles Identified - UK DfT -
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Comprehensive Security and Compliance at an Affordable Price.
Hala Zeine SVP Head of SAP Portfolio Strategy & Pricing
and Security Management: ISO 28000
Information Technology Sector
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
Detection and Analysis of Threats to the Energy Sector (DATES)
CCNET Managed Services
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Cybersecurity EXERCISE (CE) ATD Scenario intro
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
General information Organisation logo Targeted topics
The Transition to a High DER Future
Threat Systems Management Office (TSMO)
Making Information Security Manageable with GRC
Cyber Security in Ports Business as Usual?
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 21 March 2018.
Cybersecurity at PJM Jonathon Monken
David Sayago EU Research Funding Team Valorisation Centre.
An Urgent National Imperative
EVP, Chief Administrative Officer
NERC Cyber Security Standard
A Global Perspective on Greening the Transport Sector
Cyber Risk & Cyber Insurance - Overview
Cybersecurity ATD technical
Enhanced alerting and collaborative incident management
AMI Security Roadmap April 13, 2007.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
The SAFERtec project on V2I security assurance: concept and vision
Computer Science and Engineering
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 26 September 2018.
MAZARS’ CONSULTING PRACTICE
Final Conference 18 Set 2018.
Managing IT Risk in a digital Transformation AGE
Cybersecurity at PJM Jonathon Monken
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Electricity Distribution and Energy Decarbonisation
Presentation transcript:

Cyber Resilient Energy Delivery Consortium

CREDC in a nutshell identify and perform cutting edge research and development whose results are actually used to increase cyber-resiliency of energy delivery systems

Supporting objectives Understand EDS cyber-resiliency investment from C-suite perspective Identify impediments and find highest impact adoptable solutions Develop, validate, verify high impact solutions, with industry Make solutions available Develop model of operation that is ultimately self-supporting

Supporting objectives Understand EDS cyber-resiliency investment from C-suite perspective Identify impediments and find highest impact adoptable solutions Develop, validate, verify high impact solutions, with industry Make solutions available Develop model of operation that is ultimately self-supporting

Supporting objectives Understand EDS cyber-resiliency investment from C-suite perspective Identify impediments and find highest impact adoptable solutions Develop, validate, verify high impact solutions, with industry Make solutions available Develop model of operation that is ultimately self-supporting

Supporting objectives Understand EDS cyber-resiliency investment from C-suite perspective Identify impediments and find highest impact adoptable solutions Develop, validate, verify high impact solutions, with industry Make solutions available Develop model of operation that is ultimately self-supporting

Supporting objectives Understand EDS cyber-resiliency investment from C-suite perspective Identify impediments and find highest impact adoptable solutions Develop, validate, verify high impact solutions, with industry Make solutions available Develop model of operation that is ultimately self-supporting

Educational Goals Develop cyber/energy aware graduates for industry and academia Create workforce development curriculum Create and deliver workshops to industry (e.g. at industry oriented forums) Create and deliver summer school Create K-12 hands-on and interactive educational materials

CREDC Research Team Paul Skare Shabbir Shamsuddin

Approach

Trends shaping CREDC research and DOE Roadmap goals Technology that creates new attack surfaces, IoT, cloud, distributed generation, electric vehicle infrastructure Evolving adversary Push towards standardization and compliance Increased integration of renewable energy Increased monitoring and control

Trends shaping CREDC research and DOE Roadmap goals Technology that creates new attack surfaces, IoT, cloud, distributed generation, electric vehicle infrastructure Evolving adversary Push towards standardization and compliance Increased integration of renewable energy Increased monitoring and control

Trends shaping CREDC research and DOE Roadmap goals Technology that creates new attack surfaces, IoT, cloud, distributed generation, electric vehicle infrastructure Evolving adversary Push towards standardization and compliance Increased integration of renewable energy Increased monitoring and control

Trends shaping CREDC research and DOE Roadmap goals Technology that creates new attack surfaces, IoT, cloud, distributed generation, electric vehicle infrastructure Evolving adversary Push towards standardization and compliance Increased integration of renewable energy Increased monitoring and control

Trends shaping CREDC research and DOE Roadmap goals Technology that creates new attack surfaces, IoT, cloud, distributed generation, electric vehicle infrastructure Evolving adversary Push towards standardization and compliance Increased integration of renewable energy Increased monitoring and control

CREDC Research Areas (with connections to Renewables)

Cyber-protection Technologies Develop new technologies and enhance existing technologies to protect EDS from cyber-attack, emphasis on using physical models for validation / spoof detection Cyber Monitoring, Metrics, and Evaluation Identify metrics that correlate with cyber events Monitor w/o disturbing EDS Leverage physical state for validity checks Account for uncertainties and unknowns in data, metrics correlation with cyber-events, risk of non-response, costs of dynamic response, effectiveness of solution

Risk Assessment of EDS Technology and Systems Forecasting cyber security events in EDS Cyber-physical modeling and analysis, quantification of risk Security risks in dynamic EDS Data Analytics for Cyber Event Detection, Management, Recovery Analyze volumes of EDS data to identify evidence of events that threaten resiliency, such as the presence of malicious actors or tampered data Privacy issues related to data sharing

Resilient EDS Architectures and Networks Explore how emerging networking technologies (e.g. software-defined networking) can be used in EDS to increase robustness, security, and resiliency Impact of Disruptive EDS Technologies on EDS Identify technology gaps impacting EDS resiliency in anticipation of coming impacts on how EDS systems are organized, cyber-technologies used on them, and on new threats to resiliency that will be exposed.