Cybersecurity Framework For Cooperative Utilities

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Advertisements

Cyber Security in Implementing Modern Grid Automation Systems Vijayan SR CIGRE SC D2 Tutorials & Colloquium on SMART GRID Mysore, 13 – 15 November 2013.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Stephen S. Yau CSE , Fall Security Strategies.
Payment Card Industry (PCI) Data Security Standard
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Website Hardening HUIT IT Security | Sep
GridWise ® Architecture Council Cyber-Physical System Requirements for Transactive Energy Systems Shawn A. Chandler Maseeh College of Electrical and Computer.
Bill Trelease VP – CTO Delhi Telephone Company
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Sandra C Security Advisor Energy Dan B Security Advisor Water
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Albany Bank Corporation Security Incident Management Program.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
Security Outsourcing Melissa Karolewski. Overview Introduction Definitions Offshoring MSSP Outsourcing Advice Vendors MSSPs Benefits & Risks Security.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
September 20, 2016 How to Defend Your Organization from a Cyber Breach LTC Tim Bloechl (U.S. Army, Ret.) Director, Cyber Security Business.
Onsite CRM Security
Security and resilience for Smart Hospitals Key findings
Law Firm Data Security: What In-house Counsel Need to Know
Managing Compliance for All Departments
Performing Risk Analysis and Testing: Outsource or In-house
OIT Security Operations
PCI-DSS Security Awareness
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Capabilities Matrix Access and Authentication
Designing, Building and Managing a Cyber Security Program Based on the NIST Cybersecurity Framework (NIST CSF) A Business Case.
Leverage What’s Out There
Intelligent Buildings and Cybersecurity
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Joe, Larry, Josh, Susan, Mary, & Ken
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
IS4550 Security Policies and Implementation
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
I have many checklists: how do I get started with cyber security?
Cyber Defense Matrix Cyber Defense Matrix
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Security as Risk Management
Cyber Security Best Practices
How to Mitigate the Consequences What are the Countermeasures?
Group Meeting Ming Hong Tsai Date :
Larry Bugh ECAR Standard Drafting Team Chair June 1, 2005
DER DATA Security Best Practices
Cyber Security Best Practices
Security week 1 Introductions Class website Syllabus review
Cybersecurity Framework For Energy Sector
Cyber Security in a Risk Management Framework
Data Security and Privacy Techniques for Modern Databases
IT Management Services Infrastructure Services
UDTSecure TM.
Presentation transcript:

Cybersecurity Framework For Cooperative Utilities NCEMC Technology Conference 2018 Erfan Ibrahim, PhD Founder & CEO The Bit Bazaar LLC August 17th, 2018

Agenda Background of speaker The building blocks of the coop cybersecurity framework Best practices for IoT security Four functional layers of IT/OT cybersecurity architecture Cyber governance assessment deep dive TBB SAFETM methodology for full life cycle protection of digital technology TBB cyber awareness training overview Call to action The Bit Bazaar LLC

Background of speaker PhD in Nuclear Engineering (UC Berkeley - 1987) 4 years in post doctoral fusion energy R&D (LLNL, UCLA) 4 years in academia (high school and college in CA) 12 years in IT, Telecom, networking, network management, cybersecurity 11 years in electric sector (smart metering, cybersecurity, IT/OT networks, renewable energy, SCADA, Smart Grid) Managed the cybersecurity and smart meter programs at EPRI 2008 - 2011 Organized the first set of workshops for Smart Grid for NIST in 2009 Led the DoE funded NESCOR cybersecurity project in 2010 – 2011 Created and led the cybersecurity program at National Renewable Energy Lab between 2015 – 2018 Hosting monthly Smart Grid webinars for industry since 2008 (5000+ community) The Bit Bazaar LLC

Cybersecurity framework building blocks Cyber governance assessment (NIST CSF, DoE C2 M2, ISO/IEC 27001) Documentation of business use cases (actors, transaction frequency, type and duration of data exchange, data storage requirements) Network architecture development to support use cases Cybersecurity architecture development to secure use cases Technology procurement requirements development (functional, networking, cyber) to align with use cases, network/cybersecurity architecture Hardening of systems (patching, scanning source code and binaries with vulnerability mitigation) Cyber penetration testing, data fuzz testing and failure scenarios/mitigation of critical applications Cyber security awareness training for IT, OT and corporate staff The Bit Bazaar LLC

Best practices for IoT security The “S” in IoT stands for security  Appreciate Flavor Flav quote for vendor IoT security propaganda (“Don’t believe the hype!”) IoT security begins at the network layer Don’t rely solely on IT centric security controls of IoT protocols (insider threat) Install hypervisor on IoT device (if possible) for added layer of security and resilience use .252 mask on each IoT device to create 2-host subnets set granular ACLs on gateway switches to block cross IoT device connectivity unless use case justifies it Implement IDS/IPS on the uplink of IoT gateway switch (block anomalous traffic) Create a 2-tier system of switches for all IoT devices (never connect IoT devices directly to primary Ethernet network in substation) Establish a separate VLAN for syslog alarms from IoT devices to Syslog server Visualize syslog alarms from IoT devices on Splunk > like tool in control center The Bit Bazaar LLC

Four functional layers for IT/OT cybersecurity architecture Authentication, authorization, stateful inspection, network segmentation Username, password, digital certificates, 2-factor authentication, access control lists, firewall policies, single sign on, TCP layer filters Signature based intrusion detection and prevention & anti-virus server Context based intrusion detection and prevention (protocol specific) End point security (hypervisor, OS firewall, tamper resistant software, resilient microprocessors) The manifestation of vendor agnostic zero trust network  The Bit Bazaar LLC

Cyber governance assessment deep dive Assessment of 386 business process security controls across 10 DoE C2 M2 domains (RM, ACM, SA, IR, ISC, WM, TVM, IAM, EDM, CPM) 4 levels of implementation (NIST CSF levels) 0 - not implemented 1 – partially implemented 2 – informed 3 – repeatable 4 – adaptive A subset of DoE C2 M2 controls across 5 categories of NIST CSF (identify, protect, monitor, respond, recover) Assessment of business process security controls from ISO/IEC 27001 The Bit Bazaar LLC

Cybernance CMOM automated software tool The Bit Bazaar LLC

CMOM automated software (contd.) The Bit Bazaar LLC

CMOM automated software (contd.) The Bit Bazaar LLC

TBB SAFETM methodology for digital technology protection The Bit Bazaar LLC

TBB cybersecurity awareness training overview Custom tailored for each cooperative utility based on business processes and organizational policies (1 month onsite prep) Onsite classroom style delivery 2.5 days (plenary and breakout sessions) Breakout sessions focused on IT, OT and corporate staff needs Interactive (workshop style paper exercises) Red-team, blue team exercises for IT/OT staff (trainers have top security clearances and background from defense and intelligence community) Continuing education credits with certificate of completion Annual refresher course available The Bit Bazaar LLC

Call to action Be active in your state wide initiative for cybersecurity Consider adopting TBB recommended cybersecurity framework at the state level for all cooperatives for effective and consistent protection of your data assets from insider and external cyber threats Decide what tasks you wish to perform internally or outsource to third parties to realize the framework Perform cyber governance assessment rapidly and cost effectively with TBB using CMOM software (possibility of partial funding assistance from NRECA) Reduce cyber insurance premiums with the implementation of the cybersecurity framework Don’t hesitate – the time to act is now before a data breach makes you incur high cost to recover (> $3.5 million per incident) The Bit Bazaar LLC

Grab the cyber bison by its horns – take charge! Contact Info Erfan Ibrahim 925-785-5967 erfan@tbbllc.com www.tbbllc.com