Keeping the Lights on in a Dangerous World

Slides:



Advertisements
Similar presentations
VSE Corporation Proprietary Information
Advertisements

Xanthus Consulting International Smart Grid Cyber Security: Support from Power System SCADA and EMS Frances Cleveland
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Jeffery J. Gust IOWA INDUSTRIAL ENERGY GROUP FALL CONFERENCE Tuesday, October 14, 2014 MidAmerican Energy Company.
Power Utilities in the Telecom Business in the USA: Past Failures and Future Trends Mike Oldak Vice President & General Counsel Utilities Telecom Council.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Homeland Security Conference Symposium on Homeland Security & Defense Christopher Newport University May 18,
SafeZone® patent pending 1 Detect. Inform. Prevent. NERC Physical Security Standards and Guidelines SafeZone® Detect. Inform. Prevent.
ELECTRICAL CRITICAL INFRASTRUCTURE SECURITY Charles Hookham, P.E., M.ASCE, VP, Utility Projects HDR Engineering 1.
Why Make NJ Energy Strong? Sandy, Hurricane Irene and the October 2011 snow storm represent extreme weather patterns that may become commonplace. For.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Phoenix Convention Center Phoenix, Arizona When Prevention and Preparation May Not be Enough: Resilience and Recovery for the Electricity Sub-Sector Operational.
Role for Electric Sector in Critical Infrastructure Protection R&D Presented to NERC CIPC Washington D.C. June 9, 2005 Bill Muston Public Release.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
The Challenging Landscape of Critical Information Infrastructure: Are We Ready? Leonard Bailey Senior Counsel Computer Crime & Intellectual Property Section.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
North American Energy Infrastructure Policy Philip Gonda Steven Mays Robert Floyd Josh Kapp.
Created by: Ashley Spivey For Department of Homeland Security All information from:
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Ayman Irziqat Katarzyna Kosarska Sergio Pradel 1.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Threat Intelligence Program Primer NASCUS August 1, 2016 Chicago, IL Christina Saari, Senior Cyber Intelligence Officer National Credit Union Administration.
R ISK AND R ESILIENCE FOR THE G RID : T HRESHOLDS AND T IPPING P OINTS James Newcomb Understanding Risk; Boulder CO, October 2015.
Module 8 Risk Management. Manager, Customer Services Module 8Slide - 2 Objective The learner will be able to: –Develop an understanding of Security Responsibility.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Industrial Control Systems.
Resiliency and Reliability
Proactive Incident Response
Cyber Insurance Risk Transfer Alternatives
Broadband Challenges 2017 Christopher Tamarin
NS4054 Fall Term 2015 U.S. Energy Planning in a Period of Rapid Change
Nation State Actors Lex Dunlap.
How Secure Is Our Power Grid?
Information Security – Current Challenges
Iowa Communications Alliance
Security Risk Profiles – Tips and Tricks
Joint Force Headquarters-Michigan CCIRs and PIRs
Cyber Physical Attack Detection
Goals and Targets to Direct FY2010 Budget and Stimulus
California Cybersecurity Integration Center (Cal-CSIC)
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Joint Force Headquarters-Michigan CCIRs and PIRs
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024Low Power Wide Area Network.
8 Building Blocks of National Cyber Strategies
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
One Utility’s Path to Climate Change Readiness
India Smart Grid Week, 2016 Yogendra Patwardhan
Cybersecurity, an important element of stability for the energy sector
Pacific Power Seismic Preparedness Update
Categorizing and Assessing the Severity of Disruptive Cyber Incidents
Karen Bartleson, President, IEEE Standards Association
Role for Electric Sector in Critical Infrastructure Protection R&D
John M. Felker Director, NCCIC.
Federal Protective Service
Factors to Consider when Designing a Reliable Power Grid
2013 Long-Term Reliability Assessment and Other Key Assessment Initiatives Briefing.
EVP, Chief Administrative Officer
Alison Silverstein Contributor to DOE 2017.
Factors to Consider when Designing a Reliable Power Grid
Preparing for a Terrorist Attack Indian Point Energy Center
Long-Term Power Outage
Deborah Housen-Couriel, ADV.
Adding security to your ICS environment? Fine! But how?!
Presentation transcript:

Keeping the Lights on in a Dangerous World Adam S. Lee, Vice President and CSO Dominion Energy January 11, 2019

Dominion Energy: Who We Are January 11, 2019 January 11, 2019

Ukraine 2015 and 2016 Outages 2015 cyberattack against electric distribution Outage for 225,000 customers Attack against multiple utilities Numerous cyber related attack techniques 2016 cyberattack against electric transmission Tailored ICS malware, uses the ICS system capabilities to perform its work Source: https://dragos.com/blog/crashoverride/ CrashOverride-01.pdf Source: https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf January 11, 2019

Russia’s Threat to Energy Sector Dragonfly 2.0 targeted grid operators, power generators, pipeline operators, equipment providers (Source: Symantec) US-CERT Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors Used many cyberattack techniques, tactics, and procedures (TTPs) Targeted industrial control systems Source:www.symantec.com/blogs/threat-intelligence/dragonfly-energy-sector-cyber-attacks January 11, 2019

Energy is a key aspect of China 2025 Plan Made in China 2025 Electrical equipment, energy saving, and new energy vehicles Smart grids as an area to improve its research and development Intellectual Property theft / economic espionage May 2014 – hackers targeting U.S. nuclear power, metals and solar products industries December 2018 – hackers who were part of APT10 with conspiracy against the oil and gas sector and a national energy research laboratory Intellectual Property theft / economic espionage May 2014 indictment of five Chinese military hackers for activities targeting U.S. nuclear power, metals and solar products industries December 2018 indictment of two Chinese hackers who were part of APT10 with conspiracy to commit computer intrusions, conspiracy to commit wire fraud, and aggravated identity theft including against the oil and gas sector and a national energy research laboratory https://supchina.com/2018/06/28/made-in-china-2025/ :https://www.uschamber.com/sites/default/files/final_made_in_china_2025_report_full.pdf Source: https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor https://www.justice.gov/opa/pr/two-chinese-hackers-associated-ministry-state-security-charged-global-computer-intrusion January 11, 2019

Kinetic Attacks 2013 Metcalf substation attack Communications infrastructure - fiber cuts Sniper shoots at equipment in station Damage to transformers and circuit breakers No outage to customers $15 million in damage Source: http://www.cpuc.ca.gov/uploadedFiles/CPUC_Website/Content/Safety/Presentations_ for_Commission_Meeting/SafteySlidesfromPowerPointforthe22714Meeting3331.pdf https://www.wsj.com/articles/assault-on-california-power-station-raises-alarm-on-potential-for-terrorism-1391570879?tesla=y January 11, 2019

Domestic Terrorism/ Environmental Extremism Environmental activists Attempts to disrupt or prevent building of infrastructure Protests against existing generation (e.g., coal plants) Extremists against land use: NIMBY (Not in my backyard) https://www.greenpeace.org/usa/news/ greenpeace-activists-climb-coal-elevator-at-bridgeport-coal-plant/ Block construction paths / damage construction equipment Tampering with pipeline valves Attaching themselves to construction equipment Source: https://www.washingtontimes.com/ news/2016/oct/27/authorities-begin-removal-dakota-access-protest-ca/ January 11, 2019

Disruptive Weather: Hurricanes/ Tropical Storms, Ice, Wind 2011 Irene: 1.2 million customers impacted 2012 Super Derecho: 1.0 million customers impacted 2018 Wind Storm: 690,000 customers impacted 2018 Tropical Storm Michael: 600,000 customers impacted January 11, 2019

Risk-based Approach Assess Risk Analyze Threat Intelligence Assess Posture & Identify Gaps Implement Capabilities Continuous Monitoring Incident Response/ Recovery January 11, 2019

Philosophy Defense-in-Depth Resilience-in-Depth Multiple layers of defense Continually asking “what if” an attacker gets past a line of defense Layers of defense aligned with risk profile Resilience-in-Depth Identify critical single points of failure or exposure Design redundancy, fault tolerance, and recovery capabilities Layers of resilience aligned with risk profile January 11, 2019

Threat Intelligence and Information Sharing Within Industry Active participants in industry information sharing and analysis centers (ISACs) Industry and regional peer groups Industry trade associations Private – Public Partnerships Intelligence Community Federal, state and local law enforcement U.S. Department of Energy January 11, 2019