The Environment. The business environment  The critical infrastructure business environment has changed Information Technology offers opportunity for.

Slides:



Advertisements
Similar presentations
Framework for K-Farm Green Value Chain Production of Carambola
Advertisements

Strategic case for information & IT Acknowledgements to Euan Wilson (Staffordshire University)
© QinetiQ North America, Inc QinetiQ North America, Inc. 1 Implementing an Enterprise Security Framework – Safeguarding Your Most.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
Bridging the Gaps: Public Health and Radiation Emergency Preparedness Mr. James Kish, Director Technological Hazards National Preparedness Directorate.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Wireless Solution Training for the (Enterprise) Carpeted Office February 2004 Tina Herrera
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Secure disposal and recycling Service and competitive pricing Service.
Embracing IP Multimedia Services for Strategic Business Advantage Rick Seeto VP & GM Enterprise Networks, Asia Pacific.
Water scarcity and business: constraints and opportunities Alex McNamara NCPC Industrial Efficiency Conference, Durban ICC, 22 July 2015.
ELECTRICAL CRITICAL INFRASTRUCTURE SECURITY Charles Hookham, P.E., M.ASCE, VP, Utility Projects HDR Engineering 1.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Evolving IT Framework Standards (Compliance and IT)
Business Crisis and Continuity Management (BCCM) Class Session
Green Jobs. A “green job”  Has a direct, essential impact on a product, service or process that results in an environmental benefit.
Models for Estimating Risk and Optimizing the Return on Security Investment.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Business Plan Teaser For your company XSEEDCapital GmbH ®2014 XSEEDCapital.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
 Issue: Big Data In Energy How can the energy sector leverage big data technology?
Proposed Centralized Sales Support Server Implementation.
Global City Teams Challenge September 29-30, 2014 Report Out: Project X.
Marketing in Today’s Economy
Maritime Cyber Vulnerabilities in the Energy Sector Center for Joint Operations of the Sea ODU Maritime Institute Students Crow, Fresco, Lee.
Maritime Cyber Security: An Overview May | | What is Maritime Cyber Security?
Settling the Frontier: The Convergence and Impact of Privacy and Security Practices Chris Israel Deputy Assistant Secretary for Technology Policy U.S.
Presents The NetBotz Homeland Security Solution A Texas Company Protecting Texans.
ClearView Value-adding Services for Non-Profit Operations Management Transparency for Understanding, Visibility for Decisions N OT F OR P ROFIT S ERVICES.
SECURITY CONSULTING /DISASTER RECOVERY SERVICE The “Must Have Plans” for a Business in the World of Tomorrow.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Microsoft Belgium Security Summit Georges Ataya S olvay B usiness S chool, ISACA Belux Detlef Eckert Microsoft EMEA.
Hurdles in implementation of cyber security in India.
Chapter 1 Investments - Background and Issues McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved. Investments & Financial.
Pacific Texas Corporation PICACHO PIPELINE Natural Gas PROJECT Phoenix, Arizona 2004.
Capital Improvements & Infrastructure: Hazards Profile #1 - Current Hazards Risks & Impacts Looking at the hazards maps and data, what locations, impacts.
The problem: what risk was been addressed The objective.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Climate Adaptation and Hazard Resilient Coastal Communities Climate Adaptation in Coastal Communities: A Network Approach to Outreach Workshop November.
Physical Security Market to Global Analysis and Forecasts by Application, Services No of Pages: 150 Publishing Date: Jan 2017 Single User PDF: US$
Physical Security Market to Global Analysis and Forecasts by Application, Services No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Industrial Control Systems.
Cybersecurity as a Business Differentiator
Why Choose Exera to Secure your Business?
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
MGT 498 TUTORIAL Success trials - mgt498tutorial.com
and Security Management: ISO 28000
SUPPORT OPTIONS Note to Presenter: This is a high-level presentation of EMC’s CSS Support Options. Backup slides are also available which include additional.
How to prepare for the End of License of Windows Server 2012/R2
ESSENTIALS OF A PHYSICAL SECURITY SYSTEMS RISK ASSESSMENT
CIS 333Competitive Success/tutorialrank.com
CMGT 431 STUDY Lessons in Excellence--cmgt431study.com.
MGT 498 TUTORIAL Lessons in Excellence -- mgt498tutorial.com.
MGT 498 Education for Service-- snaptutorial.com
الباب الثاني الأنواع المختلفة للشركات
Sharing of Underground Data - A Utility Perspective
Who We Are BlueI provides a holistic management system for water quality By providing a total water analytics solutions along side with state of the art.
The University of Adelaide, School of Computer Science
Marketing in Today’s Economy
Knowledge and skills for sustainable development:
GRC - A Strategic Approach
Effective Risk Management in Decision Making Process
Information Security Risks; All-in-One Terminology
Presentation transcript:

The Environment

The business environment  The critical infrastructure business environment has changed Information Technology offers opportunity for enhanced, efficient and more profitable service delivery – and competitive advantage Threats are present, real and formidable Impact of unmitigated threat is damage to business Demands of governance, liability potential for cyber threat are real and unambiguous  Business must think differently about threat environment Not a problem for which there is a solution, but a new way of thinking about threat, risk -- cyber security is now a constant element of decision making Security is more than defense: it is an essential element of the successful company’s plan to stay in business in a threat environment 2

IT- SCADA Comparison 3 CHARACTERISTICITSCADA SafetyLow ConcernHighest Concern Network DelayUsually acceptableNever acceptable Throughput (Bandwidth)Usually highLow Physical Security Easily implemented most places Hard to implement at remote sites Tech RefreshEvery 3 to 5 years years or more PatchingRoutine or on demandSeldom or unfeasible Environment Clean, temperature controlled Dirty, extreme temperatures DowntimeAcceptable based on missionUnacceptable Environmental Impact of Incident NoneNone to Catastrophic System SecurityHigh ConcernLow Concern

IT-SCADA Security Priority Comparison 4 ConfidentialityIntegrityAvailability SafetyAvailabilityIntegrityConfidentiality

Perspective on Critical Infrastructure Protection 5 Cyber Security Security of Physical Assets Security of OT system Security of IT system