CONTROL SYSTEM: RISK IDENTIFICATION AND MITIGATION PLAN Françoise GOUGNAUDJanuary 14th 21016.

Slides:



Advertisements
Similar presentations
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
Advertisements

<<replace with Customer Logo>>
Module 2.2 Security, legal and ethical issues Theme: Finding solutions.
Implementation Plans and Teams IACT424/924 Corporate Network Design and Implementation.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
How ISO 9001 Fits Into The Software World? Management of Software Projects and Personnel CIS 6516 March 6, 2006 Prepared by Olgu Yilmaz Swapna Mekala.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
CS370 Spring 2007 CS 370 Database Systems Lecture 2 Overview of Database Systems.
CS101 Introduction to Computing Lecture SW Development Methodology.
WU1 - Management S. Gammino (INFN). WU1 Management and TDR preparation: overview and criticalities 2 The WP6 aim is to define the best design of the Warm.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Chapter Three IT Risks and Controls.
COBIT - IT Governance.
Chapter 4: Overview of Preventive Maintenance
Installation and Maintenance of Health IT Systems
PROJECT 123 Business Case March 30, Page 1 Authors: Saltlane Table of Contents Executive Summary Background Scope Approach Resource Requirements.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
16 1 Installation  After development and testing, system must be put into operation  Important planning considerations Costs of operating both systems.
1 CS 426 Senior Projects Chapter 3: The Requirements Workflow [Arlow & Neustadt, 2005] January 31, 2012.
Risk Management for Software Projects. The curve that is the life of your project…
1-1 System Development Process System development process – a set of activities, methods, best practices, deliverables, and automated tools that stakeholders.
April 1, 2007 Global Design Effort 1 Materials for S4 meeting Discussion of risks in BDS WP April 1, 2007.
El-Omari, Samir Hartline, Chris M. Hau, Jenny H. Huynh, Nhi T. Johnson, Rodger D. Kwan, Winnie W.
Lecture # 17 PRM 702 Project Risk Management Ghazala Amin
Core Banking Transformation: A Roadmap to a Successful Core Banking Product Implementation - PMI Virtual Library | | © 2008 Kannan S. Ramakrishnan.
PMC Update on Cyber Sprint June 18, Overview: 30-Day Cyber Sprint 1.Interagency Cyber Sprint Team: Launched June 11 and executing against the.
Introducing Project Management Update December 2011.
PFP Instrument Status All PFP Instruments Except SWEA have been delivered, integrated, and tested; supporting environmental tests Issues: –EUV alignment.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Cloud Computing, Business Users & Google Raju Gulabani Director of Product Management, Google Apps Feb 25, 09.
Innovation Software Corporation's Cultural Awareness Training Program Presentation by:
Anjanae Brueland & Janet Wingard.  What is Network Design, Planning & Management?  System Development Life Cycle (SDLC)  The phases of an information.
SDC Update June 5, SDC Update – June 2012 Investment Plans submitted to OCIO for approval – Core Network – Firewall – Storage OB2 Heat Reduction.
1 OPTIMA INCO-MPC Fourth Management Board Meeting, December 19/ Milano DDr. Kurt Fedra Environmental Software & Services GmbH A-2352 Gumpoldskirchen.
Configuration of a support- plateform for data collection using Mobile technologies African Regional Conference on the use of mobile technology for statistical.
1 FLITECAM April 28, 2009 Ian McLean (Principal Investigator) UCLA Infrared Laboratory University of California, Los Angeles.
ESS RFQ PROJECT RISKS Anne-Catherine CHAUVEAU 14 January 2016.
Auditing of CBIS Chapter Ten. IIA Vs. AICPA IIA Audit Scope –Reliability and integrity –Complies with operating parameters –Review IC to safeguard assets.
Chapter 3: The Requirements Workflow [Arlow and Neustadt, 2005] CS 426 Senior Projects in Computer Science University of Nevada, Reno Department of Computer.
 Full scale audit of all their current network environment  Examination of the current security policy and physical security  Full scale audits will.
Cloud Computing ILAS project DONE BY:. Table of content INTRODUCTION. ◦ Cloud computing in general ◦ What are the things that worked during the implementation.
2.0 PROJECT INITIATION AND PLANNING The initiating and planning are the phase where process or workflow to develop the system will identify and planning.
Configuration Management By Abokor and Alireza. The Overview of Configuration Management  Network Configuration is a process of organising and maintaining.
Collaborating for Quality Quality Assurance (QA) & Quality Control (QC) in the Accelerator Project (ACCSYS) Matthew Conlon ACCSYS QA/QC
Status report on ICS interfaces (Accelerator, Target, NSS, CF) and related activities Miha Reščič Deputy Project Manager, ICS
The Real Cost of Late- Stage Change Orders Business Management & Information Technology Brief.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Overview of Preventive Maintenance IT Essentials 5.0.
Job offer IT System & Software Specialist We are currently looking for an IT database administrator in order to respond to one key-account customer demand.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
AMI System Status Report December 11, Project Objectives Selection, p rocurement and implementation of an AMI System that: Provides automated meter.
IS&T Project Reviews September 9, Project Review Overview Facilitative approach that actively engages a number of key project staff and senior IS&T.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Collaborating for Quality through the Project Quality Plan Matthew Conlon ESS ACCSYS QA/QC Quality Learning & Planning.
Test stand preparation and EMR "live" data summaries
Healthcare IT Services Company
Proton Source and LEBT Luigi Celona & Lorenzo Neri
ENTERPRISE RESOURCE PLANNING- ERP UNIT-1 INTRODUCTION Overview of Enterprise System Evolution Risks and Benefits Fundamental Technology Issues to be consider.
Cisco Dumps PDF Implementing Cisco Network Security RealExamCollection.com.
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education for Service-- tutorialrank.com
"IT principles" Context, roadmap
IS4680 Security Auditing for Compliance
SISAI STATISTICAL INFORMATION SYSTEMS ARCHITECTURE AND INTEGRATION
Website Content Management System (CMS)
Project Phases ‘98 ‘00 ‘02 ‘04 ‘06 Preparatory Phase
Status of Control Services ICS WP10 (accelerator integration work package) Tuesday 20th November
CS 140 Lecture Notes: Virtual Machines
Accelerator NCFE Liaison Officer
Stuart Birch On behalf of Protection Systems Group
Presentation transcript:

CONTROL SYSTEM: RISK IDENTIFICATION AND MITIGATION PLAN Françoise GOUGNAUDJanuary 14th 21016

| PAGE 2 OVERVIEW OF THE CONTROL RISKS TABLE 3 items:  Management of the WP  Owner: ESS AB  Design and development  Owner: CEA-ESSI  These risks and issues have a high probability to occur  Tests and commissioning  Owner: CEA-ESSI

| PAGE 3 CONTROL SYSTEM MANAGEMENT RISKS CEA is the first stakeholder to implement the CS, CS in a learning curve phase  lost time & delay in delivery. ICS coming to Saclay to bring efficient support.

| PAGE 4 CONTROL SYSTEM MANAGEMENT RISKS ICS coming to Saclay to bring efficient support. CB based on the small company IOxOS, may be unable to support hardware during the whole time of project Find backup solution. CEA is the first stakeholder to implement the CS, CS in a learning curve phase  lost time & delay in delivery.

| PAGE 5 CONTROL SYSTEM MANAGEMENT RISKS ICS coming to Saclay to bring efficient support. CB based on the small company IOxOS, may be unable to support hardware during the whole time of project Find backup solution. Additional cybersecurity requirements. CEA is the first stakeholder to implement the CS, CS in a learning curve phase  lost time & delay in delivery. Cybersecurity requirements to set up rapidly: activate SELinux, firewall, higher security on PLCs, authentication on common computers.

| PAGE 6 CS DESIGN & DEVELOPMENT RISKS Not all the guidelines and specifications have been provided yet to CEA-ESSI:  reworks will be needed. « Baseline PS and LEBT CS design » has to be written by CEA and approved by ESS. Done for the Source.

| PAGE 7 CS DESIGN & DEVELOPMENT RISKS Late delivery of ESS partners devices or cabling  delay of integration for the Source. All the guidelines and specifications have not been provided yet to CEA-ESSI: -  reworks could be needed. « Baseline PS and LEBT CS design » has to be written by CEA and approved by ESS. Done for the Source..

| PAGE 8 CS DESIGN & DEVELOPMENT RISKS Late delivery of ESS partners devices or cabling  delay of integration for the Source. New technologies with mandatory and inherent updates may lead to issues in software installation. ICS has to have its own repository to stabilize the development environment. Not all the guidelines and specifications have been provided yet to CEA-ESSI: -  reworks could be needed. « Baseline PS and LEBT CS design » has to be written by CEA and approved by ESS. Done for the Source.

| PAGE 9 CS TESTS & COMMISSIONING RISKS Evolution in technology (VME to µTCA) or updates during tests may extend the duration of tests. Anticipate technology evolution (VME to µTCA) by using real test benches and stabilizing the software environment.

| PAGE 10 CONCLUSION  Currently the major risks for CEA are delays in CS deliveries for Source & LEBT  Action plan  Mission to Catania End-January  to start the CS installation  to get a status of the installation and cabling of the cabinets