We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAmber Gorman
Modified over 3 years ago
© 2012 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Electric Sector Security Awareness Rising 1 May 2013 IBM Industry Security
© 2012 IBM Corporation IBM Security Systems 2 © 2013 IBM Corporation 2 In the beginning...
© 2012 IBM Corporation IBM Security Systems 3 © 2013 IBM Corporation Presenting: the grid
© 2012 IBM Corporation IBM Security Systems 4 © 2013 IBM Corporation 4 The great convergence
© 2012 IBM Corporation IBM Security Systems 5 © 2013 IBM Corporation Grid operations and security
© 2012 IBM Corporation IBM Security Systems 6 Both sides of the aisle care about this
© 2012 IBM Corporation IBM Security Systems 7 Environment & Smart Grid security: connecting the dots 1) Environment improves when fossil fuel use is reduced 2) Utility-scale and DG wind, solar, hydro + EE + DR help reduce fossil fuel use 3) But the legacy grid can't tolerate the high levels of intermittency in wind and solar 4) So in the US and elsewhere we're modernizing the grid for this (and a number of other reasons) 5) However, if adversaries can reveal the Smart Grid to be susceptible to repeated, disruptive attacks, we won't trust it enough to deploy it 6) Many orgs and individuals are working to secure the Smart Grid 7) However, since we don't measure security it's hard to know how secure/insecure we are at present, and if/when it's secure enough based on risk tolerance 8) Developing and deploying mutually agreed version 1.0 security metrics and using them to identify gaps and roadmap to an improved state can get us back to the top
© 2012 IBM Corporation IBM Security Systems 8 –Presidential EO and NIST Crit Infra Cybersecurity Framework working group (Mar 2013) Developing metrics to baseline CI providers –DOE's Electricity Subsector Cybersecurity Maturity Model (Jun 2012) Metrics for utilities to use to baseline and gauge effectiveness –DOEs Electricity Subsector Risk Management Process (May 2012) Help translating cybersecurity into risk management framework –NARUC's Cybersecurity for State Regulators (Jun 2012, Feb 2013 update) Questions utilities will be asked by their state public utility commissions –NISTs NISTIR 7628 Assessment Guide (Aug 2012) –NRECA's Guide to Developing a Cybersecurity and Risk Mitigation Plan (June 2011) A measurement movement is forming
© 2012 IBM Corporation IBM Security Systems 9 Security Governance for utilities 1.Security as risk management 2.A fully integrated security enterprise 3.Security by design 4.Business-oriented security metrics and measurement 5.Change that begins at the top 6.IBMs 10 essential security actions
© 2012 IBM Corporation IBM Security Systems 10 Making security metrics – here's a start
© 2012 IBM Corporation IBM Security Systems 11 Ibm.com/energy ibm.com/security © Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBMs sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Andy Bochman WW Energy Security Lead email@example.com Andy Bochman WW Energy Security Lead firstname.lastname@example.org
® IBM Software Group © 2011 IBM Corporation Innovation for a smarter planet IBM SOA Overview for MITRE “Driving SOA Program Success and Efficiency” April.
European Mobility & Endpoint Security User Group.
© 2013 IBM Corporation IBM Security Systems © 2012 IBM Corporation Offense Magnitude.
IBM Software Group ® Jazz Storage Service Thomas.
IBM Software Group ® RTC Agile Planning Component Thomas.
IBM Software Group ® Process Sequence to call ProcessAdminService from browser Thomas.
© 2013 IBM Corporation IBM UrbanCode Deploy v6.0.1 Support Enablement Training Source Configuration and Database Upgrades Michael Malinowski
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
DevOps and UrbanCode Deploy Scott Pecnik. Development and Operations Contraction of Development and Operations Industry History “DevOps Days” in 2009.
IBM Software Group ® Jazz Team Build – Part 1 Overview Jonathan.
IBM Software Group ® Jazz Process Component —Process Template Management Thomas.
© 2013 IBM Corporation IBM UrbanCode Deploy v6.0 Support Enablement Training Jenkins plug-in 1 November 2013.
® IBM Software Group © 2010 IBM Corporation Rational Publishing Engine and Rational Change configuration Francisco López Minaya Rational Technical Solution.
© 2009 IBM Corporation iEA16 Defining and Aligning Requirements using System Architect and DOORs Paul W. Johnson CEO / President Pragmatica Innovations.
® IBM Software Group © 2007 IBM Corporation Achieving Harmony IBM's Platform and Methodology for Systems Engineering and Embedded Software Development.
© 2012 IBM Corporation Introducing IBM Cognos Insight.
June 5–9 Orlando, Florida IBM Innovate 2011 Session Track Template Rainer Ersch Senior Research Scientist Siemens AG ALM-1180.
© 2014 IBM Corporation Rational Developer for i Rational Developer for i Modern IBM Development Tools for System i (AS/400) Brad Adams IBM Software, Rational.
® IBM Software Group © 2012 IBM Corporation OPTIM Data Studio – Jon Sayles, IBM/Rational November, 2012.
® © 2016 IBM Corporation Comparison between EPF Composer and Rational Method Composer.
© 2013 IBM Corporation LDAP Fundamentals & LDAP for CLM Bruce Besch IBM Rational Services.
IBM Innovate 2012 Title Presenter’s Name Presenter’s Title, Organization Presenter’s Address Session Track Number (if applicable)
© 2009 IBM Corporation ® IBM Lotus Notes and Domino Product Roadmap April 2009.
© 2015 IBM Corporation Big Data Journey. © 2015 IBM Corporation 2.
© 2013 IBM Corporation Green Hat Technology Demo Certification Program.
© 2009 IBM Corporation SDP023 Extending Rational Team Concert 2.0 Jean-Michel Lemieux Team Concert PMC Jazz Source Control Lead IBM Rational Software Ottawa,
IBM ISPF Productivity Tool © 2008 IBM Corporation IBM ISPF Productivity Tool for z/OS V 5.10 More Than Just ISPF.
® IBM Software Group © 2013 IBM Corporation Innovation for a smarter planet Timeboxes in a New Paradigm of Behavior Modeling Barclay Brown, ESEP IBM
© 2009 IBM Corporation Select View/Master/Slide Master to add Session Number Here The Enterprise Architecture Workspace: Your Architecture Blueprint Martin.
© 2012 IBM Corporation May 2012 Rational Token Licensing: Licensing Adaptable to Changing User Needs.
® IBM Software Group © 2008 IBM Corporation IBM Rational Team Concert Mason Young Rational Brand Specialist IBM Rational Software
© 2008 IBM Corporation IBM Software Group An IBM Proof of Technology Discovering the value of IBM WebSphere Portal V6.1 WebSphere Portal v6.1 開發訓練 Elvin.
Work smarter, keep connected with Lotus Software Jon Crouch | Senior Technical Specialist, Lotus Software Matt Newton | Senior Technical Specialist, Lotus.
Click to add text © 2012 IBM Corporation Session # INV305 Getting beyond “good enough” with Microsoft Sharepoint Louis Richardson Worldwide Social Business.
® IBM Software Group © 2007 IBM Corporation Modeling Software Engineering Processes using Eclipse Process Framework Composer (EPFC) / Rational Method Composer.
Click to add text © 2012 IBM Corporation 1 Streams Toolkit Landscape InfoSphere Streams Version 3.0 Mike Branson Toolkits.
Click to add text © 2012 IBM Corporation 1 InfoSphere Streams Streams Console Applications InfoSphere Streams Version 3.0 Warren Acker InfoSphere Streams.
Domino iSeries Multi-Versioning © 2002 IBM Corporation | Lotus software © 2002 IBM Corporation Domino Multi-Versioning Mike Gordon – IBM Global Services.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM X-Force Threat Intelligence Quarterly 2Q 2014 Diana Kelley Executive Security.
Lotus Domino Document Manager: Next Steps Jelan Heidelberg, Offering Manager Dave Kajmo, Product Manager
© 2014 IBM Corporation The insights to transform the business with speed and conviction Kevin Redmond Head of Information Management Central & Eastern.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM X-Force: The Emerging Threat Landscape Michael P. Hamelin Lead X-Force Security.
Design Management: When Model Driven Engineering Embraces the Semantic Web NECSIS 2012, Gatineau, QC 27 June 2012 Maged Elaasar.
© 2011 IBM Corporation Overview on Modeling RESTful Services August, 2011 Manoj Paul, Software Developer, Rational,
© 2010 IBM Corporation IBM Rational Enterprise Architecture Management 25 August 2010.
© 2017 SlidePlayer.com Inc. All rights reserved.