We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAmber Gorman
Modified over 2 years ago
© 2012 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Electric Sector Security Awareness Rising 1 May 2013 IBM Industry Security
© 2012 IBM Corporation IBM Security Systems 2 © 2013 IBM Corporation 2 In the beginning...
© 2012 IBM Corporation IBM Security Systems 3 © 2013 IBM Corporation Presenting: the grid
© 2012 IBM Corporation IBM Security Systems 4 © 2013 IBM Corporation 4 The great convergence
© 2012 IBM Corporation IBM Security Systems 5 © 2013 IBM Corporation Grid operations and security
© 2012 IBM Corporation IBM Security Systems 6 Both sides of the aisle care about this
© 2012 IBM Corporation IBM Security Systems 7 Environment & Smart Grid security: connecting the dots 1) Environment improves when fossil fuel use is reduced 2) Utility-scale and DG wind, solar, hydro + EE + DR help reduce fossil fuel use 3) But the legacy grid can't tolerate the high levels of intermittency in wind and solar 4) So in the US and elsewhere we're modernizing the grid for this (and a number of other reasons) 5) However, if adversaries can reveal the Smart Grid to be susceptible to repeated, disruptive attacks, we won't trust it enough to deploy it 6) Many orgs and individuals are working to secure the Smart Grid 7) However, since we don't measure security it's hard to know how secure/insecure we are at present, and if/when it's secure enough based on risk tolerance 8) Developing and deploying mutually agreed version 1.0 security metrics and using them to identify gaps and roadmap to an improved state can get us back to the top
© 2012 IBM Corporation IBM Security Systems 8 –Presidential EO and NIST Crit Infra Cybersecurity Framework working group (Mar 2013) Developing metrics to baseline CI providers –DOE's Electricity Subsector Cybersecurity Maturity Model (Jun 2012) Metrics for utilities to use to baseline and gauge effectiveness –DOEs Electricity Subsector Risk Management Process (May 2012) Help translating cybersecurity into risk management framework –NARUC's Cybersecurity for State Regulators (Jun 2012, Feb 2013 update) Questions utilities will be asked by their state public utility commissions –NISTs NISTIR 7628 Assessment Guide (Aug 2012) –NRECA's Guide to Developing a Cybersecurity and Risk Mitigation Plan (June 2011) A measurement movement is forming
© 2012 IBM Corporation IBM Security Systems 9 Security Governance for utilities 1.Security as risk management 2.A fully integrated security enterprise 3.Security by design 4.Business-oriented security metrics and measurement 5.Change that begins at the top 6.IBMs 10 essential security actions
© 2012 IBM Corporation IBM Security Systems 10 Making security metrics – here's a start
© 2012 IBM Corporation IBM Security Systems 11 Ibm.com/energy ibm.com/security © Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBMs sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Andy Bochman WW Energy Security Lead Andy Bochman WW Energy Security Lead
® IBM Software Group © 2010 IBM Corporation Rational Publishing Engine and Rational Change configuration Francisco López Minaya Rational Technical Solution.
© 2009 IBM Corporation iEA16 Defining and Aligning Requirements using System Architect and DOORs Paul W. Johnson CEO / President Pragmatica Innovations.
® IBM Software Group © 2009 IBM Corporation Improve Collaboration Across Multiplatform Teams with IBM Rational Team Concert for System z David Lawrence.
© 2009 IBM Corporation SDP023 Extending Rational Team Concert 2.0 Jean-Michel Lemieux Team Concert PMC Jazz Source Control Lead IBM Rational Software Ottawa,
® IBM Software Group © 2008 IBM Corporation IBM Rational Team Concert Mason Young Rational Brand Specialist IBM Rational Software
IBM Rational Requirements Management Tools Achieving better control over your requirements.
Sreenath Chary IBM Systems Group-System z Business Unit Executive Managing TCO with SOA: Platform Makes the Difference!
InfoSphere Information Server: Trends & Tactics for Improving Data Quality of your Business Intelligence Solution.
DevOps & Continuous Delivery Accelerating the delivery of value to the business David Myers February, 2013.
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Proprietary and Confidential. 1.
The following 10 questions test your knowledge of Internet-based client management in Configuration Manager Configuration Manager 2007 Internet-Based.
Integrating IBM WebSphere Portal with Web Analytic Hosted and Non-Hosted Sites Stefan Liesche Richard Gornitsky #1298.
March Technical Documentation License Agreement (Standard) READ THIS! This is a legal agreement between Microsoft Corporation (“Microsoft”) and.
Źródło:http://msdn.microsoft.com/en-us/library/ms aspxhttp://msdn.microsoft.com/en-us/library/ms aspx.
1 of 17 Information Strategy The Features of an Information Strategy © FAO 2005 IMARK Investing in Information for Development Information Strategy The.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
© 2011 IBM Corporation IBM Software 1 IBM InfoSphere Classic Federation Server for z/OS Provide fast, automated SQL access to mainframe data Our understanding.
“SG-Systems” (Smart Grid – Operational Applications Integration) “Boot Camp” Overview Greg Robinson, Co-Chair, SG-Systems Brent Hodges, Chair, SG-Systems.
Insert your company logo here (on slide master). Insert your company logo here (on slide master) Developed by the Department of Communications, Information.
© 2013 IBM Corporation Implement high-level parallel API in JDK Richard Ning – Enterprise Developer 1 st June 2013.
1 Note content copyright © 2004 Ian Sommerville. NU-specific content copyright © 2004 M. E. Kabay. All rights reserved. Process Improvement IS301 – Software.
© 2016 SlidePlayer.com Inc. All rights reserved.