1 Landis+Gyr Confidential Analyst Presentation November 2008`1 Confidential Company Overview & Update DRAFT November 2008 Cyber-Security & Interoperability.

Slides:



Advertisements
Similar presentations
Update on Texas Smart Grid Activity Christine Wright Public Utility Commission of Texas.
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Achieving Price-Responsive Demand in New England Henry Yoshimura Director, Demand Resource Strategy ISO New England National Town Meeting on Demand Response.
Google Confidential and Proprietary 1 The Power of Information Dan Reicher National Town Meeting on Demand Response and Smart Grid July 13, 2009 Washington,
Demand Response & Smart Grid
Setting Standards for the Smart Grid George W. Arnold, Eng.Sc.D. National Coordinator for Smart Grid Interoperability National Institute of Standards and.
Smart Grid: an Ontario Perspective Brian Hewson, Senior Manager Regulatory Policy Hamilton May 8, 2013.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Potential Smart Grid standardisation work in ETSI Security and privacy aspects Carmine Rizzo on behalf of Scott CADZOW, C3L © ETSI All rights reserved.
Multivendor Interoperability
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Building Confidence in E-government Services ITU-T Workshop on.
© State Services Commission, 2006 Authentication to access government services What might the future hold? Laurence Millar Deputy Commissioner Information.
Developing and Executing a Global Data Strategy March 16, 2010
Palo Alto Networks Jay Flanyak Channel Business Manager
Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP
June 2010 Smart Grid Wireless Solutions End-to-end Smart Meter/Grid solution, specifically designed to meet the demands of Utilities and their customers.
Impact of Smart Grid, ICT on Environment and Climate Change David Su Advanced Network Technologies National Institute of Standards and Technology ITU Symposium.
Development of the Smart Grid Implementation of the Board’s Policies Smart Grid Working Group November 29, 2012.
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
To have your cake and eat it: Planning for a future EHR and meeting todays needs Jonah Aburrow-Jones, Senior Vice President The HCI Group 3 rd March 2015.
Off-the-Record Communication, or, Why Not To Use PGP
UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
0 © 2011 Silver Spring Networks. All rights reserved. Building the Smart Grid.
AMI Home Area Network Update SAG Meeting March 18, 2014.
Vendor Briefing May 26, 2006 AMI Overview & Communications TCM.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Cyber Security and the Smart Grid George W. Arnold, Eng.Sc.D. National Institute of Standards and Technology (NIST) U.S. Department of Commerce
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Focus Group on Smart Sustainable Cities ITU-T Giampiero Nanni Leader of the “Technical report on cyber-security, data protection & cyber-resilience in.
EU Commission Task Force for Smart Grids Expert Group 3: Roles and Responsibilities of Actors involved in the Smart Grids Deployment Samia Benrachi-Maassam.
Cyber Threats/Security and System Security of Power Sector Workshop on Crisis & Disaster Management of Power Sector P.K.Agarwal, AGM Power System Operation.
REV Total SaaS global revenues of $13.1 billion in 2009 Total SaaS estimated revenues of $40.5 billion by % of CRM software in 2011 will.
1 Challenges For A Credit Bureau In Emerging Markets.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Smart Grid Interoperability Standards George W. Arnold, Eng.Sc.D. National Coordinator for Smart Grid Interoperability National Institute of Standards.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
DOE’s Smart Grid R&D Needs Steve Bossart Energy Analyst U.S. Department of Energy National Energy Technology Laboratory Materials Challenges in Alternative.
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
SEC835 Database and Web application security Information Security Architecture.
Lessons Learned in Smart Grid Cyber Security
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
SmartSynch NOTE: The representations as to SmartSynch’s offerings are those of SmartSynch and Verizon Wireless makes no representation as to their accuracy.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
THE MOBILE CHANNEL IN FINANCIAL SERVICES TARIK HUSAIN BUSINESS DEVELOPMENT DIRECTOR ASIAN BANKER SUMMIT APRIL 2011.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 End to End Security on the Smart Grid Perry Jurancich Utilities Vertical Market Development Verizon.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All SMART GRID ICT: SECURITY, INTEROPERABILITY & NEXT STEPS John O’Neill, Senior Project Manager CSA.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Copyright Frost & Sullivan Mobile Digital Rights Management: Managing Rights, Managing Revenues Interactive Analyst Briefing Allison Webb 12 March 2003.
“Best Value/Risk Ratio” The Case for End-to-end Standards Bill Vogel Trilliant Networks, Inc. August 21, 2007.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
June 17, 2009 Michael W. Howard, Ph.D. Sr. Vice President The Interoperable Smart Grid Evolving.
An Overview of the Smart Metering Programme in GB.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
Myongji University HMCL
Jeju, 13 – 16 May 2013Standards for Shared ICT Dr. Farrokh Khatibi Director of Engineering Qualcomm ATIS and the Smart Grid Document No: GSC17-PLEN-63.
Santa Clara 2008 Smart Meters and Home Automation Ember Corporation Bob Gohn VP Marketing
Asset Performance Management
Agenda Control systems defined
Information Technology Sector
National Mining University
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Licensed under a CC BY-SA license
Presentation transcript:

1 Landis+Gyr Confidential Analyst Presentation November 2008`1 Confidential Company Overview & Update DRAFT November 2008 Cyber-Security & Interoperability Breakout - Michelle Mindala-Freeman National Town Meeting – July 14, 2009

2 Landis+Gyr Confidential Introduction… + Many of Landis+Gyr customers have been early adopters of intelligent, automated metering systems + We design smart grid solutions for these customers & prospects that meet operational & financial objectives and consumers needs + We believe interoperability isn't an end – its an process that requires diligence in design & implementation to deliver real value + Security is paramount; however, delivering a secure smart grid is a journey…perhaps without a final destination + Our core approach is to deliver the right building blocks for an interoperable and secure smart grid – rapidly delivery technology at the pace of value - value to the utility, to the consumers and to this growing market

3 Landis+Gyr Confidential Landis+Gyr – where we are the smart grid… Meters & Endpoints Communication Networks Data Management Application Demand Management Distribution Automation Deployment & Operations Services + 5,000 people in 30 countries with $1.3B+ in sales. + Over $1B invested in more than a dozen companies + 15+years of fixed network deployment and measurement automation experience + Global leader in metering – PG&E, PEPCO, SMUD, E.ON, CHED + Leader in fixed networks - 20M+ embedded endpoints - Oncor, Austin Energy, AEP Texas, Fortis Alberta

4 Landis+Gyr Confidential Interoperability – a means or an end? + A smart grid [will] employ real-time, two-way communication technologies to allow users to connect directly with power suppliers. The development of the grid will create jobs and spur the development of innovative products that can be exported. + The greatest benefit from the smart grid will be interoperability that will open up every aspect of the generation, distribution, and use of energy to innovation. * Source: NIST Interim SG Standards June 09 + Products/ Services + Improved Competition + Time to Market + Customer Value

5 Landis+Gyr Confidential Interoperability – what can we learn? + Internet analogy + Telecom analogy + Interoperability Plug and Play + Specifications Uniformity + Sameness Value

6 Landis+Gyr Confidential How can we move forward faster? + Stay focused on drivers + Prioritize - set the value pace + Allow market forces to work + Drive, not stall, deployments + Leverage upgradability + Value to Consumers + Value between Systems + Value within the System + Scale with International Standards + Flexibility for different Utility conditions

7 Landis+Gyr Confidential How is Landis+Gyr approaching Interoperability? + Develop for Value 1 st --- Interoperability at Head-End and HAN + Protect for the Future -- Secure upgradability – Meter, Comms & HAN + Create Scale – Supporting International standards & working groups – Promoting Common information/Data Model – Multispeak CIM + Evolve for next value phase -- Working to fill standards gaps / refine – Meter tables – Common PHY/MAC – Mesh routing protocols

8 Landis+Gyr Confidential Security + Cyber security is a critical issue due to the increasing potential of cyber attacks and incidents against this critical sector as it becomes more and more interconnected. Cyber security must address deliberate attacks…[and] inadvertent compromises of the…infrastructure* + Key issues: – Risk mitigation & protection in current systems – Standards to assess & address risks in the system – Addressing future vulnerability as the grid evolves

9 Landis+Gyr Confidential Landis+Gyrs Protections Today + Privacy, Accuracy & Authenticity of Information – AES encryption & protocol wrappers – Randomized Meshed Paths – Unique Channel Schemes – HAN leveraging ECC + Avoiding Disruption or Malicious Use of the Network – Role-based access control – Device registration and validation – Limited allowable / verified actions at the edge – Natural protection via network design

10 Landis+Gyr Confidential No one can sit still… + Disruptions on a widescale today would take tremendous experimentation & determination, with limited results + However… – Aug 18, Staged cyberattack exposes vulnerability in power grid – March 21 st, 2009 – Power Grid Is Found Susceptible to Cyberattack – April 8 th, Electricity Grid in U.S. Penetrated By Spies – June 12 th, 2009 – Hacking will be demonstrated in July + The cat and mouse chase is on – system managers & vendors will improve security postures as exploits are developed

11 Landis+Gyr Confidential An approach to ongoing protection Non-Repudiation – Proof of Origin and Receipt NR Providing Individual or System Identity Authentication Avoiding Disruption of Service Ensuring Information is Unaltered Availability and Integrity Keeping Information Secret Confidentiality

12 Landis+Gyr Confidential Landis+Gyrs Top Recommended Security Practices + Implement strong security techniques, such as mutual authentication, cryptography & message integrity verification to protect information + Provide countermeasures to identify potential breaches, the areas affected, and a means for users timely reaction + Ensure protection of all user and credential information, allowing access according to designated rights. + Incorporate use of access controls to ensure access to certain data/functionality is allowed only to specific trusted entities + Train all employees who have access to AMI data or controls. + Perform ongoing 3 rd -party penetration testing to uncover vulnerabilities

13 Landis+Gyr Confidential Thank you Michelle Mindala-Freeman VP, Marketing & Product Management, North Am