Session title: Protection of Smart Utility Grids Group edited strategy.

Slides:



Advertisements
Similar presentations
Secure Smart Grids Edward Chow Professor of Computer Science University of Colorado at Colorado Springs Freshmen Welcome 2009 Chow1.
Advertisements

Creating a Low Carbon City with a High Quality of Life for All Bristol’s Experiences.
Secure Smart Grid Edward Chow Department of Computer Science University of Colorado at Colorado Springs Edward Chow Department of Computer Science University.
Vendor Briefing May 26, 2006 AMI Overview & Communications TCM.
ANALYTICS: BRINGING VALUE TO THE UTILITIES IN MITIGATING ENERGY LOSSES José-Manuel LOPEZ Istanbul, May 9, 2014.
1 Grid Modernization – A Strategic Imperative for 2050 Advanced Energy Conference May 1, 2013 By Carl Imhoff Electric Infrastructure Sector Manager Pacific.
Workforce & Engineering Design Optimization Plenary Session: Enterprise Resource Planning for Infrastructure and Utilities Gurgaon India Feb GIS.
Recognising the Risks of Cyber Threats Across the Organisation John Thornton Secretary to the Digital Government Security Forum.
1. 2 Jamie Caplan Square D by Schneider Electric Energy Solutions – Northwest Tel:
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Focus Group on Smart Sustainable Cities ITU-T Giampiero Nanni Leader of the “Technical report on cyber-security, data protection & cyber-resilience in.
Department Operations Center Quarterly Meeting January 18 th, 2011.
August 8, 2015ECI Confidential. AccessWave Smart Grid Market Trends& Applications Matthias Nass VP Field Marketing EMEA.
What is Smart Grid/Metering for electric distribution? Should they be implemented in the US? Presented by: Jeffrey Grodzki, April Romanishan, Cameron Hinkel,
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
Frankfurt (Germany), 6-9 June 2011 ENEL Group Italian core European base Worldwide strategy Italy’s largest power company. Europe’s second listed utility.
Thomas DEGNER -DE- BETA SESSION 4b: Integration of RES+DG Barcelona May DISPOWER Distributed Generation with High Penetration of Renewable.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Security Challenges for Customer Domain in the Smart Grid
Andrea Ricci - ISIS Brussels, 12 April 2012 Smart Grids: Overview of the study and main challenges 1.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
Use case for discussion Smart Metering with Satellite Communications Group Name: WG#1 Source: Inmarsat Meeting Date: Joint-REQ-ARC-WGs-call Agenda Item:
SECURITY WG Paul Howell, Eric Boyd Internet2 © 2015 Internet2.
P4.
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
The Smart Grid: A Brief Introduction Qinran Hu Ph.D. Candidate Jun 12 th, 2014 Knoxville, Tennessee.
Frankfurt (Germany), 6-9 June 2011 Smart Grid Protection in China Wu Guopei Guangzhou Power Supply Bureau Guangdong Power Grid, China.
Power IT Solution in KEPCO. com Contents Introduction 1 EIS in KEPCO 2 Results of EIS 3 Future Expansion 4 You can briefly add outline.
Global City Teams Challenge September 29-30, 2014 Report Out: Project X.
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300.
DCC SERVICES FOR THE ENERGY INDUSTRY What now? What next? Jonathan Bennett DCC DCC PUBLIC.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
MARPHLI Cutting-Edge Issues in Management and Leadership Bradley A. Perkins, MD, MBA Director Office of Strategy and Innovation,
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
ENISA efforts for securing European Internet Infrastructure
International Telecommunication Union Committed to connecting the world ITU-T Focus Group on Smart Sustainable Cities Giampiero Nanni Co-Leader of the.
CIP 2015 Smart Grid Vulnerability Assessment Using National Testbed Networks IHAB DARWISHOBINNA IGBETAREQ SAADAWI.
June 17, 2009 Michael W. Howard, Ph.D. Sr. Vice President The Interoperable Smart Grid Evolving.
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
Secure Communications—No Compromise Real Time Communications in Emergency Response Planning and Operations Tim Vittetoe VIACK Corporation.
Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming Hongbo Liu, Yingying Chen Department of ECE Stevens Institute.
Pecan Street Project Inc.. Things change What’s in it for the customer?
SMART GRID A smart grid for intelligent energy use. By: Suhani Gupta.
Smart Grid Schneider Electric Javier Orellana
Consumers Energy Advanced Metering Infrastructure Review and Feedback Utility AMI / Open HAN Meeting August 15, 2007.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Technical Assistance for Civil Society Organisations Regional Office This project is funded by the European Union STRATEGIC PLANNING Same logic Where we.
Smart Grid Vision: Vision for a Holistic Power Supply and Delivery Chain Stephen Lee Senior Technical Executive Power Delivery & Utilization November 2008.
Metering Americas April 24, 2006 Advanced Metering.
EEA priorities on circular economy Multi-annual work programme OutputsTime frame Briefing on progress towards a circular economy in EuropeAnnual.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
Joint Radio Company: Making the spectrum and technology work for your business Adrian Grilli Managing Director, JRC Ltd, London Technical Adviser, European.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS.
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
Understanding Your Options
Security and resilience for Smart Hospitals Key findings
Sessione interattiva: Autovalutazione della cyber security della tua Azienda [WISER Team] #CyberSecPractice.
Panel Discussion Can We Handle an Advanced Cyber Threat?
Cybersecurity, an important element of stability for the energy sector
كيف تكتب خطة تشغيلية لمنظمة **
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Smart Grid Overview] Date Submitted: [13.
כלי אבחון.
AMI Security Roadmap April 13, 2007.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
M.Eng. Alessandro Mancuso Supervisor: Dr. Piotr Żebrowski
Presentation transcript:

Session title: Protection of Smart Utility Grids Group edited strategy

Three opportunities 1.Integration of dispersed generation sources 2.European target 2022 for complete smart metering household coverage. –Differing requirements between Network Operator, Supplier 3.Move from closed SCADA system to one which is more integrated

Future technologies required Next generation of smart meters and standardisation Application of defense technologies in this area Authentication, advanced access control technologies

Practical steps required by research organisations Advanced research into next generation smart meters and standardisation Further research into the mitigation of realistic threat scenarios and enablement of rapid recovery from network outages Research into SCADA attack vectors to ensure first that the system can be recovered and second that the attack surface is closed to prevent future attacks.