Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 D2-02_12 Comprehensive Cybersecurity strategy for Smartgrid equipment manufacturers SC D2.

Slides:



Advertisements
Similar presentations
Elements for Integrating Early Warning into Disaster Preparedness and Management Policies A Contribution of the EWC-II Advisory Group to the High level.
Advertisements

J. David Tàbara Institute of Environmental Science and Technology Autonomous University of Barcelona Integrated Climate Governance.
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
A. ArzuagaCIGRE D2 Colloquium - Mysore November 2013 D2-01_37 WAN Network Communications Architectures for Smartgrids: Case Study comparison Authors: Arzuaga,
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
State Treasury System Peter Bulla director of the Department of State Treasury System management Ministry of finance SR 6th september 2005.
Workforce & Engineering Design Optimization Plenary Session: Enterprise Resource Planning for Infrastructure and Utilities Gurgaon India Feb GIS.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Policy Models  “A model should clarify the issues in the debate; it must be able to enforce a discipline of analysis and discourse among stakeholders;
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
1 Kuwait Central Agency for information technology.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
BioMedical Computing and Standards. BioMedical Computing Medical Equipment Cellular and system simulation Data mining for medical correlations Determining.
SEC835 Database and Web application security Information Security Architecture.
D2-02_09 Construction of Next-generation Security Infrastructure to Cope with Next Types of Cyber Attacks Takehiro Sueta Kyushu Electric Power Co., Inc.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Conostix S.A. Sensible defence.
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Security considerations for mobile devices in GoRTT
Federal Acquisition Service U.S. General Services Administration June 3, 2013 Joint Working Group on Improving Cybersecurity and Resilience through Acquisition.
Board of Directors & Technical Committee Thursday, March 29, 2012 Data Management (Contract) Field Data Collection & Database Development Solution Presented.
NEET Workgroup #3 - Residential Subgroup Snohomish County PUD November 2008.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
NIST Update: Part Deux Elaine Newton, PhD NIST
Risk management (lecture). D efinitions of risk General: standard deviation Finance: volatility of return and costs Risk in project management (Lockyer.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Information Security What is Information Security?
Integrating a comprehensive audio design into the overall game design audio within game design Most aspects of a game design will influence or be influenced.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
ENISA efforts for securing European Internet Infrastructure
OUTLOOK 2009 Emerging Technologies and Trends October 2009.
IHE PCD Analysis Committee Meeting October 26, 2009.
Training of Information Security for Common Users Dr. Francisco Eduardo Rivera FAA SALT Conference, February 18, 2004.
Jeff Miller Tamra Pawloski IT Procurement Summit headline news…
Advanced Sensors for the Smartgrid
Information Security IBK3IBV01 College 3 Paul J. Cornelisse.
© 2007 Avaya Inc. All rights reserved. Avaya – Proprietary & Confidential. Under NDA Flatten, Consolidate, Extend (FCE) Feasibility and Justification Presenter.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
ISACA’S 2015 IT RISK/REWARD BAROMETER: A GLOBAL LOOK AT IOT SECURITY October 2015.
Information Systems in Organizations 3.2 Systems Management.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
VII. COLLABORATION/DELEGA TION A. DEFINED UNIT two: STRATEGIES for PROFESSIONAL DEVELOPMENT.
Lecture1.1(Chapter 1) Prepared by Dr. Lamiaa M. Elshenawy 1.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Snowfensive At Snowfensive.com, we provide specialized cyber security risk assessments for organizations. We also give security awareness training for.
Eric Peirano, Ph.D., TECHNOFI, COO
GCTC Transportation Super Cluster Smart City SDK
Your Partner for Superior Cybersecurity
Cloud Security for eHealth – Study Validation
Eric Peirano, Ph.D., TECHNOFI, COO
Presenter: Mohammed Jalaluddin
On-Line Meeting 2 October 25, 2016.
Security of In-Vehicle Software
Towards End-to-End Data Protection in Low-Powered Networks
USA Final Project Report
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Today’s Risk. Today’s Solutions. Cyber security and
Securing Your Digital Transformation
ISMS Information Security Management System
Final Conference in Paris Exploitation plan
Cyber Risk & Cyber Insurance - Overview
Security for Safety: Enabling Digitalization of Railway Systems
The whole is… 10-FRAME PART-WHOLE EARLY NUMBER SENSE.
Completing a task relevant to cybersecurity Case 2
DiFens E-MANUAL for Young Entrepreneurs
Streamline your move to the cloud
Presentation transcript:

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 D2-02_12 Comprehensive Cybersecurity strategy for Smartgrid equipment manufacturers SC D Colloquium in Mysore, Karnataka, India

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 GAP of knowledge Energy knowledge Communication knowledge SMARTGRID Security knowledge

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 What is cybersecurity

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 Standards for cybersecurity

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 SGAM

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 Use cases & SGIS  Use cases :  Split the whole problem into more affordable issues Vs. maximalist approaches  At least take into account information assets, owners and actors

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 Other aspects Detection Response Prevention  Information security is not only prevention  Bottom down approach: Penetration testing  Awareness

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 Conclusions  Day to day task  Not dealing with securities but probabilities  Need to incorporate the body of knowledge of cybersecurity experts  Risks Vs. Performance  Efforts in different standardization groups  Cybersecurity must be part of the design process

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 Special report Q2_10: questions  What are the recommendations of the authors for integrated operations of end-consumers/ devices with utility systems – given the current state of cyber security maturity in the domain?  Can a security breach occur from a consumer appliance or by consumer?

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 S.R. Q2_10: contribution (I)  Q: What are the recommendations of the authors for integrated operations of end-consumers/ devices with utility systems – given the current state of cyber security maturity in the domain?  A: Recommendations:  No security through obscurity or proprietary solutions  Incorporate security body of knowledge  Use common sense = risk analysis  Security in depth Vs. panic

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 S.R. Q2_10: contribution (II)  Q: Can a security breach occur from a consumer appliance or by consumer?  A: What is a security breach? To which scale?  Availability: Easy to some extent. Vital?  Confidentiality: Privacy & duration  Integrity: Perhaps the most risky?  Take control of other devices: Early detection

Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 THANK YOU