Presentation is loading. Please wait.

Presentation is loading. Please wait.

Governance and Oversight

Similar presentations


Presentation on theme: "Governance and Oversight"— Presentation transcript:

1 Cyber Security- Natural Gas (NG) Utilities and NG-Transmission Executive Session June 16, 2016

2 Governance and Oversight
CIO / CSO Board of Directors Enterprise Security Committee Director of Infrastructure and Security Guest Speakers Regular Reporting Conferences Sr. Security Manager Security Workgroups

3 Governance and Oversight Enterprise Security Committee
Members Dir. of Transmission Ops Dir. of IT and Security Dir. of Generation & Production Mgr. of Reliability Compliance Dir. of Corporate Communications Dir. of Electrical Engineering Sr. Legal Counsel Dir. Human Resources Dir. Environmental Affairs Dir. of Planning & Asset Management Dir of Natural Gas Enterprise Security Committee Work Groups

4 Cyber Security Framework

5 Security Framework (Example Only)

6 Smart Grid Security: Cyber Testing
Security Program Cyber Security (2010) Smart Grid Review (2011) Dept. Of Energy (2013) Physical Security (2014) Substation Security (2015) Vulnerability & Penetration Accuvant (2010) SAIC (2011) Cylance (2013) Optiv (2015)

7 Telecommunications Prefer utility owned and operated transport
Private wireless networks & Private leased lines Telemetry (Data acquisition rather than control) Segmentation and security inspection Security applied to the endpoint

8 Cyber-Security: Mutual Aid

9 WASHINGTON STATE EMD COMMUNITY CYBERSECURITY
Cyber-Security: Mutual Aid WASHINGTON STATE EMD COMMUNITY CYBERSECURITY MISSION To minimize the impact of cyber emergencies on the people, property, environment, and economy of Washington State VISION A public, private, and tribal partnership able to prepare for and respond to cyber emergencies with unity, competence, and efficiency for the good of the citizens of Washington State Our approach is in keeping with the National Response Framework: to manage cyber emergencies in a similar way to other threat profiles like earthquakes, wildfires, volcano eruptions, or terrorist attacks However, the unique complexities of the cyber threat profile require extensive planning, exercising, training, outreach and partnerships in order to prepare and respond

10 Questions?


Download ppt "Governance and Oversight"

Similar presentations


Ads by Google