SlideShare a Scribd company logo
1 of 19
Page 1
Integration of
Technology &
Compliance
August 02, 2012
2012 Technologies for Security &
Compliance Summit
Austin, Texas
Page 2
John Heintz, CISSP, CISM,
CRISC
Senior Manager,
Enterprise IT Security
Page 3
• The city of San Antonio out bid
other entities to purchase the
SAPs Co for $34 million.
• The city sold off the street car
business and retained the power
generation, distribution and gas
network.
• Changed the name to City
Public Service and changed
through out the years to CPS
Energy.
• Oldest utility in Texas. Gas light system started in 1860’s.
• In 1917, San Antonio Public Service Company (SAPs CO), under the
ownership of American Light and Traction company ran the city’s power
plants, gas network and street car lines.
• In 1942, Anti-trust laws required American Light and Traction company to
sell some of it’s assets.
CPS Energy History (The early days)
Page 4
CPS Energy (Current)
• Based in San Antonio (7th largest city in the nation)
• Largest Municipally owned energy utility that provides both natural gas
and electric service
• Serve over 717,000 electric customers
• Over 325,000 gas customers
• 1,514 square mile service area.
• Over 3,600 employees
• $2 Billion in annual revenues
• $9.7 Billion in assets
• Provide roughly $250 - $280 million annual revenue to the City of San
Antonio.
Page 5
Generation
• Generation Assets
 Own and operate 4 major generation facilities in the San Antonio
area (Gas and Coal).
 Generates approximately 7000 Megawatts of power
 Own 40% of South Texas Project (STP) units 1 and 2.
 Provides 1088 megawatts of power for CPS Energy customers
 Has invested additional 7.625 % into additional units at STP.
 Would generate additional 200 megawatts of power for our customers.
• Fuel Mix
 Coal - 32%
 Nuclear - 16%
 Natural gas and purchased power -
39%
 Renewable (Wind, solar and landfill
methane gas) - 13%
 To increase to 20% by 2020.
Page 6
Transmission & Distribution
• Transmission & Distribution Assets
 Own and maintain 1400 Miles of transmission lines.
 Own and maintain 7600 miles of overhead distribution lines.
Over 408,000 poles
 Own and maintain additional 4300 miles of underground distribution lines.
Page 7
Enterprise IT Security Organization
• Enterprise IT Security Organization (EITS)
 Formed in May of 2007
 John Heintz began with CPS Energy almost 2 years ago
• EITS moved to Legal Department under General Council in 2009
 Provides true segregation of duties
 Reports to Senior Council and Director of Compliance.
• Baseline the EITS security program utilizing the Forrester
Information Security Maturity Model.
 Benchmarking tool to access the information security program.
 Provides framework that describes all of the required functions and
components of a comprehensive information security program.
 Forrester model is objective, prescriptive, process oriented, modular and
uncomplicated.
Page 8
Forrester Information Security Maturity Model
Oversight
• Strategy
• Governance
• Risk Management
• Compliance
Management
• Audit and Assurance
People
• Security Services
• Communication
• Security Organization
• Business Relationship
• Roles/Responsibilities
Technology
• Network
• Databases
• Systems
• Endpoints
• Application
Infrastructure
• Messaging and content
• Data
Process
• Identity and Access
Management
• Threat and vulnerability
management
• Investigations and
records management
• Incident management
• Sourcing and vendor
management
• Information Asset
Management
• Application/systems
development
• Business Continuity
and Disaster Recovery
Page 9
Maturity Model Self Assessment
0-
Nonexistent
•Not understood
•Not formalized
•Need is not
recognized
1-Ad Hoc
•Occasional
•Not Consistent
•Not Planned
•Disorganized
2-
Repeatable
•Intuitive
•Not
documented
•Occurs only
when necessary
3-Defined
•Documented
•Predictable
•Evaluated
occasionally
•Understood
4-Measured
•Well managed
•Formal
•Often
Automated
•Evaluated
Frequently
5-Optimized
•Continuous and
effective
•Integrated
•Proactive
•Usually
Automated
Most mature
companies are at
this stage.
Our corporate
network results
Page 10
Doing Well and What has already improved
• EITS - What are we doing well
– Endpoint Anti-Malware
– Network Intrusion Detection
– Anti-spam
– Policy Creation
– Security Event Management
• Other improvements already made
– Security Metrics
– Endpoint Protection
– Network Vulnerability
– Application Developer Security Awareness
– Vulnerability Management
– Security Testing
– Forensics and e-Discovery
– Threat Modeling
– Threat Research
– Client Encryption
– Project Integration
Page 11
Key Security / Compliance Challenges
• Technology
– Databases
• Encryption is ad hoc
– Systems
• Host based Firewalls and IPS
– Application Infrastructure
• XML gateway
• Application Firewall
– Messaging and Content
• Message Encryption
• Instant Message Filtering
• Anti-Malware
– Data
• Digital Rights Management
• Process
– Identity and Access
Management
• Web SSO
• Access Control
• Enterprise SSO
• People
– Security Organization
• Staffing
Page 12
Corporate Information Security Goal
0-
Nonexistent
•Not understood
•Not formalized
•Need is not
recognized
1-Ad Hoc
•Occasional
•Not Consistent
•Not Planned
•Disorganized
2-
Repeatable
•Intuitive
•Not
documented
•Occurs only
when necessary
3-Defined
•Documented
•Predictable
•Evaluated
occasionally
•Understood
4-Measured
•Well managed
•Formal
•Often
Automated
•Evaluated
Frequently
5-Optimized
•Continuous and
effective
•Integrated
•Proactive
•Usually
Automated
Key Security issues
are addressed, could
move here…
Page 13
James Grimshaw
Critical Cyber Infrastructure Manager,
Transmission Compliance
Page 14
Control Systems Cyber Security (or Compliance?)
• NERC Compliance Events
 January 2009 – One year to be fully compliant
 January 2010 - Fully compliant date
 October 2010 – TOP CFR Certification
 November 2011 – 1st Full TO/TOP/LSE CIP Audit
 2012 – Documented lessons learned (LL) and begin to implement LL during
annual updates
1. Manage and Communicate Compliance Activities
2. CIP-004 -3, R4 – Access Program
3. Management Dashboard
Page 15
Manage and Communicate Compliance Activities
• Annual reviews (Policies, Programs, Procedures etc…)
• Create compliance periodic reports
• Where to file (sensitive) associated reports and evidence
• Complete Reliability Standards Audit Worksheets (RSAWs)
• Create workflows for accountability, accuracy, & oversight
• Risk management – Escalation of non-completed workflows,
security trends
• Manage Technical Feasibility Exceptions, Mitigation Plans etc.
• Decrease interruption to Subject Matter Expert daily work
schedule
Page 16
Physical & Cyber Access Program
• Automate performance reviews and system generated reports
• Integrate systems to decrease risk & increase efficiency
• Physical Security Perimeter & Electronic Security Perimeter
• PSP Area Owners & Cyber System Owners
• Corporate Enterprise Resource Planning program for PRAs
• Corporate learning management system for NERC training records
• Weekly access report fed into management dashboard
• Automate position organizational changes, terminations and new
hires
• CIP Version 5 – Role based access (and other changes)
Page 17
Management Compliance Dashboard
• One of top ranked challenges is getting management support
 NERC Committee (Steering Group)
 Provide senior management with high level insight (drill down)
• Properly prioritize projects vs. compliance
• Properly prioritize funding
• Corporate level risk mitigation
Page 18
The Future for Control Systems Environments
• Working together with other Utilities
 CIP Working Group
• Continuous Process Improvement
 Invest to automate processes
 Integrate systems to decrease risk
• Stay informed and utilize resources
 NERC and ICSJWG Workshops
 Keep up with NERC & TxRE communications
 DOE/DHS
Page 19
Questions

More Related Content

What's hot

From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air ControlEnergySec
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...EnergySec
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...EnergySec
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationJoe Reddix
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyNandita Nityanandam
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case StudyDigital Bond
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIvanti
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsIgnyte Assurance Platform
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Global Business Events
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeePlus
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is RealePlus
 
Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your NetworkePlus
 
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with IgnyteMidway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with IgnyteIgnyte Assurance Platform
 

What's hot (20)

From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air Control
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - Presentation
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
 
Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your Network
 
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with IgnyteMidway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
 

Viewers also liked

Game Development in the Cloud - Live Q&A
Game Development in the Cloud - Live Q&AGame Development in the Cloud - Live Q&A
Game Development in the Cloud - Live Q&ARightScale
 
Insight SaaS Overview - Cloud Computing
Insight SaaS Overview - Cloud ComputingInsight SaaS Overview - Cloud Computing
Insight SaaS Overview - Cloud Computingjgasior
 
Docker Container As A Service - Mix-IT 2016
Docker Container As A Service - Mix-IT 2016Docker Container As A Service - Mix-IT 2016
Docker Container As A Service - Mix-IT 2016Patrick Chanezon
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesPing Identity
 
Data Governance for End-User Computing
Data Governance for  End-User ComputingData Governance for  End-User Computing
Data Governance for End-User ComputingDATAVERSITY
 
Martin Börjesson - Hvad er Bimodal IT?
Martin Börjesson - Hvad er Bimodal IT?Martin Börjesson - Hvad er Bimodal IT?
Martin Börjesson - Hvad er Bimodal IT?Aarhus BSS
 
Web Game Development
Web Game DevelopmentWeb Game Development
Web Game DevelopmentSabin Buraga
 
Technology Transformation Maturity Model
Technology Transformation Maturity ModelTechnology Transformation Maturity Model
Technology Transformation Maturity ModelEliot Arnold
 
Red Hat OpenShift Container Platform Overview
Red Hat OpenShift Container Platform OverviewRed Hat OpenShift Container Platform Overview
Red Hat OpenShift Container Platform OverviewJames Falkner
 
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015Martin Thompson
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextDavid Sweigert
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 

Viewers also liked (14)

Game Development in the Cloud - Live Q&A
Game Development in the Cloud - Live Q&AGame Development in the Cloud - Live Q&A
Game Development in the Cloud - Live Q&A
 
Obsidian Agile DevOps
Obsidian Agile DevOpsObsidian Agile DevOps
Obsidian Agile DevOps
 
Insight SaaS Overview - Cloud Computing
Insight SaaS Overview - Cloud ComputingInsight SaaS Overview - Cloud Computing
Insight SaaS Overview - Cloud Computing
 
Docker Container As A Service - Mix-IT 2016
Docker Container As A Service - Mix-IT 2016Docker Container As A Service - Mix-IT 2016
Docker Container As A Service - Mix-IT 2016
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
 
Data Governance for End-User Computing
Data Governance for  End-User ComputingData Governance for  End-User Computing
Data Governance for End-User Computing
 
Martin Börjesson - Hvad er Bimodal IT?
Martin Börjesson - Hvad er Bimodal IT?Martin Börjesson - Hvad er Bimodal IT?
Martin Börjesson - Hvad er Bimodal IT?
 
Web Game Development
Web Game DevelopmentWeb Game Development
Web Game Development
 
Technology Transformation Maturity Model
Technology Transformation Maturity ModelTechnology Transformation Maturity Model
Technology Transformation Maturity Model
 
Red Hat OpenShift Container Platform Overview
Red Hat OpenShift Container Platform OverviewRed Hat OpenShift Container Platform Overview
Red Hat OpenShift Container Platform Overview
 
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 context
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 

Similar to Integration of Technology & Compliance Presented by John Heintz, CPS Energy

EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPScott Baron
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessDan Yarmoluk
 
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility EnergyTech2015
 
Simplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachSimplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachp6academy
 
PiT 29 October 2014 Presentation - Seqwater
PiT 29 October 2014 Presentation - SeqwaterPiT 29 October 2014 Presentation - Seqwater
PiT 29 October 2014 Presentation - SeqwaterDigital Queensland
 
2014 06-06 open data summit deck v1
2014 06-06 open data summit deck v12014 06-06 open data summit deck v1
2014 06-06 open data summit deck v1Samuel Wong
 
module_1_chapter_1.pptx
module_1_chapter_1.pptxmodule_1_chapter_1.pptx
module_1_chapter_1.pptxArsalanT2
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?Denodo
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliancesAhmadi Madi
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...元 黄
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsBarcoding, Inc.
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...Formulatedby
 
Tata steel ideation contest
Tata steel ideation contestTata steel ideation contest
Tata steel ideation contestashwinikumar1424
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0Valdez Ladd MBA, CISSP, CISA,
 

Similar to Integration of Technology & Compliance Presented by John Heintz, CPS Energy (20)

EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
 
APM
APMAPM
APM
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT Process
 
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
 
Demystifying internet of things
Demystifying internet of thingsDemystifying internet of things
Demystifying internet of things
 
Simplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachSimplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approach
 
PiT 29 October 2014 Presentation - Seqwater
PiT 29 October 2014 Presentation - SeqwaterPiT 29 October 2014 Presentation - Seqwater
PiT 29 October 2014 Presentation - Seqwater
 
2014 06-06 open data summit deck v1
2014 06-06 open data summit deck v12014 06-06 open data summit deck v1
2014 06-06 open data summit deck v1
 
module_1_chapter_1.pptx
module_1_chapter_1.pptxmodule_1_chapter_1.pptx
module_1_chapter_1.pptx
 
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019 PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management Systems
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...
 
Tata steel ideation contest
Tata steel ideation contestTata steel ideation contest
Tata steel ideation contest
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
 
Tata steel ideation contest
Tata steel ideation contestTata steel ideation contest
Tata steel ideation contest
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Integration of Technology & Compliance Presented by John Heintz, CPS Energy

  • 1. Page 1 Integration of Technology & Compliance August 02, 2012 2012 Technologies for Security & Compliance Summit Austin, Texas
  • 2. Page 2 John Heintz, CISSP, CISM, CRISC Senior Manager, Enterprise IT Security
  • 3. Page 3 • The city of San Antonio out bid other entities to purchase the SAPs Co for $34 million. • The city sold off the street car business and retained the power generation, distribution and gas network. • Changed the name to City Public Service and changed through out the years to CPS Energy. • Oldest utility in Texas. Gas light system started in 1860’s. • In 1917, San Antonio Public Service Company (SAPs CO), under the ownership of American Light and Traction company ran the city’s power plants, gas network and street car lines. • In 1942, Anti-trust laws required American Light and Traction company to sell some of it’s assets. CPS Energy History (The early days)
  • 4. Page 4 CPS Energy (Current) • Based in San Antonio (7th largest city in the nation) • Largest Municipally owned energy utility that provides both natural gas and electric service • Serve over 717,000 electric customers • Over 325,000 gas customers • 1,514 square mile service area. • Over 3,600 employees • $2 Billion in annual revenues • $9.7 Billion in assets • Provide roughly $250 - $280 million annual revenue to the City of San Antonio.
  • 5. Page 5 Generation • Generation Assets  Own and operate 4 major generation facilities in the San Antonio area (Gas and Coal).  Generates approximately 7000 Megawatts of power  Own 40% of South Texas Project (STP) units 1 and 2.  Provides 1088 megawatts of power for CPS Energy customers  Has invested additional 7.625 % into additional units at STP.  Would generate additional 200 megawatts of power for our customers. • Fuel Mix  Coal - 32%  Nuclear - 16%  Natural gas and purchased power - 39%  Renewable (Wind, solar and landfill methane gas) - 13%  To increase to 20% by 2020.
  • 6. Page 6 Transmission & Distribution • Transmission & Distribution Assets  Own and maintain 1400 Miles of transmission lines.  Own and maintain 7600 miles of overhead distribution lines. Over 408,000 poles  Own and maintain additional 4300 miles of underground distribution lines.
  • 7. Page 7 Enterprise IT Security Organization • Enterprise IT Security Organization (EITS)  Formed in May of 2007  John Heintz began with CPS Energy almost 2 years ago • EITS moved to Legal Department under General Council in 2009  Provides true segregation of duties  Reports to Senior Council and Director of Compliance. • Baseline the EITS security program utilizing the Forrester Information Security Maturity Model.  Benchmarking tool to access the information security program.  Provides framework that describes all of the required functions and components of a comprehensive information security program.  Forrester model is objective, prescriptive, process oriented, modular and uncomplicated.
  • 8. Page 8 Forrester Information Security Maturity Model Oversight • Strategy • Governance • Risk Management • Compliance Management • Audit and Assurance People • Security Services • Communication • Security Organization • Business Relationship • Roles/Responsibilities Technology • Network • Databases • Systems • Endpoints • Application Infrastructure • Messaging and content • Data Process • Identity and Access Management • Threat and vulnerability management • Investigations and records management • Incident management • Sourcing and vendor management • Information Asset Management • Application/systems development • Business Continuity and Disaster Recovery
  • 9. Page 9 Maturity Model Self Assessment 0- Nonexistent •Not understood •Not formalized •Need is not recognized 1-Ad Hoc •Occasional •Not Consistent •Not Planned •Disorganized 2- Repeatable •Intuitive •Not documented •Occurs only when necessary 3-Defined •Documented •Predictable •Evaluated occasionally •Understood 4-Measured •Well managed •Formal •Often Automated •Evaluated Frequently 5-Optimized •Continuous and effective •Integrated •Proactive •Usually Automated Most mature companies are at this stage. Our corporate network results
  • 10. Page 10 Doing Well and What has already improved • EITS - What are we doing well – Endpoint Anti-Malware – Network Intrusion Detection – Anti-spam – Policy Creation – Security Event Management • Other improvements already made – Security Metrics – Endpoint Protection – Network Vulnerability – Application Developer Security Awareness – Vulnerability Management – Security Testing – Forensics and e-Discovery – Threat Modeling – Threat Research – Client Encryption – Project Integration
  • 11. Page 11 Key Security / Compliance Challenges • Technology – Databases • Encryption is ad hoc – Systems • Host based Firewalls and IPS – Application Infrastructure • XML gateway • Application Firewall – Messaging and Content • Message Encryption • Instant Message Filtering • Anti-Malware – Data • Digital Rights Management • Process – Identity and Access Management • Web SSO • Access Control • Enterprise SSO • People – Security Organization • Staffing
  • 12. Page 12 Corporate Information Security Goal 0- Nonexistent •Not understood •Not formalized •Need is not recognized 1-Ad Hoc •Occasional •Not Consistent •Not Planned •Disorganized 2- Repeatable •Intuitive •Not documented •Occurs only when necessary 3-Defined •Documented •Predictable •Evaluated occasionally •Understood 4-Measured •Well managed •Formal •Often Automated •Evaluated Frequently 5-Optimized •Continuous and effective •Integrated •Proactive •Usually Automated Key Security issues are addressed, could move here…
  • 13. Page 13 James Grimshaw Critical Cyber Infrastructure Manager, Transmission Compliance
  • 14. Page 14 Control Systems Cyber Security (or Compliance?) • NERC Compliance Events  January 2009 – One year to be fully compliant  January 2010 - Fully compliant date  October 2010 – TOP CFR Certification  November 2011 – 1st Full TO/TOP/LSE CIP Audit  2012 – Documented lessons learned (LL) and begin to implement LL during annual updates 1. Manage and Communicate Compliance Activities 2. CIP-004 -3, R4 – Access Program 3. Management Dashboard
  • 15. Page 15 Manage and Communicate Compliance Activities • Annual reviews (Policies, Programs, Procedures etc…) • Create compliance periodic reports • Where to file (sensitive) associated reports and evidence • Complete Reliability Standards Audit Worksheets (RSAWs) • Create workflows for accountability, accuracy, & oversight • Risk management – Escalation of non-completed workflows, security trends • Manage Technical Feasibility Exceptions, Mitigation Plans etc. • Decrease interruption to Subject Matter Expert daily work schedule
  • 16. Page 16 Physical & Cyber Access Program • Automate performance reviews and system generated reports • Integrate systems to decrease risk & increase efficiency • Physical Security Perimeter & Electronic Security Perimeter • PSP Area Owners & Cyber System Owners • Corporate Enterprise Resource Planning program for PRAs • Corporate learning management system for NERC training records • Weekly access report fed into management dashboard • Automate position organizational changes, terminations and new hires • CIP Version 5 – Role based access (and other changes)
  • 17. Page 17 Management Compliance Dashboard • One of top ranked challenges is getting management support  NERC Committee (Steering Group)  Provide senior management with high level insight (drill down) • Properly prioritize projects vs. compliance • Properly prioritize funding • Corporate level risk mitigation
  • 18. Page 18 The Future for Control Systems Environments • Working together with other Utilities  CIP Working Group • Continuous Process Improvement  Invest to automate processes  Integrate systems to decrease risk • Stay informed and utilize resources  NERC and ICSJWG Workshops  Keep up with NERC & TxRE communications  DOE/DHS

Editor's Notes

  1. For everyone from Texas please be patient while I take a few slides to describe CPS Energy. This is a brief Mr. Heintz uses a various forums.
  2. Tag-line for our Customers!
  3. The Forrester Information Security Maturity Model details 123 components that comprise a successful security organization, grouped in 25 functions, and 4 high level domains (sometimes referred to as categories): Oversight, People, Technology and Process, with subcategories under each.
  4. The Forrester Information Security Maturity Model
  5. We need to ensure our security system integration is where we want it to ensure CPS Energy reduces our security risk.
  6. Coordinated Functional Registration Agreement for the Transmission Operator Function - Electric Reliability Council of Texas, Inc. (ERCOT ISO), which is the independent system operator for the ERCOT Interconnection, and below-signed Local Control Center (LCC), which operates a control center for a discrete portion of the bulk-power system within the ERCOT Interconnection
  7. Looking for cyber solutions to assist us with these compliance activities