SlideShare a Scribd company logo
1 of 44
ENERGYSEC 10TH
ANNIVERSARY SUMMIT
August 12-22, 2014
Austin, Texas
Feldman comments – a view from 50K ft.
Distribution
Reliability
Berkeley Lab Study Estimates $80 Billion Annual Cost of Power
Interruptions - 70 page study. http://www.EnergyCollection.us/Energy-
Reliability/The-Cost-Of-Power-Interruptions-2004-09-01-70.pdf
Energy Sources and Sinks
RTOs/ ISOs
Secondary Decisions
Wind / Cost / Reliability
Duck Curve
Today
Tomorrow
Incentives
Additional Information
• PaulFeldman@Gmail.com
• Board of Directors – Governance – Cybersecurity Paper –
http://www.EnergyCollection.us/456.pdf
• Collected Resources – http://EnergyCollection.us/457.pdf
• Industry Strategy Paper –
http://www.EnergyCollection.us/211.pdf
• This presentation in PDF –
http://www.EnergyCollection.us/0334.pdf

More Related Content

What's hot

Meecal2014 schroeder etal_final
Meecal2014 schroeder etal_finalMeecal2014 schroeder etal_final
Meecal2014 schroeder etal_finalMatthias Schroeder
 
Five most promising topics of research in hydrology
Five most promising topics of research in hydrologyFive most promising topics of research in hydrology
Five most promising topics of research in hydrologyMrinmoy Majumder
 
Env Aspects Of Labs
Env Aspects Of LabsEnv Aspects Of Labs
Env Aspects Of LabsDIv CHAS
 
Building on the Atlas (of Living Australia)
Building on the Atlas (of Living Australia)Building on the Atlas (of Living Australia)
Building on the Atlas (of Living Australia)Andrew Treloar
 
Engauge perl chilled water project - 02 february 2018
Engauge   perl chilled water project - 02 february 2018Engauge   perl chilled water project - 02 february 2018
Engauge perl chilled water project - 02 february 2018Kossi Ahialegbedzi
 
Marketing Healthcare Presentation
Marketing Healthcare PresentationMarketing Healthcare Presentation
Marketing Healthcare Presentationscubacray
 
10 Reasons to consider LED lighting for mining applications
10 Reasons to consider LED lighting for mining applications10 Reasons to consider LED lighting for mining applications
10 Reasons to consider LED lighting for mining applicationsEaton Electrical
 
Husar Report to UIC Plenary
Husar Report to UIC PlenaryHusar Report to UIC Plenary
Husar Report to UIC PlenaryRudolf Husar
 

What's hot (10)

A career in the process industry - Sharon Louch
A career in the process industry - Sharon LouchA career in the process industry - Sharon Louch
A career in the process industry - Sharon Louch
 
Meecal2014 schroeder etal_final
Meecal2014 schroeder etal_finalMeecal2014 schroeder etal_final
Meecal2014 schroeder etal_final
 
Five most promising topics of research in hydrology
Five most promising topics of research in hydrologyFive most promising topics of research in hydrology
Five most promising topics of research in hydrology
 
13 pv salvage value and end of life management
13   pv salvage value and end of life management13   pv salvage value and end of life management
13 pv salvage value and end of life management
 
Env Aspects Of Labs
Env Aspects Of LabsEnv Aspects Of Labs
Env Aspects Of Labs
 
Building on the Atlas (of Living Australia)
Building on the Atlas (of Living Australia)Building on the Atlas (of Living Australia)
Building on the Atlas (of Living Australia)
 
Engauge perl chilled water project - 02 february 2018
Engauge   perl chilled water project - 02 february 2018Engauge   perl chilled water project - 02 february 2018
Engauge perl chilled water project - 02 february 2018
 
Marketing Healthcare Presentation
Marketing Healthcare PresentationMarketing Healthcare Presentation
Marketing Healthcare Presentation
 
10 Reasons to consider LED lighting for mining applications
10 Reasons to consider LED lighting for mining applications10 Reasons to consider LED lighting for mining applications
10 Reasons to consider LED lighting for mining applications
 
Husar Report to UIC Plenary
Husar Report to UIC PlenaryHusar Report to UIC Plenary
Husar Report to UIC Plenary
 

Viewers also liked

Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaEnergySec
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityEnergySec
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...EnergySec
 
Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration EnergySec
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureEnergySec
 
CIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s PerspectiveCIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s PerspectiveEnergySec
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherEnergySec
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherEnergySec
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationEnergySec
 
Building an Incident Response Team
Building an Incident Response TeamBuilding an Incident Response Team
Building an Incident Response TeamEnergySec
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayEnergySec
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...EnergySec
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through SecurityEnergySec
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedEnergySec
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 

Viewers also liked (20)

Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six Sigma
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid Security
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical InfrastructureUsing IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
Using IP Cameras and Advanced Analytics to help Protect Critical Infrastructure
 
CIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s PerspectiveCIP-014-1: Next Steps from an Auditor’s Perspective
CIP-014-1: Next Steps from an Auditor’s Perspective
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
Building an Incident Response Team
Building an Incident Response TeamBuilding an Incident Response Team
Building an Incident Response Team
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 

Similar to Sea Changes, Strategic Implications, Board Cyber Perspectives

Combined Heating and Power- Dan Bullock
Combined Heating and Power- Dan BullockCombined Heating and Power- Dan Bullock
Combined Heating and Power- Dan BullockHayley Pallister
 
APPENDICES California Energy Commission 500-2013-134-APPENDIXES
APPENDICES California Energy Commission 500-2013-134-APPENDIXESAPPENDICES California Energy Commission 500-2013-134-APPENDIXES
APPENDICES California Energy Commission 500-2013-134-APPENDIXESFranco Moriconi
 
Tactical Power Sources Summit 2014
Tactical Power Sources Summit 2014Tactical Power Sources Summit 2014
Tactical Power Sources Summit 2014Katrina Savarino
 
Energy Conservation At Attractions And Accommodations
Energy  Conservation At  Attractions And  AccommodationsEnergy  Conservation At  Attractions And  Accommodations
Energy Conservation At Attractions And AccommodationsMartin Mongiello
 
Southern Energy Efficiency Center Final Report
Southern Energy Efficiency Center Final ReportSouthern Energy Efficiency Center Final Report
Southern Energy Efficiency Center Final ReportFlanna489y
 
Peer review Brian Valentine - Energy Storage.pptx
Peer review Brian Valentine - Energy Storage.pptxPeer review Brian Valentine - Energy Storage.pptx
Peer review Brian Valentine - Energy Storage.pptxNitinPhadkule2
 
Energia solar thermal energy storage systems
Energia solar   thermal energy storage systemsEnergia solar   thermal energy storage systems
Energia solar thermal energy storage systemsUsama Abudawud
 
Pakistan's Energy Challenges: a Seminar Supported by USAID
Pakistan's Energy Challenges: a Seminar Supported by USAIDPakistan's Energy Challenges: a Seminar Supported by USAID
Pakistan's Energy Challenges: a Seminar Supported by USAIDAlliance To Save Energy
 
Technology and applied R&D needs for electrical energy storage
Technology and applied R&D needs for electrical energy storage Technology and applied R&D needs for electrical energy storage
Technology and applied R&D needs for electrical energy storage Andrew Gelston
 
Technology and Applied R&D Needs for Electrical Energy Storage (March 2007)
Technology and Applied R&D Needs for Electrical Energy Storage (March 2007)Technology and Applied R&D Needs for Electrical Energy Storage (March 2007)
Technology and Applied R&D Needs for Electrical Energy Storage (March 2007)Andrew Gelston
 
Wilton E. Scott Inst for Energy Innovation
Wilton E. Scott Inst for Energy InnovationWilton E. Scott Inst for Energy Innovation
Wilton E. Scott Inst for Energy InnovationInvest Northern Ireland
 
Net Zero - TSA presentation
Net Zero - TSA presentationNet Zero - TSA presentation
Net Zero - TSA presentationPeter Hoffmann
 
New Era of Energy-Efficiency Management
New Era of Energy-Efficiency ManagementNew Era of Energy-Efficiency Management
New Era of Energy-Efficiency ManagementPeter Armstrong
 
DSP02110-2 Next Gen Energy Storage White Paper_INTER V1
DSP02110-2 Next Gen Energy Storage White Paper_INTER V1DSP02110-2 Next Gen Energy Storage White Paper_INTER V1
DSP02110-2 Next Gen Energy Storage White Paper_INTER V1Zach Pollock
 
Emergent Energy Futures
Emergent Energy FuturesEmergent Energy Futures
Emergent Energy Futuresjames_hamilton
 
Ips connect 2015 richard rocheleau
Ips connect 2015 richard rocheleauIps connect 2015 richard rocheleau
Ips connect 2015 richard rocheleaujames_hamilton
 
DoE activities in CCS and workshop summary
DoE activities in CCS and workshop summaryDoE activities in CCS and workshop summary
DoE activities in CCS and workshop summaryIEA-ETSAP
 

Similar to Sea Changes, Strategic Implications, Board Cyber Perspectives (20)

Combined Heating and Power- Dan Bullock
Combined Heating and Power- Dan BullockCombined Heating and Power- Dan Bullock
Combined Heating and Power- Dan Bullock
 
APPENDICES California Energy Commission 500-2013-134-APPENDIXES
APPENDICES California Energy Commission 500-2013-134-APPENDIXESAPPENDICES California Energy Commission 500-2013-134-APPENDIXES
APPENDICES California Energy Commission 500-2013-134-APPENDIXES
 
Tactical Power Sources Summit 2014
Tactical Power Sources Summit 2014Tactical Power Sources Summit 2014
Tactical Power Sources Summit 2014
 
Energy Conservation At Attractions And Accommodations
Energy  Conservation At  Attractions And  AccommodationsEnergy  Conservation At  Attractions And  Accommodations
Energy Conservation At Attractions And Accommodations
 
Southern Energy Efficiency Center Final Report
Southern Energy Efficiency Center Final ReportSouthern Energy Efficiency Center Final Report
Southern Energy Efficiency Center Final Report
 
Peer review Brian Valentine - Energy Storage.pptx
Peer review Brian Valentine - Energy Storage.pptxPeer review Brian Valentine - Energy Storage.pptx
Peer review Brian Valentine - Energy Storage.pptx
 
Energia solar thermal energy storage systems
Energia solar   thermal energy storage systemsEnergia solar   thermal energy storage systems
Energia solar thermal energy storage systems
 
Pakistan's Energy Challenges: a Seminar Supported by USAID
Pakistan's Energy Challenges: a Seminar Supported by USAIDPakistan's Energy Challenges: a Seminar Supported by USAID
Pakistan's Energy Challenges: a Seminar Supported by USAID
 
Technology and applied R&D needs for electrical energy storage
Technology and applied R&D needs for electrical energy storage Technology and applied R&D needs for electrical energy storage
Technology and applied R&D needs for electrical energy storage
 
Technology and Applied R&D Needs for Electrical Energy Storage (March 2007)
Technology and Applied R&D Needs for Electrical Energy Storage (March 2007)Technology and Applied R&D Needs for Electrical Energy Storage (March 2007)
Technology and Applied R&D Needs for Electrical Energy Storage (March 2007)
 
NMRESGI_Energy Storage Trends and Challenges_Willard
NMRESGI_Energy Storage Trends and Challenges_WillardNMRESGI_Energy Storage Trends and Challenges_Willard
NMRESGI_Energy Storage Trends and Challenges_Willard
 
Wilton E. Scott Inst for Energy Innovation
Wilton E. Scott Inst for Energy InnovationWilton E. Scott Inst for Energy Innovation
Wilton E. Scott Inst for Energy Innovation
 
Net Zero - TSA presentation
Net Zero - TSA presentationNet Zero - TSA presentation
Net Zero - TSA presentation
 
Mike Twedt on Green Energy Engineering
Mike Twedt on Green Energy EngineeringMike Twedt on Green Energy Engineering
Mike Twedt on Green Energy Engineering
 
New Era of Energy-Efficiency Management
New Era of Energy-Efficiency ManagementNew Era of Energy-Efficiency Management
New Era of Energy-Efficiency Management
 
DSP02110-2 Next Gen Energy Storage White Paper_INTER V1
DSP02110-2 Next Gen Energy Storage White Paper_INTER V1DSP02110-2 Next Gen Energy Storage White Paper_INTER V1
DSP02110-2 Next Gen Energy Storage White Paper_INTER V1
 
Emergent Energy Futures
Emergent Energy FuturesEmergent Energy Futures
Emergent Energy Futures
 
Ips connect 2015 richard rocheleau
Ips connect 2015 richard rocheleauIps connect 2015 richard rocheleau
Ips connect 2015 richard rocheleau
 
Energy Manager Training Website
Energy Manager Training WebsiteEnergy Manager Training Website
Energy Manager Training Website
 
DoE activities in CCS and workshop summary
DoE activities in CCS and workshop summaryDoE activities in CCS and workshop summary
DoE activities in CCS and workshop summary
 

More from EnergySec

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityEnergySec
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementEnergySec
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachEnergySec
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsEnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueEnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationEnergySec
 
CIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopCIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopEnergySec
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...EnergySec
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorEnergySec
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...EnergySec
 
Event Correlation Applications for Utilities
Event Correlation Applications for UtilitiesEvent Correlation Applications for Utilities
Event Correlation Applications for UtilitiesEnergySec
 

More from EnergySec (19)

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and Education
 
CIP Version 5 Immersion Workshop
CIP Version 5 Immersion WorkshopCIP Version 5 Immersion Workshop
CIP Version 5 Immersion Workshop
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
 
Event Correlation Applications for Utilities
Event Correlation Applications for UtilitiesEvent Correlation Applications for Utilities
Event Correlation Applications for Utilities
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Sea Changes, Strategic Implications, Board Cyber Perspectives

Editor's Notes

  1. Energy Goes with the Flow - Lawrence Livermore produced the first diagrams illustrating U.S. energy use in the mid-1970s. Portraying U.S. energy resources and their ultimate use, these diagrams, called energy flow charts, help scientists, analysts, and other decision makers to visualize the complex interrelationships involved in powering the nation. The charts continue to provide value, drawing widespread attention and praise from such organizations as the National Academy of Sciences and the President’s Council of Advisors on Science and Technology - http://www.EnergyCollection.us/Energy-Generation/Energy-Flows.pdf Lawrence Livermore on 2009 consumption - https://publicaffairs.llnl.gov/news/news_releases/2010/NR-10-08-05.html High resolution image of generation and consumption - https://publicaffairs.llnl.gov/news/news_releases/2010/images/energy-flow-annotated.pdf Wikipedia on Quad Definition - http://en.wikipedia.org/wiki/Quad_%28unit%29   Roughly 1 Quad = 300B KWh. Images on energy use and carbon dioxide - http://flowcharts.llnl.gov
  2. End-customer resources are favored until marginal cost parity with traditional resources. End-customer resource applications to distribution reliability and cost. Formulaic rates need to compensate energy companies for using end-customer resources in an Economic Profit sense up until there is parity with traditional resources.