SlideShare a Scribd company logo
1 of 10
TAC Subscription Overview


        August 30, 2012
Panelists

                       Chris Jager
                       Director, NESCO TAC




                       Jack Whitsitt
                       Principal TAC Analyst




                       Steve Parker
                       V.P. Technology Research                                                       Powered by
                       and Projects




8/31/201   The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec
2                        with funding assistance from the U.S. Department of Energy                                2
Format
       Today's webinar is intended to be
       interactive, so feel free to ask questions.



       Agenda
           • Background
           • Subscription Service Overview
           • Discussion / Q&A


8/31/201           The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec
2                                with funding assistance from the U.S. Department of Energy                   3
Timeliness
       Today’s cyber threats move at internet
       speeds. To keep pace, defenders must have
       access to timely information about threats,
       vulnerabilities, incidents, and mitigations.




8/31/201         The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec
2                              with funding assistance from the U.S. Department of Energy                   4
Context
       Security and operations staff are often
       flooded with information and data regarding
       security issues. Identifying the subset of
       information that is relevant to their specific
       circumstances is a daunting task.




8/31/201         The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec
2                              with funding assistance from the U.S. Department of Energy                   5
Ground Truth
       In most circumstances, the best information
       is that which is sourced from, analyzed by,
       and delivered to the community it is intended
       to serve.




8/31/201         The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec
2                              with funding assistance from the U.S. Department of Energy                   6
What Is The TAC?

           The NESCO Tactical Analysis Center (TAC)
            is led by EnergySec staff and informed by
            industry volunteers and other partners. Its
           role is to provide community-based analysis
            of security issues and timely dissemination
                of relevant, actionable information to
                               industry.


8/31/201            The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec
2                                 with funding assistance from the U.S. Department of Energy                   7
Subscription Offerings
       Operational Information
             • Daily Diaries
             • Attack Signatures, Indicators Of Compromise
             • Rapid Notification System


           Planning and Analysis
             • Monthly/Quarterly Reports
             • Threat Briefings
             • Executive overviews




8/31/201                The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec
2                                     with funding assistance from the U.S. Department of Energy                   8
Details
        Who can subscribe?
           – All asset owners regardless of size or
             regulatory coverage

        Where do I sign-up?
           – http://grids.ec/tacsubscribe

        Where do I get more information?
           – http://www.us-nesco.org/tac
           – Email us at: tac@us-nesco.org


8/31/201            The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec
2                                 with funding assistance from the U.S. Department of Energy                   9
Discussion

                       Chris Jager
                       Director, NESCO TAC




                       Jack Whitsitt
                       Principal TAC Analyst




                       Steve Parker
                       V.P. Technology Research                                                       Powered by
                       and Projects




8/31/201   The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec
2                        with funding assistance from the U.S. Department of Energy                                10

More Related Content

Similar to TAC Subscription Webinar

EISS Cybersecurity Briefing
EISS Cybersecurity BriefingEISS Cybersecurity Briefing
EISS Cybersecurity Briefing
EnergySec
 
NESCO: A Closer Look
NESCO: A Closer LookNESCO: A Closer Look
NESCO: A Closer Look
EnergySec
 
Emerson Ovation User Group BOD Meeting
Emerson Ovation User Group BOD MeetingEmerson Ovation User Group BOD Meeting
Emerson Ovation User Group BOD Meeting
EnergySec
 
Building A Stronger And Smarter Electrical Energy Infrastructure IEEE-USA
Building A Stronger And Smarter Electrical Energy Infrastructure   IEEE-USABuilding A Stronger And Smarter Electrical Energy Infrastructure   IEEE-USA
Building A Stronger And Smarter Electrical Energy Infrastructure IEEE-USA
John Ragan
 
Security From the Ground Up
Security From the Ground UpSecurity From the Ground Up
Security From the Ground Up
EnergySec
 

Similar to TAC Subscription Webinar (20)

EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...
EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...
EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...
 
Bridging the Gap: Between Operations and IT
Bridging the Gap: Between Operations and ITBridging the Gap: Between Operations and IT
Bridging the Gap: Between Operations and IT
 
EISS Cybersecurity Briefing
EISS Cybersecurity BriefingEISS Cybersecurity Briefing
EISS Cybersecurity Briefing
 
Hype, Hope and Happenstance: Cyber Threats and Opportunities in an Age of Aut...
Hype, Hope and Happenstance: Cyber Threats and Opportunities in an Age of Aut...Hype, Hope and Happenstance: Cyber Threats and Opportunities in an Age of Aut...
Hype, Hope and Happenstance: Cyber Threats and Opportunities in an Age of Aut...
 
NESCO Year 2 Overview
NESCO Year 2 OverviewNESCO Year 2 Overview
NESCO Year 2 Overview
 
What's "Smart" Got to Do With It?: A technical overview of Advanced Metering ...
What's "Smart" Got to Do With It?: A technical overview of Advanced Metering ...What's "Smart" Got to Do With It?: A technical overview of Advanced Metering ...
What's "Smart" Got to Do With It?: A technical overview of Advanced Metering ...
 
Next Generation Information Sharing for the Electric Sector
Next Generation Information Sharing for the Electric SectorNext Generation Information Sharing for the Electric Sector
Next Generation Information Sharing for the Electric Sector
 
The Expanding Web of Cybersecurity Requirements
The Expanding Web of Cybersecurity RequirementsThe Expanding Web of Cybersecurity Requirements
The Expanding Web of Cybersecurity Requirements
 
NESCO: A Closer Look
NESCO: A Closer LookNESCO: A Closer Look
NESCO: A Closer Look
 
Emerson Ovation User Group BOD Meeting
Emerson Ovation User Group BOD MeetingEmerson Ovation User Group BOD Meeting
Emerson Ovation User Group BOD Meeting
 
NESCO Overview: Emerson Ovation User Group BOD Meeting
NESCO Overview: Emerson Ovation User Group BOD MeetingNESCO Overview: Emerson Ovation User Group BOD Meeting
NESCO Overview: Emerson Ovation User Group BOD Meeting
 
Don't Get Hacked! Cybersecurity Boot Camp
Don't Get Hacked! Cybersecurity Boot CampDon't Get Hacked! Cybersecurity Boot Camp
Don't Get Hacked! Cybersecurity Boot Camp
 
EnergySec and the NESCO overview
EnergySec and the NESCO overviewEnergySec and the NESCO overview
EnergySec and the NESCO overview
 
Capstone Paper
Capstone PaperCapstone Paper
Capstone Paper
 
Innovation in the Power Systems industry
Innovation in the Power Systems industryInnovation in the Power Systems industry
Innovation in the Power Systems industry
 
Innovation in the Power Systems industry CIGRE
Innovation in the Power Systems industry CIGREInnovation in the Power Systems industry CIGRE
Innovation in the Power Systems industry CIGRE
 
Building A Stronger And Smarter Electrical Energy Infrastructure IEEE-USA
Building A Stronger And Smarter Electrical Energy Infrastructure   IEEE-USABuilding A Stronger And Smarter Electrical Energy Infrastructure   IEEE-USA
Building A Stronger And Smarter Electrical Energy Infrastructure IEEE-USA
 
White House Smart Grid Strategy for 21st Century
White House Smart Grid Strategy for 21st CenturyWhite House Smart Grid Strategy for 21st Century
White House Smart Grid Strategy for 21st Century
 
Security From the Ground Up
Security From the Ground UpSecurity From the Ground Up
Security From the Ground Up
 
Security From the Ground Up
Security From the Ground UpSecurity From the Ground Up
Security From the Ground Up
 

More from EnergySec

Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
EnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
EnergySec
 

More from EnergySec (20)

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

TAC Subscription Webinar

  • 1. TAC Subscription Overview August 30, 2012
  • 2. Panelists Chris Jager Director, NESCO TAC Jack Whitsitt Principal TAC Analyst Steve Parker V.P. Technology Research Powered by and Projects 8/31/201 The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec 2 with funding assistance from the U.S. Department of Energy 2
  • 3. Format Today's webinar is intended to be interactive, so feel free to ask questions. Agenda • Background • Subscription Service Overview • Discussion / Q&A 8/31/201 The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec 2 with funding assistance from the U.S. Department of Energy 3
  • 4. Timeliness Today’s cyber threats move at internet speeds. To keep pace, defenders must have access to timely information about threats, vulnerabilities, incidents, and mitigations. 8/31/201 The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec 2 with funding assistance from the U.S. Department of Energy 4
  • 5. Context Security and operations staff are often flooded with information and data regarding security issues. Identifying the subset of information that is relevant to their specific circumstances is a daunting task. 8/31/201 The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec 2 with funding assistance from the U.S. Department of Energy 5
  • 6. Ground Truth In most circumstances, the best information is that which is sourced from, analyzed by, and delivered to the community it is intended to serve. 8/31/201 The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec 2 with funding assistance from the U.S. Department of Energy 6
  • 7. What Is The TAC? The NESCO Tactical Analysis Center (TAC) is led by EnergySec staff and informed by industry volunteers and other partners. Its role is to provide community-based analysis of security issues and timely dissemination of relevant, actionable information to industry. 8/31/201 The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec 2 with funding assistance from the U.S. Department of Energy 7
  • 8. Subscription Offerings Operational Information • Daily Diaries • Attack Signatures, Indicators Of Compromise • Rapid Notification System Planning and Analysis • Monthly/Quarterly Reports • Threat Briefings • Executive overviews 8/31/201 The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec 2 with funding assistance from the U.S. Department of Energy 8
  • 9. Details  Who can subscribe? – All asset owners regardless of size or regulatory coverage  Where do I sign-up? – http://grids.ec/tacsubscribe  Where do I get more information? – http://www.us-nesco.org/tac – Email us at: tac@us-nesco.org 8/31/201 The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec 2 with funding assistance from the U.S. Department of Energy 9
  • 10. Discussion Chris Jager Director, NESCO TAC Jack Whitsitt Principal TAC Analyst Steve Parker V.P. Technology Research Powered by and Projects 8/31/201 The National Electric Sector Cybersecurity Organization (NESCO) is operated by EnergySec 2 with funding assistance from the U.S. Department of Energy 10