2012 Reenergize the Americas 3B: Ralph Martinez

452 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
452
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

2012 Reenergize the Americas 3B: Ralph Martinez

  1. 1. Session 3B: Cyber Security for Distributed Renewable Generation and Smart Grids Moderator: Ralph Martinez, Director, Regional Cyber and Energy Security Center, The University of Texas at El Paso• Angel Avila, Cyber Specialist, Defensive Network Security Consultants, LLC• Charles Hamilton, Protective Security Advisor, Department of Homeland Security• Gene Rodriquez, Energy and Utilities Industry Solutions Executive, IBM
  2. 2. Definitions for Cyber and Energy Security Cyber Energy Security Security• Cyber security measures and prevents • Energy security allowsendangerment to energy system cyber government, industry and civil institutionsinfrastructure due to external and internal to:agents. • Prevent loss of access to power and fuel• External Agents: sources (surety) • industrial espionage • Ensure resilience in energy systems • international crime groups (survivability) • terrorist groups • Provide access to alternative and • natural disasters renewable energy sources available on installations (supply)• Internal Agents: • Provide adequate power for critical • disgruntled employees missions (sufficiency) • user errors • Promote support for the customer’s • equipment failures mission, its community, and the• Agents can alter the infrastructure at environment (sustainability).different levels (network, system, individual • Promote the adoption of distributedcomponent) to destabilize it to renewable generation, such as solar PVunpredictable conditions. and wind. Copyright @ The University of Texas at El Paso 2
  3. 3. Recent Cyber and Energy Security IncidentsCyber Security Incidents:• Insider Security Threats to Utilities• Security Incidents Rise In Industrial Control Systems• Spike In Power Grid Attacks Likely In Next 12 MonthsCBS 60 Minutes Video on Cyber and Energy Security of the U.S. Power Grid• http://www.cbsnews.com/video/watch/?id=6578069nEnergy Security Incidents:• One Electrical Worker Blamed for Leaving Millions Without Power in California, Arizona and Mexico, September 2011• Arizona Wildfire Forces Evacuations as Texas, New Mexico Face Power Outages• January’s freeze still has the Sun City shivering Copyright @ The University of Texas at El Paso 3
  4. 4. Steps to Achieving a Security and Reliable Power Grid in RCES Center• RCES Center Core Capabilities • Derived from DOE/DoD WGs Sustain Year 5-6 • Product and Services test and Cyber Cyber Security certification Test & Systems • VARM Certification Manage• Ancillary RCES Center Capabilities Interoperability Year 4-5 Incidents • Solar PV Market Acceleration With Electric Grid Standards & Training • Cyber Security/Power Degrees • Workforce Training Develop Test • Professional Engineer training Cyber Security Architecture Year 3-4 & Certification • Technology Transfer And Requirements for Region Methodology • Educational Workshops Conceptual Cyber Security Year 2-3 Assess & Reference Model for Electric Grids Monitor Risk Build Cyber Regional Business and Public Year 1 Policy Requirements Security & Solar Culture Copyright @ The University of Texas at El Paso 4
  5. 5. * * NIST/EPRI Smart Grid Interim Roadmap Report, June 2009Seven Smart Grid Domains Cyber Security Everywhere Physical and Operational Security For Domains Copyright @ The University of Texas at El Paso 5
  6. 6. Cyber Security EverywhereCopyright @ The University of Texas at El Paso 6
  7. 7. Session 3B: Cyber Security for Distributed Renewable Generation and Smart Grids• Angel Avila, Cyber Specialist, Defensive Network Security Consultants, LLC• Charles Hamilton, Protective Security Advisor, Department of Homeland Security• Gene Rodriquez, Energy and Utilities Industry Solutions Executive, IBM• Panel Discussion Copyright @ The University of Texas at El Paso 7

×