SlideShare a Scribd company logo
1 of 1
Download to read offline
Multi-Layered Defense
Our cybersecurity strategy includes
a multi-layered approach to grid
protection. In our defense-in-depth
strategy, each layer acts as a virtual
“steel door” that can be locked
down in the event of a breach
isolating illicit traffic.
The first layer surrounding the core
includes advanced tools, technology,
processes and employee awareness measures designed to block, reduce and detect
threats before they cause impairment. Response to any disruptions is immediate to
maintain grid reliability.
The middle layer includes policies, training, employee education and separation of duties to
govern information transfers ensuring data confidentiality and integrity.
The outer security layer includes employee identification badges, authorized access
privileges, biometric identification, guards, CCTV and alarms.
Cybersecurity Collaborations
This defense posture is only part of the picture. Real-time information sharing from
local, state and federal agencies, as well as utility partners, provides an additional layer
of support.
Our mission is to assure grid safety and reliability, so our cybersecurity department
regularly engages key contacts in the following organizations:
• Department of Defense
• Department of Energy
• Department of Homeland Security
• Edison Electric Institute
• Electric Power Research Institute
• Electricity Sector Information Sharing Analysis Center
• EnergySec
• Federal Bureau of Investigations
• Lockheed Martin
• North American Electric Reliability Corporation
Cybersecurity Fact Sheet
Defense in Depth
— 1 —
Southern California
Edison Facts:
• Serves nearly 14 million
people in a 50,000-square
mile service area within
central, coastal and
Southern California
• Providing service to
the area for more than
120 years
• Regulated by California
Public Utilities Commission
and the Federal Energy
Regulatory Commission
• One of the nation’s leading
purchasers of renewable
energy, we delivered nearly
15 billion kilowatt-hours
of renewable energy to
customers in 2012
• To improve grid reliability,
we are investing billions
of dollars to replace and
upgrade electric system
infrastructure
Media Relations:
626-302-2255
Cybersecurity:
Cybersecurity@sce.com
Defense in Depth_Mktg_
v1_10.29.14.pub

More Related Content

What's hot

International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) MiajackB
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyerClaude Gelinas
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) MiajackB
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Craig Rispin
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation pptvaishalshah01
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySHIVAMSHARMA1271
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)ijcisjournal
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introductionyuliana_mar
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01ITNet
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)ijfcst journal
 

What's hot (19)

International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyer
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
IT security
IT securityIT security
IT security
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
презентация1
презентация1презентация1
презентация1
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation ppt
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
 
Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01Ia 124 1621324143 ia_124_lecture_01
Ia 124 1621324143 ia_124_lecture_01
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 

Viewers also liked

Presentación literatura griega
Presentación literatura griegaPresentación literatura griega
Presentación literatura griegaLuis Capelli
 
Natalia cruz e isabella ortiz
Natalia cruz e isabella ortizNatalia cruz e isabella ortiz
Natalia cruz e isabella ortizIsabella Betancur
 
Plan Vive Digital 2014 - 2018
Plan Vive Digital 2014 - 2018Plan Vive Digital 2014 - 2018
Plan Vive Digital 2014 - 2018Katherin Graciano
 
Manage Your Total Workforce in the Cloud with SAP Fieldglass and SAP SuccessF...
Manage Your Total Workforce in the Cloud with SAP Fieldglass and SAP SuccessF...Manage Your Total Workforce in the Cloud with SAP Fieldglass and SAP SuccessF...
Manage Your Total Workforce in the Cloud with SAP Fieldglass and SAP SuccessF...NGA Human Resources
 
HPS Kitty and Eileen
HPS Kitty and EileenHPS Kitty and Eileen
HPS Kitty and EileenKids Work
 
¿Existe actualmente discriminación hacia los inmigrantes en las aulas?
¿Existe actualmente discriminación hacia los inmigrantes en las aulas?¿Existe actualmente discriminación hacia los inmigrantes en las aulas?
¿Existe actualmente discriminación hacia los inmigrantes en las aulas?Alicia García
 
SAARC ppt on international trade
SAARC ppt on international tradeSAARC ppt on international trade
SAARC ppt on international tradeNeha Kumari
 

Viewers also liked (15)

Presentación literatura griega
Presentación literatura griegaPresentación literatura griega
Presentación literatura griega
 
Natalia cruz e isabella ortiz
Natalia cruz e isabella ortizNatalia cruz e isabella ortiz
Natalia cruz e isabella ortiz
 
Kevin Kuhn
Kevin KuhnKevin Kuhn
Kevin Kuhn
 
Evolution of a Website
Evolution of a WebsiteEvolution of a Website
Evolution of a Website
 
Margaret Keane
Margaret KeaneMargaret Keane
Margaret Keane
 
Plan Vive Digital 2014 - 2018
Plan Vive Digital 2014 - 2018Plan Vive Digital 2014 - 2018
Plan Vive Digital 2014 - 2018
 
Manage Your Total Workforce in the Cloud with SAP Fieldglass and SAP SuccessF...
Manage Your Total Workforce in the Cloud with SAP Fieldglass and SAP SuccessF...Manage Your Total Workforce in the Cloud with SAP Fieldglass and SAP SuccessF...
Manage Your Total Workforce in the Cloud with SAP Fieldglass and SAP SuccessF...
 
FRC Learning
FRC LearningFRC Learning
FRC Learning
 
HPS Kitty and Eileen
HPS Kitty and EileenHPS Kitty and Eileen
HPS Kitty and Eileen
 
¿Existe actualmente discriminación hacia los inmigrantes en las aulas?
¿Existe actualmente discriminación hacia los inmigrantes en las aulas?¿Existe actualmente discriminación hacia los inmigrantes en las aulas?
¿Existe actualmente discriminación hacia los inmigrantes en las aulas?
 
Agile - be focused
Agile - be focusedAgile - be focused
Agile - be focused
 
Vinodkumar cv
Vinodkumar cvVinodkumar cv
Vinodkumar cv
 
Dincolo de PIB - O provocare larg asumată. Cum îi facem faţă?
Dincolo de PIB - O provocare larg asumată. Cum îi facem faţă?Dincolo de PIB - O provocare larg asumată. Cum îi facem faţă?
Dincolo de PIB - O provocare larg asumată. Cum îi facem faţă?
 
Summary Resume
Summary ResumeSummary Resume
Summary Resume
 
SAARC ppt on international trade
SAARC ppt on international tradeSAARC ppt on international trade
SAARC ppt on international trade
 

Similar to Cybersecurity Fact Sheet _ Defense in Depth

Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
Best cybersecurity services for organizations
Best cybersecurity services for organizationsBest cybersecurity services for organizations
Best cybersecurity services for organizationswilsonconsulting1
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response MethodologySignals Defense, LLC
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Ioannis Aligizakis, M.Sc.
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...MajedahAlkharji
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response ManagementDon Caeiro
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefJonathan Reyes
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorCloudMask inc.
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 

Similar to Cybersecurity Fact Sheet _ Defense in Depth (20)

Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Best cybersecurity services for organizations
Best cybersecurity services for organizationsBest cybersecurity services for organizations
Best cybersecurity services for organizations
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Cyber Security: Cyber Incident Response Methodology
Cyber Security:  Cyber Incident Response MethodologyCyber Security:  Cyber Incident Response Methodology
Cyber Security: Cyber Incident Response Methodology
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-Brief
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security Sector
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 

Cybersecurity Fact Sheet _ Defense in Depth

  • 1. Multi-Layered Defense Our cybersecurity strategy includes a multi-layered approach to grid protection. In our defense-in-depth strategy, each layer acts as a virtual “steel door” that can be locked down in the event of a breach isolating illicit traffic. The first layer surrounding the core includes advanced tools, technology, processes and employee awareness measures designed to block, reduce and detect threats before they cause impairment. Response to any disruptions is immediate to maintain grid reliability. The middle layer includes policies, training, employee education and separation of duties to govern information transfers ensuring data confidentiality and integrity. The outer security layer includes employee identification badges, authorized access privileges, biometric identification, guards, CCTV and alarms. Cybersecurity Collaborations This defense posture is only part of the picture. Real-time information sharing from local, state and federal agencies, as well as utility partners, provides an additional layer of support. Our mission is to assure grid safety and reliability, so our cybersecurity department regularly engages key contacts in the following organizations: • Department of Defense • Department of Energy • Department of Homeland Security • Edison Electric Institute • Electric Power Research Institute • Electricity Sector Information Sharing Analysis Center • EnergySec • Federal Bureau of Investigations • Lockheed Martin • North American Electric Reliability Corporation Cybersecurity Fact Sheet Defense in Depth — 1 — Southern California Edison Facts: • Serves nearly 14 million people in a 50,000-square mile service area within central, coastal and Southern California • Providing service to the area for more than 120 years • Regulated by California Public Utilities Commission and the Federal Energy Regulatory Commission • One of the nation’s leading purchasers of renewable energy, we delivered nearly 15 billion kilowatt-hours of renewable energy to customers in 2012 • To improve grid reliability, we are investing billions of dollars to replace and upgrade electric system infrastructure Media Relations: 626-302-2255 Cybersecurity: Cybersecurity@sce.com Defense in Depth_Mktg_ v1_10.29.14.pub