SlideShare a Scribd company logo
1 of 9
PROTECTION OF THE
POWER SYSTEM
AGAINST HACKERS:
Ukrenergo`s practical
experience
UKRAINIAN POWER SYSTEM AND ITS TSO– SE “NPC “UKRENERGO”
4 NPPs
12* TPPs
and dozens of
CHPPs
7 HPPs and 3 HPSPPs
Dozens of small
HPPs, SPPs,WPPs
Up to 21* thous km, 220-750 kV OHL 102* 220-750 kV substations Up to 9 thous.employees
*excluding the temporarily occupied territories of the Donetsk and Lugansk regions and Crimea
SCOPE OF CYBER ATTACKS IS GROWING EVERY YEAR
BlackEnergy, 2015
(On the 23rd of December, 2015 the computers of the control system in the
“Prykarpattiaoblenergo” dispatching center were attacked; up to 30 substations
were switched off; up to 230 thous.of citizen were left without power for 1-6
hours).
Cyber attack at the “Pivnichna” substation, 2016
(On the 17th-18th of December, 2016 the 330 kV substation “Pivnichna” was
attacked. The following substation supply power to the Northern part of Kyiv.
The research proved that the attacks on the computer systems related to the
substation were multilevel and seriously prepared»)
Petya.А, 2017
(On the 27th of June, 2017 the Petya. A computer virus, similar to WannaCry,
attacked the Ukrainian banks, state and private companies)
WE DO COMPREHEND THE DANGER
SUSTAINABILITY OF THE UKRAINIAN POWER SYSTEN
DEPENDS ON THE SUSTAINABILITY OF UKRENERGO
PETYA.A
Crucial
systems were
not seriously
affected
However we
“lost” many
substations in
the working
mode
The majority of
substations
functioned in a
normal mode
until Monday
“Exhaled”
July 7
WE COPED WITH THE PROBLEM QUITE GOOD
Usage of the previous attacks experience
Establishment of the response body on the
cyber threats
Up to 100% of the reserve copies
We`ve assessed our system otherwise
... HOWERE WE UNDERSTOOD THE CYBER SECUTITY SYSTEM SHULD BE SIGNIFICANTLY IMPROVED
Development and approval
of the cyber security
concept
Preparation and approval of
the normative documents
within the cybersecurity
sphere
Training with the
American colleagues
Technological network
launching
WE DO STRIVE TO ATTAIN THE SECURE IT
Launching of the cyber protection infrastructure project
Complete split between the technological and office infrastructure
Clear segmentation and perimeter protection
Implementation of the security systems (NGFW, SIEM, IDM...)
Thank you for your
attention!

More Related Content

What's hot

Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...IJNSA Journal
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA) International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA) IJNSA Journal
 

What's hot (19)

Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA) International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 

Similar to Ukrenergo cyber safety

S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017Marina Krotofil
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Kaspersky
 
Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochureGeorge Wainblat
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
 
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...Muhammad FAHAD
 
170418 prbx smart-grid-security_final
170418 prbx smart-grid-security_final170418 prbx smart-grid-security_final
170418 prbx smart-grid-security_finalPatrick Le Fevre
 
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET Journal
 
Ahmed_Asaker_C.V ver3.
Ahmed_Asaker_C.V ver3.Ahmed_Asaker_C.V ver3.
Ahmed_Asaker_C.V ver3.medolove5159
 
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...nilesh405711
 
Modern technologies and cybersecurity
Modern technologies and cybersecurityModern technologies and cybersecurity
Modern technologies and cybersecurityVadimDavydov3
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
28 9760 a review paper id 0028 (ed l)
28 9760 a review paper id 0028 (ed l)28 9760 a review paper id 0028 (ed l)
28 9760 a review paper id 0028 (ed l)IAESIJEECS
 
Lightning and Power Systems in the 21st Century
Lightning and Power Systems in the 21st CenturyLightning and Power Systems in the 21st Century
Lightning and Power Systems in the 21st CenturyGrid Protection Alliance
 
Lightning threat and protection from lightning information and product by jm...
Lightning threat and  protection from lightning information and product by jm...Lightning threat and  protection from lightning information and product by jm...
Lightning threat and protection from lightning information and product by jm...Mahesh Chandra Manav
 
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Power System Operation
 
Presentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue systemPresentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue systemMahesh Chandra Manav
 
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in Society
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in SocietyLockheed Martin - Integrated Infrastructure: Cyber Resiliency in Society
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in SocietyLockheed-Martin
 
Control Center EMS Solutions for the Grid of the Future
Control Center EMS Solutions for the  Grid of the FutureControl Center EMS Solutions for the  Grid of the Future
Control Center EMS Solutions for the Grid of the FuturePower System Operation
 

Similar to Ukrenergo cyber safety (20)

S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017S4 krotofil morning_sesh_2017
S4 krotofil morning_sesh_2017
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
S C A D A Security Keynote C K
S C A D A  Security  Keynote  C KS C A D A  Security  Keynote  C K
S C A D A Security Keynote C K
 
Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017Industrial Threats Landscape, H2'2017
Industrial Threats Landscape, H2'2017
 
Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochure
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
 
170418 prbx smart-grid-security_final
170418 prbx smart-grid-security_final170418 prbx smart-grid-security_final
170418 prbx smart-grid-security_final
 
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
 
Ahmed_Asaker_C.V ver3.
Ahmed_Asaker_C.V ver3.Ahmed_Asaker_C.V ver3.
Ahmed_Asaker_C.V ver3.
 
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
 
Modern technologies and cybersecurity
Modern technologies and cybersecurityModern technologies and cybersecurity
Modern technologies and cybersecurity
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
28 9760 a review paper id 0028 (ed l)
28 9760 a review paper id 0028 (ed l)28 9760 a review paper id 0028 (ed l)
28 9760 a review paper id 0028 (ed l)
 
Lightning and Power Systems in the 21st Century
Lightning and Power Systems in the 21st CenturyLightning and Power Systems in the 21st Century
Lightning and Power Systems in the 21st Century
 
Lightning threat and protection from lightning information and product by jm...
Lightning threat and  protection from lightning information and product by jm...Lightning threat and  protection from lightning information and product by jm...
Lightning threat and protection from lightning information and product by jm...
 
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
 
Presentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue systemPresentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue system
 
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in Society
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in SocietyLockheed Martin - Integrated Infrastructure: Cyber Resiliency in Society
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in Society
 
Control Center EMS Solutions for the Grid of the Future
Control Center EMS Solutions for the  Grid of the FutureControl Center EMS Solutions for the  Grid of the Future
Control Center EMS Solutions for the Grid of the Future
 

More from НЕК Укренерго - NPC Ukrenergo

2 роки роботи українського ринку електроенергії
2 роки роботи українського ринку електроенергії2 роки роботи українського ринку електроенергії
2 роки роботи українського ринку електроенергіїНЕК Укренерго - NPC Ukrenergo
 
Керування обмеженнями ВДЕ: як реалізувати право на компенсацію за невідпущену...
Керування обмеженнями ВДЕ: як реалізувати право на компенсацію за невідпущену...Керування обмеженнями ВДЕ: як реалізувати право на компенсацію за невідпущену...
Керування обмеженнями ВДЕ: як реалізувати право на компенсацію за невідпущену...НЕК Укренерго - NPC Ukrenergo
 
Energy storage. Перспективи та особливості інтеграції BESS в українській енер...
Energy storage. Перспективи та особливості інтеграції BESS в українській енер...Energy storage. Перспективи та особливості інтеграції BESS в українській енер...
Energy storage. Перспективи та особливості інтеграції BESS в українській енер...НЕК Укренерго - NPC Ukrenergo
 
Розвиток ВДЕ. Інтеграція в енергосистему та фінансування
Розвиток ВДЕ. Інтеграція в енергосистему та фінансування Розвиток ВДЕ. Інтеграція в енергосистему та фінансування
Розвиток ВДЕ. Інтеграція в енергосистему та фінансування НЕК Укренерго - NPC Ukrenergo
 
Впровадження та розвиток ринку електричної енергії в Україні
Впровадження та розвиток ринку електричної енергії в УкраїніВпровадження та розвиток ринку електричної енергії в Україні
Впровадження та розвиток ринку електричної енергії в УкраїніНЕК Укренерго - NPC Ukrenergo
 
Адміністрування розрахунків, поточний стан, проблеми та шляхи їх вирішення
Адміністрування розрахунків, поточний стан, проблеми та шляхи їх вирішенняАдміністрування розрахунків, поточний стан, проблеми та шляхи їх вирішення
Адміністрування розрахунків, поточний стан, проблеми та шляхи їх вирішенняНЕК Укренерго - NPC Ukrenergo
 
Стан комерційного обліку на ринку електричної енергії
Стан комерційного обліку на ринку електричної енергіїСтан комерційного обліку на ринку електричної енергії
Стан комерційного обліку на ринку електричної енергіїНЕК Укренерго - NPC Ukrenergo
 
Договори на ринку електричної енергії та стан розрахунків
Договори на ринку електричної енергії та стан розрахунківДоговори на ринку електричної енергії та стан розрахунків
Договори на ринку електричної енергії та стан розрахунківНЕК Укренерго - NPC Ukrenergo
 
Перші підсумки роботи нового ринку електроенергії
Перші підсумки роботи нового ринку електроенергіїПерші підсумки роботи нового ринку електроенергії
Перші підсумки роботи нового ринку електроенергіїНЕК Укренерго - NPC Ukrenergo
 
Покладання спецобов'язків та комерційний облік в новому ринку електроенергії
Покладання спецобов'язків та комерційний облік в новому ринку електроенергіїПокладання спецобов'язків та комерційний облік в новому ринку електроенергії
Покладання спецобов'язків та комерційний облік в новому ринку електроенергіїНЕК Укренерго - NPC Ukrenergo
 
Інтеграція до ENTSO-E. Ключові результати за два роки
Інтеграція до ENTSO-E. Ключові результати за два рокиІнтеграція до ENTSO-E. Ключові результати за два роки
Інтеграція до ENTSO-E. Ключові результати за два рокиНЕК Укренерго - NPC Ukrenergo
 
New electricity market. How consumers will pay for the pas mistakes made at t...
New electricity market. How consumers will pay for the pas mistakes made at t...New electricity market. How consumers will pay for the pas mistakes made at t...
New electricity market. How consumers will pay for the pas mistakes made at t...НЕК Укренерго - NPC Ukrenergo
 
Новий ринок електроенергії: Чим заплатить споживач за помилки на старті новог...
Новий ринок електроенергії: Чим заплатить споживач за помилки на старті новог...Новий ринок електроенергії: Чим заплатить споживач за помилки на старті новог...
Новий ринок електроенергії: Чим заплатить споживач за помилки на старті новог...НЕК Укренерго - NPC Ukrenergo
 

More from НЕК Укренерго - NPC Ukrenergo (20)

2 роки роботи українського ринку електроенергії
2 роки роботи українського ринку електроенергії2 роки роботи українського ринку електроенергії
2 роки роботи українського ринку електроенергії
 
Керування обмеженнями ВДЕ: як реалізувати право на компенсацію за невідпущену...
Керування обмеженнями ВДЕ: як реалізувати право на компенсацію за невідпущену...Керування обмеженнями ВДЕ: як реалізувати право на компенсацію за невідпущену...
Керування обмеженнями ВДЕ: як реалізувати право на компенсацію за невідпущену...
 
Укренерго: нові горизонти
Укренерго: нові горизонтиУкренерго: нові горизонти
Укренерго: нові горизонти
 
Укренерго: попередні підсумки 2019 року
Укренерго: попередні підсумки 2019 року Укренерго: попередні підсумки 2019 року
Укренерго: попередні підсумки 2019 року
 
Energy storage. Перспективи та особливості інтеграції BESS в українській енер...
Energy storage. Перспективи та особливості інтеграції BESS в українській енер...Energy storage. Перспективи та особливості інтеграції BESS в українській енер...
Energy storage. Перспективи та особливості інтеграції BESS в українській енер...
 
Розвиток ВДЕ. Інтеграція в енергосистему та фінансування
Розвиток ВДЕ. Інтеграція в енергосистему та фінансування Розвиток ВДЕ. Інтеграція в енергосистему та фінансування
Розвиток ВДЕ. Інтеграція в енергосистему та фінансування
 
Впровадження та розвиток ринку електричної енергії в Україні
Впровадження та розвиток ринку електричної енергії в УкраїніВпровадження та розвиток ринку електричної енергії в Україні
Впровадження та розвиток ринку електричної енергії в Україні
 
Адміністрування розрахунків, поточний стан, проблеми та шляхи їх вирішення
Адміністрування розрахунків, поточний стан, проблеми та шляхи їх вирішенняАдміністрування розрахунків, поточний стан, проблеми та шляхи їх вирішення
Адміністрування розрахунків, поточний стан, проблеми та шляхи їх вирішення
 
Поточний стан ринку допоміжних послуг
Поточний стан ринку допоміжних послугПоточний стан ринку допоміжних послуг
Поточний стан ринку допоміжних послуг
 
Стан комерційного обліку на ринку електричної енергії
Стан комерційного обліку на ринку електричної енергіїСтан комерційного обліку на ринку електричної енергії
Стан комерційного обліку на ринку електричної енергії
 
Договори на ринку електричної енергії та стан розрахунків
Договори на ринку електричної енергії та стан розрахунківДоговори на ринку електричної енергії та стан розрахунків
Договори на ринку електричної енергії та стан розрахунків
 
Перші підсумки роботи нового ринку електроенергії
Перші підсумки роботи нового ринку електроенергіїПерші підсумки роботи нового ринку електроенергії
Перші підсумки роботи нового ринку електроенергії
 
Покладання спецобов'язків та комерційний облік в новому ринку електроенергії
Покладання спецобов'язків та комерційний облік в новому ринку електроенергіїПокладання спецобов'язків та комерційний облік в новому ринку електроенергії
Покладання спецобов'язків та комерційний облік в новому ринку електроенергії
 
Integration into ENTSO-E. Key results over two years
Integration into ENTSO-E. Key results over two yearsIntegration into ENTSO-E. Key results over two years
Integration into ENTSO-E. Key results over two years
 
Інтеграція до ENTSO-E. Ключові результати за два роки
Інтеграція до ENTSO-E. Ключові результати за два рокиІнтеграція до ENTSO-E. Ключові результати за два роки
Інтеграція до ENTSO-E. Ключові результати за два роки
 
Зустріч Укренерго з бізнесом АСС
Зустріч Укренерго з бізнесом АССЗустріч Укренерго з бізнесом АСС
Зустріч Укренерго з бізнесом АСС
 
New electricity market. How consumers will pay for the pas mistakes made at t...
New electricity market. How consumers will pay for the pas mistakes made at t...New electricity market. How consumers will pay for the pas mistakes made at t...
New electricity market. How consumers will pay for the pas mistakes made at t...
 
Новий ринок електроенергії: Чим заплатить споживач за помилки на старті новог...
Новий ринок електроенергії: Чим заплатить споживач за помилки на старті новог...Новий ринок електроенергії: Чим заплатить споживач за помилки на старті новог...
Новий ринок електроенергії: Чим заплатить споживач за помилки на старті новог...
 
Gender balance
Gender balance Gender balance
Gender balance
 
10 кроків назустріч Європі
10 кроків назустріч Європі10 кроків назустріч Європі
10 кроків назустріч Європі
 

Recently uploaded

BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyPooja Nehwal
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaKayode Fayemi
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsaqsarehman5055
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Chameera Dedduwage
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubssamaasim06
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Delhi Call girls
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardsticksaastr
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Vipesco
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...Sheetaleventcompany
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 

Recently uploaded (20)

BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
Night 7k Call Girls Noida Sector 128 Call Me: 8448380779
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 

Ukrenergo cyber safety

  • 1. PROTECTION OF THE POWER SYSTEM AGAINST HACKERS: Ukrenergo`s practical experience
  • 2. UKRAINIAN POWER SYSTEM AND ITS TSO– SE “NPC “UKRENERGO” 4 NPPs 12* TPPs and dozens of CHPPs 7 HPPs and 3 HPSPPs Dozens of small HPPs, SPPs,WPPs Up to 21* thous km, 220-750 kV OHL 102* 220-750 kV substations Up to 9 thous.employees *excluding the temporarily occupied territories of the Donetsk and Lugansk regions and Crimea
  • 3. SCOPE OF CYBER ATTACKS IS GROWING EVERY YEAR BlackEnergy, 2015 (On the 23rd of December, 2015 the computers of the control system in the “Prykarpattiaoblenergo” dispatching center were attacked; up to 30 substations were switched off; up to 230 thous.of citizen were left without power for 1-6 hours). Cyber attack at the “Pivnichna” substation, 2016 (On the 17th-18th of December, 2016 the 330 kV substation “Pivnichna” was attacked. The following substation supply power to the Northern part of Kyiv. The research proved that the attacks on the computer systems related to the substation were multilevel and seriously prepared») Petya.А, 2017 (On the 27th of June, 2017 the Petya. A computer virus, similar to WannaCry, attacked the Ukrainian banks, state and private companies)
  • 4. WE DO COMPREHEND THE DANGER SUSTAINABILITY OF THE UKRAINIAN POWER SYSTEN DEPENDS ON THE SUSTAINABILITY OF UKRENERGO
  • 5. PETYA.A Crucial systems were not seriously affected However we “lost” many substations in the working mode The majority of substations functioned in a normal mode until Monday “Exhaled” July 7
  • 6. WE COPED WITH THE PROBLEM QUITE GOOD Usage of the previous attacks experience Establishment of the response body on the cyber threats Up to 100% of the reserve copies We`ve assessed our system otherwise
  • 7. ... HOWERE WE UNDERSTOOD THE CYBER SECUTITY SYSTEM SHULD BE SIGNIFICANTLY IMPROVED Development and approval of the cyber security concept Preparation and approval of the normative documents within the cybersecurity sphere Training with the American colleagues Technological network launching
  • 8. WE DO STRIVE TO ATTAIN THE SECURE IT Launching of the cyber protection infrastructure project Complete split between the technological and office infrastructure Clear segmentation and perimeter protection Implementation of the security systems (NGFW, SIEM, IDM...)
  • 9. Thank you for your attention!