The document summarizes an agenda for a meeting of the NRECA Agile Fractal Grid Kickoff Meeting. The agenda includes introductions, discussions on various topics such as the managed services store and applications, distributed systems elements, and the industrial internet. It also lists participants from various organizations that will be involved in discussions and the Security Fabric Alliance.
This kickoff intrtoduces the concept of the Agile Fractal grid to more than 100 companies that particpated in the full day workshop lead by Chuck Speicher and John Reynolds and Craig Miller the Chief scientist of the NRECA
Presentation at the 2016 IIOT Challenges and Opportunities Workshop.
The next wave of Industrial Internet applications will connect machines and devices together into functioning, intelligent systems with capabilities beyond anything possible today. These systems fundamentally depend on connectivity and information exchange to derive knowledge and make "smart decisions". They require a much higher level of reliability and security than "Consumer" IoT applications. OMG's Data-Distribution Service for Real-Time Systems (DDS) is the premier open middleware standard directly addressing publish-subscribe communications for Industrial IoT applications. It provides a protocol that meets the demanding security, scalability, performance, and Quality of Service requirements of IIoT applications spanning connected machines, enterprise systems, and mobile devices.This presentation will use concrete use cases to introduce DDS and examine why energy, advanced medical, asset-tracking, transportation, and military systems choose to base their designs on DDS.
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Gerald Faulhaber
Professor Emeritus, Business Economics & Public Policy, Wharton School
https://www.cablelabs.com/informed/
This kickoff intrtoduces the concept of the Agile Fractal grid to more than 100 companies that particpated in the full day workshop lead by Chuck Speicher and John Reynolds and Craig Miller the Chief scientist of the NRECA
Presentation at the 2016 IIOT Challenges and Opportunities Workshop.
The next wave of Industrial Internet applications will connect machines and devices together into functioning, intelligent systems with capabilities beyond anything possible today. These systems fundamentally depend on connectivity and information exchange to derive knowledge and make "smart decisions". They require a much higher level of reliability and security than "Consumer" IoT applications. OMG's Data-Distribution Service for Real-Time Systems (DDS) is the premier open middleware standard directly addressing publish-subscribe communications for Industrial IoT applications. It provides a protocol that meets the demanding security, scalability, performance, and Quality of Service requirements of IIoT applications spanning connected machines, enterprise systems, and mobile devices.This presentation will use concrete use cases to introduce DDS and examine why energy, advanced medical, asset-tracking, transportation, and military systems choose to base their designs on DDS.
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Gerald Faulhaber
Professor Emeritus, Business Economics & Public Policy, Wharton School
https://www.cablelabs.com/informed/
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Rob Alderfer, Moderator
Vice President Technology Policy, CableLabs
Gerald Faulhaber
Professor Emeritus, Business Economics & Public Policy, Wharton School
Chaz Lever
Lead Reseacher, Georgia Tech
Jason Livingood
Vice President, Technology Policy & Standards, Comcast
Internet of Things (IoT) is becoming an emerging trend superseding other technologies and researchers considered it as the future of internet. As now the connectivity to the World Wide Web is becoming highly available cost is drastically decreasing so everyone can afford the technology. As Internet of Things provides a great opportunity to develop an important industrial systems and applications with the help of various kind of sensors that can sense out the environment using number of devices that is connected to the internet, usage of IoT is drastically increasing and becoming a common thing. With this sky-rocketed usage and the demand, Communication and storing of the information faces serious security issues as the security of IoT devices become just an afterthought when manufacturing most of the devices. This study tries to summarize this IoT security issues in terms of primary information security concepts confidentiality, integrity and availability with regards to its architecture.
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Jason Livingood
Vice President, Technology Policy & Standards, Comcast
https://www.cablelabs.com/informed/
Mobile containers - The good, the bad and the uglyPriyanka Aash
This presentation covers the premise of mobile containers and their inherent limitations, from app level to OS level containers. As part of the presentation and in coordination with Google, the presenters will discuss issues recently uncovered within the Android for Work framework and provide a demonstration of techniques used by attackers to bypass the secure separation built into such a solution.
(Source: RSA Conference USA 2017)
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
Internet Society (ISOC) aims are:
make security an integrated function of connected objects and encourages IoT device and service providers for consumers to adopt the Online Trust Alliance (OTA) security and privacy principles ;
increase the consumer demand for security and privacy in the IoT devices they purchase;
create government policies and regulations that promote better security and privacy features in IoT devices.
Internet of Things (IoT) will enable dramatic society transformation. This seminar presents an introduction to the IoT and explains why IoT Security is important.
Then it presents security issues in wireless sensor networks that constitute a main ingredient of IoT.
Seminar given at Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) on 28 January 2015.
The session with highlight Intel’s vision for IoT Security and the fundamental building blocks and capabilities Intel and the ecosystem are providing to organizations to build security in from design through deployment and maintenance.
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
This Cybersecurity webinar addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids. Cyber threats and vulnerabilities, including cyber attacks, will be addressed; as well as Smart Grid trends, and privacy and data integrity issues. United States, European, and International organizations and initiatives to address cybersecurity for utilities will be discussed. The webinar will conclude with strategies to improve cybersecurity. A second cybersecurity webinar (programmed in September 2017) will address best practices, case studies, and legal and regulatory constraints for architecting smart grids in a secure way.
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
The Internet of Things (IoT) has the potential to drive new innovation in products, services, and improve "how things are done" in manufacturing. However IoT also brings-to-light safety and security issues when purpose-built computing and network devices are exposed to the internet. This session will review case studies of IoT enabled exploits, explore some of the underlying cause of the vulnerabilities, and briefly review of steps vendors and end-users are taking to mitigate the risk.
From the 2014 Taking Shape Summit: The Internet of Things & the Future of Manufacturing.
The symbiotic relationship between smart cities and smart grids. The integration of city infrastructure with electric utilities infrastructure is indeed a natural way of building a system of systems to deliver a secure resilient grid through the emergence of integrated utility micro-grids.
A narrative about how the grid will transform itself starting with the convergence of advanced intelligent machines, broadband communications, edge computing, cloud analytics all connected as a secure distributed network.
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Rob Alderfer, Moderator
Vice President Technology Policy, CableLabs
Gerald Faulhaber
Professor Emeritus, Business Economics & Public Policy, Wharton School
Chaz Lever
Lead Reseacher, Georgia Tech
Jason Livingood
Vice President, Technology Policy & Standards, Comcast
Internet of Things (IoT) is becoming an emerging trend superseding other technologies and researchers considered it as the future of internet. As now the connectivity to the World Wide Web is becoming highly available cost is drastically decreasing so everyone can afford the technology. As Internet of Things provides a great opportunity to develop an important industrial systems and applications with the help of various kind of sensors that can sense out the environment using number of devices that is connected to the internet, usage of IoT is drastically increasing and becoming a common thing. With this sky-rocketed usage and the demand, Communication and storing of the information faces serious security issues as the security of IoT devices become just an afterthought when manufacturing most of the devices. This study tries to summarize this IoT security issues in terms of primary information security concepts confidentiality, integrity and availability with regards to its architecture.
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Jason Livingood
Vice President, Technology Policy & Standards, Comcast
https://www.cablelabs.com/informed/
Mobile containers - The good, the bad and the uglyPriyanka Aash
This presentation covers the premise of mobile containers and their inherent limitations, from app level to OS level containers. As part of the presentation and in coordination with Google, the presenters will discuss issues recently uncovered within the Android for Work framework and provide a demonstration of techniques used by attackers to bypass the secure separation built into such a solution.
(Source: RSA Conference USA 2017)
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
Internet Society (ISOC) aims are:
make security an integrated function of connected objects and encourages IoT device and service providers for consumers to adopt the Online Trust Alliance (OTA) security and privacy principles ;
increase the consumer demand for security and privacy in the IoT devices they purchase;
create government policies and regulations that promote better security and privacy features in IoT devices.
Internet of Things (IoT) will enable dramatic society transformation. This seminar presents an introduction to the IoT and explains why IoT Security is important.
Then it presents security issues in wireless sensor networks that constitute a main ingredient of IoT.
Seminar given at Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) on 28 January 2015.
The session with highlight Intel’s vision for IoT Security and the fundamental building blocks and capabilities Intel and the ecosystem are providing to organizations to build security in from design through deployment and maintenance.
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
This Cybersecurity webinar addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids. Cyber threats and vulnerabilities, including cyber attacks, will be addressed; as well as Smart Grid trends, and privacy and data integrity issues. United States, European, and International organizations and initiatives to address cybersecurity for utilities will be discussed. The webinar will conclude with strategies to improve cybersecurity. A second cybersecurity webinar (programmed in September 2017) will address best practices, case studies, and legal and regulatory constraints for architecting smart grids in a secure way.
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
The Internet of Things (IoT) has the potential to drive new innovation in products, services, and improve "how things are done" in manufacturing. However IoT also brings-to-light safety and security issues when purpose-built computing and network devices are exposed to the internet. This session will review case studies of IoT enabled exploits, explore some of the underlying cause of the vulnerabilities, and briefly review of steps vendors and end-users are taking to mitigate the risk.
From the 2014 Taking Shape Summit: The Internet of Things & the Future of Manufacturing.
The symbiotic relationship between smart cities and smart grids. The integration of city infrastructure with electric utilities infrastructure is indeed a natural way of building a system of systems to deliver a secure resilient grid through the emergence of integrated utility micro-grids.
A narrative about how the grid will transform itself starting with the convergence of advanced intelligent machines, broadband communications, edge computing, cloud analytics all connected as a secure distributed network.
Consider first that platforms are becoming a dominant form of business organization. Then consider how you transition an existing product to a platform. This talk illustrates steps to make the transition. It then describes what an open business model looks like and compares differences in openness of Apple, Google, Microsoft and others.
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandesjornvorn
This first part forms the introduction to the lecture series " Urban Analysis and Design" of the Minor Green Blue City. Focus is on urban residential typologies in Rotterdam Zuid. Exemined will be various forms of city maps that can be used for successful analytical methods. The lecture is given by Evelien Brandes, coordinator of the Urban Analysis and Design course.
The Security Fabric Alliance is an informal consortium dedicated to the deployment of "designed in security" for embedded systems in critical infrastructure.
It uses the NIST IR 7628 guidelines and the "tailored trustworthy space" as the basis for the Security Fabric Reference Architecture. The SFRA is discussed in detail in the slides herein.
Sfa community of practice a natural way of buildingChuck Speicher
A community of practice is natural way of building something through intuitive learning exercises ( lean development methodology) that people lack the knowledge to accomplish on their own.
These barriers to enabling new markets have always existed from ancient times to present day. The "community of practice" bridges technology processes and people to naturally solve what people need to know and learn quickly.
Interop 2006: Evolution of the Networking IndustryAbner Germanow
This was a presentation from 2006 where (starting on slide 30) I described how the way consumer networking vendors built their products would ultimately upend the way enterprise vendors built products. Today, the hype around SDN, commodity switching products, and linux based network operating systems is making much of this come true.
This presentation was first given in May 2006 at the Interop trade show.
Slide 30, is where I talked about how the networking market would split from vertically organized vendors to horizontally specialized vendors. I predicted this transition would take 10 years.
At the time, the use of merchant silicon in datacenter and enterprise switching products was a rarity. Today, it is common. Then linux derivative network OSes were limited to consumer products, today they are taking over large scale cloud datacenters.
The networking market hasn’t come as far as I expected in 10 years, but it’s pretty cool much of this either came true or is on the cusp of coming true. Much more change is under way.
The PPT is intended to provide an open discussion on the subject matter covered in the 30 + slides.The knowledge collected and shared here has culminated from thousands of hours with SMEs and practitioners dedicated to the transformation of the power grid, the creation of an industrial internet and finally putting this knowledge to practical use so that a knowledge economy can be realized and sustained for all.
The challenges are daunting but not impossible to overcome.Change is needed in how we solve such complex problems by actively seeking new pathways that are less traveled. One only needs to draw from the courage one needs to take the first step in a thousand mile journey.
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
[View the Webinar] - https://electrici.mp/2v1fQlI
Electric Imp CEO, Hugo Fiennes, and UL’s Director of Connected Technologies, Rachna Stegall discuss the unique demands of helping to secure the IoT — and why independent certification is even more critical in the fast-evolving world.
Join us to hear Fiennes & Stegall share candid insights into why establishing an IoT Security Benchmark, such as UL 2900-2-2 Cybersecurity Certification, is critical for due diligence of edge to enterprise technologies — and the future of commercial, industrial and consumer IoT overall.
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
Presented by: Nadya Bartol, Utility Telecom Council
Abstract: A variety of recent breaches and vulnerabilities demonstrate that software and hardware supply chain is a serious concern in the ICS space. Asset owners/operators and suppliers are in a symbiotic relationship – acquirers cannot conduct business without the supplier products and services. Where do the subcomponents come from and what do we know about their contents? Which code libraries were used by the sub-supplier? Why do we need to know? Several solution sets have emerged over the last 6 years, developed in IT/communications, defense, and ICS space. These include soon-to-be-published ISO and IEC standards, NIST documents, certification framework, Common Criteria extensions, and efforts by software industry consortium. The presentation will survey ICT supply chain security problem space, provide an overview of available solutions developed to date, and recommend how to use these solutions in the ICS context
In this webinar, learn about common cybersecurity threats and the crucial role played by real-time digital simulation in the reinforcement of cybersecurity in power systems.
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
The next wave of Industrial Internet applications will connect machines and devices together into functioning, intelligent systems with capabilities beyond anything possible today. These systems fundamentally depend on connectivity and information exchange to derive knowledge and make "smart decisions". They require a much higher level of reliability and security than "Consumer" IoT applications. OMG's Data-Distribution Service for Real-Time Systems (DDS) is the premier open middleware standard directly addressing publish-subscribe communications for Industrial IoT applications. It provides a protocol that meets the demanding security, scalability, performance, and Quality of Service requirements of IIoT applications spanning connected machines, enterprise systems, and mobile devices.This presentation will use concrete use cases to introduce DDS and examine why energy, advanced medical, asset-tracking, transportation, and military systems choose to base their designs on DDS.
European smart grid cyber and scada securityYulia Rotar
European Smart Grid Cyber and SCADA Security Conference by the SMi Group, London, UK, 10-11 March 2014.
Get in touch with us via mmalik@smi-online.co.uk
Security of the Electric Grid: It's more than just NERC CIPEnergySec
The availability of spectrum for utility communications networks, heightened consumer protection and privacy concerns, cloud computing and its application to the smart grid, supply chain security – these are just some of the policy and regulatory issues that could have a significant impact on utilities as they integrate millions of data points for more efficient control of the modernized grid. Attention has been focused on compliance with NERC-CIP mandates and passing audits, but what is their place in the broader security picture? Will other policy developments change the landscape of grid security?
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
Similar to 2-25-2014 Part 1 - NRECA Kickoff Meeting v2 (20)
3. Agenda for NRECA Agile Fractal Grid
Kickoff Meeting
8:00 Welcome by Martin Lowery; Opening by Chuck Speicher
8:15 Introductions of the Participants – John Reynolds
8:45 Achieving the Common Language through Design Patterns
9:20 The Vision of the Agile Fractal Grid – Craig Miller
9:45 Break
10:00 Discussion of the Managed Services Store and Applications
10:20 Discussion of the Distributed Systems Elements
11:45 Discussion of the Industrial Internet – Security, Resiliency, Efficiency
12:15 Lunch
1:00 Scope of the SmartAmerica Challenge vs. the Production Rollout
2:00 SEIT Process and Phase 1 Planning
2:30 Break
3:00 Phase 2 Implementation and Thread Assignments
3:30 General Discussion, Issues, Action Items, and Understandings
4:00 Wrap Up and Conclusion
8. It has been said that
the greatest engineering achievement of the 20th century
has been the building of the electric grid.
- The National Academy of Engineering
10. Department of Energy
Carol Hawk
Program Manager,
Cyber Security for Energy Delivery Systems
Ivanpah
World's largest solar plant started producing electricity today
Ivanpah was supported by $1.6 billion in investments
from the Energy Department's Loan Programs Office.
It represents the future of energy –
utility-scale renewable power generation
that uses the latest technology to harness the sun
where it is most abundant.
13. Department of Homeland Security
Lisa Kaiser
Sarah Mahmood
Executive Order (EO) 13636: Improving Critical Infrastructure Cybersecurity
Presidential Policy Directive (PPD)-21: Critical Infrastructure Security and Resilience,
Critical Infrastructure Cyber Community Voluntary Program
Secretary of Homeland Security
Jeh Johnson
14. PM – ISE
DNI
Pamela Wise-Martinez
Mike Howell
Kshemendra Paul
Mission Partners
15. Congress
Diane Rinaldo
Legislative Director
For Mike RogersMike Rogers
– Michigan 8th District
U.S. House of Representatives
Chairman, House Intelligence Committee
Member, Energy and Commerce Committee
United States House Energy Subcommittee on Communications and Technology
United States House Energy Subcommittee on Health
Cyberthreat Data Sharing
and Protection
18. We are planning to support the 940 rural co-ops in the U.S. with
hybrid cloud/device services protected by the Security Fabric.
This is also the candidate energy “testbed” for the SmartAmerica demonstration.
19. What NRECA has asked us to do.
1. Stand up an “app store” for both operational and analytical
applications for the cooperatives.
2. Participate in the “Substation of the Future” for the remote
equipment and subsystems.
3. Apply the Security Fabric within the emerging Industrial
Internet to protect all communications between the
elements.
20. Introduction to the
Security Fabric Alliance
• The Security Fabric Alliance is a working association dedicated to
practical deployment of the power grid and critical infrastructure
complex system solution in the United States:
– Utilities and telecommunications providers
– Systems integrators
– Manufacturers
– Technology partners
– National certification and interoperability entity
• The alliance is intended to give the CEO of a utility the purview of
up-to-the moment knowledge of the options available to make wise
investment decisions regarding infrastructure deployment for
optimal returns.
The variation includes the proper orientation for large, medium, and small utilities.
21. There are many participants at different levels
in the Security Fabric Alliance.
ComponentsProductsSubsystems
ResearchIntegration
Utility
Customers
• Intel – servers with Quark + TPM
• Wind River – Security Connect
• Middleware
• RTI – DDS
• GridStat
• Indra - iSpeed
• MultiSpeak
• TeamF1 – Secure Communications
• Secure Crossing – Protocol Whitelisting
• PsiNaptic – Secure Service Distribution
• SNMP Research – SNMP Agent
• Freescale – HSM w/Vybrid SoC
• Xilinx – CompactRIO SOC
• Green Hills Software - INTEGRITY
• Altera - tamper proofing
• Microsoft – Active Directory
• Red Hat – Auth Hub
• General Electric – EMS
• Alstom Grid – EMS
• Siemens – DMS
• Viridity Energy – DR + DER
+ Microgrid
• Lemko – LTE systems
• Intel Security – SIEM + GTI
• Intel – Encanto
+ silicon support
• Sypris – Supply
Chain Root of Trust
• TCIPG
• EPRI – CIM Standards
• MIT – Security &
Privacy Standards
• EPG – Phasor Data Portfolio
• GridSense– NAN & Line Sensors
• S&C IntelliTeam
• SafeNet – Secure Key Management
• Heart - Transverter
• Freescale One Box
• Cisco Cloud-in-a-Box
• Integrated Architectures – SEIT
• MACE Fusion - DoD
• Kryptos Logic – Red Team Certification
• M2M Dynamics
• Drummond Group – C&IT
• Intel Security - Distribution
...First Stage……
• ERCOT
• ONCOR
• AEP
• NRECA
• NRTC
Suppliers
• Verizon
• Level3
• AT&T
• Internet2
• BT
• ViaSat
• Hughes
• ARINC
• Stratus
• Symmetricom
…Second Stage……
• APPA
• SDG&E
• PJM
• NYISO
• Southern Company
• Duke Energy
• CAISO
• Pecan Street
• Mueller Community
• Pike Powers
• PNNL – CyberSecurity
Test Center
• Lincoln Labs
• OMG SIG
• SmartAmerica
Managed Services
• Tazca – Connect
• CSG International
• Digi International
• N-Dimension
• SETI
• Lockheed Martin
• SAIC
• Threat Connect
22. To establish the security of end-to-end systems using the Security Fabric elements,
you need to do all seven… not just some.
4. Audit
– Records noteworthy events for later analysis
5. Confidentiality
– Encrypts sensitive data for matters of privacy.
6. Integrity
– Ensures that messages have not been
altered.
7. Availability
– Prevents denial of service attacks
1. Identity Management
– Ensures the device identity is established
genuinely
2. Mutual Authentication
– Allows both the Device Node and the
Controller to verify the trustworthiness their
identity to each other.
3. Authorization
– Manages permission to proceed with specific
operations.
These are the seven tenets of security
as described in the NIST-IR 7628 Guidelines.
23. The OMG process is more about establishing markets
as opposed to just setting standards.
SFA Reference
Builds
Certification of
Conformance &
Interoperability
The OMG is planning to standardize
the Security Fabric
for all critical infrastructure.
25. Systems Engineering, Integration, and Test
• President – Energy One Solutions
• Secretary General – GO15
Very Large Power Grid Operators
• President and CEO
Alstom ESCA Corporation
• CTO – PJM Interconnection
• Co-founder Viridity EnergyAlain Steven
John Reynolds
Alain Steven
Rick Schaal
Mike Sisto
Jim Baller
Bob Lamont
Paul Carroll
Mike Sisto
• IBM’s Wireless Emerging Business Opportunities
• AT&T, Lucent Technologies and Hewlett-Packard
• Lemko Distributed Mobile Wireless Network solutions
Rick Schaal
• VP, Engineering – Viridity
• Executive Program Director –
Alstom ESCA
• Program Director – AREVA
• DMS Lead – Puget Sound Energy
• American Public Power Association
• Fiber to the Home Council
• Google Inc.
• National Association of Telecommunications
Officers and Advisors
• + several hundred specific broadband projects
27. Texas A&M University
Named second in the nation by The Wall Street Journal among all universities,
public and private, in a survey of top U.S. corporations, non-profits and government agencies,
based on graduates that recruiters prefer to hire.
“Home of the 12th Man”
Walt Magnussen
28. Real-Time Innovations
AEGIS Weapons System
Total Ship Computing Environment
NASA Robotic Controls Unmanned Aircraft Systems
Tom O’Conner
Mark Hamilton
30. GridSense
Transformer IQ
Line IQ
Inspection
Brett Sargent • System Capacity
• Phase Imbalance
• Metering / Theft
• Conservation Voltage
Reduction
• Four Quadrant True
Power Factor
• Line Fault Directionality
• PQ – voltage sags/swells,
interruptions, surges,
unbalance
• Transformer Asset
Management
31. Lemko
LTE over Satellite
Cellular on Wheels
Utility Industry
WiMax Replacement
Security Industry
Transportation Industry
Mike Sisto
Public Safety
Healthcare industry
42. Green Hills Software
Smart Farming
Smart Medical Systems
GE Aircraft Engines
EMC High End Storage Systems
Transportation Systems
Phase Array Radar Systems
Weapons Control Systems
Guidance Systems
Game Systems
Automotive Systems
John Warther
John Killam
Brad Jackson
Brian Riley
43. LocalGrid Technologies
Power Quality Analyzer
Microgrid controls:
• Microgrid and Generation Control
• Generation and Asset Monitoring
• Storage Integration
Device EnvironmentController Environment
Hypervisor
Application
Management
Agent
Hypervisor
Application
Management
Agent
David Berg
51. Utilities Telecommunications Council
Eric Wagner
Brett Kilbourne
• Advocacy and Training
• License Sentry
• Frequency Coordination
• Microwave Coordination
• PLC Database
• RF Safety and Training
• Regulatory Filing and Tracking
54. National Rural Electrical Cooperative
Association
Martin Lowery
Robbin Christianson
David Pinney
Maurice Martin
Barry Lawson
Bridgette Bourge
Bob Lamouth
Doug Lambert
Paul Carrol
Craig Miller