The document discusses several initiatives related to securing critical infrastructure systems:
- The Security Fabric Alliance aims to deploy security solutions for the power grid through collaboration between utilities, technology companies, and standards bodies.
- The Industrial Internet Consortium works to accelerate development and adoption of technologies connecting industrial systems for security and productivity.
- The OMG process establishes market standards to certify conformity and interoperability of the Security Fabric for critical infrastructure.
- Initiatives are described to utilize hybrid cloud/device services, protected by the Security Fabric, to support rural electric co-ops across the U.S.
Building a national network dedicated to supporting deterministic workflows as part of a shared infrastructure supporting both the resilient power grid and the Industrial Internet using a blue ocean strategy to lower CAPEX and OPEX.
This kickoff intrtoduces the concept of the Agile Fractal grid to more than 100 companies that particpated in the full day workshop lead by Chuck Speicher and John Reynolds and Craig Miller the Chief scientist of the NRECA
A narrative about how the grid will transform itself starting with the convergence of advanced intelligent machines, broadband communications, edge computing, cloud analytics all connected as a secure distributed network.
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
This Cybersecurity webinar addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids. Cyber threats and vulnerabilities, including cyber attacks, will be addressed; as well as Smart Grid trends, and privacy and data integrity issues. United States, European, and International organizations and initiatives to address cybersecurity for utilities will be discussed. The webinar will conclude with strategies to improve cybersecurity. A second cybersecurity webinar (programmed in September 2017) will address best practices, case studies, and legal and regulatory constraints for architecting smart grids in a secure way.
Building a national network dedicated to supporting deterministic workflows as part of a shared infrastructure supporting both the resilient power grid and the Industrial Internet using a blue ocean strategy to lower CAPEX and OPEX.
This kickoff intrtoduces the concept of the Agile Fractal grid to more than 100 companies that particpated in the full day workshop lead by Chuck Speicher and John Reynolds and Craig Miller the Chief scientist of the NRECA
A narrative about how the grid will transform itself starting with the convergence of advanced intelligent machines, broadband communications, edge computing, cloud analytics all connected as a secure distributed network.
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
This Cybersecurity webinar addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids. Cyber threats and vulnerabilities, including cyber attacks, will be addressed; as well as Smart Grid trends, and privacy and data integrity issues. United States, European, and International organizations and initiatives to address cybersecurity for utilities will be discussed. The webinar will conclude with strategies to improve cybersecurity. A second cybersecurity webinar (programmed in September 2017) will address best practices, case studies, and legal and regulatory constraints for architecting smart grids in a secure way.
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
This presentation gives an introduction to security of smart grid and reviews the most important related guidelines like NISTIR 7628 and IEEE 2030. At the final section, it reviews the US cyber security program for the energy sector as a case study.
D2D communication for spectral efficiency improvement and interference reduct...journalBEEI
Device-to-device (D2D) communication system plays an extremely important role in fulfilling the demands of fourth generation (4G) and fifth generation (5G) technologies. 4G technology cannot meet high data demands. The D2D communication system is believed to provide major improvements in resource usage, energy efficiency, and overall throughput, which are the main demands for the 5G network. Some of the main issues in the D2D communication system involve spectrum efficiency and interference. Although many studies have been conducted on spectrum efficiency improvement and interference reduction, the issues still remain. A study should be conducted to obtain a better understanding of the D2D communication system and to develop a D2D scheme with efficient spectrum utilization and interference reduction. Many survey papers have been published on these issues, but the fundamental concepts behind the D2D communication system require investigation. In this study, we investigated and analyzed the fundamental concepts behind the D2D communication system to develop an efficient D2D resource allocation scheme with reduced interference.
5G Mobile Wireless network system yield new challenges. In future the demand that need to be addressed are capacity, increase data rate and reduce latency. This paper focus on latest technologies used in wireless mobile communication network. In this, some emerging technologies use like device-to-device Communication (D2D), Interference Management, Spectrum sharing with cognitive radio, network cloud and Internet of Things (IoT), Massive MIMO. The IoT allows objects to be sensed or controlled remotely across existing network infrastructure and network cloud describing the access of networking resources from a centralized third-party provider. Kiran Likhar | Shraddha Karale | Rashmi Bhat"Challenges and Emerging Technology in 5G" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10778.pdf http://www.ijtsrd.com/computer-science/other/10778/challenges-and-emerging-technology-in-5g/kiran-likhar
A secure cloud computing based framework for big information management syste...Pawan Arya
—Smart grid is a technological innovation that improves efficiency, reliability, economics, and sustainability of electricity services. It plays a crucial role in modern energy infrastructure. The main challenges of smart grids, however, are how to manage different types of front-end intelligent devices such as power assets and smart meters efficiently; and how to process a huge amount of data received from these devices. Cloud computing, a technology that provides computational resources on demands, is a good candidate to address. a secure cloud computing based framework for big data information management in smart grids, which we call “Smart-Frame.
Presentation introduces Chief Security Officers (CSO's) and others with responsibility for protecting companies and their customers to what they need to know about the coming Smart Grid
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
iDirect's solution for electric ulitiesJoshua Cohen
The whole 'smart grid' trend is very big in the utilities space. This is a VSAT solution that can help IT Ptos and Operations staff in utilities implement smart grid in their enterprise
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
Report-An ambient assisted-living emergency system exploits cloud and fog computing, an outdoor positioning mechanism, and emergency and communication protocols to locate activity-challenged individuals.
Healthcare Infrastructure Solutions that Deliver Dramatic SavingsMestizo Enterprises
Shrinking Budgets, Consolidation, and the incessant demand for more functionality, more services, more integration at lower cost is harming healthcare operations. Decision Makers are at a loss when faced with technical decisions that force them to spend money on cable plants, network switches, telco closet expansions to meet "today's standards", and more and more energy consumption. Sandia National LABS cut more than 1 Million Kilowatt hours and is predicting a savings of 20 Million Dollars over the next 5 years alone and they spent less money on upgrades than ever before.
The symbiotic relationship between smart cities and smart grids. The integration of city infrastructure with electric utilities infrastructure is indeed a natural way of building a system of systems to deliver a secure resilient grid through the emergence of integrated utility micro-grids.
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
This Cybersecurity webinar, the second in a series, addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids worldwide. Technology and market challenges will be addressed, followed by cybersecurity approaches (including those used in Europe and US) and best practices. Three case studies, and legal and regulatory constraints, for architecting smart grids in a secure way also will be presented.
This presentation gives an introduction to security of smart grid and reviews the most important related guidelines like NISTIR 7628 and IEEE 2030. At the final section, it reviews the US cyber security program for the energy sector as a case study.
D2D communication for spectral efficiency improvement and interference reduct...journalBEEI
Device-to-device (D2D) communication system plays an extremely important role in fulfilling the demands of fourth generation (4G) and fifth generation (5G) technologies. 4G technology cannot meet high data demands. The D2D communication system is believed to provide major improvements in resource usage, energy efficiency, and overall throughput, which are the main demands for the 5G network. Some of the main issues in the D2D communication system involve spectrum efficiency and interference. Although many studies have been conducted on spectrum efficiency improvement and interference reduction, the issues still remain. A study should be conducted to obtain a better understanding of the D2D communication system and to develop a D2D scheme with efficient spectrum utilization and interference reduction. Many survey papers have been published on these issues, but the fundamental concepts behind the D2D communication system require investigation. In this study, we investigated and analyzed the fundamental concepts behind the D2D communication system to develop an efficient D2D resource allocation scheme with reduced interference.
5G Mobile Wireless network system yield new challenges. In future the demand that need to be addressed are capacity, increase data rate and reduce latency. This paper focus on latest technologies used in wireless mobile communication network. In this, some emerging technologies use like device-to-device Communication (D2D), Interference Management, Spectrum sharing with cognitive radio, network cloud and Internet of Things (IoT), Massive MIMO. The IoT allows objects to be sensed or controlled remotely across existing network infrastructure and network cloud describing the access of networking resources from a centralized third-party provider. Kiran Likhar | Shraddha Karale | Rashmi Bhat"Challenges and Emerging Technology in 5G" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10778.pdf http://www.ijtsrd.com/computer-science/other/10778/challenges-and-emerging-technology-in-5g/kiran-likhar
A secure cloud computing based framework for big information management syste...Pawan Arya
—Smart grid is a technological innovation that improves efficiency, reliability, economics, and sustainability of electricity services. It plays a crucial role in modern energy infrastructure. The main challenges of smart grids, however, are how to manage different types of front-end intelligent devices such as power assets and smart meters efficiently; and how to process a huge amount of data received from these devices. Cloud computing, a technology that provides computational resources on demands, is a good candidate to address. a secure cloud computing based framework for big data information management in smart grids, which we call “Smart-Frame.
Presentation introduces Chief Security Officers (CSO's) and others with responsibility for protecting companies and their customers to what they need to know about the coming Smart Grid
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
iDirect's solution for electric ulitiesJoshua Cohen
The whole 'smart grid' trend is very big in the utilities space. This is a VSAT solution that can help IT Ptos and Operations staff in utilities implement smart grid in their enterprise
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
Report-An ambient assisted-living emergency system exploits cloud and fog computing, an outdoor positioning mechanism, and emergency and communication protocols to locate activity-challenged individuals.
Healthcare Infrastructure Solutions that Deliver Dramatic SavingsMestizo Enterprises
Shrinking Budgets, Consolidation, and the incessant demand for more functionality, more services, more integration at lower cost is harming healthcare operations. Decision Makers are at a loss when faced with technical decisions that force them to spend money on cable plants, network switches, telco closet expansions to meet "today's standards", and more and more energy consumption. Sandia National LABS cut more than 1 Million Kilowatt hours and is predicting a savings of 20 Million Dollars over the next 5 years alone and they spent less money on upgrades than ever before.
The symbiotic relationship between smart cities and smart grids. The integration of city infrastructure with electric utilities infrastructure is indeed a natural way of building a system of systems to deliver a secure resilient grid through the emergence of integrated utility micro-grids.
Consider first that platforms are becoming a dominant form of business organization. Then consider how you transition an existing product to a platform. This talk illustrates steps to make the transition. It then describes what an open business model looks like and compares differences in openness of Apple, Google, Microsoft and others.
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandesjornvorn
This first part forms the introduction to the lecture series " Urban Analysis and Design" of the Minor Green Blue City. Focus is on urban residential typologies in Rotterdam Zuid. Exemined will be various forms of city maps that can be used for successful analytical methods. The lecture is given by Evelien Brandes, coordinator of the Urban Analysis and Design course.
The Security Fabric Alliance is an informal consortium dedicated to the deployment of "designed in security" for embedded systems in critical infrastructure.
It uses the NIST IR 7628 guidelines and the "tailored trustworthy space" as the basis for the Security Fabric Reference Architecture. The SFRA is discussed in detail in the slides herein.
Sfa community of practice a natural way of buildingChuck Speicher
A community of practice is natural way of building something through intuitive learning exercises ( lean development methodology) that people lack the knowledge to accomplish on their own.
These barriers to enabling new markets have always existed from ancient times to present day. The "community of practice" bridges technology processes and people to naturally solve what people need to know and learn quickly.
The PPT is intended to provide an open discussion on the subject matter covered in the 30 + slides.The knowledge collected and shared here has culminated from thousands of hours with SMEs and practitioners dedicated to the transformation of the power grid, the creation of an industrial internet and finally putting this knowledge to practical use so that a knowledge economy can be realized and sustained for all.
The challenges are daunting but not impossible to overcome.Change is needed in how we solve such complex problems by actively seeking new pathways that are less traveled. One only needs to draw from the courage one needs to take the first step in a thousand mile journey.
Securing the 5G growth story with NFVi (1).pdfSecurity Gen
2020 became the year of 5G proliferation (as per Qualcomm study), while 2021 is
about a rapid 5G rollout, vertical expansion, and advancing 5G systems with new
capabilities. The same gets reflected in an August 2021 Gartner forecast that
estimates 5G coverage in tier-1 cities across the US by 2024 will be 60%, besides
predicting a revenue growth from $794 million to $1.6 billion in western Europe, by
the year-end.
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenSecurityGen1
SecurityGen delves deep into the intricacies of 5G technology to uncover potential vulnerabilities that may compromise network security and data integrity. Our dedicated team of cybersecurity experts conducts rigorous assessments and threat analyses to identify and prioritize vulnerabilities across the 5G ecosystem. From protocol vulnerabilities to infrastructure weaknesses, SecurityGen offers comprehensive insights and solutions to address the diverse array of risks associated with 5G deployment.
Securing the 5G growth story with NFVi.pdfSecurity Gen
2020 became the year of 5G proliferation (as per Qualcomm study), while 2021 is
about a rapid 5G rollout, vertical expansion, and advancing 5G systems with new
capabilities. The same gets reflected in an August 2021 Gartner forecast that
estimates 5G coverage in tier-1 cities across the US by 2024 will be 60%, besides
predicting a revenue growth from $794 million to $1.6 billion in western Europe, by
the year-end.
Slides from panel talk at the annual IEEE Power and Energy Society meeting on Power System Cybersecurity.
After a 8 hour tutorial and a panel talk, there were a number of consistent themes and challenges that surfaced. The two that concern me the most are: a) blocking engineers from discussing security approaches at technical conferences and b) treating power system cybersecurity as only a compliance issue for the IT, legal, and compliance departments. With the hopes that this sparks a bigger conversation, I’m sharing a copy of my slides from our panel talk. Thoughts and comments are welcomed.
http://www.ibm.com/smarterplanet/us/en/smart_grid/article/cyber_security.html?cmp=agus_cxosp2gridsec-20100426&cm=c&csr=endsecurity&cr=slideshare&ct=usbrb401&cm_mmc=agus_cxosp2gridsec-20100426-usbrb401-_-c-_-endsecurity-_-slideshare
IBM End-to-End Smart Grid Security Involving IT Security and Enterprise Asset Management
What is Your Edge From the Cloud to the Edge, Extending Your ReachSUSE
As companies continue to take advantage of the benefits of cloud – increased flexibility, speed of innovation and quickly responding to business demands, it is no wonder that they want to extend these benefits to the edge. But there are still a lot of questions.
Connected Vehicles, Zonal In Vehicle Network Architectureijtsrd
In vehicle network architecture is crucial in modern automobiles, enabling the seamless integration of electronic components and systems within vehicles. This article provides an in depth exploration of in vehicle network architecture, covering its history, types of networks, communication protocols, and emerging trends. The history section highlights the development of in vehicle networks, from basic electrical systems to the introduction of standardized protocols like the Controller Area Network CAN . The types of networks section discusses Local Interconnect Network LIN, CAN, and Automotive Ethernet, outlining their characteristics and applications. The communication protocols section explores protocols such as CAN, LIN, FlexRay, MOST, and Ethernet, detailing their features and use cases. Additionally, the article delves into emerging trends, including connected vehicles, advanced driver assistance systems ADAS, autonomous vehicles, and cybersecurity. The discussion emphasizes the increasing need for high bandwidth, low latency communication and robust cybersecurity measures in modern vehicles. By understanding in vehicle network architecture and its evolving landscape, automotive engineers and stakeholders can navigate the complexities of designing advanced, connected vehicles that ensure safety, efficiency, and a superior driving experience. Sanath D Javagal "Connected Vehicles, Zonal In-Vehicle Network Architecture" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-4, August 2023, URL: https://www.ijtsrd.com/papers/ijtsrd59616.pdf Paper Url:https://www.ijtsrd.com/engineering/automotive-engineering/59616/connected-vehicles-zonal-invehicle-network-architecture/sanath-d-javagal
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...SecurityGen1
Empower your defense against DDoS attacks with SecurityGen's comprehensive approach to prevention. Beyond merely blocking attacks, SecurityGen focuses on understanding the unique challenges your business faces. Our DDoS Attack Prevention goes beyond traditional measures, incorporating real-time threat intelligence and behavioral analysis. By choosing SecurityGen, businesses gain a holistic defense strategy that adapts to emerging threats. With SecurityGen's comprehensive approach, organizations can confidently navigate the digital landscape, knowing that their digital assets are protected against the evolving nature of DDoS attacks.
Wi-Fi has been ubiquitous on Enterprise and Industrial environments. Fast evolution
a great promise in fact made some MNOs and Fixed Service Providers to build their
own “complementary” Wi-Fi networks, especially due to the high costs on 3G
deployment.
During the 4G rollout, technology evolution has tilted the scale back for MNOs, but
Wi-Fi was still the standard for enterprises. Enhanced-LTE and 5G are now
challenging this reality.
The specifications for reliability, high speed, low latency, high density, and powe
Wi-Fi has been ubiquitous on Enterprise and Industrial environments. Fast evolution
a great promise in fact made some MNOs and Fixed Service Providers to build their
own “complementary” Wi-Fi networks, especially due to the high costs on 3G
deployment.
During the 4G rollout, technology evolution has tilted the scale back for MNOs, but
Wi-Fi was still the standard for enterprises. Enhanced-LTE and 5G are now
challenging this reality.
The specifications for reliability, high speed, low latency, high density, and powe
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
Industrial infrastructures are growing in size and complexity. And it’s all too clear that traditional enterprise IT solutions have not been successful in safeguarding them from
cyber-attack.
They do not meet the best-practice deep-packet inspection capability in the field, nor do they place an emphasis on zone protection network segmentation.
As well, they tend to focus on preventing loss of confidential information, rather than
what really matters in the industrial world – reliability and integrity of the system.In this architecture, a Cybridge is used as a one way content filter gateway which enables the extraction and export of protocol data and information from within the industrial networks, carried upon industrial protocols, to enterprise networks.
This allows safe and easy integration of the machine data coming from the SCADA
network in enterprise reporting and statistical services, within external or public networks without any Cyber-attacks apprehension.
1. The Agile Fractal Grid
Chuck Speicher
John Reynolds
Friday, July 11, 2014
2. Security Fabric Alliance
• The Security Fabric Alliance is a working association dedicated
to practical deployment of the power grid and critical
infrastructure complex system solution in the United States:
– Utilities and telecommunications providers
– Systems integrators
– Manufacturers
– Technology partners
– National certification and interoperability entity
• The alliance is intended to give the CEO of a utility the purview
of up-to-the moment knowledge of the options available to
make wise investment decisions regarding infrastructure
deployment for optimal returns.
The variation includes the proper orientation for large, medium, and small entities.
3. The Industrial Internet
• The Industrial Internet Consortium was founded in 2014 to further
development, adoption and wide-spread use of interconnected
machines, intelligent analytics, and people at work.
• Through an independently-run consortium of technology innovators,
industrial companies, academia, and government, the goal of the IIC is to
accelerate the development and availability of intelligent industrial
automation for the public good.
• This goal of the consortium is to:
– Utilize existing and create new industry use cases and test beds for real-world
applications;
– Deliver best practices, reference architectures, case studies, and standards
requirements to ease deployment of connected technologies;
– Influence the global development standards process for internet and industrial
systems;
– Facilitate open forums to share and exchange real-world ideas, practices, lessons,
and insights;
– Build confidence around new and innovative approaches to security.
• The Industrial Internet Consortium (“IIC”) is a trademark of the Object Management
Group®, Inc. (OMG®), a not-for-profit 501(c)(6) tax-exempt organization.
4. The OMG process is more about establishing markets
as opposed to just setting standards.
SFA Reference
Builds
Certification of
Conformance &
Interoperability
The OMG is planning to standardize
the Security Fabric
for all critical infrastructure.
5. We are planning to support the 940 rural co-ops in the U.S. with
hybrid cloud/device services protected by the Security Fabric.
The FCC recently has emphasized that the best course of action
for rural broadband in the United States would be to use the rural electric utilities…
… the UTC and APPA expansions would triple the size of the coverage …
6. The Vision
“The Agile Fractal Grid”
Achieving
Grid Security, Reliability, and Resiliency
through Advanced Analytics and Control
What is needed:
1. A hybrid cloud for operations
and analytics
2. Substation of the future
3. Security Fabric end-to-end
7. Each level operates in
somewhat of a selfish fashion…
but recommendations for the
best trend for the flock
come from management
guidance from above.
Primary Data Flow
Patterns in
Laminar Control for
Power Grids
8. Electric power distribution and broadband communications
are like Siamese twins!
(They can’t go anywhere without each other.)
Digital control is needed
at each junction point.
Like electricity,
broadband can be used
for multiple things.
The Circulatory System The Nervous System
NRECA
UTC
9. As envisioned, Internet2 would eventually provide a
sequestered core network for the Industrial Internet.
Note the quadruple redundancy
10. Separation of the Industrial Internet
from the Generic Internet
The Core Network
Generic Internet
Carrier Ethernet
With Routing
DWDM Isolation
Cooperative Control Centers
Core City
Node
Enterprise Systems
Industrial Devices
Substation Nodes
Router+
Substation
Controller Router+
Carrier Ethernet
Isolation
NAN Nodes
HAN Nodes
Wireless LTE
700 MHz?
Wireless LTE
2.5 GHz?
PicoCell
Gateway
Sensor
Transverter
We will eventually use
a combination of DWDM separation
plus Carrier Ethernet separation.
11. Our communications has redundancy
built into the control protocols.
LTE
Macrocell
and
Distribution
Fiber
NAN
LTE
Picocell
Mobile
HAN
LTE
Home
Gateway
This is the only capability available
that allows handoff between terrestrial
LTE services and satellite services.
This system can simultaneously support
the public safety 700 MHz frequencies
as well as commercial usage.
15Mbps downloading and
5Mbps when uploading.
100 MB Access Services!
Internet2*
Cell Broadcast
12. The Security Fabric follows the guidelines required by the
NIST 7628 for the Department of Energy.
xSystem &
Network
Management
Controller
Device
Device The
Security
Fabric
The Security Fabric is an implementation of the
Tailored Trustworthy Space.
14. Separation of Protection and Security
• The major hardware approach for security or protection is the
use of hierarchical protection domains. Prominent example
of this approach is a ring architecture with "supervisor mode"
and "user mode“.
• This approach adopts
capabilities provided
by a lower level:
(hardware/firmware/kernel).
The Multics Style of Ring Structure
15. The cybersecurity threat sharing needs to be performed
between multiple communities to be effective.
Subscriber
Subscriber
Subscriber
Subscriber
Subscriber
Context
Top Secret
Secret
Unclassified
F
F
Threat
Connect
STIX
Custom
Community
Community
Community
1300
Communities
1200
Subscribers
On-Premises Cloud
UI
API
Private Cloud
Threat Connect
Cloud Platform
Amazon EC2
Broker
Sources
Free, $, other
The data arrangements can be hierarchical
to facilitate multi agency awareness.
IODEF
16. The “Concierge” Service
• Attention! Some of the co-ops have very tiny IT staffs. (Like
one person)
• The coming cyber attacks will be very sophisticated.
• Even the central staff will sometimes be challenged to deal
with the complexities associated with cyber defense.
• Thus, even with collaboration and data sharing, from time to
time, a co-op technician would like to have an “OnStar”
button to push to get instant help on demand from a
specialist.
This Concierge service from ThreatConnect may be very desirable.
Saturn sees the bigger picture.