To secure something you need to have a basic understanding of how it works. This presentation provides a high-level overview of Advanced Metering Infrastructure
The document summarizes the key topics from a briefing on cybersecurity issues facing the electric infrastructure sector. It outlines the technology landscape including increased connectivity and legacy systems. It describes the cybersecurity threats facing the sector such as espionage, organized crime, and warfare. It also notes potential impacts of cyber attacks including cyber-kinetic impacts. Finally, it lists some proposed solutions such as protection, detection, response, education, and exercises.
Hype, Hope and Happenstance: Cyber Threats and Opportunities in an Age of Aut...EnergySec
The document discusses cyber threats and opportunities in the electric utility industry arising from increased automation. It notes that while the electric grid has not experienced a significant cyber-related outage, adversaries with the ability to cause outages currently lack motivation. It highlights challenges around securing critical infrastructure systems and controlling access as the industry moves towards cloud-based services, mobile access, and integration of distributed energy resources and smart grid technologies.
Poster for Snickers Conference(Afghah Version)Jabari Stegall
This document summarizes Jabari Stegall's implementation of a smart home using a wireless sensor network. The study was supported by grants from NCSU and the NSF. The wireless sensor network consisted of ZigBee nodes connected to sensors to monitor events. The nodes sent sensor data to a gateway node connected to a laptop. Tests showed the sensors could successfully detect events and the network had minimal battery consumption. Potential applications of wireless sensor networks discussed include smart homes, health monitoring, industrial facilities, supply chain management, and smart grids.
The document discusses various components of computer networks including network interface cards, switches, routers, hubs, modems, and different types of data cables. It also covers network security concerns such as vulnerabilities in wired and wireless networks, risks associated with mobile networks, and threats posed by phishing emails and cryptojacking. The conclusion emphasizes the importance of properly setting up and managing networks to ensure security and allow for future expansion.
At the 2012 Technologies for Security and Compliance Summit, Patrick Miller provides an overview of various industry specific related cybersecurity topics focusing on information sharing.
Often the most powerful and successful efforts start with a few people coming together to solve a problem. In the past 5 years a number of “compliance communities” have sprung up across North America. Panelists give their individual takes on how they are using these communities to keep up on current industry-specific security regulatory developments and how they are sharing this information with the forums they represent. The panel will discuss the challenges of providing relevant information to their constituencies, communication strategies, community-driven solutions and the power of group dynamics as it relates to addressing security regulation as well as their thoughts on the importance of participating in community-based programs.
The document summarizes the key topics from a briefing on cybersecurity issues facing the electric infrastructure sector. It outlines the technology landscape including increased connectivity and legacy systems. It describes the cybersecurity threats facing the sector such as espionage, organized crime, and warfare. It also notes potential impacts of cyber attacks including cyber-kinetic impacts. Finally, it lists some proposed solutions such as protection, detection, response, education, and exercises.
Hype, Hope and Happenstance: Cyber Threats and Opportunities in an Age of Aut...EnergySec
The document discusses cyber threats and opportunities in the electric utility industry arising from increased automation. It notes that while the electric grid has not experienced a significant cyber-related outage, adversaries with the ability to cause outages currently lack motivation. It highlights challenges around securing critical infrastructure systems and controlling access as the industry moves towards cloud-based services, mobile access, and integration of distributed energy resources and smart grid technologies.
Poster for Snickers Conference(Afghah Version)Jabari Stegall
This document summarizes Jabari Stegall's implementation of a smart home using a wireless sensor network. The study was supported by grants from NCSU and the NSF. The wireless sensor network consisted of ZigBee nodes connected to sensors to monitor events. The nodes sent sensor data to a gateway node connected to a laptop. Tests showed the sensors could successfully detect events and the network had minimal battery consumption. Potential applications of wireless sensor networks discussed include smart homes, health monitoring, industrial facilities, supply chain management, and smart grids.
The document discusses various components of computer networks including network interface cards, switches, routers, hubs, modems, and different types of data cables. It also covers network security concerns such as vulnerabilities in wired and wireless networks, risks associated with mobile networks, and threats posed by phishing emails and cryptojacking. The conclusion emphasizes the importance of properly setting up and managing networks to ensure security and allow for future expansion.
At the 2012 Technologies for Security and Compliance Summit, Patrick Miller provides an overview of various industry specific related cybersecurity topics focusing on information sharing.
Often the most powerful and successful efforts start with a few people coming together to solve a problem. In the past 5 years a number of “compliance communities” have sprung up across North America. Panelists give their individual takes on how they are using these communities to keep up on current industry-specific security regulatory developments and how they are sharing this information with the forums they represent. The panel will discuss the challenges of providing relevant information to their constituencies, communication strategies, community-driven solutions and the power of group dynamics as it relates to addressing security regulation as well as their thoughts on the importance of participating in community-based programs.
Bridging the Gap: Between Operations and ITEnergySec
This presentation delivers some concepts related to the gaps between operations and IT that exist. Addressing the various business needs for consistency and the possible real-world purposes of inconsistency is the premise of this slide deck.
Don't Get Hacked! Cybersecurity Boot CampEnergySec
At the 2011 NARUC Winter Committee Meetings, Patrick Miller teamed up with seasoned security experts Miles Keogh from NARUC and Bill Hunteman from the Department of Energy to deliver an engaging Cybersecurity Boot Camp.
The webinar discussed the Tactical Analysis Center (TAC) subscription service provided by the National Electric Sector Cybersecurity Organization (NESCO). The TAC provides timely threat information, analysis reports, and notifications to electric utilities on cybersecurity issues. Subscription options include daily diaries, indicators of compromise, threat briefings, and executive overviews. All electric asset owners can subscribe regardless of size.
Next Generation Information Sharing for the Electric SectorEnergySec
Presented in February of 2011 at ERCOT CIPWG meeting, this slide deck addresses not only the NESCO program but also points out the information sharing and collaboration required to help improve security in the electric sector.
Next Generation Information Sharing For The Electric SectorEnergySec
The document discusses the National Electric Sector Cybersecurity Organization (NESCO), a DOE-funded program led by EnergySec to improve cybersecurity information sharing in the electric sector. NESCO has over 460 members from electric utilities and vendors. It aims to identify best practices, analyze threats, and facilitate sharing between government, industry and other stakeholders. The document outlines NESCO's history, goals, and role facilitating voluntary and anonymous information exchange to strengthen cybersecurity.
Interoperability, Standards and Cybersecurity: A Business PerspectiveEnergySec
The document discusses interoperability, standards, and cybersecurity issues related to smart grids from a business perspective. It notes challenges around establishing interoperability standards, differing approaches among states and regulators, and the difficulties of securing legacy energy infrastructure against sophisticated hackers. The document advocates getting off the innovation treadmill and prioritizing security and privacy considerations in smart grid development.
Patrick Miller, NESCO's Principal Investigation, presented the current state of the NESCO program. This presentation covered the various outreach efforts we have planned this year and into 2013; the goals of the NESCO program project management plan; the new NESCO website and the community-based wiki activities; and, the NESCO organizational membership opportunity.
NESCO Overview: Emerson Ovation User Group BOD MeetingEnergySec
Patrick Miller presented a brief overview of the NESCO program and a deeper dive into various cyber security concerns related to industrial control environments at an Emerson User Group Board of Director meeting.
The document discusses the current challenges facing cybersecurity in the electric sector. It notes that legacy systems remain vulnerable, adversaries are intelligent and adaptive, and economic pressures have increased risks. It then introduces the National Electric Sector Cybersecurity Organization (NESCO), a non-profit funded by the Department of Energy to improve information sharing and cybersecurity practices across the electric industry through public-private collaboration. NESCO has over 650 members from electric utilities and aims to identify best practices, analyze threats, and encourage research to address cyber vulnerabilities.
The document proposes the establishment of a Regional Cyber and Energy Security (RCES) Center at the University of Texas at El Paso to address cyber and physical security issues for energy systems and the integration of distributed generation systems. The RCES Center would test and certify smart grid components and provide workforce training. It would benefit the region by creating new jobs, providing education opportunities for students, and increasing the reliability and security of the energy infrastructure.
Neural computing is now one of the most promising technologies in all fields of engineering,
resulting in the development of a number of Artificial Neural Networks (ANN). Double circuit transmission lines
are being employed in the distribution of power to consumers and have become more widespread than single
transmission line, as they increase the electric power transmission capacity and the reliability of an electrical
system. Losses along transmission lines occur due to faults. Possible faults on the transmission line were
predicted using Artificial Neutral Network. In this work, the simulation of fault on a 132kV double circuit
transmission lines using MATLAB was undertaken. Parameters considered during the simulation were the input
of the network which is the fault current value at each fault location while the output of the network is the fault
location. The efficiency of the neural network was tested and verified. This approach provided satisfactory
results with accuracy of 95% or higher.
EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...TheAnfieldGroup
The National Electric Sector Cybersecurity Organization (NESCO) was established by the U.S. Department of Energy to enhance cybersecurity information sharing in the electric sector. NESCO is operated by EnergySec, a nonprofit, and provides members with tools like a collaboration portal, rapid notification system, and Tactical Analysis Center. NESCO has grown significantly since its inception and aims to be fully industry-funded after an initial seed period supported by the Department of Energy.
Electricity-theft detection in smart grids based on deep learningjournalBEEI
- The document proposes a deep learning model using convolutional neural networks (CNNs) and the blue monkey (BM) algorithm for electricity theft detection in smart grids.
- The model is trained on a large electricity consumption dataset to classify customers as normal or thieves based on their power consumption patterns. Feature reduction is performed using the BM algorithm before training the CNN model.
- The best performing CNN model identified through experimentation contains two layers, with 128 nodes in the first layer and 64 nodes in the second layer, achieving an accuracy of 92% on the test data.
http://www.ibm.com/smarterplanet/us/en/smart_grid/article/cyber_security.html?cmp=agus_cxosp2gridsec-20100426&cm=c&csr=endsecurity&cr=slideshare&ct=usbrb401&cm_mmc=agus_cxosp2gridsec-20100426-usbrb401-_-c-_-endsecurity-_-slideshare
IBM End-to-End Smart Grid Security Involving IT Security and Enterprise Asset Management
IRJET- Cluster based Routing Protocol for Wireless Sensor NetworkIRJET Journal
The document summarizes research on cluster-based routing protocols for wireless sensor networks. It proposes a new energy-aware clustering algorithm (EADC) to address issues with existing protocols like LEACH that can lead to uneven energy consumption. The EADC aims to select cluster heads based on residual node energy to avoid problems from non-uniform node distribution and make the network more energy efficient. The document also reviews the evolution of cluster-based routing research from 2001 to 2012, highlighting several early protocols and their advantages/disadvantages relating to cluster head election and energy efficiency.
Building A Stronger And Smarter Electrical Energy Infrastructure IEEE-USAJohn Ragan
This document discusses the need to expand and strengthen the US electric transmission system. It notes that the existing transmission grid is divided into three major interconnections that operate as single synchronous machines. While the existing grid has served the country well, upgrades are needed to integrate renewable energy, accommodate new technologies like electric vehicles, and address reliability issues from aging infrastructure. The document recommends developing a more robust and flexible transmission system through coordinated planning, incentive-based investment, and streamlined approval processes.
Michael Hsieh (UC Berkley Extension) - Conférence TechnoArk 2013TechnoArk
The document discusses the modernization of the electric grid and the consumerization and democratization of smart energy. It summarizes that (1) consumers are becoming "prosumers" who both consume and produce energy, (2) new crowd-sourced technologies are emerging that are not supplied by traditional utilities, and (3) all technologies must be able to interconnect and interact as intended on the grid.
offers this policy framework to chart a path forward on the imperative to modernize the grid to take advantage of opportunities made possible by modern information, energy, and communications technology. This framework is premised on four pillars:
1. Enabling cost-effective smart grid investments
2. Unlocking the potential for innovation in the electric sector
3. Empowering consumers and enabling them to make informed decisions, and
4. Securing the grid.
Each pillar supports a set of policy recommendations that focus on how to facilitate a smarter and more secure grid. Progress in all four areas, as part of an overall grid modernization effort, will require sustained cooperation between the private sector, state and local governments, the Federal Government, consumer groups, and other stakeholders. Such progress is important for the United States to lead the world in the 21st century economy, be at the forefront of the clean energy revolution, and to win the future by encouraging American innovation.
Optimization scheme for intelligent master controller with collaboratives ene...IAESIJAI
This paper explores the use of deep learning to optimize the performance of a peer-to-peer energy system with an intelligent master controller. The goal addresses inefficiencies caused by energy seasonality by predicting hourly power consumption through a deep learning algorithm. The intelligent master controller was designed to manage the collaborative energy system, and the deep learning technique was employed as an optimization scheme to forecast power system performance for more efficient utilization. The deep learning algorithm was trained using dataset from American electric power, where consumer load data serves as input, and forecasted power serves as output. The forecasted power was then used as input to the intelligent master controller, which determines suitable power supply for generation and storage based on the predicted demand. The experiment results show promising accuracy with a root mean square error (RMSE) of 0.1819 for hourly energy consumption averaged over a year, 0.2419 for hourly energy consumption averaged over a month, 0.0662 for hourly energy consumption averaged per day, and 0.0217 for hourly energy consumption. These findings demonstrate that the system is well-trained and capable of accurately predicting the energy required by the intelligent master controller, thus enhancing the overall performance of the peer-to-peer energy system.
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
When we talk about cyber security, we recognize that it is part of a holistic approach to security and critical infrastructure protection. Tools and technology are not enough to ensure that mission critical systems provide capabilities needed for the military, continuity of government and commercial enterprises to continue operations in the face of emerging threats. Recognizing the unique nature of our location on the Hawaiian Islands in the middle of the Pacific, we also understand the importance of collaboration and alignment of critical infrastructure protection among the military, state government, commercial and public stakeholders. A comprehensive approach needs to include innovative capabilities, a thorough analysis of operational dependencies, and the organizational collaboration required to protect critical capabilities. In this session, we will discuss our innovate approach to developing a holistic cyber security approach for critical infrastructure and share a case study to help you think differently about your own approaches for security.
Slide Griffin - Practical Attacks and MitigationsEnergySec
Over the past few years, penetration testing has gotten easier. What used to take a week of scanning, analysis, and exploit research now happens in one day on average in a common IT environment. The efficiency of compromise has increased based on several factors including increased knowledge sharing, more robust computing, and automated exploitation tools. OT environments are often utilizing the same operating systems and are prone to many of the same attacks. The main differences are the presence of custom protocols, embedded systems, and lack of formal security programs to address the gaps created by two-way data communication networks.
This talk will show the most common attacks which our team currently uses to gain access and control over the networks and systems we test. More importantly, we will discuss the “top 10” things an organization can do to mitigate, remediate, and have active visibility into critical systems.
More Related Content
Similar to What's "Smart" Got to Do With It?: A technical overview of Advanced Metering infrastructure
Bridging the Gap: Between Operations and ITEnergySec
This presentation delivers some concepts related to the gaps between operations and IT that exist. Addressing the various business needs for consistency and the possible real-world purposes of inconsistency is the premise of this slide deck.
Don't Get Hacked! Cybersecurity Boot CampEnergySec
At the 2011 NARUC Winter Committee Meetings, Patrick Miller teamed up with seasoned security experts Miles Keogh from NARUC and Bill Hunteman from the Department of Energy to deliver an engaging Cybersecurity Boot Camp.
The webinar discussed the Tactical Analysis Center (TAC) subscription service provided by the National Electric Sector Cybersecurity Organization (NESCO). The TAC provides timely threat information, analysis reports, and notifications to electric utilities on cybersecurity issues. Subscription options include daily diaries, indicators of compromise, threat briefings, and executive overviews. All electric asset owners can subscribe regardless of size.
Next Generation Information Sharing for the Electric SectorEnergySec
Presented in February of 2011 at ERCOT CIPWG meeting, this slide deck addresses not only the NESCO program but also points out the information sharing and collaboration required to help improve security in the electric sector.
Next Generation Information Sharing For The Electric SectorEnergySec
The document discusses the National Electric Sector Cybersecurity Organization (NESCO), a DOE-funded program led by EnergySec to improve cybersecurity information sharing in the electric sector. NESCO has over 460 members from electric utilities and vendors. It aims to identify best practices, analyze threats, and facilitate sharing between government, industry and other stakeholders. The document outlines NESCO's history, goals, and role facilitating voluntary and anonymous information exchange to strengthen cybersecurity.
Interoperability, Standards and Cybersecurity: A Business PerspectiveEnergySec
The document discusses interoperability, standards, and cybersecurity issues related to smart grids from a business perspective. It notes challenges around establishing interoperability standards, differing approaches among states and regulators, and the difficulties of securing legacy energy infrastructure against sophisticated hackers. The document advocates getting off the innovation treadmill and prioritizing security and privacy considerations in smart grid development.
Patrick Miller, NESCO's Principal Investigation, presented the current state of the NESCO program. This presentation covered the various outreach efforts we have planned this year and into 2013; the goals of the NESCO program project management plan; the new NESCO website and the community-based wiki activities; and, the NESCO organizational membership opportunity.
NESCO Overview: Emerson Ovation User Group BOD MeetingEnergySec
Patrick Miller presented a brief overview of the NESCO program and a deeper dive into various cyber security concerns related to industrial control environments at an Emerson User Group Board of Director meeting.
The document discusses the current challenges facing cybersecurity in the electric sector. It notes that legacy systems remain vulnerable, adversaries are intelligent and adaptive, and economic pressures have increased risks. It then introduces the National Electric Sector Cybersecurity Organization (NESCO), a non-profit funded by the Department of Energy to improve information sharing and cybersecurity practices across the electric industry through public-private collaboration. NESCO has over 650 members from electric utilities and aims to identify best practices, analyze threats, and encourage research to address cyber vulnerabilities.
The document proposes the establishment of a Regional Cyber and Energy Security (RCES) Center at the University of Texas at El Paso to address cyber and physical security issues for energy systems and the integration of distributed generation systems. The RCES Center would test and certify smart grid components and provide workforce training. It would benefit the region by creating new jobs, providing education opportunities for students, and increasing the reliability and security of the energy infrastructure.
Neural computing is now one of the most promising technologies in all fields of engineering,
resulting in the development of a number of Artificial Neural Networks (ANN). Double circuit transmission lines
are being employed in the distribution of power to consumers and have become more widespread than single
transmission line, as they increase the electric power transmission capacity and the reliability of an electrical
system. Losses along transmission lines occur due to faults. Possible faults on the transmission line were
predicted using Artificial Neutral Network. In this work, the simulation of fault on a 132kV double circuit
transmission lines using MATLAB was undertaken. Parameters considered during the simulation were the input
of the network which is the fault current value at each fault location while the output of the network is the fault
location. The efficiency of the neural network was tested and verified. This approach provided satisfactory
results with accuracy of 95% or higher.
EnergySec & National Electric Cyber Security Organization (NESCO) Overview by...TheAnfieldGroup
The National Electric Sector Cybersecurity Organization (NESCO) was established by the U.S. Department of Energy to enhance cybersecurity information sharing in the electric sector. NESCO is operated by EnergySec, a nonprofit, and provides members with tools like a collaboration portal, rapid notification system, and Tactical Analysis Center. NESCO has grown significantly since its inception and aims to be fully industry-funded after an initial seed period supported by the Department of Energy.
Electricity-theft detection in smart grids based on deep learningjournalBEEI
- The document proposes a deep learning model using convolutional neural networks (CNNs) and the blue monkey (BM) algorithm for electricity theft detection in smart grids.
- The model is trained on a large electricity consumption dataset to classify customers as normal or thieves based on their power consumption patterns. Feature reduction is performed using the BM algorithm before training the CNN model.
- The best performing CNN model identified through experimentation contains two layers, with 128 nodes in the first layer and 64 nodes in the second layer, achieving an accuracy of 92% on the test data.
http://www.ibm.com/smarterplanet/us/en/smart_grid/article/cyber_security.html?cmp=agus_cxosp2gridsec-20100426&cm=c&csr=endsecurity&cr=slideshare&ct=usbrb401&cm_mmc=agus_cxosp2gridsec-20100426-usbrb401-_-c-_-endsecurity-_-slideshare
IBM End-to-End Smart Grid Security Involving IT Security and Enterprise Asset Management
IRJET- Cluster based Routing Protocol for Wireless Sensor NetworkIRJET Journal
The document summarizes research on cluster-based routing protocols for wireless sensor networks. It proposes a new energy-aware clustering algorithm (EADC) to address issues with existing protocols like LEACH that can lead to uneven energy consumption. The EADC aims to select cluster heads based on residual node energy to avoid problems from non-uniform node distribution and make the network more energy efficient. The document also reviews the evolution of cluster-based routing research from 2001 to 2012, highlighting several early protocols and their advantages/disadvantages relating to cluster head election and energy efficiency.
Building A Stronger And Smarter Electrical Energy Infrastructure IEEE-USAJohn Ragan
This document discusses the need to expand and strengthen the US electric transmission system. It notes that the existing transmission grid is divided into three major interconnections that operate as single synchronous machines. While the existing grid has served the country well, upgrades are needed to integrate renewable energy, accommodate new technologies like electric vehicles, and address reliability issues from aging infrastructure. The document recommends developing a more robust and flexible transmission system through coordinated planning, incentive-based investment, and streamlined approval processes.
Michael Hsieh (UC Berkley Extension) - Conférence TechnoArk 2013TechnoArk
The document discusses the modernization of the electric grid and the consumerization and democratization of smart energy. It summarizes that (1) consumers are becoming "prosumers" who both consume and produce energy, (2) new crowd-sourced technologies are emerging that are not supplied by traditional utilities, and (3) all technologies must be able to interconnect and interact as intended on the grid.
offers this policy framework to chart a path forward on the imperative to modernize the grid to take advantage of opportunities made possible by modern information, energy, and communications technology. This framework is premised on four pillars:
1. Enabling cost-effective smart grid investments
2. Unlocking the potential for innovation in the electric sector
3. Empowering consumers and enabling them to make informed decisions, and
4. Securing the grid.
Each pillar supports a set of policy recommendations that focus on how to facilitate a smarter and more secure grid. Progress in all four areas, as part of an overall grid modernization effort, will require sustained cooperation between the private sector, state and local governments, the Federal Government, consumer groups, and other stakeholders. Such progress is important for the United States to lead the world in the 21st century economy, be at the forefront of the clean energy revolution, and to win the future by encouraging American innovation.
Optimization scheme for intelligent master controller with collaboratives ene...IAESIJAI
This paper explores the use of deep learning to optimize the performance of a peer-to-peer energy system with an intelligent master controller. The goal addresses inefficiencies caused by energy seasonality by predicting hourly power consumption through a deep learning algorithm. The intelligent master controller was designed to manage the collaborative energy system, and the deep learning technique was employed as an optimization scheme to forecast power system performance for more efficient utilization. The deep learning algorithm was trained using dataset from American electric power, where consumer load data serves as input, and forecasted power serves as output. The forecasted power was then used as input to the intelligent master controller, which determines suitable power supply for generation and storage based on the predicted demand. The experiment results show promising accuracy with a root mean square error (RMSE) of 0.1819 for hourly energy consumption averaged over a year, 0.2419 for hourly energy consumption averaged over a month, 0.0662 for hourly energy consumption averaged per day, and 0.0217 for hourly energy consumption. These findings demonstrate that the system is well-trained and capable of accurately predicting the energy required by the intelligent master controller, thus enhancing the overall performance of the peer-to-peer energy system.
Similar to What's "Smart" Got to Do With It?: A technical overview of Advanced Metering infrastructure (20)
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
When we talk about cyber security, we recognize that it is part of a holistic approach to security and critical infrastructure protection. Tools and technology are not enough to ensure that mission critical systems provide capabilities needed for the military, continuity of government and commercial enterprises to continue operations in the face of emerging threats. Recognizing the unique nature of our location on the Hawaiian Islands in the middle of the Pacific, we also understand the importance of collaboration and alignment of critical infrastructure protection among the military, state government, commercial and public stakeholders. A comprehensive approach needs to include innovative capabilities, a thorough analysis of operational dependencies, and the organizational collaboration required to protect critical capabilities. In this session, we will discuss our innovate approach to developing a holistic cyber security approach for critical infrastructure and share a case study to help you think differently about your own approaches for security.
Slide Griffin - Practical Attacks and MitigationsEnergySec
Over the past few years, penetration testing has gotten easier. What used to take a week of scanning, analysis, and exploit research now happens in one day on average in a common IT environment. The efficiency of compromise has increased based on several factors including increased knowledge sharing, more robust computing, and automated exploitation tools. OT environments are often utilizing the same operating systems and are prone to many of the same attacks. The main differences are the presence of custom protocols, embedded systems, and lack of formal security programs to address the gaps created by two-way data communication networks.
This talk will show the most common attacks which our team currently uses to gain access and control over the networks and systems we test. More importantly, we will discuss the “top 10” things an organization can do to mitigate, remediate, and have active visibility into critical systems.
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...EnergySec
The document contains a presentation by Patrick Miller of Archer Energy Solutions on various topics related to emerging technologies and cybersecurity challenges. It includes 32 slides with headings like "Hyperconnectivity", "Adaptive Adversaries", and "Boundarylessness". The final slide advertises a workshop on solving cybersecurity problems through group discussions on issues like board engagement, insurance, and regulatory approaches. Contact information is provided at the bottom of each slide for Patrick Miller.
Almost 70 years since the first computer bug was discovered, there has been decades of research done on Information Security theory and practice. Yet, despite vast amounts of money being spent, innumerable academic papers, mainstream media obsession, and entire industries being formed, we are left with the impression that the risk is growing, not receding. Why? Some argue a lack of data, but data clearly exists. We’re likely generating it, in some areas, faster than humans will ever be able to process it. Perhaps, after all of this effort, we’ve managed to box ourselves into metaphors and first principles that might be inappropriately constraining how we think about “Information Security Risk”. In fact, it’s worth noting that we can’t even agree if there is a space between “Cyber” and “Security” when it’s written out. This talk will take an anecdotal look at “Information Security Risk”, “What IS Cyber Security?”, and use that perspective to suggest areas of research that are either lacking or should be made more accessible to the markets, industries, and individuals driving risk management change. In an industry filled with data, perhaps an examination of empty space might be helpful.
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
This document discusses the growing threat of cyber attacks on internet-connected devices and infrastructure in the age of the Internet of Things. It notes that as more devices are connected, there are more potential pathways for attacks. The document explores how cyber attacks could be used to support traditional attacks by disrupting critical services like power, water, communications, and GPS. It also discusses challenges like protecting everything, prioritizing critical systems, building resiliency through redundancy and recovery plans, and managing dependencies on external factors outside an organization's control. Finally, it considers scenarios for potential cyber attacks to disrupt electric power, airlines, manufacturing and other sectors.
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityEnergySec
An interactive look at what security research means today and how we got to zero days, bug bounties, and hoodie hackers in the news. What particular skills or talents are most essential to be effective as a security researcher, and how much can we learn from the new digital anthropologist in waiting.
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementEnergySec
The NERC CIPv5 deadline is fast approaching, and it’s not too late to be prepared. Join Mark Prince, Manager Operational Technology Fossil, from Entergy, Karl Perman, VP Member Services from EnergySec and Tim Erlin, Director from Tripwire to discuss achieving and maintaining NERC CIPv5 compliance in a fossil generation plant. We’ll cover some of the challenges that Entergy has experienced in their NERC CIPv5 compliance journey. Specifically, we will discuss configuration change management and how to leverage technologies for these requirements and consider what life would be without them.
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
Regulated entities should consider the RSAW templates when preparing evidence of compliance with the NERC CIP Standards. There are a number of implicit requirements in CIP v5 which an entity needs to fulfill to be compliant, which are not specifically identified in the actual requirements.
In this webinar, our experts will discuss such implicit requirements. Key learning's from this session would be:
RSAW format
Implicit requirements of CIP RSAWs
Leveraging technology for RSAW management
Wireless Sensor Networks: Nothing is Out of ReachEnergySec
Presenter: Daniel Lance, Layered Integration
After years of installing wireless sensor networks in homes and businesses we are now faced with a question “How is this all secure? Or is it?” A look into WSN (Wireless Sensor Networks) history and original design concepts that paved the road to us using these in our every day life.
This presentation will be a deep dive into wireless and reveal new challenges we have in protecting our perimeter when all of our core monitoring devices are riding a wave into the public space as most industrial control providers look to capitalize on fast installation times and inexpensive adaptive solutions. This research shows us start to finish how anyone with a laptop and SDR (Software Defined Radio) can hack into and take control of WSN’s from outside the front gate.
The presentation will demonstrate how a device inside your facility might reveal itself through spectrum analysis than how a hacker might flank the security of the device and own the network with very simple replay attacks that can grant them physical access, and how social engineering pre-installation and post-installation will cause you to disregard warning signs that someone is tampering with the network. A high level understanding of radio is no longer needed for packet analysis with open source tools, proper implementation has never been more important as even a encrypted device can be compromised by the last mile before installation. We will talk about the tools security professionals are lacking from the manufactures of these devices to scan for a compromised device and what can be done in the future to protect WSN’s.
Presenter: Mikael Vingaard, EnergiNet.dk
The goal of having a Honeypot (a fake ‘vulnerable’ IT-system/ service) is to learn more about your attackers and the methods they will use to breach your ICS/SCADA systems – but how can the Energy Sector actual benefit from using a Honeypot?
The Danish information security researcher, Mikael Vingaard has taken various free open source software to deploy ICS/SCADA Honeypot systems, and will share his experiences from the research and present interesting findings from the collected informations.
The talk will be discuss the pros and cons of honeypots, how to use honeypots as an early-warning system and add some interesting points seen from the energy sector of using Honeypot systems.
The presentation will showcase that gaining access to actual ICS threat intelligence can be done – even in budget constrained organizations.
This document discusses how unidirectional security gateways can maximize security and minimize compliance costs for industrial control systems. It argues that firewalls are porous and all firewalls forward attacks, while unidirectional gateways break the bidirectional channel required for most attacks. The document provides several examples of how unidirectional gateways can be applied in industrial environments and claims they provide stronger security than firewalls while also helping to reduce costs associated with NERC CIP compliance standards.
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
Presenter: Joseph Loomis, Southwest Research Institute (SwRI)
Asset Owners face challenges as they strive towards implementing the NERC-CIP V5 requirements. Meeting the requirements often require documentation and technical knowledge of how an asset operates that can only be provided by a Vendor. Vendors, likewise, may be unclear about how the NERC-CIP requirements affect them, and are unsure about how to meet the technical requirements. In this presentation we detail the lessons learned from a recent project where SwRI worked with a Vendor to determine how the requirements apply to them and what the Vendor needs to have to help support an Asset Owner in an audit.
Industrial Technology Trajectory: Running With ScissorsEnergySec
Presenter: Patrick Miller, EnergySec (President Emeritis)
Innovative and disruptive technologies are enhancing and invading our traditional industrial business model. Future infrastructure organizations will need more data to operate efficiently and succeed in the brave new interconnected world. The diversity of new technologies and data will fuel more diversity in business opportunity. Everyone expects more OT, more IOT, and more IT – and all of it is supposed to be highly reliable and secure. These factors (and more) lead to a landscape shift for the industrial cybersecurity risk profile. In this session, hear ways to recognize the problems and gain some clarity on possible solutions through historic lessons, made up words, and practical front-line experience.
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
Presenters: Robert Landavazo, PNM Resources and Katherine Brocklehurst, Tripwire
With countless hours of work to go, PNM was far from ready for its coming audit in just 18 months. Confidence levels in its existing manual, and incomplete security controls, were at an all-time low; and the visibility into control center environments for quantifying its status and progress towards compliance was immeasurable.
With Tripwire, PNM’s preparation of the looming CIPv3 audit noticeably improved. With efficient reporting and automation, PNM’s now positioned to hold itself accountable for CIP auditable compliance of more than 3,500 explicit and supporting control points, satisfying CIP-002-3, CIP-004-3, CIP-005-3, CIP-007-3 and CIP-009-3. In addition, enhanced visibility and better control gave PNM the ability to effectively communicate meaningful and measurable initiatives to executive teams – resulting in increased support for their funding needs.
In this session, PNM – New Mexico’s largest electricity provider – will share a case study on its journey towards achieving continuous NERC CIP compliance despite a highly limited headcount, how it saved countless hours of labor-intensive manual effort, and the essential role that automation played in its success.
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
Presenter: David Zahn, PAS
Industrial control systems represent the brass ring for hackers who want to disrupt plant operations and negatively impact safety and productivity. The problem for cybersecurity professionals is that plants have highly vulnerable proprietary control systems where configuration data is not visible via standard WMI or SNMP calls. Yet, it is this same configuration data, such as I/O cards, firmware, installed software, and more, that hackers work hard to attain as it aids them in gaining control over industrial systems within plants.
As the saying goes, “you can’t manage what you can’t measure.” Taking inventory of this hidden configuration data and doing so for all control assets is difficult. Plants as a result fall short of achieving centralized, automated inventory – a cybersecurity best practice and a necessary precursor to effective change management. So how do you address change management when important security data is kept locked within each vendor’s distributed control systems, programmable logic controllers, and remote terminal units?
In this session, we’ll explore the types of inventory data that comprise a best practices cyber security plan. Next, we will dive into cost effective, accurate automation opportunities for inventory discovery and maintenance of heterogeneous proprietary and non-proprietary control assets. Finally, we’ll present a case study for implementing best practices for hardening ICS cyber security and automating management of change.
Agenda:
Building and Maintaining an Accurate ICS Inventory
Best Practices in Inventory Automation
Case Study
Where Cyber Security Meets Operational ValueEnergySec
Presenter: Damiano Bolzoni, SecurityMatters
What if cyber attacks were not the most prominent threat to industrial networks and systems? Although malware is still a major point of interest, the sword of Damocles for industrial networks is represented by insider threats such as system misuse performed by disgruntled employees, contractors and vendors, unintentional operator mistakes, as well as network and system misconfiguration and uncontrolled configuration changes; all this could lead to the divergence or failure of critical processes.
In this talk we reshape the concept of ICS security and demonstrate through case studies in different critical infrastructure sectors that the real value of industrial network monitoring goes beyond the detection of cyber attacks, but includes above all the need to maintain awareness about network and process operations, and obtain actionable intelligence that allows to preserve their overall health. We will show how the use of innovative network monitoring approaches can support security, operations, and network managers to:
Gain IT visibility of OT networks and full situational awareness of the network and process
Detect complex and advanced cyber attacks against industrial networks
Mitigate operational mistakes and misconfiguration
Presenter: Chris Sistrunk
Why haven’t we seen more ICS-focused attacks? Perhaps it’s because we’re not looking for them. The current state of security in Industrial Control Systems is a widely publicized issue, but fixes to ICS security issues are long cycle, with some systems and devices that will unfortunately never have patches available.
In this environment, visibility into security threats to ICS is critical, and almost all of ICS monitoring has been focused on compliance, rather than looking for indicators/evidence of compromise. The non-intrusive nature of Network Security Monitoring (NSM) is a perfect fit for ICS. This presentation looks at using NSM as part of an incident response strategy in ICS, various options for implementing NSM, and some of the capabilities that NSM can bring to an ICS cyber security program.
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
After a brief introduction by Mr. Humphreys, Henry Bailey will talk a few minutes about SAP’s roadmap for utilities. This will be followed by a discussion led by Chris Humphreys about the evolutionary transition from disparate point solutions to enterprise-wide, end-to-end, Regulation Management where controls are consolidated and leveraged such that compliance is a byproduct of industry best practices. Finally, Mr. Rice and Chris Humphreys will end the hour with a presentation expanding on the concept of controls consolidation and compliance as a byproduct focused on NERC CIP Ver 3-5 and NIST transitional capabilities of Regulation Management.
Industry Reliability and Security Standards Working TogetherEnergySec
It’s never too early to start thinking about where the standards are going and where your program should be heading. This presentation will discuss how energy organizations should consider furthering alignment to NIST 800-53 Rev 4; focusing on security maturity opportunities such as threat management; addressing third parties and vendors and developing processes to help satisfy control-based security objectives.
What the Department of Defense and Energy Sector Can Learn from Each OtherEnergySec
This presentation will discuss how the Department of Defense executes its critical infrastructure protection program, where it intersects with energy sector CIP efforts and what we can learn from each other.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Trusted Execution Environment for Decentralized Process Mining
What's "Smart" Got to Do With It?: A technical overview of Advanced Metering infrastructure
1. What’s “smart” got to do
with it?
A technical overview of Advanced Metering
Infrastructure
Seth Bromberger, Executive VP
Co-Principal Investigator
EnergySec / NESCO
The National Electric Sector Cybersecurity Organization (NESCO) is partially funded by the United States
Department of Energy.
2. DISCLAIMER
The National Electric Sector Cybersecurity Organization (NESCO) is partially funded by the United States 2
Department of Energy.
3. AMI Basics
0001
A
M
M
S
The National Electric Sector Cybersecurity Organization (NESCO) is partially funded by the United States 3
Department of Energy.
4. Backhaul
M
A M
S
Mesh
RELAY
Corporate
0001 0001 LAN
0001 0001
The National Electric Sector Cybersecurity Organization (NESCO) is partially funded by the United States 4
Department of Energy.
5. Examples of Physical
• Indoor / Below-grade installation
• Geographic topology
• Temperature extremes
• Hostile customers
• Lack of tamper detection
mechanisms
The National Electric Sector Cybersecurity Organization (NESCO) is partially funded by the United States 5
Department of Energy.
6. Examples of Mesh
• High latency, low throughput
• Public RF spectrum
• No broadcast mechanism
• Non-deterministic routing
• Proprietary collision avoidance/
detection
The National Electric Sector Cybersecurity Organization (NESCO) is partially funded by the United States 6
Department of Energy.
7. Examples of Device
• Low-power / low-performance CPU
• Limited memory
• Firmware
• IMUs are battery powered
• 15+ year lifespan
• Metrology communications
disconnect
The National Electric Sector Cybersecurity Organization (NESCO) is partially funded by the United States 7
Department of Energy.
8. Examples of Process
• Crypto management
• Technology understanding
• Testing process
• Roles and responsibilities
The National Electric Sector Cybersecurity Organization (NESCO) is partially funded by the United States 8
Department of Energy.
9. Taken in combination...
• Performance
– new definition of “real-time”
• Management
– The 5,000-year-old problem
• Defense
– Selective intelligence
The National Electric Sector Cybersecurity Organization (NESCO) is partially funded by the United States 9
Department of Energy.
10. Solutions?
• Vendor and customer management
• Realistic expectations
• Due diligence
• Risk acceptance
The National Electric Sector Cybersecurity Organization (NESCO) is partially funded by the United States 10
Department of Energy.
Editor's Notes
\n
1. Speaking in my role within Energy Sector Security Consortium\n2. Description of technology is not specific to a particular vendor. Issues discussed are generally common to all implementations\n
Mention relays\nDiscuss costs and #s\n
Mesh network can be proprietary, WiMax, or other\nDifferentiate between Mesh and HAN\nBackhaul is typically IP over some generic WAN\n
\n
\n
\n
\n
Defense: Talk about TopSight (detect before respond)\n
Key is Risk Acceptance. New technology is always buggy.\n