SlideShare a Scribd company logo
Cybersecurity and
the Smart Utility
Branndon Kelley
Chief Information Officer
Fast Facts: American
Municipal Power
• Wholesale power supplier and services provide for
132 municipal electric systems in 9 states and
service more than 637,000 customers.
• AMP members receive their power supply from a
diversified resource mix that includes wholesale
power purchases and energy produced utilizing
fossil fuels and renewable resources.
• Focused on sustainability and increased use of
renewable generation resources with plans to add
more than 300 MW of new hydro capacity to the
region.
History of AMP
• Founded in 1971 with the purpose to provide
the generation, transmission, and distribution
of electric power and energy to its members
at lower costs. This purpose is served by:
– Joint ownership of electric facilities
– Pooled buying power in energy markets
– Pursuing additional means of generating,
transmitting and distributing electric power and
energy
• Original members were all located in Ohio
(AMP-Ohio). Name changed in 2009 to AMP.
1800s - Early days of
electricity
• Systems small and
localized
• Generation built close
to the end user
• Limited transmission
capabilities The Pearl Street Station in New
York City
1900s – Establishment of The Modern Grid
AEP 765kV transmission
tower in Virginia
Prairie State Energy
Campus in Illinois
• Began in the late 1800s.
• Transmission lines make it
possible to separate
generation from the end
user by many miles.
• More complex system but
benefits outweigh
challenges
1990s & 2000s
• 1992 - De-regulation
• Residential customer begins installing
their own generation
Rooftop Solar
• Even more complex
systems.
Future – The Smart Grid
• Many types and
sources of
generation
• Millions of
hackable utility
connected
devices
Evolution of the Utility
Smart Grid = Smart Utility
Smart controls on distribution poles
Microgrids and energy reduction Solar & Advanced Metering (AMI)
Sensors on Assets in Power Plants
Smart Utility – Power Generation
• Distributed control systems & automation reduce the number
of people it takes to run a power plant.
• Sensors and system provide data for pro-active maintenance
to take place and reduce unnecessary maintenance.
• All resulting in safer facilities and less forced outages.
Smart Utility – T & D
• SCADA system allow for better monitoring of the grid and
identification of issues.
• Automated reclosers provides for better detection and
interruption of momentary faults
• All resulting in faster restoration during weather events and
more efficient system maintenance.
Smart Utility – Micro Grids
• Can operate with the main grid or independently as an
electrical island
• Locally controlled systems
• Often contain multiple generation types with battery storage
• Current State of
CyberSecurity
Latest in the News
Threat Vectors
• Physical Attacks
• Malware - Viruses/Exploits
• Phishing Attacks & Social Engineering
– Targeted Attacks to Extract Information
• Advanced Persistent Threats
– Well planned
– Often Nation State or Organization Sponsored
Top target roles – Spear Phishing
Symantec Internet Security Threat Report – April 2015, Volume 20
Vulnerabilities in ICS
The Structure of an Advanced Persistent Threat
Source: Dell Secureworks
Smart Enablement Cyber Risk
• Generation Example
• Attackers gain access to an unnamed plant’s office network
through a targeted malicious email
• Attacker’s are ultimately able to cross over into the production
network.
• The plant’s control systems are breached which results in an
incident where a turbine could not be shut down in the regular way
and the turbine was in an undefined condition which resulted in
massive damage to the whole system
Smart Enablement Cyber Risk
• Distribution Example
XX
X
X
X
X X
X
X
Smart Enablement Cyber Risk
• In the Home Example
Water Heater Thermostat
Connected utility and security can
co-exist.
• Must create a culture of cyber security
• Leveraging best practices for Physical and
Cyber Security is key
• Standards do exist for implementing effective
cyber security
– SANS 20 Critical Security Controls
– NIST Cybersecurity Framework
Physical Security Best Practices
• Review/Confirm security procedures and regular inspection of
facilities
• Provide Security Training and awareness for staff
• Hold Security Briefings for key personnel
• Limit Access to Facilities and Systems to authorized
personnel only
• Security Badges and Electronic Security Systems
• Procedures to prevent tailgating and unauthorized entry to
facilities
Cyber Security Best Practices
• Adopt a Framework (SANS, NIST)
• Cyber Security Training
• Penetration Tests & Vulnerability Assessments
• Tabletop exercises
• Restrict Physical Access to IT Devices/Networks
• Practice Incident Response
Cyber Security Incident Response
• Take a not “if” but “when” approach
• Drill incident response and include
executive management.
• Reviewed layered defense strategy to
identify defense points.
Cyber Security Systems
• Firewalls, Intrusion Prevention Systems, and
Web Filters
• Sandboxing - Advanced Persistent Threats
• Endpoint based Protection and Whitelisting
– Traditional Antivirus is becoming less effective
• Network Access Control Systems
• Multi-Factor Authentication
• Separated Networks with Layered Defenses
Air Gapping is becoming more
difficult
• USB drive plugged in
• Engineering laptop plugged in
• Researchers are discovering ways to
bridge air gaps with cell phones
• IT and OT personnel have to work
together to secure systems at all layers
instead of creating a hardened outer
perimeter with a weak inner network.
Defense in Depth / Layered Security
• Originally a military strategy that seeks to delay, rather
than prevent, the advance of an attacker by yielding
space in order to buy time.
• Test defenses with Red Team vs Blue Team Exercises
Source: NERC
30
Redefining AMP’s Strategy
What we know…
• The utility industry business is increasing its use of technology - in
the business, in field equipment, and by customers
• Our member municipalities have an emerging need
– Skill & talent not locally available
• Our operations are becoming more vulnerable to attack
– Cybersecurity engineering is of paramount importance
Members have recognized AMP’s ability to effectively
manage bulk power purchases, generation facilities
and power supply contracts
• AMP’s Board has identified the need to support members in their
adoption of technology in their operations
Redefining AMP’s Strategy
One of the eight teams is focused on technology
enablement - “Hosted Solutions"
• AMP members are evaluating many technologies in the
distribution and customer operations parts of the business
• Vendors, distributors, and independent providers have identified
the need within small municipal utility operators
• The term – “Hosted Solutions” – is reflective of what the
marketplace refers to these services
– Vendors providing these services to individual members
AMP’s Smart Grid Program
Project launched on January 6, 2015
• Focus on simplifying AMI adoption for AMP members
• Recognize variability among member’s requirements
Pilot member utilities’ benefits
• Aggregating purchasing of equipment
• Mitigating the risks associated with local deployment of major
technology components like Meter Data Management Systems
• Support business case & financial modeling
• Assistance with presentations to leadership, where required
• Provide collateral material for customer communications
Program Leadership
• Under supervision of AMP Chief Technology Officer,
Jared Price.
– Has been with AMP since 2011
– Has responsibility for Overall IT Enterprise Architecture, SCADA
and plant systems across AMP’s generation portfolio
– 10+ years of experience in infrastructure management, project
management, and enterprise architecture across multiple
industries including banking & finance, healthcare, education,
and utilities.
– Holds Global Industrial Cyber Security Professional Certification
(GICSP), #178
• Also retain a Smart Grid Consultant / Owner’s engineer
with 30+ years of large utility experience.
Program Overview
• AMP will host the back-end AMI and Meter Data
Management System (MDMS) for individual
member utilities.
• AMP Will provide staffing and expertise to run
these systems.
• RFI and RFP process to major systems vendors
earlier this year.
• Pilot member committee helped in shaping the
program.
• Go live planned in early 2016
Member Business Drivers
• Address aging meter assets and meter reading
equipment
• Improve customer service
• Support for emerging needs – rates, distributed
generation
• Leverage join action to gain lowest possible cost
• Defer to AMP (vs. Vendor) management of
technology
Current State - HHMR
Billing
System
• Manual meter reading process
• Aging meters, handheld equipment
• Support for new rates
• “Smart grid” platform & customer expectations
Advanced Metering Evolution - AMR
Meters
Meters replaced with “One-Way” RF System;
Reading with “drive by” equipment
• Improves efficiency (less estimates, lockouts)
• Continued shortcomings on advanced rates,
smart grid capabilities, & customer expectations
Billing
System
AMP Advanced Metering Solution - AMI
Back Office Infrastructure
MDMCustomer
Portal
Utility
Portal
Outage
viewer
AMP Managed Systems
Wireless
Network
AMI
Head-End Field
Infrastructure
Billing
System
Meters
Utility Systems
AMI Solution Security
• AMP is able to leverage Cyber Security defenses and
best practices with the deployment and management of
this solutions
– Many of our members do not have the expertise to do
this on their own
• AMP is also able to leverage trusted partners that have a
forward thinking approach to cyber security like Kevin
Goodman and Bluebridge networks. AMP will host this
system like many other critical systems within the
Bluebridge datacenter.
References
http://www.engin.umich.edu/college/about/news/stories/2011/may/living-off-the-grid-smart-grids-are-current-
technology-at-its-best
Living off the grid: smart grids are current technology at its best
By Marilyn Tsao
http://www.gereports.com/every-electron-gets-byte-digital-power-plant-makes-electricity-smart/
Every Electron Gets A Byte: Digital Power Plant Makes Electricity Smart
By Tomas Kellner
http://www.scmagazine.com/cyberattacks-costing-big-business-big-
bucks/article/443982/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+SCMagazineHo
me+(SC+Magazine)
Cyberattacks costing big business big bucks
By Dough Olenick (SC Magazine)
http://www.infosecurity-magazine.com/news/dow-jones-hacked-affecting/
Dow Jones Hacked, Affecting Thousands
By Tara Seals (Infosecurity Magazine)
Workshop: Building a Utility Customer Digital Engagement Program
By Chet Geschickter (Gartner Symposium ITXPO 2015)
References (continued…)
http://www.infosecurity-magazine.com/news/dow-jones-hacked-affecting/
Dow Jones Hacked, Affecting Thousands
By Tara Seals (Infosecurity Magazine)
http://www.infosecurity-magazine.com/news/uks-nuclear-industry-at-risk-of/
UK’s Nuclear Industry at Risk of Major Cyber-Attack
Phil Muncaster (Infosecurity Magazine)
https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932_GA-internet-security-threat-report-
volume-20-2015-social_v2.pdf
Symantec Internet Security Threat Report – April 2015, Volume 20
http://blogs.wsj.com/cio/2014/12/18/cyberattack-on-german-iron-plant-causes-widespread-damage-report/
Wall Street Journal (Dec 18, 2014) - Cyberattack on German Iron Plant Causes ‘Widespread Damage’:
Report
http://www.nist.gov/cyberframework/index.cfm
NIST Cyber Security Framework
http://www.sans.org/critical-security-controls/control/20
SANS Critical Security Control: 20
THANKS!

More Related Content

What's hot

Isaca cloud security presentation duncan unwin 16 jul13
Isaca cloud security presentation   duncan unwin 16 jul13Isaca cloud security presentation   duncan unwin 16 jul13
Isaca cloud security presentation duncan unwin 16 jul13Duncan Unwin
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsSchneider Electric
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachSchneider Electric
 
Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT EnergyTech2015
 
Getting Started with Advanced Network Operations
Getting Started with Advanced Network OperationsGetting Started with Advanced Network Operations
Getting Started with Advanced Network OperationsSchneider Electric
 
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesNERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesSchneider Electric
 
Creating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemCreating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemSchneider Electric
 
Best Practices for Creating Your Smart Grid Network Model
Best Practices for Creating Your Smart Grid Network ModelBest Practices for Creating Your Smart Grid Network Model
Best Practices for Creating Your Smart Grid Network ModelSchneider Electric
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodClubHack
 
Schneider Electric Smart City Success Stories (Worldwide)
Schneider Electric Smart City  Success Stories (Worldwide)Schneider Electric Smart City  Success Stories (Worldwide)
Schneider Electric Smart City Success Stories (Worldwide)Schneider Electric India
 
Essential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsEssential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsSchneider Electric
 
The Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data CentersThe Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data CentersSchneider Electric
 
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...sidhota
 
Cisco Energy Management - Short
Cisco Energy Management - ShortCisco Energy Management - Short
Cisco Energy Management - ShortPaul Weight
 
What Cloud Computing means to the future of organisations – A perspective fro...
What Cloud Computing means to the future of organisations – A perspective fro...What Cloud Computing means to the future of organisations – A perspective fro...
What Cloud Computing means to the future of organisations – A perspective fro...itnewsafrica
 
2018 10-distribution automation-trends-andchallenges
2018 10-distribution automation-trends-andchallenges2018 10-distribution automation-trends-andchallenges
2018 10-distribution automation-trends-andchallengesAbhilash Gopalakrishnan
 

What's hot (20)

Isaca cloud security presentation duncan unwin 16 jul13
Isaca cloud security presentation   duncan unwin 16 jul13Isaca cloud security presentation   duncan unwin 16 jul13
Isaca cloud security presentation duncan unwin 16 jul13
 
Cps sec sg sg2017 conf_iran
Cps sec sg  sg2017 conf_iranCps sec sg  sg2017 conf_iran
Cps sec sg sg2017 conf_iran
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based Approach
 
Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT
 
Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 
Getting Started with Advanced Network Operations
Getting Started with Advanced Network OperationsGetting Started with Advanced Network Operations
Getting Started with Advanced Network Operations
 
Automated Metering Infrastructure
Automated Metering InfrastructureAutomated Metering Infrastructure
Automated Metering Infrastructure
 
SAP AMI
SAP AMISAP AMI
SAP AMI
 
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesNERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
 
Creating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemCreating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management System
 
Best Practices for Creating Your Smart Grid Network Model
Best Practices for Creating Your Smart Grid Network ModelBest Practices for Creating Your Smart Grid Network Model
Best Practices for Creating Your Smart Grid Network Model
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
Schneider Electric Smart City Success Stories (Worldwide)
Schneider Electric Smart City  Success Stories (Worldwide)Schneider Electric Smart City  Success Stories (Worldwide)
Schneider Electric Smart City Success Stories (Worldwide)
 
Essential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility OperationsEssential Elements of Data Center Facility Operations
Essential Elements of Data Center Facility Operations
 
The Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data CentersThe Data Center Evolution and Pre-Fab Data Centers
The Data Center Evolution and Pre-Fab Data Centers
 
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...
 
Cisco Energy Management - Short
Cisco Energy Management - ShortCisco Energy Management - Short
Cisco Energy Management - Short
 
What Cloud Computing means to the future of organisations – A perspective fro...
What Cloud Computing means to the future of organisations – A perspective fro...What Cloud Computing means to the future of organisations – A perspective fro...
What Cloud Computing means to the future of organisations – A perspective fro...
 
2018 10-distribution automation-trends-andchallenges
2018 10-distribution automation-trends-andchallenges2018 10-distribution automation-trends-andchallenges
2018 10-distribution automation-trends-andchallenges
 

Viewers also liked

John Ostrich: Space Weather Policy
John Ostrich: Space Weather Policy John Ostrich: Space Weather Policy
John Ostrich: Space Weather Policy EnergyTech2015
 
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...EnergyTech2015
 
Tues.1040 am states role in protecting electric grids from emp and gmd with a...
Tues.1040 am states role in protecting electric grids from emp and gmd with a...Tues.1040 am states role in protecting electric grids from emp and gmd with a...
Tues.1040 am states role in protecting electric grids from emp and gmd with a...EnergyTech2015
 
Andrew Ritch: Interruption in the Utility Industry
Andrew Ritch: Interruption in the Utility IndustryAndrew Ritch: Interruption in the Utility Industry
Andrew Ritch: Interruption in the Utility IndustryEnergyTech2015
 
Benjamin Loop: Simulation Environment for Power Management and Distribution D...
Benjamin Loop: Simulation Environment for Power Management and Distribution D...Benjamin Loop: Simulation Environment for Power Management and Distribution D...
Benjamin Loop: Simulation Environment for Power Management and Distribution D...EnergyTech2015
 
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...EnergyTech2015
 
Tues pm banquet featuring Jenita McGowan
Tues pm banquet featuring Jenita McGowanTues pm banquet featuring Jenita McGowan
Tues pm banquet featuring Jenita McGowanEnergyTech2015
 
William Good: Extra Small Modular Reactors
William Good: Extra Small Modular ReactorsWilliam Good: Extra Small Modular Reactors
William Good: Extra Small Modular ReactorsEnergyTech2015
 
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field EnergyTech2015
 
Gareth Digby: Systems-Based Approach to Cyber Investigations
Gareth Digby: Systems-Based Approach to Cyber Investigations Gareth Digby: Systems-Based Approach to Cyber Investigations
Gareth Digby: Systems-Based Approach to Cyber Investigations EnergyTech2015
 
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...EnergyTech2015
 
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...EnergyTech2015
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...EnergyTech2015
 
Halderman ch035 lecture
Halderman ch035 lectureHalderman ch035 lecture
Halderman ch035 lecturemcfalltj
 
Loyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd bakerLoyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd bakerEnergyTech2015
 
Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...
 Anne McNelis: Intelligent Power Controller Development for Human Deep Space ... Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...
Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...EnergyTech2015
 
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...EnergyTech2015
 
Brian Patterson: Reinventing Building Power
Brian Patterson: Reinventing Building PowerBrian Patterson: Reinventing Building Power
Brian Patterson: Reinventing Building PowerEnergyTech2015
 
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC Grids
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC GridsNeil Kirby: VSC HVDC Transmission and Emerging Technologies in DC Grids
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC GridsEnergyTech2015
 

Viewers also liked (20)

John Ostrich: Space Weather Policy
John Ostrich: Space Weather Policy John Ostrich: Space Weather Policy
John Ostrich: Space Weather Policy
 
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...
 
Tues.1040 am states role in protecting electric grids from emp and gmd with a...
Tues.1040 am states role in protecting electric grids from emp and gmd with a...Tues.1040 am states role in protecting electric grids from emp and gmd with a...
Tues.1040 am states role in protecting electric grids from emp and gmd with a...
 
Andrew Ritch: Interruption in the Utility Industry
Andrew Ritch: Interruption in the Utility IndustryAndrew Ritch: Interruption in the Utility Industry
Andrew Ritch: Interruption in the Utility Industry
 
Benjamin Loop: Simulation Environment for Power Management and Distribution D...
Benjamin Loop: Simulation Environment for Power Management and Distribution D...Benjamin Loop: Simulation Environment for Power Management and Distribution D...
Benjamin Loop: Simulation Environment for Power Management and Distribution D...
 
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...
 
Tues pm banquet featuring Jenita McGowan
Tues pm banquet featuring Jenita McGowanTues pm banquet featuring Jenita McGowan
Tues pm banquet featuring Jenita McGowan
 
William Good: Extra Small Modular Reactors
William Good: Extra Small Modular ReactorsWilliam Good: Extra Small Modular Reactors
William Good: Extra Small Modular Reactors
 
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field
 
Gareth Digby: Systems-Based Approach to Cyber Investigations
Gareth Digby: Systems-Based Approach to Cyber Investigations Gareth Digby: Systems-Based Approach to Cyber Investigations
Gareth Digby: Systems-Based Approach to Cyber Investigations
 
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...
 
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...
 
Halderman ch035 lecture
Halderman ch035 lectureHalderman ch035 lecture
Halderman ch035 lecture
 
Loyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd bakerLoyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd baker
 
Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...
 Anne McNelis: Intelligent Power Controller Development for Human Deep Space ... Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...
Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...
 
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...
 
Brian Patterson: Reinventing Building Power
Brian Patterson: Reinventing Building PowerBrian Patterson: Reinventing Building Power
Brian Patterson: Reinventing Building Power
 
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC Grids
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC GridsNeil Kirby: VSC HVDC Transmission and Emerging Technologies in DC Grids
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC Grids
 

Similar to Branndon Kelley Keynote on Cybersecurity and the Smart Utility

Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyTheAnfieldGroup
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energystacybre
 
Smart Grid
Smart GridSmart Grid
Smart GridNexus
 
Smart Grid Training for Non Engineers : Tonex Training
Smart Grid Training for Non Engineers : Tonex TrainingSmart Grid Training for Non Engineers : Tonex Training
Smart Grid Training for Non Engineers : Tonex TrainingBryan Len
 
Tollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
Tollgrade LightHouse Asset Management Techniques Using Smart Grid SensorsTollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
Tollgrade LightHouse Asset Management Techniques Using Smart Grid SensorsTollgrade Communications
 
[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT ConvergenceSchneider Electric
 
Smart Grid – What’s in it for me? Customer Benefits and Engineering Career Op...
Smart Grid – What’s in it for me? Customer Benefits and Engineering Career Op...Smart Grid – What’s in it for me? Customer Benefits and Engineering Career Op...
Smart Grid – What’s in it for me? Customer Benefits and Engineering Career Op...Society of Women Engineers
 
Role of substation in smart grid
Role of substation in smart grid Role of substation in smart grid
Role of substation in smart grid MANGESHKULKARNI72
 
DeployingAnAdvancedDistribution.pdf
DeployingAnAdvancedDistribution.pdfDeployingAnAdvancedDistribution.pdf
DeployingAnAdvancedDistribution.pdfbayu162365
 
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDS
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDSBUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDS
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDSiQHub
 
Smart Metering Implementation
Smart Metering Implementation Smart Metering Implementation
Smart Metering Implementation PowerEDGE
 
New Uses For Electric Meters as We Continue to Leverage AMI Technology
New Uses For Electric Meters as We Continue to Leverage AMI TechnologyNew Uses For Electric Meters as We Continue to Leverage AMI Technology
New Uses For Electric Meters as We Continue to Leverage AMI TechnologyTESCO - The Eastern Specialty Company
 

Similar to Branndon Kelley Keynote on Cybersecurity and the Smart Utility (20)

Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
Smart Grid
Smart GridSmart Grid
Smart Grid
 
Smart Grid Deployment Experience and Utility Case Studies
Smart Grid Deployment Experience and Utility Case StudiesSmart Grid Deployment Experience and Utility Case Studies
Smart Grid Deployment Experience and Utility Case Studies
 
Smart Grid Training for Non Engineers : Tonex Training
Smart Grid Training for Non Engineers : Tonex TrainingSmart Grid Training for Non Engineers : Tonex Training
Smart Grid Training for Non Engineers : Tonex Training
 
2014 PV Reliability, Operations & Maintenance Workshop: An O&M Perspective
2014 PV Reliability, Operations & Maintenance Workshop: An O&M Perspective2014 PV Reliability, Operations & Maintenance Workshop: An O&M Perspective
2014 PV Reliability, Operations & Maintenance Workshop: An O&M Perspective
 
Tollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
Tollgrade LightHouse Asset Management Techniques Using Smart Grid SensorsTollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
Tollgrade LightHouse Asset Management Techniques Using Smart Grid Sensors
 
Lect k week 12 summary on smart meters & sg 1
Lect k  week 12 summary on smart meters & sg  1Lect k  week 12 summary on smart meters & sg  1
Lect k week 12 summary on smart meters & sg 1
 
Lect k week 12 summary on smart meters & sg 1
Lect k  week 12 summary on smart meters & sg  1Lect k  week 12 summary on smart meters & sg  1
Lect k week 12 summary on smart meters & sg 1
 
Msia711.05
Msia711.05Msia711.05
Msia711.05
 
[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence
 
Smart Grid – What’s in it for me? Customer Benefits and Engineering Career Op...
Smart Grid – What’s in it for me? Customer Benefits and Engineering Career Op...Smart Grid – What’s in it for me? Customer Benefits and Engineering Career Op...
Smart Grid – What’s in it for me? Customer Benefits and Engineering Career Op...
 
Engineering the Smart Grid
Engineering the Smart GridEngineering the Smart Grid
Engineering the Smart Grid
 
Role of substation in smart grid
Role of substation in smart grid Role of substation in smart grid
Role of substation in smart grid
 
DeployingAnAdvancedDistribution.pdf
DeployingAnAdvancedDistribution.pdfDeployingAnAdvancedDistribution.pdf
DeployingAnAdvancedDistribution.pdf
 
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDS
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDSBUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDS
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDS
 
Smart Metering Implementation
Smart Metering Implementation Smart Metering Implementation
Smart Metering Implementation
 
New Uses For Electric Meters as We Continue to Leverage AMI Technology
New Uses For Electric Meters as We Continue to Leverage AMI TechnologyNew Uses For Electric Meters as We Continue to Leverage AMI Technology
New Uses For Electric Meters as We Continue to Leverage AMI Technology
 
Smart grid
Smart gridSmart grid
Smart grid
 
Proposal for PSEB
Proposal for PSEBProposal for PSEB
Proposal for PSEB
 

More from EnergyTech2015

Tues PM banquet keynote featuring Virginia A Greiman
Tues PM banquet keynote featuring Virginia A GreimanTues PM banquet keynote featuring Virginia A Greiman
Tues PM banquet keynote featuring Virginia A GreimanEnergyTech2015
 
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...EnergyTech2015
 
Bob Garrett: Network of Networks Analysis
Bob Garrett: Network of Networks AnalysisBob Garrett: Network of Networks Analysis
Bob Garrett: Network of Networks AnalysisEnergyTech2015
 
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...EnergyTech2015
 
John Nairus: Hybrid-Electric Propulsion
John Nairus: Hybrid-Electric Propulsion John Nairus: Hybrid-Electric Propulsion
John Nairus: Hybrid-Electric Propulsion EnergyTech2015
 
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion EnergyTech2015
 
EnergyTech2015 Program Guide
EnergyTech2015 Program GuideEnergyTech2015 Program Guide
EnergyTech2015 Program GuideEnergyTech2015
 

More from EnergyTech2015 (7)

Tues PM banquet keynote featuring Virginia A Greiman
Tues PM banquet keynote featuring Virginia A GreimanTues PM banquet keynote featuring Virginia A Greiman
Tues PM banquet keynote featuring Virginia A Greiman
 
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
 
Bob Garrett: Network of Networks Analysis
Bob Garrett: Network of Networks AnalysisBob Garrett: Network of Networks Analysis
Bob Garrett: Network of Networks Analysis
 
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...
 
John Nairus: Hybrid-Electric Propulsion
John Nairus: Hybrid-Electric Propulsion John Nairus: Hybrid-Electric Propulsion
John Nairus: Hybrid-Electric Propulsion
 
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion
 
EnergyTech2015 Program Guide
EnergyTech2015 Program GuideEnergyTech2015 Program Guide
EnergyTech2015 Program Guide
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Branndon Kelley Keynote on Cybersecurity and the Smart Utility

  • 1.
  • 2. Cybersecurity and the Smart Utility Branndon Kelley Chief Information Officer
  • 3. Fast Facts: American Municipal Power • Wholesale power supplier and services provide for 132 municipal electric systems in 9 states and service more than 637,000 customers. • AMP members receive their power supply from a diversified resource mix that includes wholesale power purchases and energy produced utilizing fossil fuels and renewable resources. • Focused on sustainability and increased use of renewable generation resources with plans to add more than 300 MW of new hydro capacity to the region.
  • 4. History of AMP • Founded in 1971 with the purpose to provide the generation, transmission, and distribution of electric power and energy to its members at lower costs. This purpose is served by: – Joint ownership of electric facilities – Pooled buying power in energy markets – Pursuing additional means of generating, transmitting and distributing electric power and energy • Original members were all located in Ohio (AMP-Ohio). Name changed in 2009 to AMP.
  • 5. 1800s - Early days of electricity • Systems small and localized • Generation built close to the end user • Limited transmission capabilities The Pearl Street Station in New York City
  • 6. 1900s – Establishment of The Modern Grid AEP 765kV transmission tower in Virginia Prairie State Energy Campus in Illinois • Began in the late 1800s. • Transmission lines make it possible to separate generation from the end user by many miles. • More complex system but benefits outweigh challenges
  • 7. 1990s & 2000s • 1992 - De-regulation • Residential customer begins installing their own generation Rooftop Solar • Even more complex systems.
  • 8. Future – The Smart Grid • Many types and sources of generation • Millions of hackable utility connected devices
  • 10. Smart Grid = Smart Utility Smart controls on distribution poles Microgrids and energy reduction Solar & Advanced Metering (AMI) Sensors on Assets in Power Plants
  • 11. Smart Utility – Power Generation • Distributed control systems & automation reduce the number of people it takes to run a power plant. • Sensors and system provide data for pro-active maintenance to take place and reduce unnecessary maintenance. • All resulting in safer facilities and less forced outages.
  • 12. Smart Utility – T & D • SCADA system allow for better monitoring of the grid and identification of issues. • Automated reclosers provides for better detection and interruption of momentary faults • All resulting in faster restoration during weather events and more efficient system maintenance.
  • 13. Smart Utility – Micro Grids • Can operate with the main grid or independently as an electrical island • Locally controlled systems • Often contain multiple generation types with battery storage
  • 14. • Current State of CyberSecurity
  • 16. Threat Vectors • Physical Attacks • Malware - Viruses/Exploits • Phishing Attacks & Social Engineering – Targeted Attacks to Extract Information • Advanced Persistent Threats – Well planned – Often Nation State or Organization Sponsored
  • 17. Top target roles – Spear Phishing Symantec Internet Security Threat Report – April 2015, Volume 20
  • 19. The Structure of an Advanced Persistent Threat Source: Dell Secureworks
  • 20. Smart Enablement Cyber Risk • Generation Example • Attackers gain access to an unnamed plant’s office network through a targeted malicious email • Attacker’s are ultimately able to cross over into the production network. • The plant’s control systems are breached which results in an incident where a turbine could not be shut down in the regular way and the turbine was in an undefined condition which resulted in massive damage to the whole system
  • 21. Smart Enablement Cyber Risk • Distribution Example XX X X X X X X X
  • 22. Smart Enablement Cyber Risk • In the Home Example Water Heater Thermostat
  • 23. Connected utility and security can co-exist. • Must create a culture of cyber security • Leveraging best practices for Physical and Cyber Security is key • Standards do exist for implementing effective cyber security – SANS 20 Critical Security Controls – NIST Cybersecurity Framework
  • 24. Physical Security Best Practices • Review/Confirm security procedures and regular inspection of facilities • Provide Security Training and awareness for staff • Hold Security Briefings for key personnel • Limit Access to Facilities and Systems to authorized personnel only • Security Badges and Electronic Security Systems • Procedures to prevent tailgating and unauthorized entry to facilities
  • 25. Cyber Security Best Practices • Adopt a Framework (SANS, NIST) • Cyber Security Training • Penetration Tests & Vulnerability Assessments • Tabletop exercises • Restrict Physical Access to IT Devices/Networks • Practice Incident Response
  • 26. Cyber Security Incident Response • Take a not “if” but “when” approach • Drill incident response and include executive management. • Reviewed layered defense strategy to identify defense points.
  • 27. Cyber Security Systems • Firewalls, Intrusion Prevention Systems, and Web Filters • Sandboxing - Advanced Persistent Threats • Endpoint based Protection and Whitelisting – Traditional Antivirus is becoming less effective • Network Access Control Systems • Multi-Factor Authentication • Separated Networks with Layered Defenses
  • 28. Air Gapping is becoming more difficult • USB drive plugged in • Engineering laptop plugged in • Researchers are discovering ways to bridge air gaps with cell phones • IT and OT personnel have to work together to secure systems at all layers instead of creating a hardened outer perimeter with a weak inner network.
  • 29. Defense in Depth / Layered Security • Originally a military strategy that seeks to delay, rather than prevent, the advance of an attacker by yielding space in order to buy time. • Test defenses with Red Team vs Blue Team Exercises Source: NERC
  • 30. 30 Redefining AMP’s Strategy What we know… • The utility industry business is increasing its use of technology - in the business, in field equipment, and by customers • Our member municipalities have an emerging need – Skill & talent not locally available • Our operations are becoming more vulnerable to attack – Cybersecurity engineering is of paramount importance Members have recognized AMP’s ability to effectively manage bulk power purchases, generation facilities and power supply contracts • AMP’s Board has identified the need to support members in their adoption of technology in their operations
  • 31. Redefining AMP’s Strategy One of the eight teams is focused on technology enablement - “Hosted Solutions" • AMP members are evaluating many technologies in the distribution and customer operations parts of the business • Vendors, distributors, and independent providers have identified the need within small municipal utility operators • The term – “Hosted Solutions” – is reflective of what the marketplace refers to these services – Vendors providing these services to individual members
  • 32. AMP’s Smart Grid Program Project launched on January 6, 2015 • Focus on simplifying AMI adoption for AMP members • Recognize variability among member’s requirements Pilot member utilities’ benefits • Aggregating purchasing of equipment • Mitigating the risks associated with local deployment of major technology components like Meter Data Management Systems • Support business case & financial modeling • Assistance with presentations to leadership, where required • Provide collateral material for customer communications
  • 33. Program Leadership • Under supervision of AMP Chief Technology Officer, Jared Price. – Has been with AMP since 2011 – Has responsibility for Overall IT Enterprise Architecture, SCADA and plant systems across AMP’s generation portfolio – 10+ years of experience in infrastructure management, project management, and enterprise architecture across multiple industries including banking & finance, healthcare, education, and utilities. – Holds Global Industrial Cyber Security Professional Certification (GICSP), #178 • Also retain a Smart Grid Consultant / Owner’s engineer with 30+ years of large utility experience.
  • 34. Program Overview • AMP will host the back-end AMI and Meter Data Management System (MDMS) for individual member utilities. • AMP Will provide staffing and expertise to run these systems. • RFI and RFP process to major systems vendors earlier this year. • Pilot member committee helped in shaping the program. • Go live planned in early 2016
  • 35. Member Business Drivers • Address aging meter assets and meter reading equipment • Improve customer service • Support for emerging needs – rates, distributed generation • Leverage join action to gain lowest possible cost • Defer to AMP (vs. Vendor) management of technology
  • 36. Current State - HHMR Billing System • Manual meter reading process • Aging meters, handheld equipment • Support for new rates • “Smart grid” platform & customer expectations
  • 37. Advanced Metering Evolution - AMR Meters Meters replaced with “One-Way” RF System; Reading with “drive by” equipment • Improves efficiency (less estimates, lockouts) • Continued shortcomings on advanced rates, smart grid capabilities, & customer expectations Billing System
  • 38. AMP Advanced Metering Solution - AMI Back Office Infrastructure MDMCustomer Portal Utility Portal Outage viewer AMP Managed Systems Wireless Network AMI Head-End Field Infrastructure Billing System Meters Utility Systems
  • 39. AMI Solution Security • AMP is able to leverage Cyber Security defenses and best practices with the deployment and management of this solutions – Many of our members do not have the expertise to do this on their own • AMP is also able to leverage trusted partners that have a forward thinking approach to cyber security like Kevin Goodman and Bluebridge networks. AMP will host this system like many other critical systems within the Bluebridge datacenter.
  • 40. References http://www.engin.umich.edu/college/about/news/stories/2011/may/living-off-the-grid-smart-grids-are-current- technology-at-its-best Living off the grid: smart grids are current technology at its best By Marilyn Tsao http://www.gereports.com/every-electron-gets-byte-digital-power-plant-makes-electricity-smart/ Every Electron Gets A Byte: Digital Power Plant Makes Electricity Smart By Tomas Kellner http://www.scmagazine.com/cyberattacks-costing-big-business-big- bucks/article/443982/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+SCMagazineHo me+(SC+Magazine) Cyberattacks costing big business big bucks By Dough Olenick (SC Magazine) http://www.infosecurity-magazine.com/news/dow-jones-hacked-affecting/ Dow Jones Hacked, Affecting Thousands By Tara Seals (Infosecurity Magazine) Workshop: Building a Utility Customer Digital Engagement Program By Chet Geschickter (Gartner Symposium ITXPO 2015)
  • 41. References (continued…) http://www.infosecurity-magazine.com/news/dow-jones-hacked-affecting/ Dow Jones Hacked, Affecting Thousands By Tara Seals (Infosecurity Magazine) http://www.infosecurity-magazine.com/news/uks-nuclear-industry-at-risk-of/ UK’s Nuclear Industry at Risk of Major Cyber-Attack Phil Muncaster (Infosecurity Magazine) https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932_GA-internet-security-threat-report- volume-20-2015-social_v2.pdf Symantec Internet Security Threat Report – April 2015, Volume 20 http://blogs.wsj.com/cio/2014/12/18/cyberattack-on-german-iron-plant-causes-widespread-damage-report/ Wall Street Journal (Dec 18, 2014) - Cyberattack on German Iron Plant Causes ‘Widespread Damage’: Report http://www.nist.gov/cyberframework/index.cfm NIST Cyber Security Framework http://www.sans.org/critical-security-controls/control/20 SANS Critical Security Control: 20