SlideShare a Scribd company logo
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 1
Presentation title
Emerging IoT in the Energy
Sector
Where we’ve been and where we are going
EMCSF June 2017
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 2
OMNETRIC Group
We are transformation architects
We are focused on the energy
industry and dedicated to our
customers’ energy journey over the
long term. Our talent, tools,
accelerators and methodologies, our
adapters and proprietary solutions,
R&D and thought leadership are all
focused on solving the integration
challenges of our utilities
customers.
We understand the mandate to
transform and the business
imperatives, but equally, the
inherent risks and costs. This
enables us to propose real world
ready solutions that can be
implemented reliably at speed.
We live and breathe
IT/OT integration
We approach integration
with a deep understanding
of the operations side of the
IT/OT equation
We can offer ready-made
solution assets to the
market
We combine privileged
access to the world class
assets of our shareholders
with the agility of a start-up
We make the upfront investments
required to bring ready-made
solutions to our customers so that
they can solve their challenges
faster and more reliably with less
risk.
Our customers benefit from the
products, global footprint and
financial backing of our
shareholders as well as a privileged
relationship with their ecosystem
partners.
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 3
Why are we worrying about
security?
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 4
Seven 110kV and twenty-
three 35kV substations
across three DSOs had
breakers opened
225,000 premises were
without power for 4-6
hours
Serial-to-IP converters were
permanently destroyed by
rogue firmware
Multiple control PCs disks
were wiped using Killdisk
HR system disabled
Loss of AMI
connectivity
DSO restricted to manual operations
UPS changes killed power
to data centre
DOS attack against call centre
Ukraine – December 2015
4
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 5
IT/OT integration is an evolution that is
applied step-by-step
We can apply the same thinking for security and trust
FlyJumpRunWalkCrawl
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 6
Circuit based solutions
Circuit based solutions
• Serial cable
• PSTN
• Mobile modem
Getting old
• Expensive to implement and maintain
• Not highly scalable
Communications technology
Assessment
• Establishing trust – hope the engineer gets it right
• Level of trust – minimal. Hard to prove end-point and relatively easy to intercept
• Management – poor. Passwords often unchanged for years and even when transferred
• High scale – extremely difficult, especially where communications infrastructure needed
Challenges
Control system Field deviceCircuit
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 7
Virtual Private Networks
Communications technology Challenges
IP Based connections with a virtual circuit at OSI layer 2/3 • Expensive to implement and maintain
• Not highly scalable
• Secure pipe – but gaps at the end
Assessment
• Establishing trust – engineer probably gets it right but no end-to-end
• Level of trust – connection okay – but gaps at either end
• Management – hard at large scale
• High scale – difficult and very expensive
Control system Field deviceVirtual circuit
VPN
server
VPN
Client
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 8
Symmetric keys – shared secret
Communications technology Challenges
• IP Based connections with a secure connection at OSI
Layer 6
• Trust via symmetric keys
• Key handling
• Breach of key store breaches all devices
• Needs capable devices with crypto processors
• Only supports 1:1 relationship
Assessment
• Establishing trust – shared secret can be installed by the manufacturer. Needs to be installed in the right place
• Level of trust – very high. Symmetric crypto is tough to crack. Relationship to the end device
• Management – can handle very large scale but needs very robust processes
• High scale – much more scalable but hard to control keys
Control system Field deviceTLS or Message Based
Key
store
Crypto
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 9
Asymmetric keys – Public Key Infrastructure
Communications technology Challenges
• IP Based connections with a secure connection at OSI
Layer 6
• Trust via asymmetric keys
• Public Key Infrastructure – Root and signing servers
• Breach of key store breaches trust
• Needs capable devices with crypto processors
• Supports many to many relationship
• Certificate handling & revocation problematic
Assessment
• Establishing trust – public certificates can be provided by the manufacturer. Needs to be installed in the right place
• Level of trust – very high. Generally needs combination of asymmetric and symmetric for processing
• Management – can handle extremely large scale but needs very robust processes for certificate handling
• High scale – known to work at extreme scale but hard to recover trust
Control system Field deviceTLS or Message Based
Key
store
Crypto
PKI Cert mgt
Cert mgt
Cert mgt
Cert mgt
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 10
Where next?
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 11
Smart grid solution security in context
Risk management & security governance
Protectiontechnology
Security processes and procedures
Cryptography management Monitoring and intrusion detection
Enhance
d
security
offeringBasic security measures
Core solution
Core
solution
offering
Incidentresponseand
recovery
Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 12
OMNETRIC Group is dedicated to the global delivery of
integrated information technology and operational
technology solutions and services, helping utility
companies to achieve greater grid reliability and
efficiency. OMNETRIC Group can support clients with
innovative solutions wherever they may be on their path
to a smarter grid. For more information, visit
www.omnetricgroup.com.
For more information contact:
Jon Longstaff CISSP
Head of Cyber Security
jon.longstaff@omnetric.com
@DefendtheGrid
Engineers
IT
experts
Data
scientists
Cybersecurity
specialists

More Related Content

What's hot

HDS Bridge from here to there
HDS Bridge   from here to thereHDS Bridge   from here to there
HDS Bridge from here to there
Andrew McGee
 
IoTiL (Internet of Things in Logistics)
IoTiL (Internet of Things in Logistics)IoTiL (Internet of Things in Logistics)
IoTiL (Internet of Things in Logistics)
Subhash Chowdary
 
Cloud computing and managed services (Sumit Dutta, CSSWA)
Cloud computing and managed services (Sumit Dutta, CSSWA)Cloud computing and managed services (Sumit Dutta, CSSWA)
Cloud computing and managed services (Sumit Dutta, CSSWA)
makinglinks
 
IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130
Francisco Maroto
 
Industrial Internet of things - What’s at Stake?
Industrial Internet of things - What’s at Stake? Industrial Internet of things - What’s at Stake?
Industrial Internet of things - What’s at Stake?
Karan Menon
 
Engineering and OW2 Big Data Initiative: an open approach to the data-driven ...
Engineering and OW2 Big Data Initiative: an open approach to the data-driven ...Engineering and OW2 Big Data Initiative: an open approach to the data-driven ...
Engineering and OW2 Big Data Initiative: an open approach to the data-driven ...
SpagoWorld
 
EENA2019: Track1 session1 T20 project (...)_Steve McLinden
EENA2019: Track1 session1 T20 project (...)_Steve McLindenEENA2019: Track1 session1 T20 project (...)_Steve McLinden
EENA2019: Track1 session1 T20 project (...)_Steve McLinden
EENA (European Emergency Number Association)
 
IoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance InfobiteIoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance Infobite
Equinix
 
‘What IN the WORLD is Open data anyway?’ and other valid questions | Julia Gl...
‘What IN the WORLD is Open data anyway?’ and other valid questions | Julia Gl...‘What IN the WORLD is Open data anyway?’ and other valid questions | Julia Gl...
‘What IN the WORLD is Open data anyway?’ and other valid questions | Julia Gl...
Department for Communities and Local Government Local Digital Campaign
 
SMART PAPER D.U.A.L. book
SMART PAPER D.U.A.L. bookSMART PAPER D.U.A.L. book
SMART PAPER D.U.A.L. book
Smart Paper
 
Medical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and ChallengesMedical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and Challenges
Amgad Magdy
 
My data dual book 4.5.2017
My data dual book 4.5.2017My data dual book 4.5.2017
My data dual book 4.5.2017
Smart Paper
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
Privacy Data Protection for Engineering
 
Mark mc granaghan presentation
Mark mc granaghan presentationMark mc granaghan presentation
Mark mc granaghan presentationGreen17Creative
 
IoT and Big Data
IoT and Big DataIoT and Big Data
IoT and Big Data
sabnees
 
Maurizio Pilu - Digital Catapult - IoT Day - 10 04 2014
Maurizio Pilu   - Digital Catapult  - IoT Day -  10 04 2014Maurizio Pilu   - Digital Catapult  - IoT Day -  10 04 2014
Maurizio Pilu - Digital Catapult - IoT Day - 10 04 2014Maurizio Pilu
 
Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44
Jisc
 
Forecast 2014: eDiscovery and Forensics
Forecast 2014: eDiscovery and Forensics Forecast 2014: eDiscovery and Forensics
Forecast 2014: eDiscovery and Forensics
Open Data Center Alliance
 

What's hot (20)

HDS Bridge from here to there
HDS Bridge   from here to thereHDS Bridge   from here to there
HDS Bridge from here to there
 
IoTiL (Internet of Things in Logistics)
IoTiL (Internet of Things in Logistics)IoTiL (Internet of Things in Logistics)
IoTiL (Internet of Things in Logistics)
 
eChallenges_e2011_JS
eChallenges_e2011_JSeChallenges_e2011_JS
eChallenges_e2011_JS
 
Cloud computing and managed services (Sumit Dutta, CSSWA)
Cloud computing and managed services (Sumit Dutta, CSSWA)Cloud computing and managed services (Sumit Dutta, CSSWA)
Cloud computing and managed services (Sumit Dutta, CSSWA)
 
IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130IoT_Evolution_or_Revolution_20160130
IoT_Evolution_or_Revolution_20160130
 
A. leng development of telehealth hub infrastructure in yorkshire
A. leng development of telehealth hub infrastructure in yorkshireA. leng development of telehealth hub infrastructure in yorkshire
A. leng development of telehealth hub infrastructure in yorkshire
 
Industrial Internet of things - What’s at Stake?
Industrial Internet of things - What’s at Stake? Industrial Internet of things - What’s at Stake?
Industrial Internet of things - What’s at Stake?
 
Engineering and OW2 Big Data Initiative: an open approach to the data-driven ...
Engineering and OW2 Big Data Initiative: an open approach to the data-driven ...Engineering and OW2 Big Data Initiative: an open approach to the data-driven ...
Engineering and OW2 Big Data Initiative: an open approach to the data-driven ...
 
EENA2019: Track1 session1 T20 project (...)_Steve McLinden
EENA2019: Track1 session1 T20 project (...)_Steve McLindenEENA2019: Track1 session1 T20 project (...)_Steve McLinden
EENA2019: Track1 session1 T20 project (...)_Steve McLinden
 
IoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance InfobiteIoT-Enabled Predictive Maintenance Infobite
IoT-Enabled Predictive Maintenance Infobite
 
‘What IN the WORLD is Open data anyway?’ and other valid questions | Julia Gl...
‘What IN the WORLD is Open data anyway?’ and other valid questions | Julia Gl...‘What IN the WORLD is Open data anyway?’ and other valid questions | Julia Gl...
‘What IN the WORLD is Open data anyway?’ and other valid questions | Julia Gl...
 
SMART PAPER D.U.A.L. book
SMART PAPER D.U.A.L. bookSMART PAPER D.U.A.L. book
SMART PAPER D.U.A.L. book
 
Medical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and ChallengesMedical IoT<E security issues: Risks and Challenges
Medical IoT<E security issues: Risks and Challenges
 
My data dual book 4.5.2017
My data dual book 4.5.2017My data dual book 4.5.2017
My data dual book 4.5.2017
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
 
Mark mc granaghan presentation
Mark mc granaghan presentationMark mc granaghan presentation
Mark mc granaghan presentation
 
IoT and Big Data
IoT and Big DataIoT and Big Data
IoT and Big Data
 
Maurizio Pilu - Digital Catapult - IoT Day - 10 04 2014
Maurizio Pilu   - Digital Catapult  - IoT Day -  10 04 2014Maurizio Pilu   - Digital Catapult  - IoT Day -  10 04 2014
Maurizio Pilu - Digital Catapult - IoT Day - 10 04 2014
 
Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44
 
Forecast 2014: eDiscovery and Forensics
Forecast 2014: eDiscovery and Forensics Forecast 2014: eDiscovery and Forensics
Forecast 2014: eDiscovery and Forensics
 

Similar to Emerging IoT in the Energy Sector

Architecting, Integrating, and Managing IoT Solutions
Architecting, Integrating, and Managing IoT SolutionsArchitecting, Integrating, and Managing IoT Solutions
Architecting, Integrating, and Managing IoT Solutions
Christopher Carpentier
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide Ethernet
Rockwell Automation
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud
ADVA
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV Easy
ADVA
 
Colocation Services
Colocation ServicesColocation Services
Colocation Services
jerianasmith
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
Cisco Russia
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
CodeOps Technologies LLP
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
ThousandEyes
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
Naved Ahmed
 
HiveMQ Cloud Webinar
HiveMQ Cloud WebinarHiveMQ Cloud Webinar
HiveMQ Cloud Webinar
HiveMQ
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
terrencebarr
 
Cisco Meraki - Let Simple Work for You
Cisco Meraki - Let Simple Work for YouCisco Meraki - Let Simple Work for You
Cisco Meraki - Let Simple Work for You
Cisco Canada
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05hoanv
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04
Avinaba Basu
 
Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Russia
 
Cisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For YouCisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For You
Cisco Canada
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
Medley India Infosolution Pvt Ltd
 
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For YouCisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Canada
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
Andrew Blades
 

Similar to Emerging IoT in the Energy Sector (20)

Architecting, Integrating, and Managing IoT Solutions
Architecting, Integrating, and Managing IoT SolutionsArchitecting, Integrating, and Managing IoT Solutions
Architecting, Integrating, and Managing IoT Solutions
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide Ethernet
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV Easy
 
Colocation Services
Colocation ServicesColocation Services
Colocation Services
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and CiscoWho Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
Who Moved My Network? Mastering Hybrid WANs with ThousandEyes and Cisco
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
HiveMQ Cloud Webinar
HiveMQ Cloud WebinarHiveMQ Cloud Webinar
HiveMQ Cloud Webinar
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Cisco Meraki - Let Simple Work for You
Cisco Meraki - Let Simple Work for YouCisco Meraki - Let Simple Work for You
Cisco Meraki - Let Simple Work for You
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04
 
Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed Networking
 
Cisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For YouCisco Meraki: Let Simple Work For You
Cisco Meraki: Let Simple Work For You
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For YouCisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
Cisco Connect Vancouver 2017 - Cisco Meraki -Let Simple Work For You
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
 

More from East Midlands Cyber Security Forum

Cyber Crime - Who do you call?
Cyber Crime - Who do you call?Cyber Crime - Who do you call?
Cyber Crime - Who do you call?
East Midlands Cyber Security Forum
 
What to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breachWhat to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breach
East Midlands Cyber Security Forum
 
Securing the IoT... Good Luck
Securing the IoT... Good LuckSecuring the IoT... Good Luck
Securing the IoT... Good Luck
East Midlands Cyber Security Forum
 
The Cyber Connected World
The Cyber Connected World The Cyber Connected World
The Cyber Connected World
East Midlands Cyber Security Forum
 
The Internet of Things Security Foundation (IoTSF)
The Internet of Things Security Foundation (IoTSF)The Internet of Things Security Foundation (IoTSF)
The Internet of Things Security Foundation (IoTSF)
East Midlands Cyber Security Forum
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
East Midlands Cyber Security Forum
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
East Midlands Cyber Security Forum
 

More from East Midlands Cyber Security Forum (7)

Cyber Crime - Who do you call?
Cyber Crime - Who do you call?Cyber Crime - Who do you call?
Cyber Crime - Who do you call?
 
What to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breachWhat to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breach
 
Securing the IoT... Good Luck
Securing the IoT... Good LuckSecuring the IoT... Good Luck
Securing the IoT... Good Luck
 
The Cyber Connected World
The Cyber Connected World The Cyber Connected World
The Cyber Connected World
 
The Internet of Things Security Foundation (IoTSF)
The Internet of Things Security Foundation (IoTSF)The Internet of Things Security Foundation (IoTSF)
The Internet of Things Security Foundation (IoTSF)
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 

Recently uploaded

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Emerging IoT in the Energy Sector

  • 1. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 1 Presentation title Emerging IoT in the Energy Sector Where we’ve been and where we are going EMCSF June 2017
  • 2. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 2 OMNETRIC Group We are transformation architects We are focused on the energy industry and dedicated to our customers’ energy journey over the long term. Our talent, tools, accelerators and methodologies, our adapters and proprietary solutions, R&D and thought leadership are all focused on solving the integration challenges of our utilities customers. We understand the mandate to transform and the business imperatives, but equally, the inherent risks and costs. This enables us to propose real world ready solutions that can be implemented reliably at speed. We live and breathe IT/OT integration We approach integration with a deep understanding of the operations side of the IT/OT equation We can offer ready-made solution assets to the market We combine privileged access to the world class assets of our shareholders with the agility of a start-up We make the upfront investments required to bring ready-made solutions to our customers so that they can solve their challenges faster and more reliably with less risk. Our customers benefit from the products, global footprint and financial backing of our shareholders as well as a privileged relationship with their ecosystem partners.
  • 3. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 3 Why are we worrying about security?
  • 4. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 4 Seven 110kV and twenty- three 35kV substations across three DSOs had breakers opened 225,000 premises were without power for 4-6 hours Serial-to-IP converters were permanently destroyed by rogue firmware Multiple control PCs disks were wiped using Killdisk HR system disabled Loss of AMI connectivity DSO restricted to manual operations UPS changes killed power to data centre DOS attack against call centre Ukraine – December 2015 4
  • 5. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 5 IT/OT integration is an evolution that is applied step-by-step We can apply the same thinking for security and trust FlyJumpRunWalkCrawl
  • 6. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 6 Circuit based solutions Circuit based solutions • Serial cable • PSTN • Mobile modem Getting old • Expensive to implement and maintain • Not highly scalable Communications technology Assessment • Establishing trust – hope the engineer gets it right • Level of trust – minimal. Hard to prove end-point and relatively easy to intercept • Management – poor. Passwords often unchanged for years and even when transferred • High scale – extremely difficult, especially where communications infrastructure needed Challenges Control system Field deviceCircuit
  • 7. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 7 Virtual Private Networks Communications technology Challenges IP Based connections with a virtual circuit at OSI layer 2/3 • Expensive to implement and maintain • Not highly scalable • Secure pipe – but gaps at the end Assessment • Establishing trust – engineer probably gets it right but no end-to-end • Level of trust – connection okay – but gaps at either end • Management – hard at large scale • High scale – difficult and very expensive Control system Field deviceVirtual circuit VPN server VPN Client
  • 8. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 8 Symmetric keys – shared secret Communications technology Challenges • IP Based connections with a secure connection at OSI Layer 6 • Trust via symmetric keys • Key handling • Breach of key store breaches all devices • Needs capable devices with crypto processors • Only supports 1:1 relationship Assessment • Establishing trust – shared secret can be installed by the manufacturer. Needs to be installed in the right place • Level of trust – very high. Symmetric crypto is tough to crack. Relationship to the end device • Management – can handle very large scale but needs very robust processes • High scale – much more scalable but hard to control keys Control system Field deviceTLS or Message Based Key store Crypto
  • 9. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 9 Asymmetric keys – Public Key Infrastructure Communications technology Challenges • IP Based connections with a secure connection at OSI Layer 6 • Trust via asymmetric keys • Public Key Infrastructure – Root and signing servers • Breach of key store breaches trust • Needs capable devices with crypto processors • Supports many to many relationship • Certificate handling & revocation problematic Assessment • Establishing trust – public certificates can be provided by the manufacturer. Needs to be installed in the right place • Level of trust – very high. Generally needs combination of asymmetric and symmetric for processing • Management – can handle extremely large scale but needs very robust processes for certificate handling • High scale – known to work at extreme scale but hard to recover trust Control system Field deviceTLS or Message Based Key store Crypto PKI Cert mgt Cert mgt Cert mgt Cert mgt
  • 10. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 10 Where next?
  • 11. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 11 Smart grid solution security in context Risk management & security governance Protectiontechnology Security processes and procedures Cryptography management Monitoring and intrusion detection Enhance d security offeringBasic security measures Core solution Core solution offering Incidentresponseand recovery
  • 12. Copyright ©2017 OMNETRIC Group. All rights reserved. OMNETRIC Group Unrestricted information. 12 OMNETRIC Group is dedicated to the global delivery of integrated information technology and operational technology solutions and services, helping utility companies to achieve greater grid reliability and efficiency. OMNETRIC Group can support clients with innovative solutions wherever they may be on their path to a smarter grid. For more information, visit www.omnetricgroup.com. For more information contact: Jon Longstaff CISSP Head of Cyber Security jon.longstaff@omnetric.com @DefendtheGrid Engineers IT experts Data scientists Cybersecurity specialists