SlideShare ist ein Scribd-Unternehmen logo
1 von 54
Downloaden Sie, um offline zu lesen
NRECA
The Agile Fractal Grid
“The Gathering of Eagles”
Tuesday, February 25, 2014
Arlington, VA
Coffee and Breakfast
Agenda for NRECA Agile Fractal Grid
Kickoff Meeting
8:00 Welcome by Martin Lowery; Opening by Chuck Speicher
8:15 Introductions of the Participants – John Reynolds
8:45 Achieving the Common Language through Design Patterns
9:20 The Vision of the Agile Fractal Grid – Craig Miller
9:45 Break
10:00 Discussion of the Managed Services Store and Applications
10:20 Discussion of the Distributed Systems Elements
11:45 Discussion of the Industrial Internet – Security, Resiliency, Efficiency
12:15 Lunch
1:00 Scope of the SmartAmerica Challenge vs. the Production Rollout
2:00 SEIT Process and Phase 1 Planning
2:30 Break
3:00 Phase 2 Implementation and Thread Assignments
3:30 General Discussion, Issues, Action Items, and Understandings
4:00 Wrap Up and Conclusion
Welcome to NRECA
Martin Lowrie
Background on the National Rural Electric
Cooperative Association
Convening of the Security Fabric Alliance
Chuck Speicher
Announcement of House SFA Rules
John Reynolds
It has been said that
the greatest engineering achievement of the 20th century
has been the building of the electric grid.
- The National Academy of Engineering
Invited Visitors
Department of Energy
Carol Hawk
Program Manager,
Cyber Security for Energy Delivery Systems
Ivanpah
World's largest solar plant started producing electricity today
Ivanpah was supported by $1.6 billion in investments
from the Energy Department's Loan Programs Office.
It represents the future of energy –
utility-scale renewable power generation
that uses the latest technology to harness the sun
where it is most abundant.
Federal Communications
Commission
Henning Schulzerinne
Office of the
Secretary of Defense
Rollie Wicks
Department of Homeland Security
Lisa Kaiser
Sarah Mahmood
Executive Order (EO) 13636: Improving Critical Infrastructure Cybersecurity
Presidential Policy Directive (PPD)-21: Critical Infrastructure Security and Resilience,
Critical Infrastructure Cyber Community Voluntary Program
Secretary of Homeland Security
Jeh Johnson
PM – ISE
DNI
Pamela Wise-Martinez
Mike Howell
Kshemendra Paul
Mission Partners
Congress
Diane Rinaldo
Legislative Director
For Mike RogersMike Rogers
– Michigan 8th District
U.S. House of Representatives
Chairman, House Intelligence Committee
Member, Energy and Commerce Committee
United States House Energy Subcommittee on Communications and Technology
United States House Energy Subcommittee on Health
Cyberthreat Data Sharing
and Protection
SmartAmerica
Challenge
Sokwoo Rhee
Presidential Innovation Fellow
The Challenge
We are planning to support the 940 rural co-ops in the U.S. with
hybrid cloud/device services protected by the Security Fabric.
This is also the candidate energy “testbed” for the SmartAmerica demonstration.
What NRECA has asked us to do.
1. Stand up an “app store” for both operational and analytical
applications for the cooperatives.
2. Participate in the “Substation of the Future” for the remote
equipment and subsystems.
3. Apply the Security Fabric within the emerging Industrial
Internet to protect all communications between the
elements.
Introduction to the
Security Fabric Alliance
• The Security Fabric Alliance is a working association dedicated to
practical deployment of the power grid and critical infrastructure
complex system solution in the United States:
– Utilities and telecommunications providers
– Systems integrators
– Manufacturers
– Technology partners
– National certification and interoperability entity
• The alliance is intended to give the CEO of a utility the purview of
up-to-the moment knowledge of the options available to make wise
investment decisions regarding infrastructure deployment for
optimal returns.
The variation includes the proper orientation for large, medium, and small utilities.
There are many participants at different levels
in the Security Fabric Alliance.
ComponentsProductsSubsystems
ResearchIntegration
Utility
Customers
• Intel – servers with Quark + TPM
• Wind River – Security Connect
• Middleware
• RTI – DDS
• GridStat
• Indra - iSpeed
• MultiSpeak
• TeamF1 – Secure Communications
• Secure Crossing – Protocol Whitelisting
• PsiNaptic – Secure Service Distribution
• SNMP Research – SNMP Agent
• Freescale – HSM w/Vybrid SoC
• Xilinx – CompactRIO SOC
• Green Hills Software - INTEGRITY
• Altera - tamper proofing
• Microsoft – Active Directory
• Red Hat – Auth Hub
• General Electric – EMS
• Alstom Grid – EMS
• Siemens – DMS
• Viridity Energy – DR + DER
+ Microgrid
• Lemko – LTE systems
• Intel Security – SIEM + GTI
• Intel – Encanto
+ silicon support
• Sypris – Supply
Chain Root of Trust
• TCIPG
• EPRI – CIM Standards
• MIT – Security &
Privacy Standards
• EPG – Phasor Data Portfolio
• GridSense– NAN & Line Sensors
• S&C IntelliTeam
• SafeNet – Secure Key Management
• Heart - Transverter
• Freescale One Box
• Cisco Cloud-in-a-Box
• Integrated Architectures – SEIT
• MACE Fusion - DoD
• Kryptos Logic – Red Team Certification
• M2M Dynamics
• Drummond Group – C&IT
• Intel Security - Distribution
...First Stage……
• ERCOT
• ONCOR
• AEP
• NRECA
• NRTC
Suppliers
• Verizon
• Level3
• AT&T
• Internet2
• BT
• ViaSat
• Hughes
• ARINC
• Stratus
• Symmetricom
…Second Stage……
• APPA
• SDG&E
• PJM
• NYISO
• Southern Company
• Duke Energy
• CAISO
• Pecan Street
• Mueller Community
• Pike Powers
• PNNL – CyberSecurity
Test Center
• Lincoln Labs
• OMG SIG
• SmartAmerica
Managed Services
• Tazca – Connect
• CSG International
• Digi International
• N-Dimension
• SETI
• Lockheed Martin
• SAIC
• Threat Connect
To establish the security of end-to-end systems using the Security Fabric elements,
you need to do all seven… not just some.
4. Audit
– Records noteworthy events for later analysis
5. Confidentiality
– Encrypts sensitive data for matters of privacy.
6. Integrity
– Ensures that messages have not been
altered.
7. Availability
– Prevents denial of service attacks
1. Identity Management
– Ensures the device identity is established
genuinely
2. Mutual Authentication
– Allows both the Device Node and the
Controller to verify the trustworthiness their
identity to each other.
3. Authorization
– Manages permission to proceed with specific
operations.
These are the seven tenets of security
as described in the NIST-IR 7628 Guidelines.
The OMG process is more about establishing markets
as opposed to just setting standards.
SFA Reference
Builds
Certification of
Conformance &
Interoperability
The OMG is planning to standardize
the Security Fabric
for all critical infrastructure.
SFA Participants Introductions
Systems Engineering, Integration, and Test
• President – Energy One Solutions
• Secretary General – GO15
Very Large Power Grid Operators
• President and CEO
Alstom ESCA Corporation
• CTO – PJM Interconnection
• Co-founder Viridity EnergyAlain Steven
John Reynolds
Alain Steven
Rick Schaal
Mike Sisto
Jim Baller
Bob Lamont
Paul Carroll
Mike Sisto
• IBM’s Wireless Emerging Business Opportunities
• AT&T, Lucent Technologies and Hewlett-Packard
• Lemko Distributed Mobile Wireless Network solutions
Rick Schaal
• VP, Engineering – Viridity
• Executive Program Director –
Alstom ESCA
• Program Director – AREVA
• DMS Lead – Puget Sound Energy
• American Public Power Association
• Fiber to the Home Council
• Google Inc.
• National Association of Telecommunications
Officers and Advisors
• + several hundred specific broadband projects
Internet2
Christian Todorov
Texas A&M University
Named second in the nation by The Wall Street Journal among all universities,
public and private, in a survey of top U.S. corporations, non-profits and government agencies,
based on graduates that recruiters prefer to hire.
“Home of the 12th Man”
Walt Magnussen
Real-Time Innovations
AEGIS Weapons System
Total Ship Computing Environment
NASA Robotic Controls Unmanned Aircraft Systems
Tom O’Conner
Mark Hamilton
Indra
Michael Peck
Eloy Gonzalez Ortega
GridSense
Transformer IQ
Line IQ
Inspection
Brett Sargent • System Capacity
• Phase Imbalance
• Metering / Theft
• Conservation Voltage
Reduction
• Four Quadrant True
Power Factor
• Line Fault Directionality
• PQ – voltage sags/swells,
interruptions, surges,
unbalance
• Transformer Asset
Management
Lemko
LTE over Satellite
Cellular on Wheels
Utility Industry
WiMax Replacement
Security Industry
Transportation Industry
Mike Sisto
Public Safety
Healthcare industry
Subnet Solutions
SEL Substation Controller
Message Management from Substations
Ameen Hamdon
CSGi
Jarrid Hall
Eddie Day
Over 8 trillion revenue event records processed annually for major clients.
InterMediate
Electric Power Group
Direction of Grid Stress
Voltage Stability Monitoring
Vikram Budhraja
Vivek Bhaman
BaseN
Anders Viden
BearingPoint Infonova
 Concept-to-Cash
Andrew Thomson
The Orchestration of the Ecosystem.
BT America
Milton Keynes
Tom Wolf
Bryan Fite
Milsoft
Engineering Analysis
Geographic Information
Field Engineering
Outage Management
Wayne Carr
TOA
Neil Ringers
Mike Carpenter
Kevin Cantoli
TeMix
Ed Cazalet
Transactive Energy
Netronome
DJ Root
Jerome Taylor
256 GB
Green Hills Software
Smart Farming
Smart Medical Systems
GE Aircraft Engines
EMC High End Storage Systems
Transportation Systems
Phase Array Radar Systems
Weapons Control Systems
Guidance Systems
Game Systems
Automotive Systems
John Warther
John Killam
Brad Jackson
Brian Riley
LocalGrid Technologies
Power Quality Analyzer
Microgrid controls:
• Microgrid and Generation Control
• Generation and Asset Monitoring
• Storage Integration
Device EnvironmentController Environment
Hypervisor
Application
Management
Agent
Hypervisor
Application
Management
Agent
David Berg
CryoKey
Chris Ho
Identity ManagementMutual Authentication
Authorization
Secure Crossing
Randy Reeves
Robert Lorente
N-Dimension
Andrew Wright
Bruce Gordon
Secure Exchange Technology
SETI
Richard Marshall
Elysa Jones
Threat data collaboration.
Community Emergency Management.
National footprint today!
Threat Connect
Leigh Reichel
1300 Communities of Interest already in production!
Cornice Engineering
Gary McNaughton
HereNow
Brian Reynolds
Utilities Telecommunications Council
Eric Wagner
Brett Kilbourne
• Advocacy and Training
• License Sentry
• Frequency Coordination
• Microwave Coordination
• PLC Database
• RF Safety and Training
• Regulatory Filing and Tracking
General Electric
Substation Simplification
Transformer Protection System
Energy Management System
Wide Area Monitoring
System Integrity Solution
Joe Salvo
National Rural Telecommunications
Cooperative
Kurt Schaubach
National Rural Electrical Cooperative
Association
Martin Lowery
Robbin Christianson
David Pinney
Maurice Martin
Barry Lawson
Bridgette Bourge
Bob Lamouth
Doug Lambert
Paul Carrol
Craig Miller

Weitere ähnliche Inhalte

Was ist angesagt?

Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTIoT613
 
2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom PresentationEric Gallant
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTautomatskicorporation
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryChristian Glover Wilson
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentDr. Amarjeet Singh
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Mobile containers - The good, the bad and the ugly
Mobile containers - The good, the bad and the uglyMobile containers - The good, the bad and the ugly
Mobile containers - The good, the bad and the uglyPriyanka Aash
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1EnergySec
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1Clay Melugin
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 

Was ist angesagt? (19)

Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Mobile containers - The good, the bad and the ugly
Mobile containers - The good, the bad and the uglyMobile containers - The good, the bad and the ugly
Mobile containers - The good, the bad and the ugly
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
 
The Industrial Internet of Things and RTI
The Industrial Internet of Things and RTIThe Industrial Internet of Things and RTI
The Industrial Internet of Things and RTI
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 

Andere mochten auch

SmartAmerica / Global City Teams Challenge
SmartAmerica / Global City Teams ChallengeSmartAmerica / Global City Teams Challenge
SmartAmerica / Global City Teams ChallengeInternet of Things DC
 
Smart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart GridSmart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart GridCharles "Chuck" Speicher Jr.
 
The Agile Fractal Grid orchestrated by a platform of platforms
The Agile Fractal Grid  orchestrated by a platform of platformsThe Agile Fractal Grid  orchestrated by a platform of platforms
The Agile Fractal Grid orchestrated by a platform of platformsCharles "Chuck" Speicher Jr.
 
BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John WestrikBK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrikjornvorn
 
Urban complexity's role in a practical emergent urbanism
Urban complexity's role in a practical emergent urbanismUrban complexity's role in a practical emergent urbanism
Urban complexity's role in a practical emergent urbanismMathieu Hélie
 
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han MeyerBK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyerjornvorn
 
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien BrandesBK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandesjornvorn
 
Global City Teams Challenge Overview
Global City Teams Challenge OverviewGlobal City Teams Challenge Overview
Global City Teams Challenge OverviewInternet of Things DC
 
BK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien BrandesBK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien Brandesjornvorn
 

Andere mochten auch (13)

SmartAmerica / Global City Teams Challenge
SmartAmerica / Global City Teams ChallengeSmartAmerica / Global City Teams Challenge
SmartAmerica / Global City Teams Challenge
 
Smart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart GridSmart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart Grid
 
The Agile Fractal Grid orchestrated by a platform of platforms
The Agile Fractal Grid  orchestrated by a platform of platformsThe Agile Fractal Grid  orchestrated by a platform of platforms
The Agile Fractal Grid orchestrated by a platform of platforms
 
Agile fractal grid 7-11-14
Agile fractal grid   7-11-14Agile fractal grid   7-11-14
Agile fractal grid 7-11-14
 
BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John WestrikBK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
 
New Urbanism: Just... performs...better
New Urbanism: Just... performs...betterNew Urbanism: Just... performs...better
New Urbanism: Just... performs...better
 
Urban complexity's role in a practical emergent urbanism
Urban complexity's role in a practical emergent urbanismUrban complexity's role in a practical emergent urbanism
Urban complexity's role in a practical emergent urbanism
 
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han MeyerBK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
 
Platforms Transitions
Platforms TransitionsPlatforms Transitions
Platforms Transitions
 
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien BrandesBK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
 
Global City Teams Challenge Overview
Global City Teams Challenge OverviewGlobal City Teams Challenge Overview
Global City Teams Challenge Overview
 
BK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien BrandesBK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien Brandes
 
Urban Design Definition
Urban Design DefinitionUrban Design Definition
Urban Design Definition
 

Ähnlich wie 2-25-2014 Part 1 - NRECA Kickoff Meeting v2

Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingCharles "Chuck" Speicher Jr.
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingChuck Speicher
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryAbner Germanow
 
Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"Charles "Chuck" Speicher Jr.
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranGSTF
 
Power Grid Identity Management addressed with NIST 1-800
Power Grid Identity Management addressed with NIST 1-800Power Grid Identity Management addressed with NIST 1-800
Power Grid Identity Management addressed with NIST 1-800David Sweigert
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...元 黄
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...Dale Butler
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada securityYulia Rotar
 
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPSecurity of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPEnergySec
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityLeonardo ENERGY
 

Ähnlich wie 2-25-2014 Part 1 - NRECA Kickoff Meeting v2 (20)

Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Blueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of ThingsBlueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of Things
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
T063500000200201 ppte
T063500000200201 ppteT063500000200201 ppte
T063500000200201 ppte
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 
Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"
 
Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton Ravindran
 
Power Grid Identity Management addressed with NIST 1-800
Power Grid Identity Management addressed with NIST 1-800Power Grid Identity Management addressed with NIST 1-800
Power Grid Identity Management addressed with NIST 1-800
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Power Grid Cybersecurity
Power Grid CybersecurityPower Grid Cybersecurity
Power Grid Cybersecurity
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPSecurity of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
 
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide CybersecurityCybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity
 

2-25-2014 Part 1 - NRECA Kickoff Meeting v2

  • 1. NRECA The Agile Fractal Grid “The Gathering of Eagles” Tuesday, February 25, 2014 Arlington, VA
  • 3. Agenda for NRECA Agile Fractal Grid Kickoff Meeting 8:00 Welcome by Martin Lowery; Opening by Chuck Speicher 8:15 Introductions of the Participants – John Reynolds 8:45 Achieving the Common Language through Design Patterns 9:20 The Vision of the Agile Fractal Grid – Craig Miller 9:45 Break 10:00 Discussion of the Managed Services Store and Applications 10:20 Discussion of the Distributed Systems Elements 11:45 Discussion of the Industrial Internet – Security, Resiliency, Efficiency 12:15 Lunch 1:00 Scope of the SmartAmerica Challenge vs. the Production Rollout 2:00 SEIT Process and Phase 1 Planning 2:30 Break 3:00 Phase 2 Implementation and Thread Assignments 3:30 General Discussion, Issues, Action Items, and Understandings 4:00 Wrap Up and Conclusion
  • 5. Background on the National Rural Electric Cooperative Association
  • 6. Convening of the Security Fabric Alliance Chuck Speicher
  • 7. Announcement of House SFA Rules John Reynolds
  • 8. It has been said that the greatest engineering achievement of the 20th century has been the building of the electric grid. - The National Academy of Engineering
  • 10. Department of Energy Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems Ivanpah World's largest solar plant started producing electricity today Ivanpah was supported by $1.6 billion in investments from the Energy Department's Loan Programs Office. It represents the future of energy – utility-scale renewable power generation that uses the latest technology to harness the sun where it is most abundant.
  • 12. Office of the Secretary of Defense Rollie Wicks
  • 13. Department of Homeland Security Lisa Kaiser Sarah Mahmood Executive Order (EO) 13636: Improving Critical Infrastructure Cybersecurity Presidential Policy Directive (PPD)-21: Critical Infrastructure Security and Resilience, Critical Infrastructure Cyber Community Voluntary Program Secretary of Homeland Security Jeh Johnson
  • 14. PM – ISE DNI Pamela Wise-Martinez Mike Howell Kshemendra Paul Mission Partners
  • 15. Congress Diane Rinaldo Legislative Director For Mike RogersMike Rogers – Michigan 8th District U.S. House of Representatives Chairman, House Intelligence Committee Member, Energy and Commerce Committee United States House Energy Subcommittee on Communications and Technology United States House Energy Subcommittee on Health Cyberthreat Data Sharing and Protection
  • 18. We are planning to support the 940 rural co-ops in the U.S. with hybrid cloud/device services protected by the Security Fabric. This is also the candidate energy “testbed” for the SmartAmerica demonstration.
  • 19. What NRECA has asked us to do. 1. Stand up an “app store” for both operational and analytical applications for the cooperatives. 2. Participate in the “Substation of the Future” for the remote equipment and subsystems. 3. Apply the Security Fabric within the emerging Industrial Internet to protect all communications between the elements.
  • 20. Introduction to the Security Fabric Alliance • The Security Fabric Alliance is a working association dedicated to practical deployment of the power grid and critical infrastructure complex system solution in the United States: – Utilities and telecommunications providers – Systems integrators – Manufacturers – Technology partners – National certification and interoperability entity • The alliance is intended to give the CEO of a utility the purview of up-to-the moment knowledge of the options available to make wise investment decisions regarding infrastructure deployment for optimal returns. The variation includes the proper orientation for large, medium, and small utilities.
  • 21. There are many participants at different levels in the Security Fabric Alliance. ComponentsProductsSubsystems ResearchIntegration Utility Customers • Intel – servers with Quark + TPM • Wind River – Security Connect • Middleware • RTI – DDS • GridStat • Indra - iSpeed • MultiSpeak • TeamF1 – Secure Communications • Secure Crossing – Protocol Whitelisting • PsiNaptic – Secure Service Distribution • SNMP Research – SNMP Agent • Freescale – HSM w/Vybrid SoC • Xilinx – CompactRIO SOC • Green Hills Software - INTEGRITY • Altera - tamper proofing • Microsoft – Active Directory • Red Hat – Auth Hub • General Electric – EMS • Alstom Grid – EMS • Siemens – DMS • Viridity Energy – DR + DER + Microgrid • Lemko – LTE systems • Intel Security – SIEM + GTI • Intel – Encanto + silicon support • Sypris – Supply Chain Root of Trust • TCIPG • EPRI – CIM Standards • MIT – Security & Privacy Standards • EPG – Phasor Data Portfolio • GridSense– NAN & Line Sensors • S&C IntelliTeam • SafeNet – Secure Key Management • Heart - Transverter • Freescale One Box • Cisco Cloud-in-a-Box • Integrated Architectures – SEIT • MACE Fusion - DoD • Kryptos Logic – Red Team Certification • M2M Dynamics • Drummond Group – C&IT • Intel Security - Distribution ...First Stage…… • ERCOT • ONCOR • AEP • NRECA • NRTC Suppliers • Verizon • Level3 • AT&T • Internet2 • BT • ViaSat • Hughes • ARINC • Stratus • Symmetricom …Second Stage…… • APPA • SDG&E • PJM • NYISO • Southern Company • Duke Energy • CAISO • Pecan Street • Mueller Community • Pike Powers • PNNL – CyberSecurity Test Center • Lincoln Labs • OMG SIG • SmartAmerica Managed Services • Tazca – Connect • CSG International • Digi International • N-Dimension • SETI • Lockheed Martin • SAIC • Threat Connect
  • 22. To establish the security of end-to-end systems using the Security Fabric elements, you need to do all seven… not just some. 4. Audit – Records noteworthy events for later analysis 5. Confidentiality – Encrypts sensitive data for matters of privacy. 6. Integrity – Ensures that messages have not been altered. 7. Availability – Prevents denial of service attacks 1. Identity Management – Ensures the device identity is established genuinely 2. Mutual Authentication – Allows both the Device Node and the Controller to verify the trustworthiness their identity to each other. 3. Authorization – Manages permission to proceed with specific operations. These are the seven tenets of security as described in the NIST-IR 7628 Guidelines.
  • 23. The OMG process is more about establishing markets as opposed to just setting standards. SFA Reference Builds Certification of Conformance & Interoperability The OMG is planning to standardize the Security Fabric for all critical infrastructure.
  • 25. Systems Engineering, Integration, and Test • President – Energy One Solutions • Secretary General – GO15 Very Large Power Grid Operators • President and CEO Alstom ESCA Corporation • CTO – PJM Interconnection • Co-founder Viridity EnergyAlain Steven John Reynolds Alain Steven Rick Schaal Mike Sisto Jim Baller Bob Lamont Paul Carroll Mike Sisto • IBM’s Wireless Emerging Business Opportunities • AT&T, Lucent Technologies and Hewlett-Packard • Lemko Distributed Mobile Wireless Network solutions Rick Schaal • VP, Engineering – Viridity • Executive Program Director – Alstom ESCA • Program Director – AREVA • DMS Lead – Puget Sound Energy • American Public Power Association • Fiber to the Home Council • Google Inc. • National Association of Telecommunications Officers and Advisors • + several hundred specific broadband projects
  • 27. Texas A&M University Named second in the nation by The Wall Street Journal among all universities, public and private, in a survey of top U.S. corporations, non-profits and government agencies, based on graduates that recruiters prefer to hire. “Home of the 12th Man” Walt Magnussen
  • 28. Real-Time Innovations AEGIS Weapons System Total Ship Computing Environment NASA Robotic Controls Unmanned Aircraft Systems Tom O’Conner Mark Hamilton
  • 30. GridSense Transformer IQ Line IQ Inspection Brett Sargent • System Capacity • Phase Imbalance • Metering / Theft • Conservation Voltage Reduction • Four Quadrant True Power Factor • Line Fault Directionality • PQ – voltage sags/swells, interruptions, surges, unbalance • Transformer Asset Management
  • 31. Lemko LTE over Satellite Cellular on Wheels Utility Industry WiMax Replacement Security Industry Transportation Industry Mike Sisto Public Safety Healthcare industry
  • 32. Subnet Solutions SEL Substation Controller Message Management from Substations Ameen Hamdon
  • 33. CSGi Jarrid Hall Eddie Day Over 8 trillion revenue event records processed annually for major clients. InterMediate
  • 34. Electric Power Group Direction of Grid Stress Voltage Stability Monitoring Vikram Budhraja Vivek Bhaman
  • 36. BearingPoint Infonova  Concept-to-Cash Andrew Thomson The Orchestration of the Ecosystem.
  • 37. BT America Milton Keynes Tom Wolf Bryan Fite
  • 38. Milsoft Engineering Analysis Geographic Information Field Engineering Outage Management Wayne Carr
  • 42. Green Hills Software Smart Farming Smart Medical Systems GE Aircraft Engines EMC High End Storage Systems Transportation Systems Phase Array Radar Systems Weapons Control Systems Guidance Systems Game Systems Automotive Systems John Warther John Killam Brad Jackson Brian Riley
  • 43. LocalGrid Technologies Power Quality Analyzer Microgrid controls: • Microgrid and Generation Control • Generation and Asset Monitoring • Storage Integration Device EnvironmentController Environment Hypervisor Application Management Agent Hypervisor Application Management Agent David Berg
  • 44. CryoKey Chris Ho Identity ManagementMutual Authentication Authorization
  • 47. Secure Exchange Technology SETI Richard Marshall Elysa Jones Threat data collaboration. Community Emergency Management. National footprint today!
  • 48. Threat Connect Leigh Reichel 1300 Communities of Interest already in production!
  • 51. Utilities Telecommunications Council Eric Wagner Brett Kilbourne • Advocacy and Training • License Sentry • Frequency Coordination • Microwave Coordination • PLC Database • RF Safety and Training • Regulatory Filing and Tracking
  • 52. General Electric Substation Simplification Transformer Protection System Energy Management System Wide Area Monitoring System Integrity Solution Joe Salvo
  • 54. National Rural Electrical Cooperative Association Martin Lowery Robbin Christianson David Pinney Maurice Martin Barry Lawson Bridgette Bourge Bob Lamouth Doug Lambert Paul Carrol Craig Miller