SlideShare a Scribd company logo
1 of 42
Download to read offline
© 2015 IBM Corporation
IBM Analytics – Continuous Engineering
Managing Risk:
Safety and Security
Compliance
Irv Badr
Industry Architect
IBM Continuous Engineering, IoT
ibadr@us.ibm.com
 Energy and Utility Sector Security Trends, Drivers and Impacts
 IBM Approach and Benefits
 Defining Safety Compliance
 Nature of Safety (and security) standards
 Design Compliance and its automation?
 Client Success Stories
Agenda
Engineering
Manufacturing
Operations
Requirements
Market
Needs
Social
Sentiment
Testing and
Compliance
Device
Telematic
s Data
Learn
Predictive Analytics
Design
Models
Engineering Maintenance and Operations
Continuous
Engineering
Regulatory
Reporting
Warranty &
Repair Data
Continuous Engineering and Predictive Analytics close the product
development loop
Energy and utility organizations are at the forefront of
attacks
Utilities are among the most targeted verticals
• Organized cyber-crime, hacktivists, nation-
states and exploit researchers
New vulnerabilities are being discovered
• Security testing through injecting invalid,
unexpected or random data (fuzzing) have
uncovered dozens of vulnerabilities in critical
infrastructure systems
• Exploits can be implemented through physical
access to networks or through techniques like
brute-force password hacking Internet
connected devices and phishing
Regulations provide guidance but do not protect
against these recent exploits
• NERC CIP focus on IP communications,
overlooking the real vulnerabilities that are
present
• NIST CSF is process-based and voluntary
• ENISA Smart Grid Security Recommendations
• ENISA Protecting Industrial Control Systems
Grow the business
• Customer relationships
• Advanced metering and smart grid
optimization and efficiency
Protect the business
• Customer data (usage data, credit
records, etc.)
• Intellectual property
• Internal/IT operations
Comply with compliance and regulations
• NERC CIP
• NIST CSF
• ENISA
Secure the grid
• Protect control systems and SCADA in
generation, transmission and distribution
• OT security
• Defend AMI/smart meter networks and
devices
Current trends are heightening the focus on utility security
Compliance
Management
Security Risk
Management
Secure Infrastructure
People Technology Information Process
The integration of physical
security and cyber security
is critical
Energy and utilities attacks – impact scenarios
Reliability impacts
a potential brown/black out of a
large geographical area/or
concentrated at an area where other
critical infrastructures depend on
power, water treatment plants,
transportation centers, etc.
Safety impacts
potential harms to utility personnel
and/or customers - re-energize systems
where maintenance crews are deployed
or exploding transformers with
hazardous waste
Reputation impacts
exposure of sensitive customer data (e.g.,
usage info, govt. ID information, credit
card details, etc.) – extraction of such
data, including union employee healthcare
information
Productivity impacts
Risks to utilities capacity, delivery
and overall ability to provide a
consistent product/service to their
customer base
CYBER ATTACKS
The balance of risk for energy and utility organizations is unique
A view of a transformed security environment
Current Environment Transformed Environment
Security Model based on
Defense in Depth
Security Model based on
Rapid Detection + Rapid Response
Security Operations
Steady State and Reactive
Security Operations
Elastic and Agile
Governance, Risk & Compliance
IT and Compliance Focused
Governance, Risk & Compliance
Enterprise Risk Management
Functional Domains
IT, OT, Telecom, Physical Silos
Functional Domains
Converged
Security Analysis
Manual and Fragmented
Security Analysis
Analytics and Intelligence
Reduce risks through greater visibility
Security
Intelligence is
BIG DATA
Develop greater visibility via security intelligence
and big data analytics
Client requirements:
A Threat and Risk Assessment review was conducted for a Danish energy company’s
new Smart Grid DMS (Distribution Management System)/SCADA design and architecture.
The purpose of the assessment was to identify and understand the transformational
DMS architecture risks through a “Threat Based” architectural review.
Solution:
The engagement included review and assessment through interviews, observations,
documentation reviews, industry best practices and a cross-business threat analysis and
change workshop.
Key Deliverables included: Threat Matrix Heat Map, DMS Threat and Impact Assessment,
DMS Design Considerations, DMS Security Roadmap
• Identified gaps
in architectural
design from un-
anticipated
threats
• Road map allow
prioritizing of
quick wins and
security
investment by risk
Benefits:
Country: Denmark
Security area: SCADA Threat and Risk Assessment review
• Greater
understanding
of risk exposure
across business
units from cyber
threats
DONG Energy identifies and understands risks in its smart grid
DMS/SCADA design and architecture with a threat review
What the analysts are saying about IBM
Gartner
Global Managed Security Services
Providers (MSSPs)
Strengths:
 IBM uses self-developed technology for data
collection, correlation, log query and reporting, and
ticketing/workflow.
 IBM has four North American SOCs, two in Europe,
two in Asia/Pacific, and two in other regions.
 IBM's advanced analytics and targeted attack
detection capabilities are embedded in its MSS and
hosted SIEM offerings, and are supported by IBM and
third-party technology deployed by customers.
 Gartner customers often include IBM in competitive
MSS evaluations, and IBM has high visibility in North
American, Asia/Pacific, and European markets.
 IBM's MSS capabilities include support for a
customer-deployed SIEM (from IBM and others) that
is integrated into its standard MSS offerings.
 IBM is a large, stable provider of security services
and products with global delivery capabilities.
The Bottom Line:
Enterprises with global service delivery requirements,
and those with strategic relationships with IBM, should
consider IBM for MSSs.
2014 Gartner Magic Quadrant
for SIEM: LINK
IBM Security QRadar SIEM is #1 on “Ability to
Execute” (the Y-axis) AND on “Completeness of
vision” (the X-axis)
IBM Internal and BP Use Only
What the analysts are saying about IBM
IBM Security QRadar is in the SIEM
Leadership Quadrant for Sixth Straight Year
 Ability to execute is an assessment of overall
viability, product service, customer
experience, market responsiveness, product
track record, sales execution, operations, and
marketing execution.
 Completeness of Vision is a rating of product
strategy, innovation, market understanding,
geographic strategy, and other factors
 IBM Press Release: LINK
Download the
Cyber Security
Intelligence
Index for
Energy and
Utilities
Read the
white paper:
Responding to—
and recovering
from—
sophisticated
security attacks
Read the
white paper:
How Mature is your
cyber-security risk
management?
Download the
white paper:
Best practices for
cyber security in
the electric power
sector
Learn more – select publications
CONTINUOUS ENGINEERING
Managing Security and Safety through
Source: Schneider Electric
Safety is accounted for during System Development
65% of incidents involving process control systems occur during the specification,
design, installation and commissioning phases of the product implementation.
15
Challenges We Face in the Power Industry (e.g. Nuclear)
 Radioactive Waste
 The impact on water resources,
aquatic habitats, and wildlife
Key drivers for Nuclear Energy Regulatory and Compliance Projects
Ensuring
Compliance
Environment
alSafety and
Security
 Protect confidentiality,
integrity, privacy, and
assurance of utility systems
 Protect the public in the
event of a serious reactor
accident.
 Assure a regulatory
environment for the continued
safe and efficient operation of
nuclear plants.
 Provides the governance,
oversight, and support to
assure corporate and site
regulatory and emergency
preparedness activities meet
corporate needs and
regulatory requirements.
Environmental
Impact
1. Requirements grow and change at rates in excess of 1 percent per
calendar month.
2. Few applications include greater than 80 percent of user requirements in
the first release.
3. Some requirements are dangerous or “toxic” and should not be included.
4. Some applications are overstuffed with extraneous features no one asked
for.
5. Most software applications are riddled with security vulnerabilities.
6. Errors in requirements and design cause many high-severity bugs.
7. Effective methods such as requirement and design inspections are
seldom used.
8. Standard, reusable requirements and designs are not widely available.
9. Mining legacy applications for “lost” business requirements seldom occurs.
10. The volume of paper documents may be too large for human
understanding.
10 of the top issues with requirements
Packaged applications create certain issues
Software Engineering Best Practices: Lessons from Successful Projects in the Top Companies by Capers Jones
17
Most enterprises have an inadequate compliance platform
Compliance
Documents
Costly manual effort to aggregate and analyze
for Completeness and Redundancy
Spreadsheets and word
processors
Document Management
Systems
Inadequate
tools
•Insufficient access controls
•Does not support distributed teams
•Cannot analyze the content of the
documents
•Information is not linked and offers no
traceability
18
Information Traceability - “Chaos to Order”
structured,
linked and
traced at
statement
level,
are
imported,
to produce
reports of
managed
information
Non-
integrated
project data
Autonomous
Word/Excel
Documents
with related
& dependent
Information
between them
Requirements have multiple dimensions
Functional
Safety
Procedural
Technical
Specs
Requirements
Management
Pumps,
Valves,
Hardware
Level-1,
Level-2,
….
Security,
Cooling,
….
I&C,
Software,
….
Business
Contractual
Traceability
Impact
Dependency
Detailed Requirements cover more than just software
Requirements Areas
20
Impact Analysis: studied before changes are made
10 CFR Part 72 – related to
Nuclear Cyber Security
NEI is the industry trade
group that interpreted and
proposed a response to the
CFR
Determined by technical
SMEs in each utility.
Varies from site to site
Determined by technical
SMEs in each utility.
Varies from site to site
21
Asset inventory showing which system(s) use the assets (“where used)
A given asset can “touch” multiple
critical systems.
A critical “system” is typically
composed of multiple Critical Digital
Assets (CDAs)
22
Cause and Mitigation – Reactor Auxiliary Feedwater Inspection Guide
US Department of Energy (DOE) - Yucca Mountain Repository
Requirements in ~20 areas managed with DOORS
Emergency Mgt.
Safety and Heath
Safeguards & Security
The program used Rational’s DOORS product to develop an extensive requirements
database to track and manage an extremely broad range of program and regulatory
requirements ranging from US CFRs to Contract Requirements.
Customer example
Auto-generation of safety-relevant report
Fault Source Matrix, Fault Detection Matrix, Fault-Requirement Matrix, Hazard Analysis…
• Traceability improves the
ability to enforce safety
• Safety metadata guides
downstream engineering work
25
Epic B
Story 1
Story 2
Story 3
Dev Actions in support of a
Business Requirements and
IEC 61508 standard and
guideline
The prioritized set of Epics
supporting Business
requirements that need to
be addressed and/or not
scheduled for
The set of Epics which are
scheduled for the a
different major release.
Specific Stories and Tasks to
implement the Planned Epics.
Developing Control System
For example: Intelligent Electric Devices (IED)
Incoming Business
Dev Actions
Project/product
Milestone & Backlog
Release Milestone
and Backlog/Plan
Dev Action Epic A
Dev Action
Story 4
Epic C
Top-level
safety
function
Component/Iteration
Plan
Story 5
Epic D
#technical
Agile Project PlanningRequirements
RM tool Imports IEC 61508 requirement guidelines
26
Link each requirement guideline to techniques/measure that we
should follow
Traceability from requirements to Software requirements
implementation state
27
Linking from each requirement guideline to the techniques/measures and
System Integrity level (SILs)
28
Linking from each requirement guideline from IEC 61508-2 to the
techniques/measures and System Integrity level (SILs) in part 7
29
30
Text based approaches introduce risk into the project
Method Requirements Completeness Requirements Defects per
Function Point
Dynamic Modeling 97% 0.10
Quality Functional Deployment 96% 0.25
Requirements Inspections 95% 0.10
Use Cases 80% 0.80
Energy Legacy Applications 70% 0.20
Prototyping 62% 0.55
Information Requirements
Gathering
57% 1.00
Normal Text Documents 50% 1.10
Requirements Methods (Capers 2010)
31
*Forrester Research Inc, October 23, 2012. Forrester Research, The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester
Research, Inc. The Forrester Wave™ is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments.
Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are
subject to change.
IBM Rational Recognized As A Leader in ALM
Report Highlights
• Highest Scores among all vendors for
Current Offering & Strategy“
• “Not only has IBM continued
development of its strong suite of
products, but it has also stitched them
together in a more coherent way.”
• [IBM] has also made clearer the use
cases it supports ... such as Agile teams
and embedded software development"
The Forrester WaveTM: Application Life-cycle Management*
Link to report
DESIGN COMPLIANCE
Creating Architectural (e.g. SOA) Safety View in
UML/SysML
• UML can be extended to
model metadata beyond its
standard usage, for example
• UML Profile for
Schedulability
Performance and Time
(SPT)
• Model Analysis of Real-
Time Systems (MARTE)
• Systems Modeling
Language (SysML)
• UML Profile for DoDAF
and
MoDAF (UPDM)
• A safety critical profile can be
developed that provides
• FTA diagrams
• FMEA and fault views
• Hazard analysis table
view
Safety-Critical Profile in UML
Model-Based Safety Analysis
Link to requirements
Link to manifestors
Link to extenuators Link to detectors
36
Design Standard: CIM - application and data integration and analysis
• IEC CIM v13 – Combined 61968 and 61970 models
• IEC CIM Model Transformation Plug-in (Harvested from AEP)
• EPRI Intelligrid Use Cases (Partial)
Innovation for a smarter planet
IBM Solutions for Systems and Software
Engineering (SSE)
QUALITY MANAGEMENT
Achieve “quality by design” with an
integrated, automated testing process
Rational Quality Manager
ARCHITECTURE & DESIGN
Use modeling to validate requirements, architecture
and design throughout the development process
Rational Rhapsody
REQUIREMENTS MANAGEMENT
Manage all system requirements
with full traceability across the lifecycle
Rational DOORS
COLLABORATION, PLANNING & CHANGE MANAGEMENT
Collaborate across diverse engineering disciplines and development teams
Rational Team Concert
Open Services for Lifecycle Collaboration
38
Deployment for Development: Dong Energy
CIM
Control
CIM
Monitoring
T&D
System
Dong E
Applications
Control
System
Monitoring
System
IBM
Modeling
Solutions
Websphere
Servers
Rational
Development
Solutions
•WebSphere
Application Server
•WebSphere
Message Broker
•RAD
•ILOG JRules
Continuous Engineering Reference
SE for
Dummies
Book
− https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-
CERT_Monitor_%20Jan-April2014.pdf
− http://www.reuters.com/article/2014/05/21/us-usa-cybercrime-infrastructure-
idUSBREA4J10D20140521
− http://leblog.gdfsuez-dolcevita.fr/2014/03/13/alerte-securite-attention-au-
phishing/
− https://threatpost.com/shodan-search-engine-project-enumerates-internet-
facing-critical-infrastructure-devices-010913/77385
− http://www.shodanhq.com
− http://scadastrangelove.org
− http://www.digitalbond.com/tools/basecamp/
− http://blogs.computerworld.com/cybercrime-and-hacking/23402/hackers-
exploit-scada-holes-take-full-control-critical-infrastructure
Additional References
Questions?
© 2012 IBM Corporation
Building a smarter planet
© Copyright IBM Corporation 2011. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of
any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to,
nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing
the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release
dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment
to future product or feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the
International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
www.ibm.com/software

More Related Content

What's hot

It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for JavaTim Ellison
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsVisionet Systems, Inc.
 
20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information Technology20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information TechnologyKathirvel Ayyaswamy
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...360 BSI
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1securityAnne Starr
 
Educause+V4
Educause+V4Educause+V4
Educause+V4ecarrow
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample ReportRandy James
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devicessunnay
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsArun Prabhakar
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTScsandit
 

What's hot (20)

It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 
Securing the Supply Chain
Securing the Supply ChainSecuring the Supply Chain
Securing the Supply Chain
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information Technology20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information Technology
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
 
Cybertopic_1security
Cybertopic_1securityCybertopic_1security
Cybertopic_1security
 
Educause+V4
Educause+V4Educause+V4
Educause+V4
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification Solutions
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
 

Viewers also liked

IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM Security
 
Benjamin Loop: Simulation Environment for Power Management and Distribution D...
Benjamin Loop: Simulation Environment for Power Management and Distribution D...Benjamin Loop: Simulation Environment for Power Management and Distribution D...
Benjamin Loop: Simulation Environment for Power Management and Distribution D...EnergyTech2015
 
John Ostrich: Space Weather Policy
John Ostrich: Space Weather Policy John Ostrich: Space Weather Policy
John Ostrich: Space Weather Policy EnergyTech2015
 
Tues.1040 am states role in protecting electric grids from emp and gmd with a...
Tues.1040 am states role in protecting electric grids from emp and gmd with a...Tues.1040 am states role in protecting electric grids from emp and gmd with a...
Tues.1040 am states role in protecting electric grids from emp and gmd with a...EnergyTech2015
 
William Good: Extra Small Modular Reactors
William Good: Extra Small Modular ReactorsWilliam Good: Extra Small Modular Reactors
William Good: Extra Small Modular ReactorsEnergyTech2015
 
Gareth Digby: Systems-Based Approach to Cyber Investigations
Gareth Digby: Systems-Based Approach to Cyber Investigations Gareth Digby: Systems-Based Approach to Cyber Investigations
Gareth Digby: Systems-Based Approach to Cyber Investigations EnergyTech2015
 
Andrew Ritch: Interruption in the Utility Industry
Andrew Ritch: Interruption in the Utility IndustryAndrew Ritch: Interruption in the Utility Industry
Andrew Ritch: Interruption in the Utility IndustryEnergyTech2015
 
Tues pm banquet featuring Jenita McGowan
Tues pm banquet featuring Jenita McGowanTues pm banquet featuring Jenita McGowan
Tues pm banquet featuring Jenita McGowanEnergyTech2015
 
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field EnergyTech2015
 
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...EnergyTech2015
 
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility EnergyTech2015
 
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...EnergyTech2015
 
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...EnergyTech2015
 
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...EnergyTech2015
 
금뽀 금융보안 컴플라이언스 학습 가이드(최종)
금뽀 금융보안 컴플라이언스 학습 가이드(최종)금뽀 금융보안 컴플라이언스 학습 가이드(최종)
금뽀 금융보안 컴플라이언스 학습 가이드(최종)Lee Chanwoo
 
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...EnergyTech2015
 
Halderman ch035 lecture
Halderman ch035 lectureHalderman ch035 lecture
Halderman ch035 lecturemcfalltj
 

Viewers also liked (17)

IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
 
Benjamin Loop: Simulation Environment for Power Management and Distribution D...
Benjamin Loop: Simulation Environment for Power Management and Distribution D...Benjamin Loop: Simulation Environment for Power Management and Distribution D...
Benjamin Loop: Simulation Environment for Power Management and Distribution D...
 
John Ostrich: Space Weather Policy
John Ostrich: Space Weather Policy John Ostrich: Space Weather Policy
John Ostrich: Space Weather Policy
 
Tues.1040 am states role in protecting electric grids from emp and gmd with a...
Tues.1040 am states role in protecting electric grids from emp and gmd with a...Tues.1040 am states role in protecting electric grids from emp and gmd with a...
Tues.1040 am states role in protecting electric grids from emp and gmd with a...
 
William Good: Extra Small Modular Reactors
William Good: Extra Small Modular ReactorsWilliam Good: Extra Small Modular Reactors
William Good: Extra Small Modular Reactors
 
Gareth Digby: Systems-Based Approach to Cyber Investigations
Gareth Digby: Systems-Based Approach to Cyber Investigations Gareth Digby: Systems-Based Approach to Cyber Investigations
Gareth Digby: Systems-Based Approach to Cyber Investigations
 
Andrew Ritch: Interruption in the Utility Industry
Andrew Ritch: Interruption in the Utility IndustryAndrew Ritch: Interruption in the Utility Industry
Andrew Ritch: Interruption in the Utility Industry
 
Tues pm banquet featuring Jenita McGowan
Tues pm banquet featuring Jenita McGowanTues pm banquet featuring Jenita McGowan
Tues pm banquet featuring Jenita McGowan
 
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field
Josh Long: Minimum Cyber Security Requirements for a 20 MW Photo Voltaic Field
 
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...
Anurandha Annaswamy: Computation Model of the Nexus Between Natural Gas and E...
 
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
 
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...
Bradley Glenn: Holomorphic Embedding Load Flow Method (helmtm) Algorithm Deve...
 
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...
David Sadey, Operation and Control of a Three-Phase Megawatt Class Variable F...
 
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
 
금뽀 금융보안 컴플라이언스 학습 가이드(최종)
금뽀 금융보안 컴플라이언스 학습 가이드(최종)금뽀 금융보안 컴플라이언스 학습 가이드(최종)
금뽀 금융보안 컴플라이언스 학습 가이드(최종)
 
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...
Flora Flygt: Clean Power Plan Impact on Transmisssion Planning, Development a...
 
Halderman ch035 lecture
Halderman ch035 lectureHalderman ch035 lecture
Halderman ch035 lecture
 

Similar to Irv Badr: Managing Risk Safety and Security Compliance

1973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_151973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_15shed59
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteSurfWatch Labs
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Walls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityWalls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityAbdul Jaleel
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Draup3
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Arushi00
 
Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013Andy Bochman
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsSchneider Electric
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsSolarWinds
 
Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Dave Darnell
 

Similar to Irv Badr: Managing Risk Safety and Security Compliance (20)

1973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_151973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_15
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Walls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityWalls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application Security
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
Cyber risks in supply chains
Cyber risks in supply chains Cyber risks in supply chains
Cyber risks in supply chains
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16
 

More from EnergyTech2015

Tues PM banquet keynote featuring Virginia A Greiman
Tues PM banquet keynote featuring Virginia A GreimanTues PM banquet keynote featuring Virginia A Greiman
Tues PM banquet keynote featuring Virginia A GreimanEnergyTech2015
 
Loyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd bakerLoyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd bakerEnergyTech2015
 
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...EnergyTech2015
 
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...EnergyTech2015
 
Brian Patterson: Reinventing Building Power
Brian Patterson: Reinventing Building PowerBrian Patterson: Reinventing Building Power
Brian Patterson: Reinventing Building PowerEnergyTech2015
 
Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT EnergyTech2015
 
Bob Garrett: Network of Networks Analysis
Bob Garrett: Network of Networks AnalysisBob Garrett: Network of Networks Analysis
Bob Garrett: Network of Networks AnalysisEnergyTech2015
 
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...EnergyTech2015
 
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC Grids
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC GridsNeil Kirby: VSC HVDC Transmission and Emerging Technologies in DC Grids
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC GridsEnergyTech2015
 
Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...
 Anne McNelis: Intelligent Power Controller Development for Human Deep Space ... Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...
Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...EnergyTech2015
 
John Nairus: Hybrid-Electric Propulsion
John Nairus: Hybrid-Electric Propulsion John Nairus: Hybrid-Electric Propulsion
John Nairus: Hybrid-Electric Propulsion EnergyTech2015
 
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion EnergyTech2015
 
EnergyTech2015 Program Guide
EnergyTech2015 Program GuideEnergyTech2015 Program Guide
EnergyTech2015 Program GuideEnergyTech2015
 

More from EnergyTech2015 (13)

Tues PM banquet keynote featuring Virginia A Greiman
Tues PM banquet keynote featuring Virginia A GreimanTues PM banquet keynote featuring Virginia A Greiman
Tues PM banquet keynote featuring Virginia A Greiman
 
Loyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd bakerLoyd Baker: MBSE - connecting the dots process with loyd baker
Loyd Baker: MBSE - connecting the dots process with loyd baker
 
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
 
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...
Mark Walker: Model Based Systems Engineering Initial Stages for Power & E...
 
Brian Patterson: Reinventing Building Power
Brian Patterson: Reinventing Building PowerBrian Patterson: Reinventing Building Power
Brian Patterson: Reinventing Building Power
 
Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT Matthew Hause: The Smart Grid and MBSE Driven IoT
Matthew Hause: The Smart Grid and MBSE Driven IoT
 
Bob Garrett: Network of Networks Analysis
Bob Garrett: Network of Networks AnalysisBob Garrett: Network of Networks Analysis
Bob Garrett: Network of Networks Analysis
 
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...
David Long Keynote on Beyond MBSE Looking Towards the Next Evolution in Syste...
 
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC Grids
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC GridsNeil Kirby: VSC HVDC Transmission and Emerging Technologies in DC Grids
Neil Kirby: VSC HVDC Transmission and Emerging Technologies in DC Grids
 
Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...
 Anne McNelis: Intelligent Power Controller Development for Human Deep Space ... Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...
Anne McNelis: Intelligent Power Controller Development for Human Deep Space ...
 
John Nairus: Hybrid-Electric Propulsion
John Nairus: Hybrid-Electric Propulsion John Nairus: Hybrid-Electric Propulsion
John Nairus: Hybrid-Electric Propulsion
 
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion
Neil Garrigan: Electric Drive Technology Considerations for Aircraft Propulsion
 
EnergyTech2015 Program Guide
EnergyTech2015 Program GuideEnergyTech2015 Program Guide
EnergyTech2015 Program Guide
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Irv Badr: Managing Risk Safety and Security Compliance

  • 1. © 2015 IBM Corporation IBM Analytics – Continuous Engineering Managing Risk: Safety and Security Compliance Irv Badr Industry Architect IBM Continuous Engineering, IoT ibadr@us.ibm.com
  • 2.  Energy and Utility Sector Security Trends, Drivers and Impacts  IBM Approach and Benefits  Defining Safety Compliance  Nature of Safety (and security) standards  Design Compliance and its automation?  Client Success Stories Agenda
  • 3. Engineering Manufacturing Operations Requirements Market Needs Social Sentiment Testing and Compliance Device Telematic s Data Learn Predictive Analytics Design Models Engineering Maintenance and Operations Continuous Engineering Regulatory Reporting Warranty & Repair Data Continuous Engineering and Predictive Analytics close the product development loop
  • 4. Energy and utility organizations are at the forefront of attacks Utilities are among the most targeted verticals • Organized cyber-crime, hacktivists, nation- states and exploit researchers New vulnerabilities are being discovered • Security testing through injecting invalid, unexpected or random data (fuzzing) have uncovered dozens of vulnerabilities in critical infrastructure systems • Exploits can be implemented through physical access to networks or through techniques like brute-force password hacking Internet connected devices and phishing Regulations provide guidance but do not protect against these recent exploits • NERC CIP focus on IP communications, overlooking the real vulnerabilities that are present • NIST CSF is process-based and voluntary • ENISA Smart Grid Security Recommendations • ENISA Protecting Industrial Control Systems
  • 5. Grow the business • Customer relationships • Advanced metering and smart grid optimization and efficiency Protect the business • Customer data (usage data, credit records, etc.) • Intellectual property • Internal/IT operations Comply with compliance and regulations • NERC CIP • NIST CSF • ENISA Secure the grid • Protect control systems and SCADA in generation, transmission and distribution • OT security • Defend AMI/smart meter networks and devices Current trends are heightening the focus on utility security Compliance Management Security Risk Management Secure Infrastructure People Technology Information Process The integration of physical security and cyber security is critical
  • 6. Energy and utilities attacks – impact scenarios Reliability impacts a potential brown/black out of a large geographical area/or concentrated at an area where other critical infrastructures depend on power, water treatment plants, transportation centers, etc. Safety impacts potential harms to utility personnel and/or customers - re-energize systems where maintenance crews are deployed or exploding transformers with hazardous waste Reputation impacts exposure of sensitive customer data (e.g., usage info, govt. ID information, credit card details, etc.) – extraction of such data, including union employee healthcare information Productivity impacts Risks to utilities capacity, delivery and overall ability to provide a consistent product/service to their customer base CYBER ATTACKS The balance of risk for energy and utility organizations is unique
  • 7. A view of a transformed security environment Current Environment Transformed Environment Security Model based on Defense in Depth Security Model based on Rapid Detection + Rapid Response Security Operations Steady State and Reactive Security Operations Elastic and Agile Governance, Risk & Compliance IT and Compliance Focused Governance, Risk & Compliance Enterprise Risk Management Functional Domains IT, OT, Telecom, Physical Silos Functional Domains Converged Security Analysis Manual and Fragmented Security Analysis Analytics and Intelligence
  • 8. Reduce risks through greater visibility Security Intelligence is BIG DATA Develop greater visibility via security intelligence and big data analytics
  • 9. Client requirements: A Threat and Risk Assessment review was conducted for a Danish energy company’s new Smart Grid DMS (Distribution Management System)/SCADA design and architecture. The purpose of the assessment was to identify and understand the transformational DMS architecture risks through a “Threat Based” architectural review. Solution: The engagement included review and assessment through interviews, observations, documentation reviews, industry best practices and a cross-business threat analysis and change workshop. Key Deliverables included: Threat Matrix Heat Map, DMS Threat and Impact Assessment, DMS Design Considerations, DMS Security Roadmap • Identified gaps in architectural design from un- anticipated threats • Road map allow prioritizing of quick wins and security investment by risk Benefits: Country: Denmark Security area: SCADA Threat and Risk Assessment review • Greater understanding of risk exposure across business units from cyber threats DONG Energy identifies and understands risks in its smart grid DMS/SCADA design and architecture with a threat review
  • 10. What the analysts are saying about IBM Gartner Global Managed Security Services Providers (MSSPs) Strengths:  IBM uses self-developed technology for data collection, correlation, log query and reporting, and ticketing/workflow.  IBM has four North American SOCs, two in Europe, two in Asia/Pacific, and two in other regions.  IBM's advanced analytics and targeted attack detection capabilities are embedded in its MSS and hosted SIEM offerings, and are supported by IBM and third-party technology deployed by customers.  Gartner customers often include IBM in competitive MSS evaluations, and IBM has high visibility in North American, Asia/Pacific, and European markets.  IBM's MSS capabilities include support for a customer-deployed SIEM (from IBM and others) that is integrated into its standard MSS offerings.  IBM is a large, stable provider of security services and products with global delivery capabilities. The Bottom Line: Enterprises with global service delivery requirements, and those with strategic relationships with IBM, should consider IBM for MSSs.
  • 11. 2014 Gartner Magic Quadrant for SIEM: LINK IBM Security QRadar SIEM is #1 on “Ability to Execute” (the Y-axis) AND on “Completeness of vision” (the X-axis) IBM Internal and BP Use Only What the analysts are saying about IBM IBM Security QRadar is in the SIEM Leadership Quadrant for Sixth Straight Year  Ability to execute is an assessment of overall viability, product service, customer experience, market responsiveness, product track record, sales execution, operations, and marketing execution.  Completeness of Vision is a rating of product strategy, innovation, market understanding, geographic strategy, and other factors  IBM Press Release: LINK
  • 12. Download the Cyber Security Intelligence Index for Energy and Utilities Read the white paper: Responding to— and recovering from— sophisticated security attacks Read the white paper: How Mature is your cyber-security risk management? Download the white paper: Best practices for cyber security in the electric power sector Learn more – select publications
  • 14. Source: Schneider Electric Safety is accounted for during System Development 65% of incidents involving process control systems occur during the specification, design, installation and commissioning phases of the product implementation.
  • 15. 15 Challenges We Face in the Power Industry (e.g. Nuclear)  Radioactive Waste  The impact on water resources, aquatic habitats, and wildlife Key drivers for Nuclear Energy Regulatory and Compliance Projects Ensuring Compliance Environment alSafety and Security  Protect confidentiality, integrity, privacy, and assurance of utility systems  Protect the public in the event of a serious reactor accident.  Assure a regulatory environment for the continued safe and efficient operation of nuclear plants.  Provides the governance, oversight, and support to assure corporate and site regulatory and emergency preparedness activities meet corporate needs and regulatory requirements. Environmental Impact
  • 16. 1. Requirements grow and change at rates in excess of 1 percent per calendar month. 2. Few applications include greater than 80 percent of user requirements in the first release. 3. Some requirements are dangerous or “toxic” and should not be included. 4. Some applications are overstuffed with extraneous features no one asked for. 5. Most software applications are riddled with security vulnerabilities. 6. Errors in requirements and design cause many high-severity bugs. 7. Effective methods such as requirement and design inspections are seldom used. 8. Standard, reusable requirements and designs are not widely available. 9. Mining legacy applications for “lost” business requirements seldom occurs. 10. The volume of paper documents may be too large for human understanding. 10 of the top issues with requirements Packaged applications create certain issues Software Engineering Best Practices: Lessons from Successful Projects in the Top Companies by Capers Jones
  • 17. 17 Most enterprises have an inadequate compliance platform Compliance Documents Costly manual effort to aggregate and analyze for Completeness and Redundancy Spreadsheets and word processors Document Management Systems Inadequate tools •Insufficient access controls •Does not support distributed teams •Cannot analyze the content of the documents •Information is not linked and offers no traceability
  • 18. 18 Information Traceability - “Chaos to Order” structured, linked and traced at statement level, are imported, to produce reports of managed information Non- integrated project data Autonomous Word/Excel Documents with related & dependent Information between them
  • 19. Requirements have multiple dimensions Functional Safety Procedural Technical Specs Requirements Management Pumps, Valves, Hardware Level-1, Level-2, …. Security, Cooling, …. I&C, Software, …. Business Contractual Traceability Impact Dependency Detailed Requirements cover more than just software Requirements Areas
  • 20. 20 Impact Analysis: studied before changes are made 10 CFR Part 72 – related to Nuclear Cyber Security NEI is the industry trade group that interpreted and proposed a response to the CFR Determined by technical SMEs in each utility. Varies from site to site Determined by technical SMEs in each utility. Varies from site to site
  • 21. 21 Asset inventory showing which system(s) use the assets (“where used) A given asset can “touch” multiple critical systems. A critical “system” is typically composed of multiple Critical Digital Assets (CDAs)
  • 22. 22 Cause and Mitigation – Reactor Auxiliary Feedwater Inspection Guide
  • 23. US Department of Energy (DOE) - Yucca Mountain Repository Requirements in ~20 areas managed with DOORS Emergency Mgt. Safety and Heath Safeguards & Security The program used Rational’s DOORS product to develop an extensive requirements database to track and manage an extremely broad range of program and regulatory requirements ranging from US CFRs to Contract Requirements. Customer example
  • 24. Auto-generation of safety-relevant report Fault Source Matrix, Fault Detection Matrix, Fault-Requirement Matrix, Hazard Analysis… • Traceability improves the ability to enforce safety • Safety metadata guides downstream engineering work
  • 25. 25 Epic B Story 1 Story 2 Story 3 Dev Actions in support of a Business Requirements and IEC 61508 standard and guideline The prioritized set of Epics supporting Business requirements that need to be addressed and/or not scheduled for The set of Epics which are scheduled for the a different major release. Specific Stories and Tasks to implement the Planned Epics. Developing Control System For example: Intelligent Electric Devices (IED) Incoming Business Dev Actions Project/product Milestone & Backlog Release Milestone and Backlog/Plan Dev Action Epic A Dev Action Story 4 Epic C Top-level safety function Component/Iteration Plan Story 5 Epic D #technical Agile Project PlanningRequirements
  • 26. RM tool Imports IEC 61508 requirement guidelines 26 Link each requirement guideline to techniques/measure that we should follow
  • 27. Traceability from requirements to Software requirements implementation state 27
  • 28. Linking from each requirement guideline to the techniques/measures and System Integrity level (SILs) 28
  • 29. Linking from each requirement guideline from IEC 61508-2 to the techniques/measures and System Integrity level (SILs) in part 7 29
  • 30. 30 Text based approaches introduce risk into the project Method Requirements Completeness Requirements Defects per Function Point Dynamic Modeling 97% 0.10 Quality Functional Deployment 96% 0.25 Requirements Inspections 95% 0.10 Use Cases 80% 0.80 Energy Legacy Applications 70% 0.20 Prototyping 62% 0.55 Information Requirements Gathering 57% 1.00 Normal Text Documents 50% 1.10 Requirements Methods (Capers 2010)
  • 31. 31 *Forrester Research Inc, October 23, 2012. Forrester Research, The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc. The Forrester Wave™ is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. IBM Rational Recognized As A Leader in ALM Report Highlights • Highest Scores among all vendors for Current Offering & Strategy“ • “Not only has IBM continued development of its strong suite of products, but it has also stitched them together in a more coherent way.” • [IBM] has also made clearer the use cases it supports ... such as Agile teams and embedded software development" The Forrester WaveTM: Application Life-cycle Management* Link to report
  • 33. Creating Architectural (e.g. SOA) Safety View in UML/SysML
  • 34. • UML can be extended to model metadata beyond its standard usage, for example • UML Profile for Schedulability Performance and Time (SPT) • Model Analysis of Real- Time Systems (MARTE) • Systems Modeling Language (SysML) • UML Profile for DoDAF and MoDAF (UPDM) • A safety critical profile can be developed that provides • FTA diagrams • FMEA and fault views • Hazard analysis table view Safety-Critical Profile in UML
  • 35. Model-Based Safety Analysis Link to requirements Link to manifestors Link to extenuators Link to detectors
  • 36. 36 Design Standard: CIM - application and data integration and analysis • IEC CIM v13 – Combined 61968 and 61970 models • IEC CIM Model Transformation Plug-in (Harvested from AEP) • EPRI Intelligrid Use Cases (Partial) Innovation for a smarter planet
  • 37. IBM Solutions for Systems and Software Engineering (SSE) QUALITY MANAGEMENT Achieve “quality by design” with an integrated, automated testing process Rational Quality Manager ARCHITECTURE & DESIGN Use modeling to validate requirements, architecture and design throughout the development process Rational Rhapsody REQUIREMENTS MANAGEMENT Manage all system requirements with full traceability across the lifecycle Rational DOORS COLLABORATION, PLANNING & CHANGE MANAGEMENT Collaborate across diverse engineering disciplines and development teams Rational Team Concert Open Services for Lifecycle Collaboration
  • 38. 38 Deployment for Development: Dong Energy CIM Control CIM Monitoring T&D System Dong E Applications Control System Monitoring System IBM Modeling Solutions Websphere Servers Rational Development Solutions •WebSphere Application Server •WebSphere Message Broker •RAD •ILOG JRules
  • 40. − https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS- CERT_Monitor_%20Jan-April2014.pdf − http://www.reuters.com/article/2014/05/21/us-usa-cybercrime-infrastructure- idUSBREA4J10D20140521 − http://leblog.gdfsuez-dolcevita.fr/2014/03/13/alerte-securite-attention-au- phishing/ − https://threatpost.com/shodan-search-engine-project-enumerates-internet- facing-critical-infrastructure-devices-010913/77385 − http://www.shodanhq.com − http://scadastrangelove.org − http://www.digitalbond.com/tools/basecamp/ − http://blogs.computerworld.com/cybercrime-and-hacking/23402/hackers- exploit-scada-holes-take-full-control-critical-infrastructure Additional References
  • 42. © 2012 IBM Corporation Building a smarter planet © Copyright IBM Corporation 2011. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. www.ibm.com/software