SlideShare a Scribd company logo
1 of 16
w ebcast Series Volume 3 Smart Grid  (IT) Systems Security Andy Bochman Editor : The Smart Grid Security Blog July 2010
Jack   Andy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security meets Energy
[object Object],[object Object],[object Object],[object Object],[object Object],New format rules
[object Object],[object Object],[object Object],[object Object],Overview
The systems in question
What’s in an IT system? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The future is here: cloud/utility computing ,[object Object],[object Object],[object Object],[object Object],[object Object]
More new stuff: virtualization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],"I think the worst thing is that people pretend there aren't any differences [between virtual and physical] and they move right ahead and don't have any discussions at all"  Neil MacDonald, Gartner VP, 2Q2010 http://www.scmagazineus.com/gartner-virtualization-security-will-take-time/article/165932/
Best IT systems security practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://images.travelpod.com/users/cobra1899/pauls_journey.1201056060.mainframe-digital-computer.jpg
Best IT systems security practices ,[object Object],[object Object],[object Object],[object Object],[object Object],http://geniushackers.com/blog/wp-content/uploads/2009/03/client-server.png
Best IT systems security practices ,[object Object],[object Object],[object Object],[object Object],http://www.thomaslaupstad.com/bilder/red_sunset800.jpg
Best IT systems security practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://farm1.static.flickr.com/31/54067048_e407035935.jpg
For official guidance on securing IT systems ,[object Object],[object Object],[object Object],[object Object],http:// www.flickr.com/photos/kevcole /
That’s a wrap http://www.flickr.com/photos/ajturner/3362409021/   Systems security 101 = risk management
Where we’ve been and what’s next ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks ! … and keep an eye open for SGSB Webcast 4 on  Smart Grid standards & compliance  in August The Smart Grid Security Blog smartgridsecurity.blogspot.com [email_address] Twitter.com/sgsblog

More Related Content

What's hot

information security technology
information security technologyinformation security technology
information security technology
garimasagar
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
Gyan Research And Analytics
 
Data Driven Security in SSAS
Data Driven Security in SSASData Driven Security in SSAS
Data Driven Security in SSAS
Mike Duffy
 

What's hot (18)

Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
 
Cybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework Cimetrics
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...
 
Im 111 lecture 1
Im 111   lecture 1Im 111   lecture 1
Im 111 lecture 1
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
 
information security technology
information security technologyinformation security technology
information security technology
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
Data Driven Security in SSAS
Data Driven Security in SSASData Driven Security in SSAS
Data Driven Security in SSAS
 

Viewers also liked

Brady & morris engg. co. ltd. marketing report
Brady &  morris  engg. co. ltd.  marketing reportBrady &  morris  engg. co. ltd.  marketing report
Brady & morris engg. co. ltd. marketing report
patelhardikbabubhai
 
Article Detail 4 - Domestic Preparedness
Article Detail 4 - Domestic PreparednessArticle Detail 4 - Domestic Preparedness
Article Detail 4 - Domestic Preparedness
Diana Hopkins
 
LINKEDIN Magnatech Saves Energy Presentation 2016
LINKEDIN Magnatech Saves Energy Presentation 2016LINKEDIN Magnatech Saves Energy Presentation 2016
LINKEDIN Magnatech Saves Energy Presentation 2016
Lindsay Franklin
 
Tateiju España Guía del Inmigrante 6to numero
Tateiju España Guía del Inmigrante 6to numero Tateiju España Guía del Inmigrante 6to numero
Tateiju España Guía del Inmigrante 6to numero
Gabriel B. Venegas
 
How to lead when you're not the boss
How to lead when you're not the bossHow to lead when you're not the boss
How to lead when you're not the boss
Daniel Remondegui
 
20081117 HAK Marienanstalt Global Entrepreneurship Week
20081117 HAK Marienanstalt Global Entrepreneurship Week20081117 HAK Marienanstalt Global Entrepreneurship Week
20081117 HAK Marienanstalt Global Entrepreneurship Week
Webdesign Studio7
 

Viewers also liked (20)

J ripoll clase filmin-elisava-CINE
J ripoll clase filmin-elisava-CINEJ ripoll clase filmin-elisava-CINE
J ripoll clase filmin-elisava-CINE
 
Nordic Cleantech Strongholds - Santtu Hulkkonen - Cleantech Finland - April 2010
Nordic Cleantech Strongholds - Santtu Hulkkonen - Cleantech Finland - April 2010Nordic Cleantech Strongholds - Santtu Hulkkonen - Cleantech Finland - April 2010
Nordic Cleantech Strongholds - Santtu Hulkkonen - Cleantech Finland - April 2010
 
zAgile for OpenStack Summit - v2-3.ppt
zAgile for OpenStack Summit - v2-3.pptzAgile for OpenStack Summit - v2-3.ppt
zAgile for OpenStack Summit - v2-3.ppt
 
Roman Rehak: 24/7 Database Administration + Database Mail Unleashed
Roman Rehak: 24/7 Database Administration + Database Mail UnleashedRoman Rehak: 24/7 Database Administration + Database Mail Unleashed
Roman Rehak: 24/7 Database Administration + Database Mail Unleashed
 
Brady & morris engg. co. ltd. marketing report
Brady &  morris  engg. co. ltd.  marketing reportBrady &  morris  engg. co. ltd.  marketing report
Brady & morris engg. co. ltd. marketing report
 
Clase 2: El Periodismo Desde La Aparición De Internet
Clase 2: El Periodismo Desde La Aparición De InternetClase 2: El Periodismo Desde La Aparición De Internet
Clase 2: El Periodismo Desde La Aparición De Internet
 
Article Detail 4 - Domestic Preparedness
Article Detail 4 - Domestic PreparednessArticle Detail 4 - Domestic Preparedness
Article Detail 4 - Domestic Preparedness
 
Delta Galil Under Cover
Delta  Galil  Under  CoverDelta  Galil  Under  Cover
Delta Galil Under Cover
 
LINKEDIN Magnatech Saves Energy Presentation 2016
LINKEDIN Magnatech Saves Energy Presentation 2016LINKEDIN Magnatech Saves Energy Presentation 2016
LINKEDIN Magnatech Saves Energy Presentation 2016
 
Tateiju España Guía del Inmigrante 6to numero
Tateiju España Guía del Inmigrante 6to numero Tateiju España Guía del Inmigrante 6to numero
Tateiju España Guía del Inmigrante 6to numero
 
How to lead when you're not the boss
How to lead when you're not the bossHow to lead when you're not the boss
How to lead when you're not the boss
 
A improvisación teatral
A improvisación teatralA improvisación teatral
A improvisación teatral
 
ProVari manual
ProVari manualProVari manual
ProVari manual
 
20081117 HAK Marienanstalt Global Entrepreneurship Week
20081117 HAK Marienanstalt Global Entrepreneurship Week20081117 HAK Marienanstalt Global Entrepreneurship Week
20081117 HAK Marienanstalt Global Entrepreneurship Week
 
Iniciativa de código fiscal del distrito federal
Iniciativa de código fiscal del distrito federalIniciativa de código fiscal del distrito federal
Iniciativa de código fiscal del distrito federal
 
MaRaViLLaS DeL MuNdO
MaRaViLLaS DeL MuNdOMaRaViLLaS DeL MuNdO
MaRaViLLaS DeL MuNdO
 
PKI-In-A-Box
PKI-In-A-BoxPKI-In-A-Box
PKI-In-A-Box
 
Taller "Creación y edición de música con dispositivos móviles" SIMO Educación...
Taller "Creación y edición de música con dispositivos móviles" SIMO Educación...Taller "Creación y edición de música con dispositivos móviles" SIMO Educación...
Taller "Creación y edición de música con dispositivos móviles" SIMO Educación...
 
Centro Niemeyer: programación enero / febrero / marzo 2015
Centro Niemeyer: programación enero / febrero / marzo 2015Centro Niemeyer: programación enero / febrero / marzo 2015
Centro Niemeyer: programación enero / febrero / marzo 2015
 
Himba
Himba Himba
Himba
 

Similar to SGSB Webcast 3: Smart Grid IT Systems Security

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
Patty Buckley
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
Madison Oliver
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
Matthew Moldvan
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
Fahd Khan
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 

Similar to SGSB Webcast 3: Smart Grid IT Systems Security (20)

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart building
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security Update
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
Trusted computing: an overview
Trusted computing: an overviewTrusted computing: an overview
Trusted computing: an overview
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

SGSB Webcast 3: Smart Grid IT Systems Security

  • 1. w ebcast Series Volume 3 Smart Grid (IT) Systems Security Andy Bochman Editor : The Smart Grid Security Blog July 2010
  • 2.
  • 3.
  • 4.
  • 5. The systems in question
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. That’s a wrap http://www.flickr.com/photos/ajturner/3362409021/ Systems security 101 = risk management
  • 15.
  • 16. Thanks ! … and keep an eye open for SGSB Webcast 4 on Smart Grid standards & compliance in August The Smart Grid Security Blog smartgridsecurity.blogspot.com [email_address] Twitter.com/sgsblog

Editor's Notes

  1. Starts with current grid Smart Meters and Advanced Metering Infrastructure (AMI) are just the beginning More C words: connected, complex, computerized More R words: responsive, resilient, reliable Bi-directional comms and power Enabler of industry scale wind, solar and V2G, not to mention new business models Solution to DOD’s “brittle grid” challenge