SlideShare ist ein Scribd-Unternehmen logo
1 von 27
MICHAEL W. MEISSNER, RCDD
CYBER SECURITY SERVICES
CYBER SECURITY PROGRAM AND PROJECT MANAGEMENT
CYBER SECURITY SOLUTIONS ARCHITECTURE
CYBER SECURITY DESIGN ENGINEERING
MICHAEL MEISSNER
SUMMARY
• MR. MEISSNER IS A HIGHLY MOTIVATE CYBER SECURITY PROGRAM MANAGER AND CYBER SECURITY
ENGINEER AND HAS OVER THIRTY YEARS OF EXPERIENCE AS A MANAGING PROGRAMS AND
PROJECTS.
• MICHAEL W. MEISSNER LEADS ETHERNAUTICS, INC.'S CYBER SECURITY PRACTICE. MR. MEISSNER HAS
OVER 30 YEARS OF IT, ENGINEERING AND MANAGEMENT EXPERIENCE. THROUGHOUT HIS CAREER HE
HAS PROVIDED EXCEPTIONAL CLIENT SERVICE AND COMMUNICATION SKILLS WITH A
DEMONSTRATED ABILITY TO DEVELOP AND MAINTAIN OUTSTANDING CLIENT RELATIONSHIPS.
• HIGHLY ORGANIZED, RESULTS-ORIENTED AND ATTENTIVE TO DETAILS. SELF-MOTIVATED,
PROACTIVE, INDEPENDENT AND RESPONSIVE. REQUIRES LITTLE SUPERVISORY ATTENTION.
EXCELLENT PRESENTATION, FACILITATION AND DIPLOMACY SKILLS
• MEISSNER HAS EXECUTED END TO END PROGRAM MANAGEMENT AND PROJECT MANAGEMENT OF
LARGE AND/OR MULTIPLE LARGE PROJECTS. MR. MEISSNER HAS MANAGED PROJECTS FROM A FEW
INDIVIDUALS TO TEAMS OF OVER 100 INDIVIDUALS AND VENDORS.
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
2
MICHAEL MEISSNER
SUMMARY
• MR. MEISSNER DESIGNS AND IMPLEMENTS ALL FACETS OF CYBER SECURITY PROJECTS, PROGRAMMATIC AND TECHNICAL
DETAIL MANAGEMENT TO ENSURE DELIVERABLES ARE MET WITHIN SCHEDULE, BUDGET, AND QUALITY GOALS. HE IS ABLE
TO EXPRESS A CLEAR UNDERSTANDING OF THE BUSINESS, OPERATIONAL AND HUMAN IMPACT OF TECHNOLOGY AND THE
CYBER SECURITY THREATS THEY EXPOSE.
• MR. MEISSNER HAS MANY YEARS OF EXPERIENCE WORKING IN A COMPLEX, MULTI TASKING TYPE ENVIRONMENTS.
• DEMONSTRATED TRACK RECORD ASSISTING CLIENTS WITH IDENTIFYING AND ASSESSING INFORMATION SYSTEM RELATED
RISKS AND DEFINING BEST PRACTICES AS A TRUSTED ADVISER.
• HANDS-ON EXPERIENCE WITH INFORMATION SECURITY STANDARDS AND TECHNOLOGY
• EXPERIENCE WITH SECURITY STRATEGIES AND/OR SECURITY ARCHITECTURE.
• EXPERTISE IN IT POLICY AND PROCEDURE DEVELOPMENT.
• MEISSNER HAS EXECUTED PROJECTS THRU THEIR COMPLETE LIFE-CYCLES (SDLC)
• IT PROCESSES (I.E., ITIL) INCLUDING INCIDENT, PROBLEM, DEFECT, CHANGE AND RELEASE MANAGEMENT.
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
3
MICHAEL MEISSNER
SECURITY DOMAINS
• EXPERIENCE WITH THE FOLLOWING SECURITY DOMAINS:
• AUDIT AND MONITORING,
• RISK RESPONSE & RECOVERY
• CRYPTOGRAPHY
• DATA COMMUNICATIONS
• COMPUTER OPERATIONS SECURITY
• TELECOMMUNICATIONS & NETWORK SECURITY
• SECURITY ARCHITECTURE & MODELS
• MEISSNER MAINTAINS EXPERIENCE IN SEVERAL INDUSTRY VERTICALS
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
4
WORK HISTORY
08/2007 - Present Ethernautics, Inc. California Water Services
Areva
Computer Sciences Corporation
Telcordia
Global Telcom Limited (GTL)
US Cellular
Urenco/LES
ETUS
STP – South Texas Project
Verizon Wireless
JoAnn’s Stores
01/2007 – 08/2007 NetCracker,
Technologies
US Army
Time Warner
One Communications
Covad
Telus
Nextel/Sprint
Verizon Business
Horry Telephone Cooperative
Comcast
11/1993 – 01/2007 Information
Mechanics, Inc.
Comcast (TCI)
AT&T Broadband
MetroList
Mobeo
GTE
AT&T Wireless
Bell South
Continental Cable
Lafarge Concrete
Denver Post
US Park Service
Across Media Networks
Telcordia (Belcore) – SAIC
TECO/Peoples Gas
Cable Services Group (CSG)
AMDOCS
Cable Data
Kenan
AT&T Broadband
MediaOne
USWest/Qwest
Ticketmaster/Pacer Cats, AMC, United Artist
02/1992 – 11/1993 Berger & Co Region Transportation District (RTD)
Lipper Analytical
Aspen Ski Corp
Obeymeyer Sports
USWest
Jones Cable
Xcel Energy
Frontier Communications
Optimus Technologies
Ticketmaster/Pacer Cats
Trinidad Benham
Territory Agent IBM – Oil & Gas/Mining/AEC
05/1987 – 02/1992 IBM Department of Transportation
Department of Health and Human Services
Department of Labor
Rocky Flats – Rockwell International
Public Service Company of Colorado
Kaiser Permanente
St. Anthony’s Hospital
St. Luke’s Hospital, Veterans Hospital
Colorado School of Mines
05/1987 – 10/1988 Colorado School of
Mines
Research Development
Data Center Management
06/1985 – 05/1987 Schlumberger Measurement While Drilling (MWD)
01/1988 – 06/1985 Mammoth
Information Services
Calaway Oil & Gas
Bird Oil Corporation
Amselco Minerals
Amoco
Microgeophysical Corp
Max P. Arnold & Associates
* See Project References for details: (Click Here)
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
5
GOVERNANCE
PROGRAM AND PROJECT MANAGEMENT
• CYBER SECURITY PROGRAM
LEADERSHIP AND MANAGEMENT
• CYBER SECURITY STRATEGY
• CYBER SECURITY PROJECT
MANAGEMENT
• REGULATORY COMPLIANCE
• POLICY AND PROCEDURE
DEVELOPMENT
• CHANGE MANAGEMENT -
CONFIGURATION MANAGEMENT
• TECHNICAL SPECIFICATIONS AND
BEST PRACTICE DEVELOPMENT
• INCIDENT RESPONSE DISASTER
RECOVERY
• REPORTING AND KPI’S
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
6
GOVERNANCE
PROGRAM AND PROJECT MANAGEMENT
• CUSTOMER FACING – WORKS ACROSS
ORGANIZATION
• PROJECT MANAGEMENT
• DEVELOP AND TRACK SCHEDULES
• TRACK RESOURCES
• KPI’S
• RFP PREPARATION, BID PREPARATION AND
RESPONSE
• JOB COSTING AND BUDGET TRACKING
• PROFICIENT IN DESIGN, PRESENTATION, AND
PROJECT MANAGEMENT TOOLS (MS OFFICE,
WORD, EXCEL, POWER POINT, VISIO,
PROJECT)
• PROJECT AND CONSTRUCTION
MANAGEMENT, IT ENGINEERING
MANAGEMENT, FIELD ENGINEERING AND
“CRAFT” MANAGEMENT
• LABOR/UNION RELATIONS
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –
7)
7
TECHNICAL CAPABILITIES
• LOW VOLTAGE DESIGN - REGISTERED
COMMUNICATIONS DISTRIBUTION DESIGNER
(RCDD) CERTIFICATION
• OUTSIDE PLANT DESIGN
• ELECTRONIC SAFETY AND SECURITY
SYSTEMS DESIGN (LIFE SAFETY)
• WIRELESS DESIGN (DAS, CELLULAR, ANALOG
RADIO)
• INTELLIGENT BUILDINGS, BUILDING
AUTOMATION, UTILITY MONITORING
DESIGNS
• CYBER SECURITY DESIGN – CISSP
CERTIFICATIONS
• RIGHTS OF WAY, PERMITTING, AND
AUTHORITIES HAVING JURISDICTION (AHJ)
• CUSTOMER FACING SALES AND SUPPORT –
TECHNICAL PRESENTATIONS
• PROFICIENT IN DESIGN TOOLS (ACAD, VISIO,
EXCEL)
• FIELD ENGINEERING, DESIGN VERIFICATION,
AND "AS-BUILTS"
• CYBER-PHYSICAL SYSTEMS
• CYBER SECURITY ASSESSMENT
Hello 8
TECHNICAL CAPABILITIES – CYBER SECURITY
• CYBER-PHYSICAL SYSTEMS -
ELECTRONIC SAFETY AND SECURITY
SYSTEMS DESIGN (LIFE SAFETY)
• WIRELESS DESIGN (DAS, CELLULAR,
ANALOG RADIO) - ENCRYPTION
• CYBER SECURITY DESIGN – CISSP
CERTIFICATIONS
• REGULATORY REQUIREMENTS
• BUSINESS REQUIREMENT
• CUSTOMER FACING SALES AND SUPPORT –
TECHNICAL PRESENTATIONS
• RISK ASSESSMENT
• CRITICAL DIGITAL ASSET MANAGEMENT
• CYBER SECURITY ASSESSMENT
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –
7)
9
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN SERVICES
• CYBER SECURITY ENGINEERING
• CYBER SECURITY ARCHITECTURES (PCI, NIST, ISO
ETC.)
• BUSINESS AND REGULATORY REQUIREMENTS
• SYSTEM ANALYSIS USING MULTIPLE TECHNOLOGIES
IN HETEROGENEOUS ARCHITECTURES AND WIDE
SYSTEM FUNCTIONALITY
• ELECTRONIC SAFETY AND SECURITY (ESS) -
PHYSICAL SECURITY SYSTEMS AND LIFE SAFETY
SYSTEMS
• CRITICAL DIGITAL ASSET DETERMINATION
• ANALYZES NETWORK SECURITY DESIGN
• RISK ASSESSMENT AND MANAGEMENT
• WORK WITH CLIENTS IN IDENTIFYING AND
ASSESSING INFORMATION SYSTEM RELATED
RISKS RELATED TO CYBER SECURITY.
• CREATING STRATEGIES RELATED TO CYBER
SECURITY RISK MANAGEMENT.
• PLANS AND CONDUCTS VULNERABILITY
ASSESSMENTS
• CREATED AND TUNED VULNERABILITY SCAN
GROUPS AND CONFIGURATIONS.
• IDENTIFICATION OF ATTACK VULNERABILITIES
(OWASP) AND (ISO/IEC 15408-1:2009)
• EVALUATION OF SYSTEM SECURITY
CONFIGURATIONS
• DEVELOPMENT AND EVALUATION OF ATTACK
SCENARIOS
• EVALUATES FINDINGS AND CONDUCTS ROOT CAUSE
ANALYSIS
• CONDUCT PENETRATION TESTING, ROUTINE
EXPLOIT ANALYSIS, SYSTEMS MONITORING.
• CYBER SECURITY CONTROLS CATALOG
• REMEDIATION AND MITIGATION
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT
(UTC/GMT –7)
10
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN
DIGITAL DESIGN AND SYSTEMS ENGINEERING
SERVICES
• MEISSNER HAS EXPERIENCE WITH DESIGNING THE FOLLOWING SECURITY RELATED SYSTEMS:
• NETWORK SECURITY DESIGN (LAN/WAN)
• APPLICATION SECURITY DESIGN
• DATA SECURITY
• ELECTRONIC SAFETY AND SECURITY (ESS) - PHYSICAL SECURITY SYSTEMS AND LIFE SAFETY
SYSTEMS
• SECURE WIRELESS
• RADIO ENCRYPTION
• DATA
• VOICE (PUSH-TO-TALK)
• INTEGRATES SECURITY TECHNICAL CONTROLS FOR MULTIPLE PROJECTS/PRODUCTS WITH DEFINED
REQUIREMENTS
• DESIGN TEST PLANS TO EVALUATE CONTROL OBJECTIVES AND IDENTIFY WEAKNESSES IN THE
INFORMATION TECHNOLOGY CONTROL STRUCTURE.
• SECURITY OPERATION CENTERS (SOC), NETWORK OPERATION CENTERS (NOC), DATA CENTERS,
TELECOM EQUIPMENT ROOMS,
• ENGINEERING DRAWINGS - (T-EQP, T-PHY, T-PHY)
• IDENTITY ACCESS MANAGEMENT AND AUTHORIZATION
• PLANT CONTROL SYSTEMS (PCS, ICS) AND SCADA SYSTEMS IN NUCLEAR
POWER PLANTS, CHEMICAL PROCESSING AND WATER
TREATMENT/DISTRIBUTION CRITICAL INFRASTRUCTURE
• DESIGN OVERALL DEFENSE-IN-DEPTH ARCHITECTURE FOR PLANT SYSTEMS
(NIST CYBER SECURITY FRAMEWORK AND ISO/IEC 27001 COMPLIANCE
COBIT, COSO).
• SUPPORTING INFRASTRUCTURES (TELCOM, POWER, HVAC, DATA CENTER,
CLOSETS, DAS, DISTRIBUTION SYSTEMS)
• OUTSIDE PLANT (OSP)
• SECURE STRUCTURED CABLING
• DEFINES SECURITY PRODUCT SPECIFICATIONS
• DEFINE INTRUSION/DATA LOSS TECHNIQUES.
• DESIGNS, INTEGRATES AND CONFIGURES CONTROLS.
• RESPONSIBLE FOR IMPLEMENTING AND TUNING THE TECHNICAL SOLUTION
USED TO IDENTIFY AND MANAGE THE CONFIGURATIONS AND CONTROLS
• PATCH MANAGEMENT- SATELLITE, SCCM, WSUS, SHAVLIK, SECUNIA,
LANDESK
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
11
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN
DIGITAL DESIGN AND SYSTEMS ENGINEERING
SERVICES
• MEISSNER HAS EXPERIENCE WITH DESIGNING THE FOLLOWING
SECURITY RELATED SYSTEMS:
• NETWORK SECURITY DEPLOYMENT OF NETWORK AND
APPLICATION SECURITY AND AUTHORIZATION FOR PLANT
CONTROL AND REPORTING SYSTEMS.
• FIREWALLS
• DATA DIODES
• DMZ’S
• ENCRYPTION
• IAM
• SIEMS
• IDS/IPS
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
12
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN SERVICES
• MEISSNER HAS EXPERIENCE WITH THE FOLLOWING SYSTEMS:
• PHYSICAL SECURITY SYSTEMS
• LIFE/SAFETY SYSTEMS – ESS SYSTEMS
• ASSET MANAGEMENT
• PLANT CONTROL SYSTEMS
• BUILDING AUTOMATION & UTILITY MONITORING
• DATA CENTER DESIGN
• CABLE DESIGN – STRUCTURED CABLING
• OUTSIDE PLANT - OSP
• NETWORK DESIGN
• CYBER SECURITY ENGINEERING
• AUTHORIZATION AND CONTROL
• LEED
• PROJECT MANAGEMENT
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
13
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN OPERATIONS SERVICES
• SECURITY OPERATION CENTER (SOC, ALARM STATIONS)
• CYBER SECURITY MONITORING
• NETWORK SECURITY MONITORING
• INCIDENT DETECTION
• CONTRIBUTES TO THE DEVELOPMENT AND EVALUATION OF ATTACK SCENARIOS
• EVALUATES FINDINGS AND CONDUCTS ROOT CAUSE ANALYSIS
• PERFORMS INCIDENT RESPONSE ACTIVITIES ACROSS BROAD TECHNOLOGY PROFILES OR MULTIPLE SYSTEMS
• INTERROGATES INDUSTRY SOURCES AND EVALUATES INCIDENT INDICATORS.
• COLLECTS AND PRESERVES EVIDENCE, IDENTIFIES INTRUSION OR INCIDENT PATH AND METHOD
• DETERMINES NATURE, MECHANISMS, SCOPE AND LOCATION OF THE INCIDENT.
• DRAFTS INCIDENT/INVESTIGATION REPORTS AND MAKES RECOMMENDATION FOR FUTURE PROCESS ENHANCEMENTS. PREPARES AND DELIVERS
TECHNICAL REPORTS AND BRIEFINGS
• DEPLOYMENT OF NETWORK AND APPLICATION SECURITY AND AUTHORIZATION FOR PLANT CONTROL AND REPORTING SYSTEMS.
• MONITORS NETWORK AND HOST-BASED SECURITY ALERTING SYSTEMS AND EVENT LOGS.
PERFORMS INITIAL EVENT/LOSS ASSESSMENT AND VALIDATION.
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
14
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN
IT CYBER SECURITY DETECTION AND PREVENTION
TOOLS
• NETWORK MONITORING – SOLARWINDS
• VULNERABILITY SCANNERS - NESSUS, RETINA,
QUALSYS, FOUNDSTONE, NEXPOSE
• SIEM – SPLUNK, IBM QRADAR
• IDS / IPS – SOURCEFIRE, CISCO IPS 4200,
INTRUSHIELD
• PASSWORD MANAGEMENT - THYCOTIC
• DEFENSE IN DEPTH ARCHITECTURE AND
ADVANCED PERSISTENT THREATS (APTS)
• INCIDENT MANAGEMENT AND FORENSICS -
NETWITNESS
• RSA SECURITY ANALYTICS, ARCHER, SECOPS
• PKI - PUBLIC KEY INFRASTRUCTURE
• WEBSENSE
• FIREWALLS - CISCO, PALOALTO NETWORKS,
CHECKPOINT
• DATA DIODES - CANARY, WATERFALL
• CISCO ISE
• CHECKPOINT LOAD BALANCER
• REMEDY NETWORKING
Through education and experience Mr. Meissner has amassed
skills with the following Cyber Security Tool Sets:
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT
(UTC/GMT –7)
15
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN
IT CYBER SECURITY TECHNOLOGIES
• SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
• MR. MEISSNER HAS HAD A VARIETY OF EXPERIENCES WITH THE FOLLOWING SIEM SOLUTIONS IN ORDER TO SUPPORT REAL-TIME ANALYSIS OF
SECURITY ALERTS GENERATED BY NETWORK HARDWARE AND APPLICATIONS:
• QRADAR
• SPLUNK
• MCAFEE ENTERPRISE SECURITY MANAGER
• IDS/IPS
• MR. MEISSNER HAS EXPERIENCE IN EVALUATING AND DEPLOYING SEVERAL IDS AND IPS TOOLS THAT HAVE ASSISTED ORGANIZATIONS IN THE
IDENTIFICATION AND PROTECTION OF THEIR WIRED AND WIRELESS NETWORKS AGAINST SEVERAL TYPES OF SECURITY THREATS. MR. MEISSNER
HAS EXPERIENCE WITH THE FOLLOWING IDS/IPS/SIEM SOLUTIONS:
• MCAFEE'S INTRUSHIELD/MCAFEE NETWORK SECURITY PLATFORM (NSP)
• SOURCEFIRE
• SNORT
• TIPPINGPOINT
• JUNIPER IPS
Through education and experience Mr. Meissner has
experience with the following Cyber Security Technologies:
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7)
16
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN
IT CYBER SECURITY TECHNOLOGIES
• ENDPOINT SECURITY TOOLS/ANTI-VIRUS/ANTIMALWARE
• MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING ENDPOINT SECURITY SOLUTIONS:
• MCAFEE
• SYMANTEC
• RSA ECAT
• MOBILE DEVICES MANAGEMENT (MDM)
• MR. MEISSNER HAS EFFECTIVELY DEPLOYED MDM SOFTWARE O BOLSTERS NETWORK SECURITY THROUGH REMOTE MONITORING AND CONTROL
OF SECURITY CONFIGURATIONS, POLICY ENFORCEMENT AND PATCH PUSHES TO MOBILE DEVICES. DEPLOYING SYSTEMS THAT REMOTELY LOCK
LOST, STOLEN OR COMPROMISED MOBILE DEVICES AND, IF NECESSARY, WIPE ALL STORED DATA. MR. MEISSNER HAS EXPERIENCE WITH THE
FOLLOWING MDM SOLUTIONS:
• BLACKBERRY ENTERPRISE SERVER BES10
• AIRWATCH
• IBM MAAS360 MDM
• CITRIX XENMOBILE
• SYMANTEC MOBILE MANAGEMENT
• MCAFEE EMM
• MICROSOFT ENTERPRISE MOBILITY SUITE (EMS)
• CISCO ISE
Through education and experience Mr. Meissner has
experience with the following Cyber Security Technologies:
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
17
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN
IT CYBER SECURITY TECHNOLOGIES
• NETWORK ACCESS CONTROL/IDENTITY ACCESS MANAGEMENT (IAM) TOOLS
• MR. MEISSNER HAS EVALUATED AND DEPLOY MULTIPLE IDENTITY ACCESS MANAGEMENT (IAM) SYSTEMS AT MULTIPLE ENTERPRISES TO
ESTABLISH A FRAMEWORK FOR BUSINESS PROCESSES THAT FACILITATES THE MANAGEMENT OF ELECTRONIC IDENTITIES. TO INITIATE, CAPTURE,
RECORD AND MANAGE USER IDENTITIES AND THEIR RELATED ACCESS PERMISSIONS IN AN AUTOMATED FASHION. UTILIZING IAM
TECHNOLOGIES MR. MEISSNER EFFORTS HAVE ENSURED THAT ACCESS PRIVILEGES ARE GRANTED ACCORDING TO ONE INTERPRETATION OF
POLICY AND ALL INDIVIDUALS AND SERVICES ARE PROPERLY AUTHENTICATED, AUTHORIZED AND AUDITED. MR. MEISSNER HAS EXPERIENCE
WITH THE FOLLOWING NETWORK ACCESS CONTROL/IAM SOLUTIONS:
• IBM'S SECURITY IDENTITY MANAGER
• TOOLS4EVER'S
• CENTRIFY IDENTITY SERVICE
• THYCOTIC SECRET SERVER
• CISCO ISE
• NEXT GENERATION FIREWALLS AND DATA DIODES
• MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING NEXT GENERATION FIREWALLS AND DATA DIODES:
• JUNIPER
• PALO ALTO NETWORKS (PAN)
• CANARY
• WATERFALL
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
18
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN
IT CYBER SECURITY TECHNOLOGIES
• AUTHENTICATIONS, AUTHORIZATION AND CONTROL
• MR. MEISSNER AUTHORED AUTHENTICATION, AUTHORIZATION AND CONTROL FOR EARLY INTERNET OF THINGS (IOT) IN THE EARLY 1990. UNITED STATES
PATENT: 6070001.
• COMPUTER FORENSICS
• MR. MEISSNER HAS EXPERIENCE WITH DIGITAL COMPUTER FORENSIC TOOLS USED TO PRODUCE EVIDENCE FOUND ON DIGITAL STORAGE MEDIA UTILIZING
TECHNIQUES AND PRINCIPLES TO FOR DATA RECOVERY, IN ORDER TO IDENTIFY, PRESERVE, RECOVER, ANALYZE DIGITAL INFORMATION DESIGNED TO CREATE
A LEGAL AUDIT TRAIL. MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING COMPUTER FORENSIC SOLUTION:
• ACCESSDATA
• VULNERABILITY SCANNING TOOLS:
• MR. MEISSNER HAS EVALUATED AND DEPLOY MULTIPLE VULNERABILITY SCANNING TOOLS AT MULTIPLE ENTERPRISES TO IN ORDER TO ASSESS COMPUTERS,
COMPUTER SYSTEMS, NETWORKS OR APPLICATIONS FOR WEAKNESSES. MR. MEISSNER HAS PERFORMED 1000’S OF SCANS BOTH PROTECT CRITICAL DIGITAL
ASSETS WITH THE ENTERPRISE AND TO EVALUATE ABILITY OF NON-AUTHORIZED ATTACKERS LOOKING TO GAIN UNAUTHORIZED ACCESS. MR. MEISSNER HAS
EXPERIENCE WITH THE FOLLOWING VULNERABILITY SCANNING TOOLS:
• RETINA
• NEXPOSE
• OTHERS:
• MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING ADDITIONAL TOOLS TO ASSIST THE ENTERPRISE WITH ESTABLISHING A SOUND DEFENSE IN DEPTH
ARCHITECTURE:
• WIRESHARK
• NMAP
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
19
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN
REGULATORY REQUIREMENTS AND BEST
PRACTICESName: Regulation, Pub, Doc #: Website:
PCI DSS Payment Card Industry Data Security Standard https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Secu
rity_Standard
ISO 27001:2013 Specification for an information security management system (ISMS) https://en.wikipedia.org/wiki/ISO/IEC_27001:2013
HIPAA Health Insurance Portability and Accountability Act of 1996 https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Acco
untability_Act
NIST Special Publication 800-53 Revision 4 NIST Special Publication 800-53 http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-
53r4.pdf
NIST Special Publication 800-37 Revision 1 NIST Special Publication 800-37 Revision 1 http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-
rev1-final.pdf
Managing Information Security Risk NIST Special Publication 800-39 http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf
Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security NISTIR 7628 http://www.nist.gov/smartgrid/upload/nistir-7628_total.pdf
Electric Infrastructure Protection and Substation Perimeter Security. CIP-014 https://secureusa.net/energy-sector-cip-014-compliance/
Third part (of 8) of the open international standard IEC
61131 for programmable logic controllers,
IEC 61131-3 http://en.wikipedia.org/wiki/IEC_61131-3
Role Engineering and RBAC Standards Role Based Access Control (RBAC) http://csrc.nist.gov/groups/SNS/rbac/standards.html
Security techniques -- Evaluation criteria for IT security -- Part 1:
Introduction and general model
ISO/IEC 15408-1:2009 http://www.iso.org/iso/catalogue_detail.htm?csnumber=50341
* Meissner has experience with many regulatory and best practice requirements related to Cyber Security
** Non-Exhaustive List: Requirements vary by Industry, Business Risk, and Local AHJ
*** Ethernautics, Inc. – Meissner: Cyber Security Standards, Best Practices and PRADL for Water Utilities
http://wp.me/p2xZpH-1g
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT
(UTC/GMT –7)
20
CYBER SECURITY ENGINEERING
SECURITY-BY-DESIGN
REGULATORY REQUIREMENTS AND BEST
PRACTICESName: Regulation, Pub, Doc #: Website:
ITIL General ITIL https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Secu
rity_Standard
10 CFR 73.54 “Cyber Security Rule https://en.wikipedia.org/wiki/ISO/IEC_27001:2013
Safe Guards (10 CFR 73.51) https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Acco
untability_Act
NIST Special Publication 800-53 Revision 4 http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-
53r4.pdf
Cyber Security Training and Awareness http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-
rev1-final.pdf
NIST And other security frameworks. http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf
* Non-Exhaustive List: Requirements vary by Industry, Business Risk, and
Local AHJ©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
21
DESIGN STANDARDS
• MEISSNER HAS EXPERIENCE WITH THE FOLLOWING DESIGN STANDARDS:
• ANSI/TIA/EIA STANDARDS
• ANSI/TIA/EIA-568-C: COMMERCIAL BUILDING TELECOMMUNICATIONS CABLING STANDARD
• ANSI/TIA/EIA-569-C: TELECOMMUNICATIONS PATHWAYS AND SPACES
• ANSI/TIA/EIA-606-B: CABLE LABELING STANDARDS
• ANSI/TIA/EIA-607-C: GENERIC TELECOMMUNICATIONS GROUNDING (EARTHING) AND BONDING FOR CUSTOMER PREMISES
• ANSI/TIA/EIA-942: TELECOMMUNICATIONS INFRASTRUCTURE STANDARD FOR DATA CENTERS
• TELECOMMUNICATIONS DESIGN MANUAL (TDM) - BICSI (BUILDING INDUSTRY CONSULTING SERVICE INTERNATIONAL)
• NATIONAL ELECTRIC CODE (NFPA 70) - NEC
• MASTER FORMAT
• DIVISION 27
• DIVISION 28
• ASHRAE GUIDELINES
• STANDARD 135 – BACNET - A DATA COMMUNICATION PROTOCOL FOR BUILDING AUTOMATION AND CONTROL NETWORKS
• STANDARD 189.1 – STANDARD FOR THE DESIGN OF HIGH PERFORMANCE, GREEN BUILDINGS EXCEPT LOW-RISE RESIDENTIAL BUILDINGS
• LEED – USBC US GREEN BUILDING COUNCIL
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
22
REGISTRATIONS AND CERTIFICATIONS
• REGISTERED COMMUNICATIONS DISTRIBUTION DESIGNER (RCDD)
• ELECTRONIC SAFETY AND SECURITY (ESS) – IN PROCESS
• OUTSIDE PLANT SPECIALIST (OSP) – IN PROCESS
• CERTIFIED NETWORK ASSOCIATE (CAN) – IN PROCESS
• CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) – IN
PROCESS
• PMP – PROJECT MANAGEMENT PROFESSIONAL – IN PROCESS
• LEEDS – LEADERSHIP IN ENERGY AND ENVIRONMENTAL DESIGN – IN PROCESS©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT
(UTC/GMT –7)
23
CLIENTS
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
24
REFERENCE PROJECTS
• MICHAEL W. MEISSNER WITH ETHERNAUTICS, INC. CONTRACTED TO CALIFORNIA WATER SERVICES
GROUP (CWS) FOR CYBER SECURITY PROGRAM DEVELOPMENT, SCADA NETWORK SECURITY,
VULNERABILITY MITIGATION FOR PROTECTION OF CRITICAL ASSETS IN WATER
TREATMENT/DISTRIBUTION PLANTS. (2015) (CLICK HERE)
• MICHAEL W. MEISSNER WITH ETHERNAUTICS, INC. CONTRACTED THROUGH AREVA, NP TO SOUTH
TEXAS PROJECT (STP) FOR PROGRAM IMPLEMENTATION OF 10CF73.54 PROTECTION OF CRITICAL
ASSETS IN NUCLEAR POWER PLANTS. (2012-2015) (CLICK HERE)
• MICHAEL W. MEISSNER WITH ETHERNAUTICS, INC. CONTRACTED THROUGH CSC TO URENCO-
USA/(LES) FOR PROGRAM IMPLEMENTATION AND PROTECTION OF CRITICAL ASSETS IN NUCLEAR
ENRICHMENT FACILITIES.(2007-2012) (CLICK HERE)
• MICHAEL W. MEISSNER WITH INFORMATION MECHANICS, INC. CONTRACTED BY
TELECOMMUNICATION CORPORATION INC. (TCI) FOR DEVELOPMENT OF SECURE ENCRYPTED
COMMUNICATIONS TO DIGITAL SET TOP BOXES (CLICK HERE) - ADDRESSABILITY SYSTEMS: US
PATENT NUMBER #6070001 (CLICK HERE)Hello 25
PATENTS AND PUBLISHED ARTICLES
Expert Systems and Knowledge
Engineering
IBM RedBook 1988
A Business Case for an
Education Network Channel
Jones International University 1993
Addressability Systems US Patent #6070001 1993
Product, Packages, and
Promotions Functions
Telecommunications Inc. Business Function
Document
1994
Triple Play Billing Telecommunications Inc. Business Function
Document
1994
Designing for Performance in
Credit Card Transactions
Telecommunications Inc. Business Function
Document
1994
The Pitfalls of Automating
Inefficient Processes
Information Mechanics, Inc. 1996
Data Centre Design and
Consolidation
Information Mechanics, Inc. 1997
Best Practices in Service Catalog NetCracker Marketing 2006
Best Practices on OSS
Deployment
NetCracker Marketing 2007
Best Practices in SLA’s NetCracker Marketing 2007
Defined KPI’s
• MTBF – Mean Time Between
Failure
• MTTR – Mean Time To Repair
• SCCT – Supply Chain Cycle Time
• IRCT – Inventory Replenishment
Cycle Time
• IMOS- Inventory Months of
Supply
• ITO – Inventory Turnover
www.kpilibrary.com 2008
Cabling Specifications Urenco Ltd – Design Document 2009
Cable Testing Specifications Urenco Ltd – Design Document 2010
PLC’s – The greatest Cyber
Security Risk to the Nation’s
Infrastructure
DEF CON Presentation 2012
Wikipedia Articles
• Electrode ionization
• Addressability
• Addressability Systems
• Cable Converter Box
• Descramble
• Solutions Architect
• FTTLA
Wikipedia.com
http://en.wikipedia.org/wiki/Electrodeionization
http://en.wikipedia.org/wiki/Addressability
http://en.wikipedia.org/wiki/Addressable_system
s
http://en.wikipedia.org/wiki/Cable_Converter_Bo
x
http://en.wikipedia.org/wiki/Descramble
2008-2012
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
26
PATENTS AND PUBLISHED ARTICLES
Title Address Year
Ethernautics, Inc.: Cyber
Security Database Threats
https://ethernautics.wordpress.com/2015/
06/13/database-security-threats/
2013
Glossary of Terms - Cyber
Security At Nuclear Power Plants
http://wp.me/p2xZpH-c 2013
Secure Encrypted
communications to Digital Set
Top Boxes - Addressability
Systems: US Patent Number
#6070001
http://wp.me/p2xZpH-V
http://patents.com/us-6070001.html
https://en.wikipedia.org/wiki/Addressability
1993
Ethernautics, Inc. – Meissner:
Cyber Security Standards, Best
Practices and PRADL for
Water Utilities
http://wp.me/p2xZpH-1g 2015
Cyber Security in the
Automobile:
Automobile/Vehicle Protocol
Buses
http://infrastructurecybersecurity.blogspot.
com/2015/06/automobilevehicle-protocol-
buses.html
2014
Communications Protocols
Utilized in Plant Control
Systems are a key component in
the development of a Cyber
Security Controls Catalog -
Quora
https://industrial-cyber-
security.quora.com/Communications-
Protocols-Utilized-in-Plant-Control-
Systems-are-a-key-component-in-the-
development-of-a-Cyber-
Security?srid=7rIp&share=1
2014
©1994-2016 Copyright Michael W. Meissner –
Ethernautics, Inc.
Author: Michael W. Meissner
Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT
–7)
27

Weitere ähnliche Inhalte

Andere mochten auch

Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beau Bullock
 
Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Iddan Halevy
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017Craig Hurst
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Jim Gilsinn
 
Comprehensive Security Concept For Process Control Systems V2006
Comprehensive Security Concept For Process Control Systems V2006Comprehensive Security Concept For Process Control Systems V2006
Comprehensive Security Concept For Process Control Systems V2006kaestnja
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalNewellNYC
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Joseph Hennawy
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsAndreas Mai
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threatHarman Innovation
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsJim Gilsinn
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)Byres Security Inc.
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionAlexander Schellong
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Bill Harpley
 

Andere mochten auch (18)

Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010
 
FASTR_Overview2017
FASTR_Overview2017FASTR_Overview2017
FASTR_Overview2017
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
 
Comprehensive Security Concept For Process Control Systems V2006
Comprehensive Security Concept For Process Control Systems V2006Comprehensive Security Concept For Process Control Systems V2006
Comprehensive Security Concept For Process Control Systems V2006
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's Hospital
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive Revolution
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
 

Ähnlich wie Michael W. Meissner - Cyber Security Engineering Biography

Michael W Meissner - RCDD ESS Qualifications
Michael W Meissner - RCDD ESS QualificationsMichael W Meissner - RCDD ESS Qualifications
Michael W Meissner - RCDD ESS QualificationsMichael W. Meissner, RCDD
 
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...TheAnfieldGroup
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUNYU Tandon Online
 
Cyber Security: Protecting Today's Mission Critical Public Safety Networks
Cyber Security: Protecting Today's Mission Critical Public Safety NetworksCyber Security: Protecting Today's Mission Critical Public Safety Networks
Cyber Security: Protecting Today's Mission Critical Public Safety NetworksLRKimball
 
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...EnergyTech2015
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloudMartin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloudContent Guru Benelux
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
Technology a facilitator for buisiness
Technology   a facilitator for buisinessTechnology   a facilitator for buisiness
Technology a facilitator for buisinessBrian Pereira
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineNYU Tandon Online
 
NYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixJohn Yeoh
 
How Bell Energy can help you be a Sustainable and Profitable Organization
How Bell Energy can help you be a Sustainable and Profitable OrganizationHow Bell Energy can help you be a Sustainable and Profitable Organization
How Bell Energy can help you be a Sustainable and Profitable OrganizationChandrashekhar Kulkarni
 

Ähnlich wie Michael W. Meissner - Cyber Security Engineering Biography (20)

Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013Herklotz - Information Operations and Security - Spring Review 2013
Herklotz - Information Operations and Security - Spring Review 2013
 
Michael W Meissner - RCDD ESS Qualifications
Michael W Meissner - RCDD ESS QualificationsMichael W Meissner - RCDD ESS Qualifications
Michael W Meissner - RCDD ESS Qualifications
 
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
Leveraging Technology to Enhance Security, Reliability & NERC-CIP Ver.5 Compl...
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Ijisa
IjisaIjisa
Ijisa
 
Online MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYUOnline MS in Cybersecurity at NYU
Online MS in Cybersecurity at NYU
 
Cyber Security: Protecting Today's Mission Critical Public Safety Networks
Cyber Security: Protecting Today's Mission Critical Public Safety NetworksCyber Security: Protecting Today's Mission Critical Public Safety Networks
Cyber Security: Protecting Today's Mission Critical Public Safety Networks
 
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
Mark Minnucci: Deployment of MBSE and the Emergence of a Systems-Thinking Cul...
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloudMartin Vliem (Microsoft): Met vertrouwen naar de cloud
Martin Vliem (Microsoft): Met vertrouwen naar de cloud
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Technology a facilitator for buisiness
Technology   a facilitator for buisinessTechnology   a facilitator for buisiness
Technology a facilitator for buisiness
 
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon OnlineJuly 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
July 20, 2016 Webcast for the Cybersecurity MS at NYU Tandon Online
 
NYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity WebinarNYU Tandon Online M.S. In Cybersecurity Webinar
NYU Tandon Online M.S. In Cybersecurity Webinar
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
MRHCV-short.DOC
MRHCV-short.DOCMRHCV-short.DOC
MRHCV-short.DOC
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
 
How Bell Energy can help you be a Sustainable and Profitable Organization
How Bell Energy can help you be a Sustainable and Profitable OrganizationHow Bell Energy can help you be a Sustainable and Profitable Organization
How Bell Energy can help you be a Sustainable and Profitable Organization
 

Kürzlich hochgeladen

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Michael W. Meissner - Cyber Security Engineering Biography

  • 1. MICHAEL W. MEISSNER, RCDD CYBER SECURITY SERVICES CYBER SECURITY PROGRAM AND PROJECT MANAGEMENT CYBER SECURITY SOLUTIONS ARCHITECTURE CYBER SECURITY DESIGN ENGINEERING
  • 2. MICHAEL MEISSNER SUMMARY • MR. MEISSNER IS A HIGHLY MOTIVATE CYBER SECURITY PROGRAM MANAGER AND CYBER SECURITY ENGINEER AND HAS OVER THIRTY YEARS OF EXPERIENCE AS A MANAGING PROGRAMS AND PROJECTS. • MICHAEL W. MEISSNER LEADS ETHERNAUTICS, INC.'S CYBER SECURITY PRACTICE. MR. MEISSNER HAS OVER 30 YEARS OF IT, ENGINEERING AND MANAGEMENT EXPERIENCE. THROUGHOUT HIS CAREER HE HAS PROVIDED EXCEPTIONAL CLIENT SERVICE AND COMMUNICATION SKILLS WITH A DEMONSTRATED ABILITY TO DEVELOP AND MAINTAIN OUTSTANDING CLIENT RELATIONSHIPS. • HIGHLY ORGANIZED, RESULTS-ORIENTED AND ATTENTIVE TO DETAILS. SELF-MOTIVATED, PROACTIVE, INDEPENDENT AND RESPONSIVE. REQUIRES LITTLE SUPERVISORY ATTENTION. EXCELLENT PRESENTATION, FACILITATION AND DIPLOMACY SKILLS • MEISSNER HAS EXECUTED END TO END PROGRAM MANAGEMENT AND PROJECT MANAGEMENT OF LARGE AND/OR MULTIPLE LARGE PROJECTS. MR. MEISSNER HAS MANAGED PROJECTS FROM A FEW INDIVIDUALS TO TEAMS OF OVER 100 INDIVIDUALS AND VENDORS. ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 2
  • 3. MICHAEL MEISSNER SUMMARY • MR. MEISSNER DESIGNS AND IMPLEMENTS ALL FACETS OF CYBER SECURITY PROJECTS, PROGRAMMATIC AND TECHNICAL DETAIL MANAGEMENT TO ENSURE DELIVERABLES ARE MET WITHIN SCHEDULE, BUDGET, AND QUALITY GOALS. HE IS ABLE TO EXPRESS A CLEAR UNDERSTANDING OF THE BUSINESS, OPERATIONAL AND HUMAN IMPACT OF TECHNOLOGY AND THE CYBER SECURITY THREATS THEY EXPOSE. • MR. MEISSNER HAS MANY YEARS OF EXPERIENCE WORKING IN A COMPLEX, MULTI TASKING TYPE ENVIRONMENTS. • DEMONSTRATED TRACK RECORD ASSISTING CLIENTS WITH IDENTIFYING AND ASSESSING INFORMATION SYSTEM RELATED RISKS AND DEFINING BEST PRACTICES AS A TRUSTED ADVISER. • HANDS-ON EXPERIENCE WITH INFORMATION SECURITY STANDARDS AND TECHNOLOGY • EXPERIENCE WITH SECURITY STRATEGIES AND/OR SECURITY ARCHITECTURE. • EXPERTISE IN IT POLICY AND PROCEDURE DEVELOPMENT. • MEISSNER HAS EXECUTED PROJECTS THRU THEIR COMPLETE LIFE-CYCLES (SDLC) • IT PROCESSES (I.E., ITIL) INCLUDING INCIDENT, PROBLEM, DEFECT, CHANGE AND RELEASE MANAGEMENT. ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 3
  • 4. MICHAEL MEISSNER SECURITY DOMAINS • EXPERIENCE WITH THE FOLLOWING SECURITY DOMAINS: • AUDIT AND MONITORING, • RISK RESPONSE & RECOVERY • CRYPTOGRAPHY • DATA COMMUNICATIONS • COMPUTER OPERATIONS SECURITY • TELECOMMUNICATIONS & NETWORK SECURITY • SECURITY ARCHITECTURE & MODELS • MEISSNER MAINTAINS EXPERIENCE IN SEVERAL INDUSTRY VERTICALS ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 4
  • 5. WORK HISTORY 08/2007 - Present Ethernautics, Inc. California Water Services Areva Computer Sciences Corporation Telcordia Global Telcom Limited (GTL) US Cellular Urenco/LES ETUS STP – South Texas Project Verizon Wireless JoAnn’s Stores 01/2007 – 08/2007 NetCracker, Technologies US Army Time Warner One Communications Covad Telus Nextel/Sprint Verizon Business Horry Telephone Cooperative Comcast 11/1993 – 01/2007 Information Mechanics, Inc. Comcast (TCI) AT&T Broadband MetroList Mobeo GTE AT&T Wireless Bell South Continental Cable Lafarge Concrete Denver Post US Park Service Across Media Networks Telcordia (Belcore) – SAIC TECO/Peoples Gas Cable Services Group (CSG) AMDOCS Cable Data Kenan AT&T Broadband MediaOne USWest/Qwest Ticketmaster/Pacer Cats, AMC, United Artist 02/1992 – 11/1993 Berger & Co Region Transportation District (RTD) Lipper Analytical Aspen Ski Corp Obeymeyer Sports USWest Jones Cable Xcel Energy Frontier Communications Optimus Technologies Ticketmaster/Pacer Cats Trinidad Benham Territory Agent IBM – Oil & Gas/Mining/AEC 05/1987 – 02/1992 IBM Department of Transportation Department of Health and Human Services Department of Labor Rocky Flats – Rockwell International Public Service Company of Colorado Kaiser Permanente St. Anthony’s Hospital St. Luke’s Hospital, Veterans Hospital Colorado School of Mines 05/1987 – 10/1988 Colorado School of Mines Research Development Data Center Management 06/1985 – 05/1987 Schlumberger Measurement While Drilling (MWD) 01/1988 – 06/1985 Mammoth Information Services Calaway Oil & Gas Bird Oil Corporation Amselco Minerals Amoco Microgeophysical Corp Max P. Arnold & Associates * See Project References for details: (Click Here) ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT 5
  • 6. GOVERNANCE PROGRAM AND PROJECT MANAGEMENT • CYBER SECURITY PROGRAM LEADERSHIP AND MANAGEMENT • CYBER SECURITY STRATEGY • CYBER SECURITY PROJECT MANAGEMENT • REGULATORY COMPLIANCE • POLICY AND PROCEDURE DEVELOPMENT • CHANGE MANAGEMENT - CONFIGURATION MANAGEMENT • TECHNICAL SPECIFICATIONS AND BEST PRACTICE DEVELOPMENT • INCIDENT RESPONSE DISASTER RECOVERY • REPORTING AND KPI’S ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 6
  • 7. GOVERNANCE PROGRAM AND PROJECT MANAGEMENT • CUSTOMER FACING – WORKS ACROSS ORGANIZATION • PROJECT MANAGEMENT • DEVELOP AND TRACK SCHEDULES • TRACK RESOURCES • KPI’S • RFP PREPARATION, BID PREPARATION AND RESPONSE • JOB COSTING AND BUDGET TRACKING • PROFICIENT IN DESIGN, PRESENTATION, AND PROJECT MANAGEMENT TOOLS (MS OFFICE, WORD, EXCEL, POWER POINT, VISIO, PROJECT) • PROJECT AND CONSTRUCTION MANAGEMENT, IT ENGINEERING MANAGEMENT, FIELD ENGINEERING AND “CRAFT” MANAGEMENT • LABOR/UNION RELATIONS ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT – 7) 7
  • 8. TECHNICAL CAPABILITIES • LOW VOLTAGE DESIGN - REGISTERED COMMUNICATIONS DISTRIBUTION DESIGNER (RCDD) CERTIFICATION • OUTSIDE PLANT DESIGN • ELECTRONIC SAFETY AND SECURITY SYSTEMS DESIGN (LIFE SAFETY) • WIRELESS DESIGN (DAS, CELLULAR, ANALOG RADIO) • INTELLIGENT BUILDINGS, BUILDING AUTOMATION, UTILITY MONITORING DESIGNS • CYBER SECURITY DESIGN – CISSP CERTIFICATIONS • RIGHTS OF WAY, PERMITTING, AND AUTHORITIES HAVING JURISDICTION (AHJ) • CUSTOMER FACING SALES AND SUPPORT – TECHNICAL PRESENTATIONS • PROFICIENT IN DESIGN TOOLS (ACAD, VISIO, EXCEL) • FIELD ENGINEERING, DESIGN VERIFICATION, AND "AS-BUILTS" • CYBER-PHYSICAL SYSTEMS • CYBER SECURITY ASSESSMENT Hello 8
  • 9. TECHNICAL CAPABILITIES – CYBER SECURITY • CYBER-PHYSICAL SYSTEMS - ELECTRONIC SAFETY AND SECURITY SYSTEMS DESIGN (LIFE SAFETY) • WIRELESS DESIGN (DAS, CELLULAR, ANALOG RADIO) - ENCRYPTION • CYBER SECURITY DESIGN – CISSP CERTIFICATIONS • REGULATORY REQUIREMENTS • BUSINESS REQUIREMENT • CUSTOMER FACING SALES AND SUPPORT – TECHNICAL PRESENTATIONS • RISK ASSESSMENT • CRITICAL DIGITAL ASSET MANAGEMENT • CYBER SECURITY ASSESSMENT ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT – 7) 9
  • 10. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN SERVICES • CYBER SECURITY ENGINEERING • CYBER SECURITY ARCHITECTURES (PCI, NIST, ISO ETC.) • BUSINESS AND REGULATORY REQUIREMENTS • SYSTEM ANALYSIS USING MULTIPLE TECHNOLOGIES IN HETEROGENEOUS ARCHITECTURES AND WIDE SYSTEM FUNCTIONALITY • ELECTRONIC SAFETY AND SECURITY (ESS) - PHYSICAL SECURITY SYSTEMS AND LIFE SAFETY SYSTEMS • CRITICAL DIGITAL ASSET DETERMINATION • ANALYZES NETWORK SECURITY DESIGN • RISK ASSESSMENT AND MANAGEMENT • WORK WITH CLIENTS IN IDENTIFYING AND ASSESSING INFORMATION SYSTEM RELATED RISKS RELATED TO CYBER SECURITY. • CREATING STRATEGIES RELATED TO CYBER SECURITY RISK MANAGEMENT. • PLANS AND CONDUCTS VULNERABILITY ASSESSMENTS • CREATED AND TUNED VULNERABILITY SCAN GROUPS AND CONFIGURATIONS. • IDENTIFICATION OF ATTACK VULNERABILITIES (OWASP) AND (ISO/IEC 15408-1:2009) • EVALUATION OF SYSTEM SECURITY CONFIGURATIONS • DEVELOPMENT AND EVALUATION OF ATTACK SCENARIOS • EVALUATES FINDINGS AND CONDUCTS ROOT CAUSE ANALYSIS • CONDUCT PENETRATION TESTING, ROUTINE EXPLOIT ANALYSIS, SYSTEMS MONITORING. • CYBER SECURITY CONTROLS CATALOG • REMEDIATION AND MITIGATION ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 10
  • 11. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN DIGITAL DESIGN AND SYSTEMS ENGINEERING SERVICES • MEISSNER HAS EXPERIENCE WITH DESIGNING THE FOLLOWING SECURITY RELATED SYSTEMS: • NETWORK SECURITY DESIGN (LAN/WAN) • APPLICATION SECURITY DESIGN • DATA SECURITY • ELECTRONIC SAFETY AND SECURITY (ESS) - PHYSICAL SECURITY SYSTEMS AND LIFE SAFETY SYSTEMS • SECURE WIRELESS • RADIO ENCRYPTION • DATA • VOICE (PUSH-TO-TALK) • INTEGRATES SECURITY TECHNICAL CONTROLS FOR MULTIPLE PROJECTS/PRODUCTS WITH DEFINED REQUIREMENTS • DESIGN TEST PLANS TO EVALUATE CONTROL OBJECTIVES AND IDENTIFY WEAKNESSES IN THE INFORMATION TECHNOLOGY CONTROL STRUCTURE. • SECURITY OPERATION CENTERS (SOC), NETWORK OPERATION CENTERS (NOC), DATA CENTERS, TELECOM EQUIPMENT ROOMS, • ENGINEERING DRAWINGS - (T-EQP, T-PHY, T-PHY) • IDENTITY ACCESS MANAGEMENT AND AUTHORIZATION • PLANT CONTROL SYSTEMS (PCS, ICS) AND SCADA SYSTEMS IN NUCLEAR POWER PLANTS, CHEMICAL PROCESSING AND WATER TREATMENT/DISTRIBUTION CRITICAL INFRASTRUCTURE • DESIGN OVERALL DEFENSE-IN-DEPTH ARCHITECTURE FOR PLANT SYSTEMS (NIST CYBER SECURITY FRAMEWORK AND ISO/IEC 27001 COMPLIANCE COBIT, COSO). • SUPPORTING INFRASTRUCTURES (TELCOM, POWER, HVAC, DATA CENTER, CLOSETS, DAS, DISTRIBUTION SYSTEMS) • OUTSIDE PLANT (OSP) • SECURE STRUCTURED CABLING • DEFINES SECURITY PRODUCT SPECIFICATIONS • DEFINE INTRUSION/DATA LOSS TECHNIQUES. • DESIGNS, INTEGRATES AND CONFIGURES CONTROLS. • RESPONSIBLE FOR IMPLEMENTING AND TUNING THE TECHNICAL SOLUTION USED TO IDENTIFY AND MANAGE THE CONFIGURATIONS AND CONTROLS • PATCH MANAGEMENT- SATELLITE, SCCM, WSUS, SHAVLIK, SECUNIA, LANDESK ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 11
  • 12. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN DIGITAL DESIGN AND SYSTEMS ENGINEERING SERVICES • MEISSNER HAS EXPERIENCE WITH DESIGNING THE FOLLOWING SECURITY RELATED SYSTEMS: • NETWORK SECURITY DEPLOYMENT OF NETWORK AND APPLICATION SECURITY AND AUTHORIZATION FOR PLANT CONTROL AND REPORTING SYSTEMS. • FIREWALLS • DATA DIODES • DMZ’S • ENCRYPTION • IAM • SIEMS • IDS/IPS ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 12
  • 13. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN SERVICES • MEISSNER HAS EXPERIENCE WITH THE FOLLOWING SYSTEMS: • PHYSICAL SECURITY SYSTEMS • LIFE/SAFETY SYSTEMS – ESS SYSTEMS • ASSET MANAGEMENT • PLANT CONTROL SYSTEMS • BUILDING AUTOMATION & UTILITY MONITORING • DATA CENTER DESIGN • CABLE DESIGN – STRUCTURED CABLING • OUTSIDE PLANT - OSP • NETWORK DESIGN • CYBER SECURITY ENGINEERING • AUTHORIZATION AND CONTROL • LEED • PROJECT MANAGEMENT ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 13
  • 14. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN OPERATIONS SERVICES • SECURITY OPERATION CENTER (SOC, ALARM STATIONS) • CYBER SECURITY MONITORING • NETWORK SECURITY MONITORING • INCIDENT DETECTION • CONTRIBUTES TO THE DEVELOPMENT AND EVALUATION OF ATTACK SCENARIOS • EVALUATES FINDINGS AND CONDUCTS ROOT CAUSE ANALYSIS • PERFORMS INCIDENT RESPONSE ACTIVITIES ACROSS BROAD TECHNOLOGY PROFILES OR MULTIPLE SYSTEMS • INTERROGATES INDUSTRY SOURCES AND EVALUATES INCIDENT INDICATORS. • COLLECTS AND PRESERVES EVIDENCE, IDENTIFIES INTRUSION OR INCIDENT PATH AND METHOD • DETERMINES NATURE, MECHANISMS, SCOPE AND LOCATION OF THE INCIDENT. • DRAFTS INCIDENT/INVESTIGATION REPORTS AND MAKES RECOMMENDATION FOR FUTURE PROCESS ENHANCEMENTS. PREPARES AND DELIVERS TECHNICAL REPORTS AND BRIEFINGS • DEPLOYMENT OF NETWORK AND APPLICATION SECURITY AND AUTHORIZATION FOR PLANT CONTROL AND REPORTING SYSTEMS. • MONITORS NETWORK AND HOST-BASED SECURITY ALERTING SYSTEMS AND EVENT LOGS. PERFORMS INITIAL EVENT/LOSS ASSESSMENT AND VALIDATION. ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 14
  • 15. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN IT CYBER SECURITY DETECTION AND PREVENTION TOOLS • NETWORK MONITORING – SOLARWINDS • VULNERABILITY SCANNERS - NESSUS, RETINA, QUALSYS, FOUNDSTONE, NEXPOSE • SIEM – SPLUNK, IBM QRADAR • IDS / IPS – SOURCEFIRE, CISCO IPS 4200, INTRUSHIELD • PASSWORD MANAGEMENT - THYCOTIC • DEFENSE IN DEPTH ARCHITECTURE AND ADVANCED PERSISTENT THREATS (APTS) • INCIDENT MANAGEMENT AND FORENSICS - NETWITNESS • RSA SECURITY ANALYTICS, ARCHER, SECOPS • PKI - PUBLIC KEY INFRASTRUCTURE • WEBSENSE • FIREWALLS - CISCO, PALOALTO NETWORKS, CHECKPOINT • DATA DIODES - CANARY, WATERFALL • CISCO ISE • CHECKPOINT LOAD BALANCER • REMEDY NETWORKING Through education and experience Mr. Meissner has amassed skills with the following Cyber Security Tool Sets: ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 15
  • 16. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN IT CYBER SECURITY TECHNOLOGIES • SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) • MR. MEISSNER HAS HAD A VARIETY OF EXPERIENCES WITH THE FOLLOWING SIEM SOLUTIONS IN ORDER TO SUPPORT REAL-TIME ANALYSIS OF SECURITY ALERTS GENERATED BY NETWORK HARDWARE AND APPLICATIONS: • QRADAR • SPLUNK • MCAFEE ENTERPRISE SECURITY MANAGER • IDS/IPS • MR. MEISSNER HAS EXPERIENCE IN EVALUATING AND DEPLOYING SEVERAL IDS AND IPS TOOLS THAT HAVE ASSISTED ORGANIZATIONS IN THE IDENTIFICATION AND PROTECTION OF THEIR WIRED AND WIRELESS NETWORKS AGAINST SEVERAL TYPES OF SECURITY THREATS. MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING IDS/IPS/SIEM SOLUTIONS: • MCAFEE'S INTRUSHIELD/MCAFEE NETWORK SECURITY PLATFORM (NSP) • SOURCEFIRE • SNORT • TIPPINGPOINT • JUNIPER IPS Through education and experience Mr. Meissner has experience with the following Cyber Security Technologies: ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 16
  • 17. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN IT CYBER SECURITY TECHNOLOGIES • ENDPOINT SECURITY TOOLS/ANTI-VIRUS/ANTIMALWARE • MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING ENDPOINT SECURITY SOLUTIONS: • MCAFEE • SYMANTEC • RSA ECAT • MOBILE DEVICES MANAGEMENT (MDM) • MR. MEISSNER HAS EFFECTIVELY DEPLOYED MDM SOFTWARE O BOLSTERS NETWORK SECURITY THROUGH REMOTE MONITORING AND CONTROL OF SECURITY CONFIGURATIONS, POLICY ENFORCEMENT AND PATCH PUSHES TO MOBILE DEVICES. DEPLOYING SYSTEMS THAT REMOTELY LOCK LOST, STOLEN OR COMPROMISED MOBILE DEVICES AND, IF NECESSARY, WIPE ALL STORED DATA. MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING MDM SOLUTIONS: • BLACKBERRY ENTERPRISE SERVER BES10 • AIRWATCH • IBM MAAS360 MDM • CITRIX XENMOBILE • SYMANTEC MOBILE MANAGEMENT • MCAFEE EMM • MICROSOFT ENTERPRISE MOBILITY SUITE (EMS) • CISCO ISE Through education and experience Mr. Meissner has experience with the following Cyber Security Technologies: ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 17
  • 18. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN IT CYBER SECURITY TECHNOLOGIES • NETWORK ACCESS CONTROL/IDENTITY ACCESS MANAGEMENT (IAM) TOOLS • MR. MEISSNER HAS EVALUATED AND DEPLOY MULTIPLE IDENTITY ACCESS MANAGEMENT (IAM) SYSTEMS AT MULTIPLE ENTERPRISES TO ESTABLISH A FRAMEWORK FOR BUSINESS PROCESSES THAT FACILITATES THE MANAGEMENT OF ELECTRONIC IDENTITIES. TO INITIATE, CAPTURE, RECORD AND MANAGE USER IDENTITIES AND THEIR RELATED ACCESS PERMISSIONS IN AN AUTOMATED FASHION. UTILIZING IAM TECHNOLOGIES MR. MEISSNER EFFORTS HAVE ENSURED THAT ACCESS PRIVILEGES ARE GRANTED ACCORDING TO ONE INTERPRETATION OF POLICY AND ALL INDIVIDUALS AND SERVICES ARE PROPERLY AUTHENTICATED, AUTHORIZED AND AUDITED. MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING NETWORK ACCESS CONTROL/IAM SOLUTIONS: • IBM'S SECURITY IDENTITY MANAGER • TOOLS4EVER'S • CENTRIFY IDENTITY SERVICE • THYCOTIC SECRET SERVER • CISCO ISE • NEXT GENERATION FIREWALLS AND DATA DIODES • MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING NEXT GENERATION FIREWALLS AND DATA DIODES: • JUNIPER • PALO ALTO NETWORKS (PAN) • CANARY • WATERFALL ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 18
  • 19. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN IT CYBER SECURITY TECHNOLOGIES • AUTHENTICATIONS, AUTHORIZATION AND CONTROL • MR. MEISSNER AUTHORED AUTHENTICATION, AUTHORIZATION AND CONTROL FOR EARLY INTERNET OF THINGS (IOT) IN THE EARLY 1990. UNITED STATES PATENT: 6070001. • COMPUTER FORENSICS • MR. MEISSNER HAS EXPERIENCE WITH DIGITAL COMPUTER FORENSIC TOOLS USED TO PRODUCE EVIDENCE FOUND ON DIGITAL STORAGE MEDIA UTILIZING TECHNIQUES AND PRINCIPLES TO FOR DATA RECOVERY, IN ORDER TO IDENTIFY, PRESERVE, RECOVER, ANALYZE DIGITAL INFORMATION DESIGNED TO CREATE A LEGAL AUDIT TRAIL. MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING COMPUTER FORENSIC SOLUTION: • ACCESSDATA • VULNERABILITY SCANNING TOOLS: • MR. MEISSNER HAS EVALUATED AND DEPLOY MULTIPLE VULNERABILITY SCANNING TOOLS AT MULTIPLE ENTERPRISES TO IN ORDER TO ASSESS COMPUTERS, COMPUTER SYSTEMS, NETWORKS OR APPLICATIONS FOR WEAKNESSES. MR. MEISSNER HAS PERFORMED 1000’S OF SCANS BOTH PROTECT CRITICAL DIGITAL ASSETS WITH THE ENTERPRISE AND TO EVALUATE ABILITY OF NON-AUTHORIZED ATTACKERS LOOKING TO GAIN UNAUTHORIZED ACCESS. MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING VULNERABILITY SCANNING TOOLS: • RETINA • NEXPOSE • OTHERS: • MR. MEISSNER HAS EXPERIENCE WITH THE FOLLOWING ADDITIONAL TOOLS TO ASSIST THE ENTERPRISE WITH ESTABLISHING A SOUND DEFENSE IN DEPTH ARCHITECTURE: • WIRESHARK • NMAP ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 19
  • 20. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN REGULATORY REQUIREMENTS AND BEST PRACTICESName: Regulation, Pub, Doc #: Website: PCI DSS Payment Card Industry Data Security Standard https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Secu rity_Standard ISO 27001:2013 Specification for an information security management system (ISMS) https://en.wikipedia.org/wiki/ISO/IEC_27001:2013 HIPAA Health Insurance Portability and Accountability Act of 1996 https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Acco untability_Act NIST Special Publication 800-53 Revision 4 NIST Special Publication 800-53 http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800- 53r4.pdf NIST Special Publication 800-37 Revision 1 NIST Special Publication 800-37 Revision 1 http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37- rev1-final.pdf Managing Information Security Risk NIST Special Publication 800-39 http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security NISTIR 7628 http://www.nist.gov/smartgrid/upload/nistir-7628_total.pdf Electric Infrastructure Protection and Substation Perimeter Security. CIP-014 https://secureusa.net/energy-sector-cip-014-compliance/ Third part (of 8) of the open international standard IEC 61131 for programmable logic controllers, IEC 61131-3 http://en.wikipedia.org/wiki/IEC_61131-3 Role Engineering and RBAC Standards Role Based Access Control (RBAC) http://csrc.nist.gov/groups/SNS/rbac/standards.html Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general model ISO/IEC 15408-1:2009 http://www.iso.org/iso/catalogue_detail.htm?csnumber=50341 * Meissner has experience with many regulatory and best practice requirements related to Cyber Security ** Non-Exhaustive List: Requirements vary by Industry, Business Risk, and Local AHJ *** Ethernautics, Inc. – Meissner: Cyber Security Standards, Best Practices and PRADL for Water Utilities http://wp.me/p2xZpH-1g ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 20
  • 21. CYBER SECURITY ENGINEERING SECURITY-BY-DESIGN REGULATORY REQUIREMENTS AND BEST PRACTICESName: Regulation, Pub, Doc #: Website: ITIL General ITIL https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Secu rity_Standard 10 CFR 73.54 “Cyber Security Rule https://en.wikipedia.org/wiki/ISO/IEC_27001:2013 Safe Guards (10 CFR 73.51) https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Acco untability_Act NIST Special Publication 800-53 Revision 4 http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800- 53r4.pdf Cyber Security Training and Awareness http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37- rev1-final.pdf NIST And other security frameworks. http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf * Non-Exhaustive List: Requirements vary by Industry, Business Risk, and Local AHJ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 21
  • 22. DESIGN STANDARDS • MEISSNER HAS EXPERIENCE WITH THE FOLLOWING DESIGN STANDARDS: • ANSI/TIA/EIA STANDARDS • ANSI/TIA/EIA-568-C: COMMERCIAL BUILDING TELECOMMUNICATIONS CABLING STANDARD • ANSI/TIA/EIA-569-C: TELECOMMUNICATIONS PATHWAYS AND SPACES • ANSI/TIA/EIA-606-B: CABLE LABELING STANDARDS • ANSI/TIA/EIA-607-C: GENERIC TELECOMMUNICATIONS GROUNDING (EARTHING) AND BONDING FOR CUSTOMER PREMISES • ANSI/TIA/EIA-942: TELECOMMUNICATIONS INFRASTRUCTURE STANDARD FOR DATA CENTERS • TELECOMMUNICATIONS DESIGN MANUAL (TDM) - BICSI (BUILDING INDUSTRY CONSULTING SERVICE INTERNATIONAL) • NATIONAL ELECTRIC CODE (NFPA 70) - NEC • MASTER FORMAT • DIVISION 27 • DIVISION 28 • ASHRAE GUIDELINES • STANDARD 135 – BACNET - A DATA COMMUNICATION PROTOCOL FOR BUILDING AUTOMATION AND CONTROL NETWORKS • STANDARD 189.1 – STANDARD FOR THE DESIGN OF HIGH PERFORMANCE, GREEN BUILDINGS EXCEPT LOW-RISE RESIDENTIAL BUILDINGS • LEED – USBC US GREEN BUILDING COUNCIL ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 22
  • 23. REGISTRATIONS AND CERTIFICATIONS • REGISTERED COMMUNICATIONS DISTRIBUTION DESIGNER (RCDD) • ELECTRONIC SAFETY AND SECURITY (ESS) – IN PROCESS • OUTSIDE PLANT SPECIALIST (OSP) – IN PROCESS • CERTIFIED NETWORK ASSOCIATE (CAN) – IN PROCESS • CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) – IN PROCESS • PMP – PROJECT MANAGEMENT PROFESSIONAL – IN PROCESS • LEEDS – LEADERSHIP IN ENERGY AND ENVIRONMENTAL DESIGN – IN PROCESS©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 23
  • 24. CLIENTS ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT 24
  • 25. REFERENCE PROJECTS • MICHAEL W. MEISSNER WITH ETHERNAUTICS, INC. CONTRACTED TO CALIFORNIA WATER SERVICES GROUP (CWS) FOR CYBER SECURITY PROGRAM DEVELOPMENT, SCADA NETWORK SECURITY, VULNERABILITY MITIGATION FOR PROTECTION OF CRITICAL ASSETS IN WATER TREATMENT/DISTRIBUTION PLANTS. (2015) (CLICK HERE) • MICHAEL W. MEISSNER WITH ETHERNAUTICS, INC. CONTRACTED THROUGH AREVA, NP TO SOUTH TEXAS PROJECT (STP) FOR PROGRAM IMPLEMENTATION OF 10CF73.54 PROTECTION OF CRITICAL ASSETS IN NUCLEAR POWER PLANTS. (2012-2015) (CLICK HERE) • MICHAEL W. MEISSNER WITH ETHERNAUTICS, INC. CONTRACTED THROUGH CSC TO URENCO- USA/(LES) FOR PROGRAM IMPLEMENTATION AND PROTECTION OF CRITICAL ASSETS IN NUCLEAR ENRICHMENT FACILITIES.(2007-2012) (CLICK HERE) • MICHAEL W. MEISSNER WITH INFORMATION MECHANICS, INC. CONTRACTED BY TELECOMMUNICATION CORPORATION INC. (TCI) FOR DEVELOPMENT OF SECURE ENCRYPTED COMMUNICATIONS TO DIGITAL SET TOP BOXES (CLICK HERE) - ADDRESSABILITY SYSTEMS: US PATENT NUMBER #6070001 (CLICK HERE)Hello 25
  • 26. PATENTS AND PUBLISHED ARTICLES Expert Systems and Knowledge Engineering IBM RedBook 1988 A Business Case for an Education Network Channel Jones International University 1993 Addressability Systems US Patent #6070001 1993 Product, Packages, and Promotions Functions Telecommunications Inc. Business Function Document 1994 Triple Play Billing Telecommunications Inc. Business Function Document 1994 Designing for Performance in Credit Card Transactions Telecommunications Inc. Business Function Document 1994 The Pitfalls of Automating Inefficient Processes Information Mechanics, Inc. 1996 Data Centre Design and Consolidation Information Mechanics, Inc. 1997 Best Practices in Service Catalog NetCracker Marketing 2006 Best Practices on OSS Deployment NetCracker Marketing 2007 Best Practices in SLA’s NetCracker Marketing 2007 Defined KPI’s • MTBF – Mean Time Between Failure • MTTR – Mean Time To Repair • SCCT – Supply Chain Cycle Time • IRCT – Inventory Replenishment Cycle Time • IMOS- Inventory Months of Supply • ITO – Inventory Turnover www.kpilibrary.com 2008 Cabling Specifications Urenco Ltd – Design Document 2009 Cable Testing Specifications Urenco Ltd – Design Document 2010 PLC’s – The greatest Cyber Security Risk to the Nation’s Infrastructure DEF CON Presentation 2012 Wikipedia Articles • Electrode ionization • Addressability • Addressability Systems • Cable Converter Box • Descramble • Solutions Architect • FTTLA Wikipedia.com http://en.wikipedia.org/wiki/Electrodeionization http://en.wikipedia.org/wiki/Addressability http://en.wikipedia.org/wiki/Addressable_system s http://en.wikipedia.org/wiki/Cable_Converter_Bo x http://en.wikipedia.org/wiki/Descramble 2008-2012 ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 26
  • 27. PATENTS AND PUBLISHED ARTICLES Title Address Year Ethernautics, Inc.: Cyber Security Database Threats https://ethernautics.wordpress.com/2015/ 06/13/database-security-threats/ 2013 Glossary of Terms - Cyber Security At Nuclear Power Plants http://wp.me/p2xZpH-c 2013 Secure Encrypted communications to Digital Set Top Boxes - Addressability Systems: US Patent Number #6070001 http://wp.me/p2xZpH-V http://patents.com/us-6070001.html https://en.wikipedia.org/wiki/Addressability 1993 Ethernautics, Inc. – Meissner: Cyber Security Standards, Best Practices and PRADL for Water Utilities http://wp.me/p2xZpH-1g 2015 Cyber Security in the Automobile: Automobile/Vehicle Protocol Buses http://infrastructurecybersecurity.blogspot. com/2015/06/automobilevehicle-protocol- buses.html 2014 Communications Protocols Utilized in Plant Control Systems are a key component in the development of a Cyber Security Controls Catalog - Quora https://industrial-cyber- security.quora.com/Communications- Protocols-Utilized-in-Plant-Control- Systems-are-a-key-component-in-the- development-of-a-Cyber- Security?srid=7rIp&share=1 2014 ©1994-2016 Copyright Michael W. Meissner – Ethernautics, Inc. Author: Michael W. Meissner Last revised: 02/17/2016 4:16:59 PM PDT (UTC/GMT –7) 27