presenter
play

Presenter Tony Flick Principal, FYRM Associates Over 6 Years in - PowerPoint PPT Presentation

Presenter Tony Flick Principal, FYRM Associates Over 6 Years in Information Assurance Many trips to Vegas / First presenting Agenda What is the smart grid? What makes up the smart grid? Known problems Security initiatives Timeline History


  1. Presenter Tony Flick Principal, FYRM Associates Over 6 Years in Information Assurance Many trips to Vegas / First presenting

  2. Agenda What is the smart grid? What makes up the smart grid? Known problems Security initiatives Timeline History repeating Recommendations

  3. What is the Smart Grid? Current infrastructure Future infrastructure

  4. What Makes up the Smart Grid? Devices Network infrastructure Bi-directional communication

  5. Problems Physical security Bi-directional communication introduces attack vectors Same problems as every other type of network/application

  6. Implications Google Maps art Denial-of-Service Electricity theft

  7. Security Initiatives The Energy Independence and Security Act of 2007 NIST Interoperability Framework Advanced Metering Infrastructure (AMI) System Security Requirements v1.01 Critical Electric Infrastructure Protection Act (CEIPA) - (HR 2195)

  8. Fluffy Using security flu fg words to make people feel warm and fuzzy CIA Security integration from the beginning

  9. Timeline - Part 1 Examples of Integrating Security from the beginning (2007 - 2009): Energy Independence and Security Act of 2007 NIST Smart Grid Interoperability Framework Initial list of standards for inclusion in version 1.0 released on May 8, 2009. Advanced Metering Infrastructure (AMI) System Security Requirements v1.01 2007 - 2008 Critical Electric Infrastructure Protection Act (CEIPA) - (HR 2195) 2009 Recommendations

  10. Timeline - Part 1I Design and implementation of the smart grid 2002 actually occurred before 2007 Austin - 2002 Salt River Project - 2006

  11. History Repeating PCI DSS “Self-policing” and SAQs NERC and FERC NERC and FERC - Aurora vulnerability NERC - Utilities under reporting

  12. Proven Track Record Eight Web Sites Authentication over clear-text protocols Cross Site Scripting Information Leakage What amount of security is in a name?

  13. Duck and Cover? Opportunity missed at the beginning, but we can still do some good Allow security to mature More stringent security requirements Compliant vs. Secure Tighter regulation Innovation vs. Security/Renovation

  14. Questions? If we run out of time: I’ll be here until Sunday evening Email me: tony.flick@fyrmassociates.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend