SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
MISO CIP Process
Improvement
Program
September 2013
MISO Overview
2
MISO Reliability Coordination Area, June 2013
•  Independent
•  Non-profit
•  2001 – Reliability Coordinator
•  2005 – Energy Markets
•  2009 – Ancillary Services
•  2012 – Independent Coordinator
of Transmission for Entergy
Region
•  Large Footprint – Midwest and
Southern Regions
Current Scope of Operations
as of June 1, 2013
•  Generation Capacity
–  131,522 MW (market - Midwest)
–  205,759 MW (reliability – Midwest + Southern regions)
•  Historic Peak Load (Midwest Region)
(July 23, 2012)
–  98,576 MW (market)
–  133,368 MW (reliability)
•  65,250 miles of transmission (Midwest Region)
–  15,752 Southern Region
–  49,528 Midwest Region
•  Midwest Region: 11 states, 1 Canadian province
•  Southern Region: 4 states (AR, LA, MS, TX)
(reliability only until Southern Region market integration in December 2013)
3
Speaker
•  Chris Unton
–  Currently: Sr. Manager, IT Compliance
–  Past roles include:
•  Identity & Access Management
•  Disaster Recovery & Problem Management
•  Enterprise Systems Management / Network Operations Center
•  Data Networking
–  Education
•  BS Computer Science – Rose-Hulman Institute of Technology
•  MBA – Indiana University Kelley School of Business
4
Disclaimer
•  Any views and opinions represented are those of Chris
Unton and do not necessarily reflect those of MISO
•  Many of the activities described are in-flight rather than
complete. Your mileage may vary.
5
Agenda
•  Process Driven Approach to Compliance
•  Ownership
•  Six Sigma
•  Program Structure
•  Process Improvement Tools
•  Governance and Execution
6
Traditional Model / “Audit Hamster Wheel”
7
Process Driven Approach
•  Traditional Model does not drive behavior towards:
–  Real-time compliance
–  Security driven compliance
–  Harmonization of approach across regulatory needs (NERC,
FERC, SSAE 16, SOx)
•  Process Based approach drives behavior towards:
–  Baking in compliance evidence as a natural part of the process
–  Ownership of the necessary activities
–  Documentation of control objectives & activities
–  Metrics to assess performance
8
Ownership Detail (Visual)
9
Requirement
Owner
Process Owner
Activity (Control) Owner
Executive Oversight
•  65 processes which support
CIP compliance
•  Majority (34 of 65) of the
processes have more than
three teams (or more than one
division) involved in the core
execution of the process
•  Clearly defined roles &
responsibilities of ownership
are critical to success
–  Process ownership in particular
10
CIP ROLES
(Arrows denote evidence flow)
IT Compliance
•  Accountable for
oversight to MISO’s
compliance with CIP
requirements.
•  Supports the
Requirement Owner
by assisting with
MISO’s interpretation
of the CIP
requirements.
•  Validates that the
processes under the
Requirement Owner
do meet compliance
with the standard.
•  Communicates
changes/updates/
guidance to standards
and requirements to
the Requirement
Owners.
•  Validates sufficiency
of supporting
evidence to
demonstrate
compliance.
•  Drives MISO’s
CIP Compliance
Program
Requirement Owner
•  Accountable for assuring MISO’s compliance
with that particular requirement.
•  Interprets what the requirement truly means to MISO
and devises MISO’s response to support compliance
with that requirement (with assistance of support
teams).
•  Identifies the processes needed to support
compliance and gathers the appropriate people
(process owners) together to ensure an end-to-end
solution with no gaps. The requirement owner likely is
also a process owner or manages process owners.
•  Looks forward to ensure MISO adapts to changing
regulations appropriately, while also designing
solutions that support the objective of the regulation.
•  Gathers evidence from process owners for self-
assessments and audits, to make sure the evidence
is in line with the expectations of the requirement.
•  Drives the creation of RSAW narrative that describes
MISO’s compliance approach.
•  First person to be interviewed by auditors who are
evaluating MISO’s compliance with that requirement.
•  If compliance issues arise, the requirement owner is
accountable (coordinating with Compliance Services
and other support staff) for the content of self-reports
and mitigation plans to restore compliance with that
requirement.	
  
Process Owner
•  Functional responsibility for the
operation of a process that
supports one or more compliance
requirements.
•  Designs solid, robust
processes that support
operational excellence and
security/compliance needs.
Recognizes inputs (upstream
impacts) and outputs
(downstream impacts) of the
process.
•  Responds to self-assessments
and provides evidence (upon
request) to the requirement owner
demonstrating effective process
operation.
•  Identifies key activities (controls)
within the process and assigns
personnel to execute those control
activities.
•  Subject matter expert in his/her
area of responsibility. This person
uses multiple sources (compliance
support staff, internal peers,
industry counterparts,
conferences, and training) to
continually improve the process
he/she owns.
	
  
Activity / Control
Owner
•  Responsible for
a particular
component of an
overall process.
•  Executes an activity
according to procedure.
•  Understands how
activity execution fits
into the larger process.
•  Generates evidence as
part of the activity
execution, or assures
that automated
activities produce the
expected output.
•  Provides the evidence
to downstream
activities. During self-
assessments or audit
preparation, the control
owner provides
evidence to the process
owner if it cannot be
directly queried by the
process owner.
	
  
Six Sigma
11
•  Six Sigma is a fact–based, data–driven philosophy of quality
improvement that values defect prevention over defect detection. It
drives customer satisfaction and bottom-line results by reducing variation
and waste, thereby promoting a competitive advantage. It applies
anywhere variation and waste exist, and every employee should be
involved.
•  In simple terms, Six Sigma quality performance means no more than 3.4
defects per million opportunities.
•  Methodology that takes an objective view of current performance and
structured approach to measurably improve performance
DMAIC
12
Program Structure
•  Techniques (Comprehensive Review)
1.  Identify/validate current requirement owners
2.  Map requirements to processes
3.  Identify/validate process owners
4.  Identify areas that need improvement (health check)
•  Attributes: ownership, documentation, monitoring, complexity, automation
•  Mechanisms: survey, past performance, expert assessment
5.  Analysis and Improvement
•  Kaizen events: Process (re)design, RACI, Policy and Procedures, Evidence, Automation / Tool Integration
opportunities
6.  Control – structure for on-going self-assessment and measurement
•  Training
1.  End-to-end requirement & process awareness
2.  Effective self-assessment (control design & execution)
3.  Process improvement
•  Technology Integration
1.  Utilize available tools
2.  Schedule process improvement activities to coincide with tool deployment where appropriate
•  Team
1.  Concerted effort from a diverse skillset (projecting ~6000 hours of internal effort over 16 months)
2.  Some consistent program support personnel, some subject matter experts as needed
13
Process Improvement Tools
•  Kaizen Events
•  Process Mapping
•  SIPOC
•  Data Analysis
•  Piloting
•  Workflow
•  Automation
14
Kaizen Events
•  Short duration (weeks), high intensity mini-project
•  Focuses on the Analyze & Improve phases of the
DMAIC cycle
•  Produces evidence that can be used for the
Control phase going forward
–  Business Process Diagrams, procedures, RACI
matrix
15
•  Cross-functional team makes improvements in a methodological way
–  Led by process owner
–  Supported by a Six Sigma black belt
Process Mapping
•  Visualize current &
future processes
•  Gain common
understanding
•  Identify pain points
•  Speeds training/
adoption
16
SIPOC
17
Data Analysis
•  Asset based
–  How many CIP cyber assets do we have?
–  How many backup types?
–  How many baseline configurations?
•  Process based
–  How many server commissions do we execute each year?
–  How many firewall rule updates?
–  How many significant changes?
•  Reduce Complexity
•  Align effort with volume
Piloting
•  Take the new process through a trial run on real data
during the Kaizen event
•  Demonstrates operational as well as compliance benefits
•  Provides a chance to change or tweak a process
•  Offers insight into the time and training required for a full
roll-out
Workflow
•  Many of the CIP processes require a sequence of steps to
be executed (including multiple teams)
–  Ex: Security Controls Testing
1)  Determine if the change is significant
2)  Test the security impact of the change
3)  Link the production work to the pre-production testing
•  Remedy ticketing system has been our workflow engine
of choice
•  Other options exist
–  Sharepoint
–  Lombardi Teamworks
–  Calendar reminders
Automation
•  Philosophy: process first, automation second
•  Sometimes, automation is essential to achieve a robust,
efficient process
•  Process areas we’ve explored or are planning for
automation:
–  Compliance training at onboarding
–  Quarterly entitlement reviews
–  Change monitoring
–  Cyber Security event log review
Training / Awareness
•  Online Learning Management System
–  Quick, 10-15 minute slide decks with voice over
–  Wide reach (some 200 person audiences)
–  Employees familiar with the system already
–  Repository that future employees can access
•  Face to face sessions at team meetings
–  In-depth knowledge transfer
–  Interactive
–  Time intensive
•  “Plugged In” Communications
–  News items, short story features
22
Steering Committee
Program Governance
23
Executive Sponsors
Program
Lead
Ongoing MISO Governance Committees
Capability
MATURITY
Highly MatureImmature
TIME
Named requirement owners
Evidence mapped to requirements
Process orientation for compliance
Processes mapped
Processes
comprehensive
Manage to metrics
Internal self assessments are audit comprehensive
Processes optimized for efficiency
Proactive adoption
of future standards
Controls documented
Processes deliver Six Sigma quality
Workflow automation
Interpretations documented
Compliance is a by-product of security
Execution
•  Ensure process has trackable metrics built in
–  Quantity
–  Timeliness
–  Completeness
•  Maintain a robust internal assessment process
•  Don’t forget to update QRSAW narratives – these should
be living and breathing as the process changes
25
Contact Info
•  Chris Unton
–  crunton@misoenergy.org
26

Mais conteúdo relacionado

Mais procurados

NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don Jones
Netwrix Corporation
 
Abidance Cip Presentation
Abidance Cip PresentationAbidance Cip Presentation
Abidance Cip Presentation
jamesholler
 
Fluke Connect Condition Based Maintenance
Fluke Connect Condition Based MaintenanceFluke Connect Condition Based Maintenance
Fluke Connect Condition Based Maintenance
Frederic Baudart, CMRP
 

Mais procurados (20)

Beyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentBeyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability Assessment
 
Network Operations Center Processes- Isaac Mwesigwa
Network Operations Center Processes- Isaac MwesigwaNetwork Operations Center Processes- Isaac Mwesigwa
Network Operations Center Processes- Isaac Mwesigwa
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
DevOpsDays Chicago 2014 - Controlling Devops
DevOpsDays Chicago 2014 -  Controlling DevopsDevOpsDays Chicago 2014 -  Controlling Devops
DevOpsDays Chicago 2014 - Controlling Devops
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Adam Berke Resume
Adam Berke ResumeAdam Berke Resume
Adam Berke Resume
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Network Operation Center Best Practices
Network Operation Center Best PracticesNetwork Operation Center Best Practices
Network Operation Center Best Practices
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don Jones
 
IT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterIT - Enterprise Service Operation Center
IT - Enterprise Service Operation Center
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructure
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
20180529 scaf and cosmic presentaiton s rajagopal
20180529 scaf and cosmic presentaiton  s rajagopal20180529 scaf and cosmic presentaiton  s rajagopal
20180529 scaf and cosmic presentaiton s rajagopal
 
Abidance Cip Presentation
Abidance Cip PresentationAbidance Cip Presentation
Abidance Cip Presentation
 
Fluke Connect Condition Based Maintenance
Fluke Connect Condition Based MaintenanceFluke Connect Condition Based Maintenance
Fluke Connect Condition Based Maintenance
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to Many
 

Destaque

NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesNERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
Schneider Electric
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
EnergySec
 

Destaque (20)

NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesNERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPSecurity of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
 
Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...
Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...
Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...
 
Energy Biographies Final Research report
Energy Biographies Final Research reportEnergy Biographies Final Research report
Energy Biographies Final Research report
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator Display
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration
 
Come See What’s Cooking in My Lab
Come See What’s Cooking in My LabCome See What’s Cooking in My Lab
Come See What’s Cooking in My Lab
 
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
 
How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart Meter
 
Building an Incident Response Team
Building an Incident Response TeamBuilding an Incident Response Team
Building an Incident Response Team
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
Security Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersSecurity Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for Beginners
 

Semelhante a Structured NERC CIP Process Improvement Using Six Sigma

How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
Perficient
 
Focus your investments in innovations
Focus your investments in innovationsFocus your investments in innovations
Focus your investments in innovations
Kobi Vider
 

Semelhante a Structured NERC CIP Process Improvement Using Six Sigma (20)

Leveraging Your CMMS - From Selection to Daily Use
Leveraging Your CMMS - From Selection to Daily UseLeveraging Your CMMS - From Selection to Daily Use
Leveraging Your CMMS - From Selection to Daily Use
 
ITIL Service Operation
ITIL Service OperationITIL Service Operation
ITIL Service Operation
 
ISA 3 COBIT
ISA 3 COBITISA 3 COBIT
ISA 3 COBIT
 
Review of Data Management Maturity Models
Review of Data Management Maturity ModelsReview of Data Management Maturity Models
Review of Data Management Maturity Models
 
CPI_MOM_KBR_20110909_v1
CPI_MOM_KBR_20110909_v1CPI_MOM_KBR_20110909_v1
CPI_MOM_KBR_20110909_v1
 
Documentation Framework for IT Service Delivery
Documentation Framework for IT Service DeliveryDocumentation Framework for IT Service Delivery
Documentation Framework for IT Service Delivery
 
Governance Strategies for Office 365
Governance Strategies for Office 365Governance Strategies for Office 365
Governance Strategies for Office 365
 
ITIL Best Practice for Software Companies
ITIL Best Practice for Software CompaniesITIL Best Practice for Software Companies
ITIL Best Practice for Software Companies
 
management system development and planning
management system development and planningmanagement system development and planning
management system development and planning
 
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
 
Trends in-om-scm-27-july-2012-2
Trends in-om-scm-27-july-2012-2Trends in-om-scm-27-july-2012-2
Trends in-om-scm-27-july-2012-2
 
Sadchap04
Sadchap04Sadchap04
Sadchap04
 
Business Process Reengineering | Case studies
Business Process Reengineering | Case studiesBusiness Process Reengineering | Case studies
Business Process Reengineering | Case studies
 
Focus your investments in innovations
Focus your investments in innovationsFocus your investments in innovations
Focus your investments in innovations
 
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsBeyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
 
Information system audit
Information system audit Information system audit
Information system audit
 
Robert Latest cv
Robert Latest cvRobert Latest cv
Robert Latest cv
 
Adaptive case study on setting up of PMO for large it organization
Adaptive case study on setting up of PMO for large it organizationAdaptive case study on setting up of PMO for large it organization
Adaptive case study on setting up of PMO for large it organization
 
Hcm file-wp
Hcm file-wpHcm file-wp
Hcm file-wp
 
Internal Process Audit
Internal Process AuditInternal Process Audit
Internal Process Audit
 

Mais de EnergySec

Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
EnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
EnergySec
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
EnergySec
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid Security
EnergySec
 

Mais de EnergySec (20)

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
 
Sea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesSea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber Perspectives
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid Security
 

Último

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Último (20)

Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 

Structured NERC CIP Process Improvement Using Six Sigma

  • 2. MISO Overview 2 MISO Reliability Coordination Area, June 2013 •  Independent •  Non-profit •  2001 – Reliability Coordinator •  2005 – Energy Markets •  2009 – Ancillary Services •  2012 – Independent Coordinator of Transmission for Entergy Region •  Large Footprint – Midwest and Southern Regions
  • 3. Current Scope of Operations as of June 1, 2013 •  Generation Capacity –  131,522 MW (market - Midwest) –  205,759 MW (reliability – Midwest + Southern regions) •  Historic Peak Load (Midwest Region) (July 23, 2012) –  98,576 MW (market) –  133,368 MW (reliability) •  65,250 miles of transmission (Midwest Region) –  15,752 Southern Region –  49,528 Midwest Region •  Midwest Region: 11 states, 1 Canadian province •  Southern Region: 4 states (AR, LA, MS, TX) (reliability only until Southern Region market integration in December 2013) 3
  • 4. Speaker •  Chris Unton –  Currently: Sr. Manager, IT Compliance –  Past roles include: •  Identity & Access Management •  Disaster Recovery & Problem Management •  Enterprise Systems Management / Network Operations Center •  Data Networking –  Education •  BS Computer Science – Rose-Hulman Institute of Technology •  MBA – Indiana University Kelley School of Business 4
  • 5. Disclaimer •  Any views and opinions represented are those of Chris Unton and do not necessarily reflect those of MISO •  Many of the activities described are in-flight rather than complete. Your mileage may vary. 5
  • 6. Agenda •  Process Driven Approach to Compliance •  Ownership •  Six Sigma •  Program Structure •  Process Improvement Tools •  Governance and Execution 6
  • 7. Traditional Model / “Audit Hamster Wheel” 7
  • 8. Process Driven Approach •  Traditional Model does not drive behavior towards: –  Real-time compliance –  Security driven compliance –  Harmonization of approach across regulatory needs (NERC, FERC, SSAE 16, SOx) •  Process Based approach drives behavior towards: –  Baking in compliance evidence as a natural part of the process –  Ownership of the necessary activities –  Documentation of control objectives & activities –  Metrics to assess performance 8
  • 9. Ownership Detail (Visual) 9 Requirement Owner Process Owner Activity (Control) Owner Executive Oversight •  65 processes which support CIP compliance •  Majority (34 of 65) of the processes have more than three teams (or more than one division) involved in the core execution of the process •  Clearly defined roles & responsibilities of ownership are critical to success –  Process ownership in particular
  • 10. 10 CIP ROLES (Arrows denote evidence flow) IT Compliance •  Accountable for oversight to MISO’s compliance with CIP requirements. •  Supports the Requirement Owner by assisting with MISO’s interpretation of the CIP requirements. •  Validates that the processes under the Requirement Owner do meet compliance with the standard. •  Communicates changes/updates/ guidance to standards and requirements to the Requirement Owners. •  Validates sufficiency of supporting evidence to demonstrate compliance. •  Drives MISO’s CIP Compliance Program Requirement Owner •  Accountable for assuring MISO’s compliance with that particular requirement. •  Interprets what the requirement truly means to MISO and devises MISO’s response to support compliance with that requirement (with assistance of support teams). •  Identifies the processes needed to support compliance and gathers the appropriate people (process owners) together to ensure an end-to-end solution with no gaps. The requirement owner likely is also a process owner or manages process owners. •  Looks forward to ensure MISO adapts to changing regulations appropriately, while also designing solutions that support the objective of the regulation. •  Gathers evidence from process owners for self- assessments and audits, to make sure the evidence is in line with the expectations of the requirement. •  Drives the creation of RSAW narrative that describes MISO’s compliance approach. •  First person to be interviewed by auditors who are evaluating MISO’s compliance with that requirement. •  If compliance issues arise, the requirement owner is accountable (coordinating with Compliance Services and other support staff) for the content of self-reports and mitigation plans to restore compliance with that requirement.   Process Owner •  Functional responsibility for the operation of a process that supports one or more compliance requirements. •  Designs solid, robust processes that support operational excellence and security/compliance needs. Recognizes inputs (upstream impacts) and outputs (downstream impacts) of the process. •  Responds to self-assessments and provides evidence (upon request) to the requirement owner demonstrating effective process operation. •  Identifies key activities (controls) within the process and assigns personnel to execute those control activities. •  Subject matter expert in his/her area of responsibility. This person uses multiple sources (compliance support staff, internal peers, industry counterparts, conferences, and training) to continually improve the process he/she owns.   Activity / Control Owner •  Responsible for a particular component of an overall process. •  Executes an activity according to procedure. •  Understands how activity execution fits into the larger process. •  Generates evidence as part of the activity execution, or assures that automated activities produce the expected output. •  Provides the evidence to downstream activities. During self- assessments or audit preparation, the control owner provides evidence to the process owner if it cannot be directly queried by the process owner.  
  • 11. Six Sigma 11 •  Six Sigma is a fact–based, data–driven philosophy of quality improvement that values defect prevention over defect detection. It drives customer satisfaction and bottom-line results by reducing variation and waste, thereby promoting a competitive advantage. It applies anywhere variation and waste exist, and every employee should be involved. •  In simple terms, Six Sigma quality performance means no more than 3.4 defects per million opportunities. •  Methodology that takes an objective view of current performance and structured approach to measurably improve performance
  • 13. Program Structure •  Techniques (Comprehensive Review) 1.  Identify/validate current requirement owners 2.  Map requirements to processes 3.  Identify/validate process owners 4.  Identify areas that need improvement (health check) •  Attributes: ownership, documentation, monitoring, complexity, automation •  Mechanisms: survey, past performance, expert assessment 5.  Analysis and Improvement •  Kaizen events: Process (re)design, RACI, Policy and Procedures, Evidence, Automation / Tool Integration opportunities 6.  Control – structure for on-going self-assessment and measurement •  Training 1.  End-to-end requirement & process awareness 2.  Effective self-assessment (control design & execution) 3.  Process improvement •  Technology Integration 1.  Utilize available tools 2.  Schedule process improvement activities to coincide with tool deployment where appropriate •  Team 1.  Concerted effort from a diverse skillset (projecting ~6000 hours of internal effort over 16 months) 2.  Some consistent program support personnel, some subject matter experts as needed 13
  • 14. Process Improvement Tools •  Kaizen Events •  Process Mapping •  SIPOC •  Data Analysis •  Piloting •  Workflow •  Automation 14
  • 15. Kaizen Events •  Short duration (weeks), high intensity mini-project •  Focuses on the Analyze & Improve phases of the DMAIC cycle •  Produces evidence that can be used for the Control phase going forward –  Business Process Diagrams, procedures, RACI matrix 15 •  Cross-functional team makes improvements in a methodological way –  Led by process owner –  Supported by a Six Sigma black belt
  • 16. Process Mapping •  Visualize current & future processes •  Gain common understanding •  Identify pain points •  Speeds training/ adoption 16
  • 18. Data Analysis •  Asset based –  How many CIP cyber assets do we have? –  How many backup types? –  How many baseline configurations? •  Process based –  How many server commissions do we execute each year? –  How many firewall rule updates? –  How many significant changes? •  Reduce Complexity •  Align effort with volume
  • 19. Piloting •  Take the new process through a trial run on real data during the Kaizen event •  Demonstrates operational as well as compliance benefits •  Provides a chance to change or tweak a process •  Offers insight into the time and training required for a full roll-out
  • 20. Workflow •  Many of the CIP processes require a sequence of steps to be executed (including multiple teams) –  Ex: Security Controls Testing 1)  Determine if the change is significant 2)  Test the security impact of the change 3)  Link the production work to the pre-production testing •  Remedy ticketing system has been our workflow engine of choice •  Other options exist –  Sharepoint –  Lombardi Teamworks –  Calendar reminders
  • 21. Automation •  Philosophy: process first, automation second •  Sometimes, automation is essential to achieve a robust, efficient process •  Process areas we’ve explored or are planning for automation: –  Compliance training at onboarding –  Quarterly entitlement reviews –  Change monitoring –  Cyber Security event log review
  • 22. Training / Awareness •  Online Learning Management System –  Quick, 10-15 minute slide decks with voice over –  Wide reach (some 200 person audiences) –  Employees familiar with the system already –  Repository that future employees can access •  Face to face sessions at team meetings –  In-depth knowledge transfer –  Interactive –  Time intensive •  “Plugged In” Communications –  News items, short story features 22
  • 23. Steering Committee Program Governance 23 Executive Sponsors Program Lead Ongoing MISO Governance Committees
  • 24. Capability MATURITY Highly MatureImmature TIME Named requirement owners Evidence mapped to requirements Process orientation for compliance Processes mapped Processes comprehensive Manage to metrics Internal self assessments are audit comprehensive Processes optimized for efficiency Proactive adoption of future standards Controls documented Processes deliver Six Sigma quality Workflow automation Interpretations documented Compliance is a by-product of security
  • 25. Execution •  Ensure process has trackable metrics built in –  Quantity –  Timeliness –  Completeness •  Maintain a robust internal assessment process •  Don’t forget to update QRSAW narratives – these should be living and breathing as the process changes 25
  • 26. Contact Info •  Chris Unton –  crunton@misoenergy.org 26