SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
Concrete applications of interdependency management
(the cases of INMOTOS and SESMAG projects)
Giorgio Gentile
D’Appolonia S.p.A.
AN ISO 9001 AND ISO 14001 CERTIFIED COMPANY
www.dappolonia.it
Background
Interdependencies among Critical Infrastructures, both intra-domain
and inter-domain, are complex to be understood, analysed and
managed.
Critical Infrastructures risks always change due to new threats,
interdependencies and possible scenarios.
EU Critical Infrastructures have good contingency plans but they are
not always “well proven and optimised contingency plan”, i.e.
evaluated in complex scenarios and taking into account dependencies
with other Critical Infrastructures contingency plans.
… no standards currently exist at EU level concerning the approach to
define and adopt Contingency…
…interdependencies among Cis are not taken into account…
Background - continued
EU is lacking coordination in the definition of measures to be
undertaken.
It is proven that coordination can compensate investments in security,
by improving the response effectiveness and providing a more effective
means to manage the crisis events.
An improved response, as well as, a more effective response can lead
to a significant reduction in CI harms and a subsequent reduction of
costs to be undertaken to restore the overall system and functions.
Background - continued
To enhance CI security the security approach should follow two main
steps.
 The first one is identified by the definition of security policies and
guidelines for their implementation.
 The second step is identified by the implementation of contingency
plans to be adopted in case of need.
Security Policies and Guidelines Definition
Currently regulations only exist at national level.
The 2008/114/EC directive has been a tentative approach for a EU
wide regulation in terms of policies and guidelines.
Security Policies are used to define the security objectives which a
system should be subject to. Security Policies are custom defined by
each Owner/Operator according to the existing (if any) national
regulations.
A set of guidelines addressing how to define a security policy and how
to implement it would be effective.
Contingency Plans
Contingency Plans are used to establish a solid reference of the
actions to be undertaken in case of emergency, to mitigate the disaster
effects or to restore the system functionalities.
Contingency Plans effectiveness and efficiency are difficult to be
measured and sometimes it is really expensive. Propagation of positive
effects is difficult to be assessed.
THE INMOTOS CASE
Background
• On 2007, the Council established the specific Programme
"Prevention, Preparedness and Consequence Management of
Terrorism and other Security related Risks for the Period 20072013”

• On September 2008 the Commission adopted the “2009 Annual
Work Programme”, specifying its specific objectives and thematic
priorities
• The Call for Proposals purpose was to award grants to transnational
and/or national projects that contribute to the development of the
"European Programme for Critical Infrastructure Protection"
(EPCIP)
Objectives
 Definition of a common taxonomy for
interdependencies and contingency plans;

critical

infrastructures

 Definition of a methodology for risk assessment of critical
infrastructures interdependencies and contingency plans based on
simulation;
 Design and development of tools for critical infrastructures
interdependencies and contingency plans modelling, simulation and
risk evaluation
 Analysis and validation of contingency plans in complex scenarios
taking into account both intra-domain and cross-domain
interdependencies
Contingency Planning…
Contingency Plan definition is A MUST for business continuity
assurance and for disaster recovery.
Defining a contingency plan requires:
 To have experience
 On the CI under analysis
 On the measures identified and their effectiveness

 Extensive analysis
 Extensive knowledge of historical events
 To be maintained and reviewed/improved
It’s difficult to taylor the Contingency Plan in order to make it effective,
especially with regard to the costs.
…in the Oil&Gas Field
ACTIVE MONITORING

•
•

Precise formulas exist
Well defined parameters to be
monitored
–
–

•
•

Correct functioning of the system
Service Level Agreement measures

Monitoring to be carried out by
men
SCADA systems are used to
monitor some parts of the system

P decrease at CS
(Deviation Detection)

is
pressure
decrease due to
a normal load
variation?

Yes

Activities can proceed
Normally without additional
actions

No
Verify the instruments
functionality in C.R. and on
field

are the
instruments
working?

No

Repair the instruments.
Activities can proceed normally

Yes

Verify the Flowrate at RT

is
the flowrate
decreasing?

No

Yes

Initialize Emergency Notification
to ERT Coordinator.
___
Possible Leak in Zone "1", “2” or
Zone "3"

Start further verifications and
checks.
Activities can proceed normally
if within the operating limits
…in the ICT Field
•
•
•
•

Main measures are referred to availability and performance of the whole
system
Monitoring is mostly automatic
Actions to be performed are mostly automatic
Effectiveness is easier to be evaluated
INMOTOS Approach
The main focuses for the INMOTOS project are represented by the
interdependencies among infrastructures and the contingency plans
adopted in case of emergency.
Both the Critical Infrastructures and the Contingency Plans are
modeled as Coloured Petri Nets (CPN).
The assessment of CI risks and validation of Contingency Plan is
performed by simulating their behaviour against a likely scenario.
Risk is evaluated at different layers and be seen as an aggregation of
lower risks level (top-down or bottom-up approach).
What’s available
What’s available
Interaction with Simulation Framework
THE SESMAG CASE
Project Objectives
•

SESMAG aims at ensuring a low cost and replicable study for the
evaluation and implementation of a minimum set of security requirements
to increase Smart Grids security and resilience.

•

The study aims at providing a set of guidelines to define how to implement
secure smart grids and, on a scenario basis, a set of
requirements/measures to be implemented by the stakeholders.

•

Such an approach will allow for a convergent approach across Europe
towards a secure implementation of the Smart Grids and of the energy
infrastructures, ensuring a more reliable energy production and distribution
across the network.

•

The project outcome will ensure an increased resilience of the energy
networks to cyber attacks and physical outages due to mis-configuration of
the connected producing systems or unbalanced distribution and
production algorithms.
Proposed Objectives
• SESMAG Project should:
–
–
–
–

Analyse the currently deployed situation and the applicable best practices
Define a catalog of current vulnerabilities, threats/hazards and countermeasures
Perform a risk assessment
Define a set of guidelines for Secure and Resilient Smart Grids implementation

An IT support tool will be developed to support
the user in the analysis of the deployed grid.
Approach
Brussels
Podgorica
Beijing
Seoul
Cairo
Istanbul
St. Petersburg
Abu Dhabi

Rome
Milan
Viareggio
Naples
Brindisi
Palermo

D’Appolonia S.p.A.
Headquarters:
Via San Nazaro,19
16145 Genova – Italy
Tel. +39 010 3628148 Fax +39 010 3621078
E-mail: dappolonia@dappolonia.it
Web site http://www.dappolonia.it

Mais conteúdo relacionado

Mais procurados

2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge DeliverableCurtis Brazzell
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk ManagementMarkos Mulat G
 
07 managing risk
07 managing risk07 managing risk
07 managing riskArun Asawa
 
Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Magdalena Anna Fas
 
Critical risk and control frameworks - James Ritchie
Critical risk and control frameworks - James RitchieCritical risk and control frameworks - James Ritchie
Critical risk and control frameworks - James RitchieNSW Environment and Planning
 

Mais procurados (7)

Construction Accident Risk Management
Construction Accident Risk ManagementConstruction Accident Risk Management
Construction Accident Risk Management
 
risk analysis
 risk analysis risk analysis
risk analysis
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable
 
Project Risk Management
Project Risk ManagementProject Risk Management
Project Risk Management
 
07 managing risk
07 managing risk07 managing risk
07 managing risk
 
Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205Contingency%20planning%20lecture%205
Contingency%20planning%20lecture%205
 
Critical risk and control frameworks - James Ritchie
Critical risk and control frameworks - James RitchieCritical risk and control frameworks - James Ritchie
Critical risk and control frameworks - James Ritchie
 

Semelhante a Concrete Applications of Interdependency Management

Sms Reg Nick Morten
Sms Reg Nick MortenSms Reg Nick Morten
Sms Reg Nick MortenYdalus
 
Determining Condition Monitoring
Determining Condition MonitoringDetermining Condition Monitoring
Determining Condition MonitoringKerry Williams
 
TSO Reliability Management: a probabilistic approach for better balance betwe...
TSO Reliability Management: a probabilistic approach for better balance betwe...TSO Reliability Management: a probabilistic approach for better balance betwe...
TSO Reliability Management: a probabilistic approach for better balance betwe...Leonardo ENERGY
 
Rel maint-final
Rel maint-finalRel maint-final
Rel maint-finalamar sadi
 
öZlem özkiliç makale - en
öZlem özkiliç  makale - enöZlem özkiliç  makale - en
öZlem özkiliç makale - enÖzlem ÖZKILIÇ
 
Substation earthing system design optimisation through the application of qua...
Substation earthing system design optimisation through the application of qua...Substation earthing system design optimisation through the application of qua...
Substation earthing system design optimisation through the application of qua...Power System Operation
 
software-project-management-unit-2.ppt
software-project-management-unit-2.pptsoftware-project-management-unit-2.ppt
software-project-management-unit-2.pptMaanbahadurkhadka
 
software-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfsoftware-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfVinoth Kumar
 
DSD-INT 2023 Demo EPIC Response Assessment Methodology (ERAM) - Couvin Rodriguez
DSD-INT 2023 Demo EPIC Response Assessment Methodology (ERAM) - Couvin RodriguezDSD-INT 2023 Demo EPIC Response Assessment Methodology (ERAM) - Couvin Rodriguez
DSD-INT 2023 Demo EPIC Response Assessment Methodology (ERAM) - Couvin RodriguezDeltares
 
Risk Based Design & SCE
Risk Based Design & SCERisk Based Design & SCE
Risk Based Design & SCEadepp
 
ADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based DesignADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based DesignFabienne Salimi
 
Show & Tell - Data & Digitalisation, Weather & Predictive Analytics.pdf
Show & Tell - Data & Digitalisation, Weather & Predictive Analytics.pdfShow & Tell - Data & Digitalisation, Weather & Predictive Analytics.pdf
Show & Tell - Data & Digitalisation, Weather & Predictive Analytics.pdfSIFOfgem
 
Safety System Modularity
Safety System ModularitySafety System Modularity
Safety System ModularityFasiul Alam
 
Strengthening Operational Resilience in Financial Services by Migrating to Go...
Strengthening Operational Resilience in Financial Services by Migrating to Go...Strengthening Operational Resilience in Financial Services by Migrating to Go...
Strengthening Operational Resilience in Financial Services by Migrating to Go...run_frictionless
 
Alert Plus PIOGA Presentation - oct'15
Alert Plus PIOGA Presentation - oct'15Alert Plus PIOGA Presentation - oct'15
Alert Plus PIOGA Presentation - oct'15Matt Murdock
 
Alarm information sheet
Alarm information sheet   Alarm information sheet
Alarm information sheet Anand Mishra
 
PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfmohamed Ismail
 

Semelhante a Concrete Applications of Interdependency Management (20)

Sms Reg Nick Morten
Sms Reg Nick MortenSms Reg Nick Morten
Sms Reg Nick Morten
 
Determining Condition Monitoring
Determining Condition MonitoringDetermining Condition Monitoring
Determining Condition Monitoring
 
Ecm
EcmEcm
Ecm
 
TSO Reliability Management: a probabilistic approach for better balance betwe...
TSO Reliability Management: a probabilistic approach for better balance betwe...TSO Reliability Management: a probabilistic approach for better balance betwe...
TSO Reliability Management: a probabilistic approach for better balance betwe...
 
Rel maint-final
Rel maint-finalRel maint-final
Rel maint-final
 
öZlem özkiliç makale - en
öZlem özkiliç  makale - enöZlem özkiliç  makale - en
öZlem özkiliç makale - en
 
Substation earthing system design optimisation through the application of qua...
Substation earthing system design optimisation through the application of qua...Substation earthing system design optimisation through the application of qua...
Substation earthing system design optimisation through the application of qua...
 
HSE RISK ASSESSMENT
HSE RISK ASSESSMENT HSE RISK ASSESSMENT
HSE RISK ASSESSMENT
 
software-project-management-unit-2.ppt
software-project-management-unit-2.pptsoftware-project-management-unit-2.ppt
software-project-management-unit-2.ppt
 
software-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdfsoftware-project-management-unit-2-220808125214-00921612 (1).pdf
software-project-management-unit-2-220808125214-00921612 (1).pdf
 
Importance of O&M
Importance of O&MImportance of O&M
Importance of O&M
 
DSD-INT 2023 Demo EPIC Response Assessment Methodology (ERAM) - Couvin Rodriguez
DSD-INT 2023 Demo EPIC Response Assessment Methodology (ERAM) - Couvin RodriguezDSD-INT 2023 Demo EPIC Response Assessment Methodology (ERAM) - Couvin Rodriguez
DSD-INT 2023 Demo EPIC Response Assessment Methodology (ERAM) - Couvin Rodriguez
 
Risk Based Design & SCE
Risk Based Design & SCERisk Based Design & SCE
Risk Based Design & SCE
 
ADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based DesignADEPP Monitor & Risk Based Design
ADEPP Monitor & Risk Based Design
 
Show & Tell - Data & Digitalisation, Weather & Predictive Analytics.pdf
Show & Tell - Data & Digitalisation, Weather & Predictive Analytics.pdfShow & Tell - Data & Digitalisation, Weather & Predictive Analytics.pdf
Show & Tell - Data & Digitalisation, Weather & Predictive Analytics.pdf
 
Safety System Modularity
Safety System ModularitySafety System Modularity
Safety System Modularity
 
Strengthening Operational Resilience in Financial Services by Migrating to Go...
Strengthening Operational Resilience in Financial Services by Migrating to Go...Strengthening Operational Resilience in Financial Services by Migrating to Go...
Strengthening Operational Resilience in Financial Services by Migrating to Go...
 
Alert Plus PIOGA Presentation - oct'15
Alert Plus PIOGA Presentation - oct'15Alert Plus PIOGA Presentation - oct'15
Alert Plus PIOGA Presentation - oct'15
 
Alarm information sheet
Alarm information sheet   Alarm information sheet
Alarm information sheet
 
PRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdfPRMG195 - Rsik Management Case Study.pdf
PRMG195 - Rsik Management Case Study.pdf
 

Mais de Community Protection Forum

Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Community Protection Forum
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Community Protection Forum
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...Community Protection Forum
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Community Protection Forum
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...Community Protection Forum
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachCommunity Protection Forum
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Community Protection Forum
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCommunity Protection Forum
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Community Protection Forum
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCommunity Protection Forum
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsCommunity Protection Forum
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesCommunity Protection Forum
 

Mais de Community Protection Forum (20)

The Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in CyberspaceThe Role of the Commonwealth in Cyberspace
The Role of the Commonwealth in Cyberspace
 
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020Industrial Safety and Security in Horizon 2020
Industrial Safety and Security in Horizon 2020
 
New Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants SafetyNew Frontiers for Nuclear Power Plants Safety
New Frontiers for Nuclear Power Plants Safety
 
New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...New Models and New Technologies for an Integrated Risk Management in Complex ...
New Models and New Technologies for an Integrated Risk Management in Complex ...
 
Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?Cyber Security Challenges: how are we facing them?
Cyber Security Challenges: how are we facing them?
 
How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...How Security can be stronger than a Firewall: 13 different ways breaking thro...
How Security can be stronger than a Firewall: 13 different ways breaking thro...
 
Security Projects & Projects Safety
Security Projects & Projects SafetySecurity Projects & Projects Safety
Security Projects & Projects Safety
 
Security of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approachSecurity of the Supply Chain & Commerce Facilitation with a PM approach
Security of the Supply Chain & Commerce Facilitation with a PM approach
 
A Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: SlowreqA Cyberwarfare Weapon: Slowreq
A Cyberwarfare Weapon: Slowreq
 
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
Emergency Electrical Power Supply to Nuclear Safety Systems: design basis and...
 
Touristic Port Security
Touristic Port SecurityTouristic Port Security
Touristic Port Security
 
Cyber Security Applications for Smart Communities
Cyber Security Applications for Smart CommunitiesCyber Security Applications for Smart Communities
Cyber Security Applications for Smart Communities
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
Accidents in the Energy Sector and Energy Infrastructure Attacks in the conte...
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy UnitsSafety and Security Task in the Operation of Multipurpose Italian Navy Units
Safety and Security Task in the Operation of Multipurpose Italian Navy Units
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Smart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable CitiesSmart Cities: Technologies for Efficient and Sustainable Cities
Smart Cities: Technologies for Efficient and Sustainable Cities
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Concrete Applications of Interdependency Management

  • 1. Concrete applications of interdependency management (the cases of INMOTOS and SESMAG projects) Giorgio Gentile D’Appolonia S.p.A. AN ISO 9001 AND ISO 14001 CERTIFIED COMPANY www.dappolonia.it
  • 2. Background Interdependencies among Critical Infrastructures, both intra-domain and inter-domain, are complex to be understood, analysed and managed. Critical Infrastructures risks always change due to new threats, interdependencies and possible scenarios. EU Critical Infrastructures have good contingency plans but they are not always “well proven and optimised contingency plan”, i.e. evaluated in complex scenarios and taking into account dependencies with other Critical Infrastructures contingency plans.
  • 3. … no standards currently exist at EU level concerning the approach to define and adopt Contingency… …interdependencies among Cis are not taken into account…
  • 4. Background - continued EU is lacking coordination in the definition of measures to be undertaken. It is proven that coordination can compensate investments in security, by improving the response effectiveness and providing a more effective means to manage the crisis events. An improved response, as well as, a more effective response can lead to a significant reduction in CI harms and a subsequent reduction of costs to be undertaken to restore the overall system and functions.
  • 5. Background - continued To enhance CI security the security approach should follow two main steps.  The first one is identified by the definition of security policies and guidelines for their implementation.  The second step is identified by the implementation of contingency plans to be adopted in case of need.
  • 6. Security Policies and Guidelines Definition Currently regulations only exist at national level. The 2008/114/EC directive has been a tentative approach for a EU wide regulation in terms of policies and guidelines. Security Policies are used to define the security objectives which a system should be subject to. Security Policies are custom defined by each Owner/Operator according to the existing (if any) national regulations. A set of guidelines addressing how to define a security policy and how to implement it would be effective.
  • 7. Contingency Plans Contingency Plans are used to establish a solid reference of the actions to be undertaken in case of emergency, to mitigate the disaster effects or to restore the system functionalities. Contingency Plans effectiveness and efficiency are difficult to be measured and sometimes it is really expensive. Propagation of positive effects is difficult to be assessed.
  • 9. Background • On 2007, the Council established the specific Programme "Prevention, Preparedness and Consequence Management of Terrorism and other Security related Risks for the Period 20072013” • On September 2008 the Commission adopted the “2009 Annual Work Programme”, specifying its specific objectives and thematic priorities • The Call for Proposals purpose was to award grants to transnational and/or national projects that contribute to the development of the "European Programme for Critical Infrastructure Protection" (EPCIP)
  • 10. Objectives  Definition of a common taxonomy for interdependencies and contingency plans; critical infrastructures  Definition of a methodology for risk assessment of critical infrastructures interdependencies and contingency plans based on simulation;  Design and development of tools for critical infrastructures interdependencies and contingency plans modelling, simulation and risk evaluation  Analysis and validation of contingency plans in complex scenarios taking into account both intra-domain and cross-domain interdependencies
  • 11. Contingency Planning… Contingency Plan definition is A MUST for business continuity assurance and for disaster recovery. Defining a contingency plan requires:  To have experience  On the CI under analysis  On the measures identified and their effectiveness  Extensive analysis  Extensive knowledge of historical events  To be maintained and reviewed/improved It’s difficult to taylor the Contingency Plan in order to make it effective, especially with regard to the costs.
  • 12. …in the Oil&Gas Field ACTIVE MONITORING • • Precise formulas exist Well defined parameters to be monitored – – • • Correct functioning of the system Service Level Agreement measures Monitoring to be carried out by men SCADA systems are used to monitor some parts of the system P decrease at CS (Deviation Detection) is pressure decrease due to a normal load variation? Yes Activities can proceed Normally without additional actions No Verify the instruments functionality in C.R. and on field are the instruments working? No Repair the instruments. Activities can proceed normally Yes Verify the Flowrate at RT is the flowrate decreasing? No Yes Initialize Emergency Notification to ERT Coordinator. ___ Possible Leak in Zone "1", “2” or Zone "3" Start further verifications and checks. Activities can proceed normally if within the operating limits
  • 13. …in the ICT Field • • • • Main measures are referred to availability and performance of the whole system Monitoring is mostly automatic Actions to be performed are mostly automatic Effectiveness is easier to be evaluated
  • 14. INMOTOS Approach The main focuses for the INMOTOS project are represented by the interdependencies among infrastructures and the contingency plans adopted in case of emergency. Both the Critical Infrastructures and the Contingency Plans are modeled as Coloured Petri Nets (CPN). The assessment of CI risks and validation of Contingency Plan is performed by simulating their behaviour against a likely scenario. Risk is evaluated at different layers and be seen as an aggregation of lower risks level (top-down or bottom-up approach).
  • 19. Project Objectives • SESMAG aims at ensuring a low cost and replicable study for the evaluation and implementation of a minimum set of security requirements to increase Smart Grids security and resilience. • The study aims at providing a set of guidelines to define how to implement secure smart grids and, on a scenario basis, a set of requirements/measures to be implemented by the stakeholders. • Such an approach will allow for a convergent approach across Europe towards a secure implementation of the Smart Grids and of the energy infrastructures, ensuring a more reliable energy production and distribution across the network. • The project outcome will ensure an increased resilience of the energy networks to cyber attacks and physical outages due to mis-configuration of the connected producing systems or unbalanced distribution and production algorithms.
  • 20. Proposed Objectives • SESMAG Project should: – – – – Analyse the currently deployed situation and the applicable best practices Define a catalog of current vulnerabilities, threats/hazards and countermeasures Perform a risk assessment Define a set of guidelines for Secure and Resilient Smart Grids implementation An IT support tool will be developed to support the user in the analysis of the deployed grid.
  • 22. Brussels Podgorica Beijing Seoul Cairo Istanbul St. Petersburg Abu Dhabi Rome Milan Viareggio Naples Brindisi Palermo D’Appolonia S.p.A. Headquarters: Via San Nazaro,19 16145 Genova – Italy Tel. +39 010 3628148 Fax +39 010 3621078 E-mail: dappolonia@dappolonia.it Web site http://www.dappolonia.it