SlideShare uma empresa Scribd logo
1 de 34
Baixar para ler offline
Cybersecurity for Smart Grids:
Technical Approaches to Improve
Cybersecurity
Presentation by Cyril W. Draffin, Jr.
Project Advisor, MIT Energy Initiative
Stefano Bracco
Knowledge Manager, Agency for the Cooperation of
Energy Regulators
David Batz
Security and Business Continuity, Edison Electric Institute
International Energy Agency’s International Smart Grid Action
Network (ISGAN) Academy – 2nd Cybersecurity Webinar
11 September 2017
1
ISGAN in a nutshell
International Smart Grid Action Network TCP (ISGAN)
‘Strategic platform to support high-level government attention and action for
the accelerated development and deployment of smarter, cleaner electricity
grids around the world’
 An initiative of the Clean Energy Ministerial (CEM)
 Organized as the Implementing Agreement for a
Co-Operative Programme on Smart Grids (ISGAN)
The CEM is the only multilateral forum dedicated
exclusively to the advancement of clean energy
technologies and related policies. ISGAN is the only
global government-to-government forum on smart grids
2
Geography of ISGAN
3
Swedish Energy Agency
Commonwealth Scientific
and Industrial Research
Organization
Government of Canada
Norwegian Ministry of Petroleum and Energy
New Energy and Industrial
Technology Development
Organization (NEDO)
Sustainable Energy
Authority of Ireland
Government of Belgium
Forschungszentrum JĂźlich GmbH
Government of the Netherlands,
Ministry of Economic Affairs,
Agriculture and Innovation
Union Fenosa Distribucion
Government of Austria
Government of France
Swiss Federal
Office of
Energy Government of Korea
European Commission
South African National
Energy Development Institute
Energy Market
Authority, Singapore
Government of India
MOP, NSGM,
POWER GRID, CPRI
Government of Mexico
U.S. Department of Energy
Ricerca sul Sistema Energetico (RSE S.p.A.)
Contracting Parties: 25
Invited: Malaysia
Expression of Interest: UAE
Ministry of Science and Technology
Department of High and New
Technology Development and
Industrialization
Russian Energy Agency
Tekes (Finnish Funding Agency for Technology and Innovation)
Danish Energy Agency
Activities of ISGAN
4
For more information, please visit:
o ISGAN: www.iea-isgan.org
Topics for
Cybersecurity for Smart Grids Webinar #2:
Technical Approaches to Improve
Cybersecurity
1. Cybersecurity Challenges
2. Cybersecurity Approach and Best Practices
3. Case Studies
4. Cyber Professionals
5. Regulatory and Legal Constraints of architecting smart
grids in a secure way
6. Measures of Success
7. Conclusions
5
Market and Technology
• Smart Grid and digital evolution
• Highly inter-connected platforms with a number of actuators and
sensors (with wide geographical area)
• Decision-making delegated to machines (Distributed Control Systems)
• New intelligent control devices which have to cooperate with old
control devices (which are not easy to replace)
• Changing business models with more actors involved
• Distributed Energy Resources, with renewable resources that have
intermittent behaviour, with multiple ownerships and cybersecurity
practices
• Demand changes, dynamic pricing and need for inclusion of new actors
(for example “prosumers” and aggregators) with impact on electricity
systems
Electricity Market Challenges
affecting Cybersecurity
Cybersecurity Challenges
6
Management
• Evolving cyber threats
• Hacking groups trying to find vulnerabilities embedded in the existing
security measures, and seeking undiscovered vulnerabilities of control
systems
• Potential role of nation states
• Potential national or cross-border impact of attacks and incidents,
related to the “weakest link problem”
• Existing governance versus best practices
• Agility important-- impossible to predict what will happen
• Forensics methods and technologies (applicable to standard IT systems
and their security measures) may not work as well on Operational
systems
• How much cybersecurity expenditures are sufficient?-- cost of
cybersecurity
Management Challenges
affecting Cybersecurity
Cybersecurity Challenges
7
Cybersecurity Approaches
• Threat and risk management system
 Pursue a harmonized, structured and comprehensive way to identify operators of essential
services for the energy sector at regional level
 Structured risk analysis and risk treatment plan specific for the highly interdependent European
and US energy sectors
 Cyber security maturity framework
 Regional cooperation on cyber security topics
 Control and secure disclosure of vulnerabilities and incidents affecting the energy sector in its
crucial role
• Effective cyber response framework
 Define and implement a cyber response and coordination framework
 Implement and strengthen regional cooperation for efficient handling of cyber emergencies
when energy is involved and affected
 Improve cyber resilience in the energy sector
• Build-up adequate capacity and competences
 Build competences
 Provide knowledge, including frameworks and best practices
 Promote research
Cybersecurity Approaches
8
A maturity model is a set of characteristics, attributes, indicators, or patterns that
represent capability and progression in a particular discipline.
Model content typically exemplifies best practices and may incorporate standards
or other codes of practice of the discipline. It provides a benchmark against which
an organization can evaluate the current level of capability of its practices,
processes, and methods and set goals and priorities for improvement.
When a model is widely used in a particular industry (and assessment results are
shared), organizations can benchmark their performance against other
organizations. An industry can determine how well it is performing overall by
examining the capability of its member organizations.
Maturity Model
Cybersecurity Approaches
9
10 Domains In Maturity Model:
Logical grouping of cybersecurity practices
• Risk Management
• Asset, Change, and
Configuration Management
• Identity and Access
Management
• Threat and Vulnerability
Management
• Situational Awareness
• Information Sharing and
Communications
• Event and Incident Response,
Continuity of Operations
• Supply Chain and External
Dependencies Management
• Workforce Management
• Cybersecurity Program
Management
Cybersecurity Approaches
10
Information Technology and Operations Technology
Systems
Cybersecurity Approaches
11
Information Technology
1. Confidentiality (most important)
2. Integrity
3. Availability
versus-------------------------------------------------------------------------------------------
Confidentiality
(most important)
Integrity
Availability
Availability
(most important)
Integrity
Confidentiality
Operations Technology
1. Availability (most important)
2. Integrity
3. Confidentiality
How the European Commission Clean Energy
Package acknowledges Cybersecurity
• The legislative proposals put emphasis on smarter and more
efficient management of the grid, by using digital technologies and
the flexibility of consumers and their electrical appliances
• Innovation is at the core of the package, from renewable energy
legislation, to energy efficiency and the new market design
proposals
• The package acknowledges the importance of cyber security for
the energy sector, and the need to duly assess cyber-risks and their
possible impact on the security of supply.
• It proposes the adoption of measures to prevent and mitigate the
risks identified as well as the adaption of technical rules for
electricity (i.e. a Network Code) on cyber-security.
12
Cybersecurity Approaches
Energy Expert Cyber Security Platform (EECSP)-
Expert Group
13
10 cyber security challenges in the energy
sector
(reference: EECSP Report)
Electricity Oil Gas Nuclear
1 Grid stability in a cross-border interconnected
energy
network.
x x x
2 Protection concepts reflecting current threats and
risks.
x x x x
3 Handling of cyber-attacks within the EU. x x x x
4
Effects by cyber-attacks not fully considered in the
design rules of an existing power grid or nuclear
facility
x x
5 Introduction of new highly interconnected
technologies
and services.
x x
6 Outsourcing of infrastructures and services. x x x
7 Integrity of components used in energy systems. x x x
8 Increased interdependency among market players. x
9 Availability of resources and their competences. x x x x
10 Constraints imposed by cyber security measures in
contrast to real-time/availability requirements.
x x x
Cybersecurity Approaches
Present Coverage In European Union
Regulation
14
Strategy and Legislation
Strategy papers
• EU Cyber Security Strategy
• Digital Single Market Strategy
• 50 national cyber security strategies
Legislation with
focus on cyber
security for critical
infrastructure
providers
• Network and Information Security (NIS)
Directive
• European Programme for Critical
Infrastructure Protection (EPCIP) Directive
• Contractual Public-Private Partnership
Legislation with
focus on security of
supply
• Security of Supply (SoS) Directive
• Security of Gas Supply Regulation
Legislation with focus
on data protection
and privacy
• General Data Protection Regulation (GDPR)
• Data Protection Impact Assessment
(DPIA) Template
Cybersecurity Approaches
Strategic Priorities (European perspective)
15
Strategic Priorities Strategic Areas Areas of Actions
I
Set-up an effective
threat and risk
management
system
European threat and risk landscape and
treatment
1. Identification of provider of essential
services for the energy sector at EUlevel.
2. Risk analysis and treatment.
3. Framework of rules for a
regional cooperation.
4. EU framework for vulnerabilities disclosure
for the energy sector.
Identification of provider of essential services
Best practice and information exchange
Forster international collaboration
II
Set-up an effective
cyber defence
framework
Cyber response framework 5. Define and implement cyber
response framework and
coordination.
6. Implement and strengthen the regional
cooperation for emergency handling
Crisis management
III
Continuously
improve cyber
resilience
European cyber security maturity framework
7. Establish a European cyber security
maturity framework for energy.
8. Establish a cPPP for supply chain integrity
9. Foster European and
international collaboration
Supply chain integrity framework for
components
Best practice and information exchange
Awareness campaign from top level EU
institutions
IV
Build-up the
required capacity
and competences
Capacity & competence build-up 10. Capacity and competence build-up.
Cybersecurity Approaches
Core European documents under review in
2017-2018
• EU Cyber Security Strategy is under review
• German EU Strategy and others were
reviewed in 2016
• Others strategies expected as a result of the
NIS (Network and Information Security)
Directive
16
Cybersecurity Approaches
Best Practices
• No comprehensive best practices, but:
– Big TSOs and DSOs are already applying existing standards
that may be helpful (e.g. ISO 27000 Series and NERC CIP)
– BSI is a reference in Germany (https://www.bsi.bund.de)
– ANSSI (The French CIIP Framework -
https://www.ssi.gouv.fr/en/cybersecurity-in-france/ciip-in-
france/) in France with two different approaches
– ENISA is working hard at EU Level with a number of
publications every year: most of them provide
recommendations and analysis at EU Level, and are
complemented by the work done by DG ENERGY and DG
JRC of the European Commission.
17
Cybersecurity Approaches
Case Study 1 – Advanced Metering Infrastructure
Background
The Advanced Metering Infrastructure (AMI) is now being rapidly deployed throughout
the power grid, and is an enabling technology for smart grid. Identifying the attack
surface is a necessary step in achieving cyber security in smart grids and AMI.
Source: https://arxiv.org/ftp/arxiv/papers/1607/1607.04811.pdf
Case Studies
An attacker may target an AMI in several ways, which may result in several/different
risks for the operator involved.
Main potential objectives for such an attack:
• Intelligence gathering;
• Infecting the target AMI systems;
• AMI exploitation (use for profit);
• AMI exfiltration (transfer of data);
• Maintaining control on this capability on short, medium, long run.
Needed definition: cyber attack surface can be defined by the methods an environment
or a system can be attacked by an adversary to introduce or retrieve data from that
environment or system.
Analysis
18
Case Study 1 – Advanced Metering Infrastructure
(continued)
Analysis
 Surface is composed of:
 Smart Meters
 IR Port
 Internal Link
 Firmware
 Micro Controller
 Radio
 AMI Information and Communication Network
 Smart Meter Data Collector – SMDCs
 Similar to Smart Meters
 AMI-Head End
 Interface with the Utility Infrastructure
 Outage Management Systems (Restoration capability)
 Energy Management System (Dispatch and monitoring)
 Master Data Management Systems
 Corporate WAN
 Protocols and Software
 Weak Encryption keys
 Smart Energy Profile 2.0
 KillerBee to hack AMI
 Many attacks possible on 3G/4G/LTE
Case Studies
19
Possible Counter-measures
• Create closed and proprietary security solutions;
• Use Open Standards and architect things in a way that “red points” will be green (or
removed from the list);
• Interim measure is to analyse existing devices, to identify the surface, and to
mitigate the risks.
Global Smart Grid Federation’s Smart Meter Security Survey, August 2016
http://www.globalsmartgridfederation.org/wp-content/uploads/2016/08/smart_meter_security_survey.pdf
http://ics.sans.org/media/IT-OT-Convergence-NexDefense-Whitepaper.pdf
Cyber Attack Surface Analysis of Advanced Metering Infrastructure
AMI Surface https://arxiv.org/ftp/arxiv/papers/1607/1607.04811.pdf
https://www.sans.org/reading-room/whitepapers/forensics/forensic-analysis-industrial-control-systems-
36277
Proof-of-concept ransomware locks up the PLCs that control power plants
http://www.cap.gatech.edu/plcransomware.pdf
Case Studies
20
Case Study 1 – Advanced Metering Infrastructure
(continued)
Case Study 2 – Process and Tool Adoption- toward
a secure and resilient power distribution grid
Background
The tight interaction of the control applications with communication networks and
physical components, such as sensors and actuators in a complex cyber-physical system,
is of paramount importance in order to assure that the system can be introduced in a
working environment and can provide the certain level in respect to new risks deriving
from new components tools and processes.
In this respect more work has to be done to establish, well before the adoption, how
“secure” is a system in respect to the already existing and established operations, and if
a change in operations can impact the security of the system.
Source: http://ieeexplore.ieee.org/document/7778800/
Case Studies
21
Case Study 2 – Process and Tool Adoption- toward
a secure and resilient power distribution grid (continued)
Analysis
In the DERs, local controls are capable to keep grid voltage in a certain range. Additional central
controllers may implement high-level objectives such as loss minimization or minimum generator
shedding.
While most of the systems are robust enough to overcome issues such as a weak communication
channel, there is no assurance of non vulnerability to cyber-attacks.
In this context we have to consider that technical protection measures can be of two kinds:
• ICT Security Measures (e.g. Firewall, IDP, Authentication)
• System/control-theoretic measures (e.g. model-based attack/fault detection and isolation, robust
control strategies that maintain closed-loop stability and performance guarantees)
Several recommendations are already in place.
Attacks spans Data Integrity, DoS (Denial of Service), Delay Attacks.
Findings
• A workbench to assure and test that all possible technical measures are taken into
consideration is still needed, but a comprehensive tool is not available.
• This must be part of the tasks of a control engineer when developing similar
systems, who needs to apply a more holistic approach to the engineering phase of
similar tools.
Case Studies
22
Case Study 2 – Process and Tool Adoption- toward
a secure and resilient power distribution grid (continued)
Counter-measures
• Security by design is the first advice.
• ICT Measures and control theoretic protection measures have to work together to
properly address risks which may be hidden to a preliminary analysis.
• Should be a “mantra” for the procurement of new equipment.
• Same analysis must be performed when an interconnected ICT or control
theoretic protection measure is affected by any change.
Case Studies
23
Case Study 3 – Ransomware / Wipers for
Industrial Control Systems
Background
Georgia Institute of Technology released an academic paper on use of a cross-vendor
Ransomware worm working on Programmable Logic Controllers (PLCs).
Due to a weak authentication, attacker is capable to lock out an administrator, installing
a logical bomb.
Conficker and Stuxnet used MS08-067. It is not impossible that a virus for ICS will use
MS17-010 as WannaCry/WannaCrypt did. In this case we may face safety/critical
shutdown, or worse.
“US-CERT released the following documents that contain in-depth technical analysis on
the Petya malware, as well as indicators of compromise and additional
recommendations for mitigation….. The following product vendors have proactively
issued notifications with recommendations for users regarding the Petya ransomware
(ICS-CERT will update the list of vendors that have released customer notifications as
additional information becomes available):”
Source: http://www.cap.gatech.edu/plcransomware.pdf
http://iiot-world.com/cybersecurity/the-impact-of-wannacry-on-industrial-control-systems-ics/
https://ics-cert.us-cert.gov/alerts/ICS-ALERT-17-181-01C
Case Studies
24
Case Study 3 – Ransomware / Wipers for
Industrial Control Systems (continued)
Analysis
Ransomware (including WannaCry used in 2017) is a typical extortion crime on a
company, instead on a (more common) population of potential targets.
• To implement a similar attack in practice, you will need still to use a “Trojan horse”
to inject the Ransomware.
• The Georgia Institute of Technology paper describes the side effects: profit, which in
normal circumstances would be Population*Value-Cost, in this case will be difficult
to estimate. In Smart Grids, where data are imperative to continue business, the
damage may be huge, and the restoration may be difficult if not properly addressed
in existing procedure at any level of the company.
• Collateral damages may include downtime, Equipment Health, Human Safety.
• The negotiation phase may be particularly lengthy as the financial values may be
extremely high and the legal consequences may be extremely severe for the
company, in case it would be found guilty.
On NotPetya (used in 2017) there were several abilities put in a single worm, that can
shut down operating systems, and “wipe” away information in data bases.
Case Studies
25
Case Study 3 – Ransomware / Wipers for
Industrial Control Systems (continued)
Counter-measures
• End-point security
• Network security (including backups of all configurations)
• Adoption of proper policies, including software updates
• Proper selection and management of contractors, and proper hand-over if your ITs
and OTs are managed by a Third Party
• Safeguards to protect information assets related to IT and OT equipment
• Strict control on change management and supply chain
• Isolate or protect vulnerable embedded systems that cannot be patched from
potential network exploitation
• Locate control system networks and devices behind firewalls, and isolate them from
the business network
• Engagement with regional / national defence agencies
Case Studies
26
Cybersecurity Professionals
Basic Skills
• Sound knowledge of IT and OT;
• In depth knowledge of the Security Domains (including physical security);
• Being able to analyse emerging threats in complex and interconnected infrastructures with limited
or partial inputs, and without being able to stop operations;
• Both high level and low level knowledge (processes and protocols).
Possible certifications
• Several in the field of cyber security (e.g. CISSP, CEH, others at different levels);
• Smart Grid Maturity Model Navigator is example of a good start for specific field related
certifications (http://www.sei.cmu.edu/training/P109.cfm)
Advantages of certification
• Baseline on knowledge for network operators recognised and accepted by all;
• Trust among operators and their own staff;
• As in aviation, rules in case of crises are known and common to all the community;
• Staff can be recognised as part of a community system.
For the future
If we certify equipment which can operate on smart grids, why not to certify people?
A schema has to be developed. To make fast progress, there is a need for:
o Training
o Awareness campaigns in the sector
o Extensive cooperation to identify core skills and methods
Professionals
27
Regulatory and Legal Constraints in European Union
 Smart Grids may be based on Best Available Techniques and
BREF (BAT Reference Document); This is very much depending
on the regulation; Right now it is just a reccomendation
 Nation States, such as Germany and France, have very stringent
requirements (Catalogue of IT security requirements under
section 11(1a) of the Energy Act)
Regulatory Constraints
Electricity and gas network operators are required to implement a minimum level
of IT security. The core requirement is the establishment of an information
security management system (ISMS) with certification to DIN ISO/IEC 27001 by
31 January 2018.
https://www.bundesnetzagentur.de/EN/Areas/Energy/Companies/SecurityOfSup
ply/ITSecurity/ITSecurity_node.html
28
Regulatory and Legal Constraints in European Union
(continued)
 GDPR will be applicable as from 25 May 2018 – It is already
having an impact on Smart Grid decisions (e.g. Time of retrieval
of the information from Smart Meters)
 There is a general need to coordinate National Efforts and
European Efforts
 When dealing with Standards, International efforts are needed
to make sure that standards and/or local legislations will not
collide, jeopardising the efforts of the communities producing
standards and of the international communities regulating the
cyberspace (having a standard which issues technical rules but
doesn’t take into consideration GDPR or NIS Directive may be
counterproductive)
29
Regulatory Constraints
Regulatory and Legal Constraints in United States
 Regulatory and legal constraints of architecting smart
grids in a secure way
 Bulk Electric System at a Federal level (1) vs. distribution
controlled by U.S. States/Territories (56)
30
Regulatory Constraints
Measures of Success for Cybersecurity for Smart
Grids
 Smart Grids that are secure, reliable and protect
customer data and information require:
 Engagement with National and International Authorities that
can play an important role in regulating, enforcing, monitoring
and protecting the grids from emerging risks.
 Effective response plans to recover from cyber incidents or
attacks are completed and understood
Measures of Success
31
Conclusions
• Smart Grids will grow in size and achieve higher levels of efficiency through
the adoption of new intelligent devices (including Internet of Things, and use of
the Cloud)
• Cyber threats will continue
• Technical risk management work has to be done
– Efficient methods and processes needed to speed up the mitigation of all
cybersecurity challenges, using appropriate standards and best practices, using an
iterative approach to improvement
– Understand the issues and the full risk landscape (use Computer Security Incident
Response Teams and the implementation of European NIS Directive)
– Operators should think about Maturity Models to evaluate the status of their
cybersecurity preparedness.
• Cooperation needed between institutional, regulatory, research, and market
actors—both nationally and internationally
– Report when things do not work as expected
• Cybersecurity for energy is an essential investment for the future of our civil
society
– Cybersecurity for energy has to be addressed in the short, medium, and long term
– We have a chance to mitigate risks through the adoption of proper actions
Security is your responsibility 32
Questions & Comments
Contacts:
Cyril Draffin
Email: draffin@alum.mit.edu
Stefano Bracco
Email: Stefano.BRACCO@acer.europa.eu
David Batz
Email: dbatz@eei.org
Cyril W. Draffin, Jr.
MIT Energy Initiative, E19-307
77 Massachusetts Avenue
Cambridge, Massachusetts, 02139-4307, USA
Stefano Bracco
Agency for the Cooperation of Energy Regulators
Trg Republike, 3 - TR3 12/20
SI-1000 – Ljubljana, Slovenia
David Batz
Edison Electric Institute
701 Pennsylvania Avenue, NW
Washington, DC , 20004-2696, USA
ISGAN Academy coordination:
Institute for Research in Technology
Comillas Pontifical University
Santa Cruz de Marcenado 26
28015 Madrid, Spain
International Energy Agency’s (IEA) International Smart Grid Action
Network (ISGAN) Academy – 2nd Cybersecurity Webinar
Cybersecurity for Smart Grids: Technical Approaches to
Improve Cybersecurity
33
34
This recorded cybersecurity webinar and previous webinars are available at ISGAN Academy platform:
http://www.leonardo-energy.org/resources/1070/isgan-academy-58ec8d2e7b9b0
ISGAN Academy Webinars
• Jeju Island Smart Grid Project (in Korea)
• Reference Network Models (tools for large scale distribution
network planning)
• TSO Reliability Management: a probabilistic approach for better
balance between reliability & costs (GARPUR project, Europe)
• Integration of RES in power systems: transmission networks
issues (Renewable Energy Sources)
• Cybersecurity for Smart Grids: Vulnerabilities and Strategies
to Provide Cybersecurity
(1st Cybersecurity Webinar; 28 June 2017)

Mais conteĂşdo relacionado

Mais procurados

Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
Smart Grid Components Control Elements & Smart Grid Technology
Smart Grid Components Control Elements & Smart Grid TechnologySmart Grid Components Control Elements & Smart Grid Technology
Smart Grid Components Control Elements & Smart Grid TechnologySurajPrakash115
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart citysanalkumar k
 
smart grid:the future grid
smart grid:the future gridsmart grid:the future grid
smart grid:the future gridPRAVEENKUMARSINGH87
 
Artificial Intelligence in Smart Grid
Artificial Intelligence in Smart GridArtificial Intelligence in Smart Grid
Artificial Intelligence in Smart Gridijtsrd
 
Smart grid ppt seminar topic
Smart grid ppt seminar topic Smart grid ppt seminar topic
Smart grid ppt seminar topic ramesh kumawat
 
Blockchain Transactive Energy _ BEC (july 15th 2018) pdf
Blockchain Transactive Energy _ BEC (july 15th 2018) pdfBlockchain Transactive Energy _ BEC (july 15th 2018) pdf
Blockchain Transactive Energy _ BEC (july 15th 2018) pdfcrlima10
 
Cyber Physical System: Architecture, Applications and Research Challenges
Cyber Physical System: Architecture, Applicationsand Research ChallengesCyber Physical System: Architecture, Applicationsand Research Challenges
Cyber Physical System: Architecture, Applications and Research ChallengesSyed Hassan Ahmed
 
Distributed and Cloud Computing 1st Edition Hwang Solutions Manual
Distributed and Cloud Computing 1st Edition Hwang Solutions ManualDistributed and Cloud Computing 1st Edition Hwang Solutions Manual
Distributed and Cloud Computing 1st Edition Hwang Solutions Manualkyxeminut
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesNavjyotsinh Jadeja
 
Cloud computing
Cloud computingCloud computing
Cloud computingSyam Lal
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733SIVA SASTHRI
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 
The Impacts of Cyber Physical Systems on Products
The Impacts of Cyber Physical Systems on ProductsThe Impacts of Cyber Physical Systems on Products
The Impacts of Cyber Physical Systems on ProductsArian Razmi Farooji
 
Smart energy meter ppt
Smart energy meter   pptSmart energy meter   ppt
Smart energy meter pptRitam Giri
 

Mais procurados (20)

Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Smart Grid Components Control Elements & Smart Grid Technology
Smart Grid Components Control Elements & Smart Grid TechnologySmart Grid Components Control Elements & Smart Grid Technology
Smart Grid Components Control Elements & Smart Grid Technology
 
Iot for smart city
Iot for smart cityIot for smart city
Iot for smart city
 
smart grid:the future grid
smart grid:the future gridsmart grid:the future grid
smart grid:the future grid
 
Artificial Intelligence in Smart Grid
Artificial Intelligence in Smart GridArtificial Intelligence in Smart Grid
Artificial Intelligence in Smart Grid
 
Smart grid ppt seminar topic
Smart grid ppt seminar topic Smart grid ppt seminar topic
Smart grid ppt seminar topic
 
Blockchain Transactive Energy _ BEC (july 15th 2018) pdf
Blockchain Transactive Energy _ BEC (july 15th 2018) pdfBlockchain Transactive Energy _ BEC (july 15th 2018) pdf
Blockchain Transactive Energy _ BEC (july 15th 2018) pdf
 
Cyber security for smart grid
Cyber security for smart grid Cyber security for smart grid
Cyber security for smart grid
 
Cyber Physical System: Architecture, Applications and Research Challenges
Cyber Physical System: Architecture, Applicationsand Research ChallengesCyber Physical System: Architecture, Applicationsand Research Challenges
Cyber Physical System: Architecture, Applications and Research Challenges
 
Distributed and Cloud Computing 1st Edition Hwang Solutions Manual
Distributed and Cloud Computing 1st Edition Hwang Solutions ManualDistributed and Cloud Computing 1st Edition Hwang Solutions Manual
Distributed and Cloud Computing 1st Edition Hwang Solutions Manual
 
Smart grid
Smart gridSmart grid
Smart grid
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
 
The Impacts of Cyber Physical Systems on Products
The Impacts of Cyber Physical Systems on ProductsThe Impacts of Cyber Physical Systems on Products
The Impacts of Cyber Physical Systems on Products
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
Smart energy meter ppt
Smart energy meter   pptSmart energy meter   ppt
Smart energy meter ppt
 

Semelhante a Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity

OEB Cyber Security Framework
OEB Cyber Security FrameworkOEB Cyber Security Framework
OEB Cyber Security FrameworkNorbi Hegedus
 
T063500000200201 ppte
T063500000200201 ppteT063500000200201 ppte
T063500000200201 ppteyasinalimohammed
 
SmartGrid System Report
SmartGrid System ReportSmartGrid System Report
SmartGrid System ReportGruene-it.org
 
Show and Tell - Data and Digitalisation, Digital Twins.pdf
Show and Tell - Data and Digitalisation, Digital Twins.pdfShow and Tell - Data and Digitalisation, Digital Twins.pdf
Show and Tell - Data and Digitalisation, Digital Twins.pdfSIFOfgem
 
Allen hefner presentation
Allen hefner presentationAllen hefner presentation
Allen hefner presentationGreen17Creative
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDS
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDSBUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDS
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDSiQHub
 
2018 10-distribution automation-trends-andchallenges
2018 10-distribution automation-trends-andchallenges2018 10-distribution automation-trends-andchallenges
2018 10-distribution automation-trends-andchallengesAbhilash Gopalakrishnan
 
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...KTN
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideAngela Hays
 
TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyzdooly
 
SMART GRID BY BITAN DAS
SMART GRID BY BITAN DASSMART GRID BY BITAN DAS
SMART GRID BY BITAN DASBitan Das
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Miguel A. Amutio
 
Tralli
TralliTralli
TralliNASAPMC
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Smart Grid Interoperability Panel
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Jenny Jenish kyzy
 

Semelhante a Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity (20)

OEB Cyber Security Framework
OEB Cyber Security FrameworkOEB Cyber Security Framework
OEB Cyber Security Framework
 
T063500000200201 ppte
T063500000200201 ppteT063500000200201 ppte
T063500000200201 ppte
 
SmartGrid System Report
SmartGrid System ReportSmartGrid System Report
SmartGrid System Report
 
Microgrid Testbed at a Glance
Microgrid Testbed at a GlanceMicrogrid Testbed at a Glance
Microgrid Testbed at a Glance
 
Show and Tell - Data and Digitalisation, Digital Twins.pdf
Show and Tell - Data and Digitalisation, Digital Twins.pdfShow and Tell - Data and Digitalisation, Digital Twins.pdf
Show and Tell - Data and Digitalisation, Digital Twins.pdf
 
Allen hefner presentation
Allen hefner presentationAllen hefner presentation
Allen hefner presentation
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
V-ELEC 12 Redes Inteligentes en la Region LAC, vision 2030
V-ELEC 12 Redes Inteligentes en la Region LAC, vision 2030V-ELEC 12 Redes Inteligentes en la Region LAC, vision 2030
V-ELEC 12 Redes Inteligentes en la Region LAC, vision 2030
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDS
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDSBUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDS
BUILDING SMART, RESILIENT CYBER-SECURE MICROGRIDS
 
2018 10-distribution automation-trends-andchallenges
2018 10-distribution automation-trends-andchallenges2018 10-distribution automation-trends-andchallenges
2018 10-distribution automation-trends-andchallenges
 
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
TSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdoolyTSSG Security research unit May11_zdooly
TSSG Security research unit May11_zdooly
 
SMART GRID BY BITAN DAS
SMART GRID BY BITAN DASSMART GRID BY BITAN DAS
SMART GRID BY BITAN DAS
 
Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...Using cloud services: Compliance with the Security Requirements of the Spanis...
Using cloud services: Compliance with the Security Requirements of the Spanis...
 
Tralli
TralliTralli
Tralli
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 

Mais de Leonardo ENERGY

A new generation of instruments and tools to monitor buildings performance
A new generation of instruments and tools to monitor buildings performanceA new generation of instruments and tools to monitor buildings performance
A new generation of instruments and tools to monitor buildings performanceLeonardo ENERGY
 
Addressing the Energy Efficiency First Principle in a National Energy and Cli...
Addressing the Energy Efficiency First Principle in a National Energy and Cli...Addressing the Energy Efficiency First Principle in a National Energy and Cli...
Addressing the Energy Efficiency First Principle in a National Energy and Cli...Leonardo ENERGY
 
Auctions for energy efficiency and the experience of renewables
 Auctions for energy efficiency and the experience of renewables Auctions for energy efficiency and the experience of renewables
Auctions for energy efficiency and the experience of renewablesLeonardo ENERGY
 
Energy efficiency first – retrofitting the building stock final
Energy efficiency first – retrofitting the building stock finalEnergy efficiency first – retrofitting the building stock final
Energy efficiency first – retrofitting the building stock finalLeonardo ENERGY
 
How auction design affects the financing of renewable energy projects
How auction design affects the financing of renewable energy projects How auction design affects the financing of renewable energy projects
How auction design affects the financing of renewable energy projects Leonardo ENERGY
 
Energy Efficiency Funds in Europe (updated)
Energy Efficiency Funds in Europe (updated)Energy Efficiency Funds in Europe (updated)
Energy Efficiency Funds in Europe (updated)Leonardo ENERGY
 
Energy Efficiency Funds in Europe
Energy Efficiency Funds in EuropeEnergy Efficiency Funds in Europe
Energy Efficiency Funds in EuropeLeonardo ENERGY
 
Five actions fit for 55: streamlining energy savings calculations
Five actions fit for 55: streamlining energy savings calculationsFive actions fit for 55: streamlining energy savings calculations
Five actions fit for 55: streamlining energy savings calculationsLeonardo ENERGY
 
Recent energy efficiency trends in the EU
Recent energy efficiency trends in the EURecent energy efficiency trends in the EU
Recent energy efficiency trends in the EULeonardo ENERGY
 
Energy and mobility poverty: Will the Social Climate Fund be enough to delive...
Energy and mobility poverty: Will the Social Climate Fund be enough to delive...Energy and mobility poverty: Will the Social Climate Fund be enough to delive...
Energy and mobility poverty: Will the Social Climate Fund be enough to delive...Leonardo ENERGY
 
Does the EU Emission Trading Scheme ETS Promote Energy Efficiency?
Does the EU Emission Trading Scheme ETS Promote Energy Efficiency?Does the EU Emission Trading Scheme ETS Promote Energy Efficiency?
Does the EU Emission Trading Scheme ETS Promote Energy Efficiency?Leonardo ENERGY
 
Energy efficiency, structural change and energy savings in the manufacturing ...
Energy efficiency, structural change and energy savings in the manufacturing ...Energy efficiency, structural change and energy savings in the manufacturing ...
Energy efficiency, structural change and energy savings in the manufacturing ...Leonardo ENERGY
 
Energy Sufficiency Indicators and Policies (Lea Gynther, Motiva)
Energy Sufficiency Indicators and Policies (Lea Gynther, Motiva)Energy Sufficiency Indicators and Policies (Lea Gynther, Motiva)
Energy Sufficiency Indicators and Policies (Lea Gynther, Motiva)Leonardo ENERGY
 
The Super-efficient Equipment and Appliance Deployment (SEAD) Initiative Prod...
The Super-efficient Equipment and Appliance Deployment (SEAD) Initiative Prod...The Super-efficient Equipment and Appliance Deployment (SEAD) Initiative Prod...
The Super-efficient Equipment and Appliance Deployment (SEAD) Initiative Prod...Leonardo ENERGY
 
Modelling and optimisation of electric motors with hairpin windings
Modelling and optimisation of electric motors with hairpin windingsModelling and optimisation of electric motors with hairpin windings
Modelling and optimisation of electric motors with hairpin windingsLeonardo ENERGY
 
Casting zero porosity rotors
Casting zero porosity rotorsCasting zero porosity rotors
Casting zero porosity rotorsLeonardo ENERGY
 
Direct coil cooling through hollow wire
Direct coil cooling through hollow wireDirect coil cooling through hollow wire
Direct coil cooling through hollow wireLeonardo ENERGY
 
Motor renovation - Potential savings and views from various EU Member States
Motor renovation - Potential savings and views from various EU Member StatesMotor renovation - Potential savings and views from various EU Member States
Motor renovation - Potential savings and views from various EU Member StatesLeonardo ENERGY
 
The need for an updated European Motor Study - key findings from the 2021 US...
The need for  an updated European Motor Study - key findings from the 2021 US...The need for  an updated European Motor Study - key findings from the 2021 US...
The need for an updated European Motor Study - key findings from the 2021 US...Leonardo ENERGY
 
Efficient motor systems for a Net Zero world, by Conrad U. Brunner - Impact E...
Efficient motor systems for a Net Zero world, by Conrad U. Brunner - Impact E...Efficient motor systems for a Net Zero world, by Conrad U. Brunner - Impact E...
Efficient motor systems for a Net Zero world, by Conrad U. Brunner - Impact E...Leonardo ENERGY
 

Mais de Leonardo ENERGY (20)

A new generation of instruments and tools to monitor buildings performance
A new generation of instruments and tools to monitor buildings performanceA new generation of instruments and tools to monitor buildings performance
A new generation of instruments and tools to monitor buildings performance
 
Addressing the Energy Efficiency First Principle in a National Energy and Cli...
Addressing the Energy Efficiency First Principle in a National Energy and Cli...Addressing the Energy Efficiency First Principle in a National Energy and Cli...
Addressing the Energy Efficiency First Principle in a National Energy and Cli...
 
Auctions for energy efficiency and the experience of renewables
 Auctions for energy efficiency and the experience of renewables Auctions for energy efficiency and the experience of renewables
Auctions for energy efficiency and the experience of renewables
 
Energy efficiency first – retrofitting the building stock final
Energy efficiency first – retrofitting the building stock finalEnergy efficiency first – retrofitting the building stock final
Energy efficiency first – retrofitting the building stock final
 
How auction design affects the financing of renewable energy projects
How auction design affects the financing of renewable energy projects How auction design affects the financing of renewable energy projects
How auction design affects the financing of renewable energy projects
 
Energy Efficiency Funds in Europe (updated)
Energy Efficiency Funds in Europe (updated)Energy Efficiency Funds in Europe (updated)
Energy Efficiency Funds in Europe (updated)
 
Energy Efficiency Funds in Europe
Energy Efficiency Funds in EuropeEnergy Efficiency Funds in Europe
Energy Efficiency Funds in Europe
 
Five actions fit for 55: streamlining energy savings calculations
Five actions fit for 55: streamlining energy savings calculationsFive actions fit for 55: streamlining energy savings calculations
Five actions fit for 55: streamlining energy savings calculations
 
Recent energy efficiency trends in the EU
Recent energy efficiency trends in the EURecent energy efficiency trends in the EU
Recent energy efficiency trends in the EU
 
Energy and mobility poverty: Will the Social Climate Fund be enough to delive...
Energy and mobility poverty: Will the Social Climate Fund be enough to delive...Energy and mobility poverty: Will the Social Climate Fund be enough to delive...
Energy and mobility poverty: Will the Social Climate Fund be enough to delive...
 
Does the EU Emission Trading Scheme ETS Promote Energy Efficiency?
Does the EU Emission Trading Scheme ETS Promote Energy Efficiency?Does the EU Emission Trading Scheme ETS Promote Energy Efficiency?
Does the EU Emission Trading Scheme ETS Promote Energy Efficiency?
 
Energy efficiency, structural change and energy savings in the manufacturing ...
Energy efficiency, structural change and energy savings in the manufacturing ...Energy efficiency, structural change and energy savings in the manufacturing ...
Energy efficiency, structural change and energy savings in the manufacturing ...
 
Energy Sufficiency Indicators and Policies (Lea Gynther, Motiva)
Energy Sufficiency Indicators and Policies (Lea Gynther, Motiva)Energy Sufficiency Indicators and Policies (Lea Gynther, Motiva)
Energy Sufficiency Indicators and Policies (Lea Gynther, Motiva)
 
The Super-efficient Equipment and Appliance Deployment (SEAD) Initiative Prod...
The Super-efficient Equipment and Appliance Deployment (SEAD) Initiative Prod...The Super-efficient Equipment and Appliance Deployment (SEAD) Initiative Prod...
The Super-efficient Equipment and Appliance Deployment (SEAD) Initiative Prod...
 
Modelling and optimisation of electric motors with hairpin windings
Modelling and optimisation of electric motors with hairpin windingsModelling and optimisation of electric motors with hairpin windings
Modelling and optimisation of electric motors with hairpin windings
 
Casting zero porosity rotors
Casting zero porosity rotorsCasting zero porosity rotors
Casting zero porosity rotors
 
Direct coil cooling through hollow wire
Direct coil cooling through hollow wireDirect coil cooling through hollow wire
Direct coil cooling through hollow wire
 
Motor renovation - Potential savings and views from various EU Member States
Motor renovation - Potential savings and views from various EU Member StatesMotor renovation - Potential savings and views from various EU Member States
Motor renovation - Potential savings and views from various EU Member States
 
The need for an updated European Motor Study - key findings from the 2021 US...
The need for  an updated European Motor Study - key findings from the 2021 US...The need for  an updated European Motor Study - key findings from the 2021 US...
The need for an updated European Motor Study - key findings from the 2021 US...
 
Efficient motor systems for a Net Zero world, by Conrad U. Brunner - Impact E...
Efficient motor systems for a Net Zero world, by Conrad U. Brunner - Impact E...Efficient motor systems for a Net Zero world, by Conrad U. Brunner - Impact E...
Efficient motor systems for a Net Zero world, by Conrad U. Brunner - Impact E...
 

Último

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Cybersecurity for Smart Grids: Technical Approaches to Provide Cybersecurity

  • 1. Cybersecurity for Smart Grids: Technical Approaches to Improve Cybersecurity Presentation by Cyril W. Draffin, Jr. Project Advisor, MIT Energy Initiative Stefano Bracco Knowledge Manager, Agency for the Cooperation of Energy Regulators David Batz Security and Business Continuity, Edison Electric Institute International Energy Agency’s International Smart Grid Action Network (ISGAN) Academy – 2nd Cybersecurity Webinar 11 September 2017 1
  • 2. ISGAN in a nutshell International Smart Grid Action Network TCP (ISGAN) ‘Strategic platform to support high-level government attention and action for the accelerated development and deployment of smarter, cleaner electricity grids around the world’  An initiative of the Clean Energy Ministerial (CEM)  Organized as the Implementing Agreement for a Co-Operative Programme on Smart Grids (ISGAN) The CEM is the only multilateral forum dedicated exclusively to the advancement of clean energy technologies and related policies. ISGAN is the only global government-to-government forum on smart grids 2
  • 3. Geography of ISGAN 3 Swedish Energy Agency Commonwealth Scientific and Industrial Research Organization Government of Canada Norwegian Ministry of Petroleum and Energy New Energy and Industrial Technology Development Organization (NEDO) Sustainable Energy Authority of Ireland Government of Belgium Forschungszentrum JĂźlich GmbH Government of the Netherlands, Ministry of Economic Affairs, Agriculture and Innovation Union Fenosa Distribucion Government of Austria Government of France Swiss Federal Office of Energy Government of Korea European Commission South African National Energy Development Institute Energy Market Authority, Singapore Government of India MOP, NSGM, POWER GRID, CPRI Government of Mexico U.S. Department of Energy Ricerca sul Sistema Energetico (RSE S.p.A.) Contracting Parties: 25 Invited: Malaysia Expression of Interest: UAE Ministry of Science and Technology Department of High and New Technology Development and Industrialization Russian Energy Agency Tekes (Finnish Funding Agency for Technology and Innovation) Danish Energy Agency
  • 4. Activities of ISGAN 4 For more information, please visit: o ISGAN: www.iea-isgan.org
  • 5. Topics for Cybersecurity for Smart Grids Webinar #2: Technical Approaches to Improve Cybersecurity 1. Cybersecurity Challenges 2. Cybersecurity Approach and Best Practices 3. Case Studies 4. Cyber Professionals 5. Regulatory and Legal Constraints of architecting smart grids in a secure way 6. Measures of Success 7. Conclusions 5
  • 6. Market and Technology • Smart Grid and digital evolution • Highly inter-connected platforms with a number of actuators and sensors (with wide geographical area) • Decision-making delegated to machines (Distributed Control Systems) • New intelligent control devices which have to cooperate with old control devices (which are not easy to replace) • Changing business models with more actors involved • Distributed Energy Resources, with renewable resources that have intermittent behaviour, with multiple ownerships and cybersecurity practices • Demand changes, dynamic pricing and need for inclusion of new actors (for example “prosumers” and aggregators) with impact on electricity systems Electricity Market Challenges affecting Cybersecurity Cybersecurity Challenges 6
  • 7. Management • Evolving cyber threats • Hacking groups trying to find vulnerabilities embedded in the existing security measures, and seeking undiscovered vulnerabilities of control systems • Potential role of nation states • Potential national or cross-border impact of attacks and incidents, related to the “weakest link problem” • Existing governance versus best practices • Agility important-- impossible to predict what will happen • Forensics methods and technologies (applicable to standard IT systems and their security measures) may not work as well on Operational systems • How much cybersecurity expenditures are sufficient?-- cost of cybersecurity Management Challenges affecting Cybersecurity Cybersecurity Challenges 7
  • 8. Cybersecurity Approaches • Threat and risk management system  Pursue a harmonized, structured and comprehensive way to identify operators of essential services for the energy sector at regional level  Structured risk analysis and risk treatment plan specific for the highly interdependent European and US energy sectors  Cyber security maturity framework  Regional cooperation on cyber security topics  Control and secure disclosure of vulnerabilities and incidents affecting the energy sector in its crucial role • Effective cyber response framework  Define and implement a cyber response and coordination framework  Implement and strengthen regional cooperation for efficient handling of cyber emergencies when energy is involved and affected  Improve cyber resilience in the energy sector • Build-up adequate capacity and competences  Build competences  Provide knowledge, including frameworks and best practices  Promote research Cybersecurity Approaches 8
  • 9. A maturity model is a set of characteristics, attributes, indicators, or patterns that represent capability and progression in a particular discipline. Model content typically exemplifies best practices and may incorporate standards or other codes of practice of the discipline. It provides a benchmark against which an organization can evaluate the current level of capability of its practices, processes, and methods and set goals and priorities for improvement. When a model is widely used in a particular industry (and assessment results are shared), organizations can benchmark their performance against other organizations. An industry can determine how well it is performing overall by examining the capability of its member organizations. Maturity Model Cybersecurity Approaches 9
  • 10. 10 Domains In Maturity Model: Logical grouping of cybersecurity practices • Risk Management • Asset, Change, and Configuration Management • Identity and Access Management • Threat and Vulnerability Management • Situational Awareness • Information Sharing and Communications • Event and Incident Response, Continuity of Operations • Supply Chain and External Dependencies Management • Workforce Management • Cybersecurity Program Management Cybersecurity Approaches 10
  • 11. Information Technology and Operations Technology Systems Cybersecurity Approaches 11 Information Technology 1. Confidentiality (most important) 2. Integrity 3. Availability versus------------------------------------------------------------------------------------------- Confidentiality (most important) Integrity Availability Availability (most important) Integrity Confidentiality Operations Technology 1. Availability (most important) 2. Integrity 3. Confidentiality
  • 12. How the European Commission Clean Energy Package acknowledges Cybersecurity • The legislative proposals put emphasis on smarter and more efficient management of the grid, by using digital technologies and the flexibility of consumers and their electrical appliances • Innovation is at the core of the package, from renewable energy legislation, to energy efficiency and the new market design proposals • The package acknowledges the importance of cyber security for the energy sector, and the need to duly assess cyber-risks and their possible impact on the security of supply. • It proposes the adoption of measures to prevent and mitigate the risks identified as well as the adaption of technical rules for electricity (i.e. a Network Code) on cyber-security. 12 Cybersecurity Approaches
  • 13. Energy Expert Cyber Security Platform (EECSP)- Expert Group 13 10 cyber security challenges in the energy sector (reference: EECSP Report) Electricity Oil Gas Nuclear 1 Grid stability in a cross-border interconnected energy network. x x x 2 Protection concepts reflecting current threats and risks. x x x x 3 Handling of cyber-attacks within the EU. x x x x 4 Effects by cyber-attacks not fully considered in the design rules of an existing power grid or nuclear facility x x 5 Introduction of new highly interconnected technologies and services. x x 6 Outsourcing of infrastructures and services. x x x 7 Integrity of components used in energy systems. x x x 8 Increased interdependency among market players. x 9 Availability of resources and their competences. x x x x 10 Constraints imposed by cyber security measures in contrast to real-time/availability requirements. x x x Cybersecurity Approaches
  • 14. Present Coverage In European Union Regulation 14 Strategy and Legislation Strategy papers • EU Cyber Security Strategy • Digital Single Market Strategy • 50 national cyber security strategies Legislation with focus on cyber security for critical infrastructure providers • Network and Information Security (NIS) Directive • European Programme for Critical Infrastructure Protection (EPCIP) Directive • Contractual Public-Private Partnership Legislation with focus on security of supply • Security of Supply (SoS) Directive • Security of Gas Supply Regulation Legislation with focus on data protection and privacy • General Data Protection Regulation (GDPR) • Data Protection Impact Assessment (DPIA) Template Cybersecurity Approaches
  • 15. Strategic Priorities (European perspective) 15 Strategic Priorities Strategic Areas Areas of Actions I Set-up an effective threat and risk management system European threat and risk landscape and treatment 1. Identification of provider of essential services for the energy sector at EUlevel. 2. Risk analysis and treatment. 3. Framework of rules for a regional cooperation. 4. EU framework for vulnerabilities disclosure for the energy sector. Identification of provider of essential services Best practice and information exchange Forster international collaboration II Set-up an effective cyber defence framework Cyber response framework 5. Define and implement cyber response framework and coordination. 6. Implement and strengthen the regional cooperation for emergency handling Crisis management III Continuously improve cyber resilience European cyber security maturity framework 7. Establish a European cyber security maturity framework for energy. 8. Establish a cPPP for supply chain integrity 9. Foster European and international collaboration Supply chain integrity framework for components Best practice and information exchange Awareness campaign from top level EU institutions IV Build-up the required capacity and competences Capacity & competence build-up 10. Capacity and competence build-up. Cybersecurity Approaches
  • 16. Core European documents under review in 2017-2018 • EU Cyber Security Strategy is under review • German EU Strategy and others were reviewed in 2016 • Others strategies expected as a result of the NIS (Network and Information Security) Directive 16 Cybersecurity Approaches
  • 17. Best Practices • No comprehensive best practices, but: – Big TSOs and DSOs are already applying existing standards that may be helpful (e.g. ISO 27000 Series and NERC CIP) – BSI is a reference in Germany (https://www.bsi.bund.de) – ANSSI (The French CIIP Framework - https://www.ssi.gouv.fr/en/cybersecurity-in-france/ciip-in- france/) in France with two different approaches – ENISA is working hard at EU Level with a number of publications every year: most of them provide recommendations and analysis at EU Level, and are complemented by the work done by DG ENERGY and DG JRC of the European Commission. 17 Cybersecurity Approaches
  • 18. Case Study 1 – Advanced Metering Infrastructure Background The Advanced Metering Infrastructure (AMI) is now being rapidly deployed throughout the power grid, and is an enabling technology for smart grid. Identifying the attack surface is a necessary step in achieving cyber security in smart grids and AMI. Source: https://arxiv.org/ftp/arxiv/papers/1607/1607.04811.pdf Case Studies An attacker may target an AMI in several ways, which may result in several/different risks for the operator involved. Main potential objectives for such an attack: • Intelligence gathering; • Infecting the target AMI systems; • AMI exploitation (use for profit); • AMI exfiltration (transfer of data); • Maintaining control on this capability on short, medium, long run. Needed definition: cyber attack surface can be defined by the methods an environment or a system can be attacked by an adversary to introduce or retrieve data from that environment or system. Analysis 18
  • 19. Case Study 1 – Advanced Metering Infrastructure (continued) Analysis  Surface is composed of:  Smart Meters  IR Port  Internal Link  Firmware  Micro Controller  Radio  AMI Information and Communication Network  Smart Meter Data Collector – SMDCs  Similar to Smart Meters  AMI-Head End  Interface with the Utility Infrastructure  Outage Management Systems (Restoration capability)  Energy Management System (Dispatch and monitoring)  Master Data Management Systems  Corporate WAN  Protocols and Software  Weak Encryption keys  Smart Energy Profile 2.0  KillerBee to hack AMI  Many attacks possible on 3G/4G/LTE Case Studies 19
  • 20. Possible Counter-measures • Create closed and proprietary security solutions; • Use Open Standards and architect things in a way that “red points” will be green (or removed from the list); • Interim measure is to analyse existing devices, to identify the surface, and to mitigate the risks. Global Smart Grid Federation’s Smart Meter Security Survey, August 2016 http://www.globalsmartgridfederation.org/wp-content/uploads/2016/08/smart_meter_security_survey.pdf http://ics.sans.org/media/IT-OT-Convergence-NexDefense-Whitepaper.pdf Cyber Attack Surface Analysis of Advanced Metering Infrastructure AMI Surface https://arxiv.org/ftp/arxiv/papers/1607/1607.04811.pdf https://www.sans.org/reading-room/whitepapers/forensics/forensic-analysis-industrial-control-systems- 36277 Proof-of-concept ransomware locks up the PLCs that control power plants http://www.cap.gatech.edu/plcransomware.pdf Case Studies 20 Case Study 1 – Advanced Metering Infrastructure (continued)
  • 21. Case Study 2 – Process and Tool Adoption- toward a secure and resilient power distribution grid Background The tight interaction of the control applications with communication networks and physical components, such as sensors and actuators in a complex cyber-physical system, is of paramount importance in order to assure that the system can be introduced in a working environment and can provide the certain level in respect to new risks deriving from new components tools and processes. In this respect more work has to be done to establish, well before the adoption, how “secure” is a system in respect to the already existing and established operations, and if a change in operations can impact the security of the system. Source: http://ieeexplore.ieee.org/document/7778800/ Case Studies 21
  • 22. Case Study 2 – Process and Tool Adoption- toward a secure and resilient power distribution grid (continued) Analysis In the DERs, local controls are capable to keep grid voltage in a certain range. Additional central controllers may implement high-level objectives such as loss minimization or minimum generator shedding. While most of the systems are robust enough to overcome issues such as a weak communication channel, there is no assurance of non vulnerability to cyber-attacks. In this context we have to consider that technical protection measures can be of two kinds: • ICT Security Measures (e.g. Firewall, IDP, Authentication) • System/control-theoretic measures (e.g. model-based attack/fault detection and isolation, robust control strategies that maintain closed-loop stability and performance guarantees) Several recommendations are already in place. Attacks spans Data Integrity, DoS (Denial of Service), Delay Attacks. Findings • A workbench to assure and test that all possible technical measures are taken into consideration is still needed, but a comprehensive tool is not available. • This must be part of the tasks of a control engineer when developing similar systems, who needs to apply a more holistic approach to the engineering phase of similar tools. Case Studies 22
  • 23. Case Study 2 – Process and Tool Adoption- toward a secure and resilient power distribution grid (continued) Counter-measures • Security by design is the first advice. • ICT Measures and control theoretic protection measures have to work together to properly address risks which may be hidden to a preliminary analysis. • Should be a “mantra” for the procurement of new equipment. • Same analysis must be performed when an interconnected ICT or control theoretic protection measure is affected by any change. Case Studies 23
  • 24. Case Study 3 – Ransomware / Wipers for Industrial Control Systems Background Georgia Institute of Technology released an academic paper on use of a cross-vendor Ransomware worm working on Programmable Logic Controllers (PLCs). Due to a weak authentication, attacker is capable to lock out an administrator, installing a logical bomb. Conficker and Stuxnet used MS08-067. It is not impossible that a virus for ICS will use MS17-010 as WannaCry/WannaCrypt did. In this case we may face safety/critical shutdown, or worse. “US-CERT released the following documents that contain in-depth technical analysis on the Petya malware, as well as indicators of compromise and additional recommendations for mitigation….. The following product vendors have proactively issued notifications with recommendations for users regarding the Petya ransomware (ICS-CERT will update the list of vendors that have released customer notifications as additional information becomes available):” Source: http://www.cap.gatech.edu/plcransomware.pdf http://iiot-world.com/cybersecurity/the-impact-of-wannacry-on-industrial-control-systems-ics/ https://ics-cert.us-cert.gov/alerts/ICS-ALERT-17-181-01C Case Studies 24
  • 25. Case Study 3 – Ransomware / Wipers for Industrial Control Systems (continued) Analysis Ransomware (including WannaCry used in 2017) is a typical extortion crime on a company, instead on a (more common) population of potential targets. • To implement a similar attack in practice, you will need still to use a “Trojan horse” to inject the Ransomware. • The Georgia Institute of Technology paper describes the side effects: profit, which in normal circumstances would be Population*Value-Cost, in this case will be difficult to estimate. In Smart Grids, where data are imperative to continue business, the damage may be huge, and the restoration may be difficult if not properly addressed in existing procedure at any level of the company. • Collateral damages may include downtime, Equipment Health, Human Safety. • The negotiation phase may be particularly lengthy as the financial values may be extremely high and the legal consequences may be extremely severe for the company, in case it would be found guilty. On NotPetya (used in 2017) there were several abilities put in a single worm, that can shut down operating systems, and “wipe” away information in data bases. Case Studies 25
  • 26. Case Study 3 – Ransomware / Wipers for Industrial Control Systems (continued) Counter-measures • End-point security • Network security (including backups of all configurations) • Adoption of proper policies, including software updates • Proper selection and management of contractors, and proper hand-over if your ITs and OTs are managed by a Third Party • Safeguards to protect information assets related to IT and OT equipment • Strict control on change management and supply chain • Isolate or protect vulnerable embedded systems that cannot be patched from potential network exploitation • Locate control system networks and devices behind firewalls, and isolate them from the business network • Engagement with regional / national defence agencies Case Studies 26
  • 27. Cybersecurity Professionals Basic Skills • Sound knowledge of IT and OT; • In depth knowledge of the Security Domains (including physical security); • Being able to analyse emerging threats in complex and interconnected infrastructures with limited or partial inputs, and without being able to stop operations; • Both high level and low level knowledge (processes and protocols). Possible certifications • Several in the field of cyber security (e.g. CISSP, CEH, others at different levels); • Smart Grid Maturity Model Navigator is example of a good start for specific field related certifications (http://www.sei.cmu.edu/training/P109.cfm) Advantages of certification • Baseline on knowledge for network operators recognised and accepted by all; • Trust among operators and their own staff; • As in aviation, rules in case of crises are known and common to all the community; • Staff can be recognised as part of a community system. For the future If we certify equipment which can operate on smart grids, why not to certify people? A schema has to be developed. To make fast progress, there is a need for: o Training o Awareness campaigns in the sector o Extensive cooperation to identify core skills and methods Professionals 27
  • 28. Regulatory and Legal Constraints in European Union  Smart Grids may be based on Best Available Techniques and BREF (BAT Reference Document); This is very much depending on the regulation; Right now it is just a reccomendation  Nation States, such as Germany and France, have very stringent requirements (Catalogue of IT security requirements under section 11(1a) of the Energy Act) Regulatory Constraints Electricity and gas network operators are required to implement a minimum level of IT security. The core requirement is the establishment of an information security management system (ISMS) with certification to DIN ISO/IEC 27001 by 31 January 2018. https://www.bundesnetzagentur.de/EN/Areas/Energy/Companies/SecurityOfSup ply/ITSecurity/ITSecurity_node.html 28
  • 29. Regulatory and Legal Constraints in European Union (continued)  GDPR will be applicable as from 25 May 2018 – It is already having an impact on Smart Grid decisions (e.g. Time of retrieval of the information from Smart Meters)  There is a general need to coordinate National Efforts and European Efforts  When dealing with Standards, International efforts are needed to make sure that standards and/or local legislations will not collide, jeopardising the efforts of the communities producing standards and of the international communities regulating the cyberspace (having a standard which issues technical rules but doesn’t take into consideration GDPR or NIS Directive may be counterproductive) 29 Regulatory Constraints
  • 30. Regulatory and Legal Constraints in United States  Regulatory and legal constraints of architecting smart grids in a secure way  Bulk Electric System at a Federal level (1) vs. distribution controlled by U.S. States/Territories (56) 30 Regulatory Constraints
  • 31. Measures of Success for Cybersecurity for Smart Grids  Smart Grids that are secure, reliable and protect customer data and information require:  Engagement with National and International Authorities that can play an important role in regulating, enforcing, monitoring and protecting the grids from emerging risks.  Effective response plans to recover from cyber incidents or attacks are completed and understood Measures of Success 31
  • 32. Conclusions • Smart Grids will grow in size and achieve higher levels of efficiency through the adoption of new intelligent devices (including Internet of Things, and use of the Cloud) • Cyber threats will continue • Technical risk management work has to be done – Efficient methods and processes needed to speed up the mitigation of all cybersecurity challenges, using appropriate standards and best practices, using an iterative approach to improvement – Understand the issues and the full risk landscape (use Computer Security Incident Response Teams and the implementation of European NIS Directive) – Operators should think about Maturity Models to evaluate the status of their cybersecurity preparedness. • Cooperation needed between institutional, regulatory, research, and market actors—both nationally and internationally – Report when things do not work as expected • Cybersecurity for energy is an essential investment for the future of our civil society – Cybersecurity for energy has to be addressed in the short, medium, and long term – We have a chance to mitigate risks through the adoption of proper actions Security is your responsibility 32
  • 33. Questions & Comments Contacts: Cyril Draffin Email: draffin@alum.mit.edu Stefano Bracco Email: Stefano.BRACCO@acer.europa.eu David Batz Email: dbatz@eei.org Cyril W. Draffin, Jr. MIT Energy Initiative, E19-307 77 Massachusetts Avenue Cambridge, Massachusetts, 02139-4307, USA Stefano Bracco Agency for the Cooperation of Energy Regulators Trg Republike, 3 - TR3 12/20 SI-1000 – Ljubljana, Slovenia David Batz Edison Electric Institute 701 Pennsylvania Avenue, NW Washington, DC , 20004-2696, USA ISGAN Academy coordination: Institute for Research in Technology Comillas Pontifical University Santa Cruz de Marcenado 26 28015 Madrid, Spain International Energy Agency’s (IEA) International Smart Grid Action Network (ISGAN) Academy – 2nd Cybersecurity Webinar Cybersecurity for Smart Grids: Technical Approaches to Improve Cybersecurity 33
  • 34. 34 This recorded cybersecurity webinar and previous webinars are available at ISGAN Academy platform: http://www.leonardo-energy.org/resources/1070/isgan-academy-58ec8d2e7b9b0 ISGAN Academy Webinars • Jeju Island Smart Grid Project (in Korea) • Reference Network Models (tools for large scale distribution network planning) • TSO Reliability Management: a probabilistic approach for better balance between reliability & costs (GARPUR project, Europe) • Integration of RES in power systems: transmission networks issues (Renewable Energy Sources) • Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybersecurity (1st Cybersecurity Webinar; 28 June 2017)