SlideShare une entreprise Scribd logo
1  sur  196
NRECA
The Agile Fractal Grid
“The Gathering of Eagles”
Tuesday, February 25, 2014
Arlington, VA
Coffee and Breakfast
Agenda for NRECA Agile Fractal Grid
Kickoff Meeting
8:00 Welcome by Martin Lowery; Opening by Chuck Speicher
8:15 Introductions of the Participants – John Reynolds
8:45 Achieving the Common Language through Design Patterns
9:20 The Vision of the Agile Fractal Grid – Craig Miller
9:45 Break
10:00 Discussion of the Managed Services Store and Applications
10:20 Discussion of the Distributed Systems Elements
11:45 Discussion of the Industrial Internet – Security, Resiliency, Efficiency
12:15 Lunch
1:00 Scope of the SmartAmerica Challenge vs. the Production Rollout
2:00 SEIT Process and Phase 1 Planning
2:30 Break
3:00 Phase 2 Implementation and Thread Assignments
3:30 General Discussion, Issues, Action Items, and Understandings
4:00 Wrap Up and Conclusion
Welcome to NRECA
Martin Lowrie
Background on the National Rural Electric
Cooperative Association
Convening of the Security Fabric Alliance
Chuck Speicher
Announcement of House SFA Rules
John Reynolds
It has been said that
the greatest engineering achievement of the 20th century
has been the building of the electric grid.
- The National Academy of Engineering
Invited Visitors
Department of Energy
Carol Hawk
Program Manager,
Cyber Security for Energy Delivery Systems
Ivanpah
World's largest solar plant started producing electricity today
Ivanpah was supported by $1.6 billion in investments
from the Energy Department's Loan Programs Office.
It represents the future of energy –
utility-scale renewable power generation
that uses the latest technology to harness the sun
where it is most abundant.
Federal Communications
Commission
Henning Schulzerinne
Office of the
Secretary of Defense
Rollie Wicks
Department of Homeland Security
Lisa Kaiser
Sarah Mahmood
Executive Order (EO) 13636: Improving Critical Infrastructure Cybersecurity
Presidential Policy Directive (PPD)-21: Critical Infrastructure Security and Resilience,
Critical Infrastructure Cyber Community Voluntary Program
Secretary of Homeland Security
Jeh Johnson
PM – ISE
DNI
Pamela Wise-Martinez
Mike Howell
Kshemendra Paul
Mission Partners
Congress
Diane Rinaldo
Legislative Director
For Mike RogersMike Rogers
– Michigan 8th District
U.S. House of Representatives
Chairman, House Intelligence Committee
Member, Energy and Commerce Committee
United States House Energy Subcommittee on Communications and Technology
United States House Energy Subcommittee on Health
Cyberthreat Data Sharing
and Protection
SmartAmerica
Challenge
Sokwoo Rhee
Presidential Innovation Fellow
The Challenge
We are planning to support the 940 rural co-ops in the U.S. with
hybrid cloud/device services protected by the Security Fabric.
This is also the candidate energy “testbed” for the SmartAmerica demonstration.
What NRECA has asked us to do.
1. Stand up an “app store” for both operational and analytical
applications for the cooperatives.
2. Participate in the “Substation of the Future” for the remote
equipment and subsystems.
3. Apply the Security Fabric within the emerging Industrial
Internet to protect all communications between the
elements.
Introduction to the
Security Fabric Alliance
• The Security Fabric Alliance is a working association dedicated to
practical deployment of the power grid and critical infrastructure
complex system solution in the United States:
– Utilities and telecommunications providers
– Systems integrators
– Manufacturers
– Technology partners
– National certification and interoperability entity
• The alliance is intended to give the CEO of a utility the purview of
up-to-the moment knowledge of the options available to make wise
investment decisions regarding infrastructure deployment for
optimal returns.
The variation includes the proper orientation for large, medium, and small utilities.
There are many participants at different levels
in the Security Fabric Alliance.
ComponentsProductsSubsystems
ResearchIntegration
Utility
Customers
• Intel – servers with Quark + TPM
• Wind River – Security Connect
• Middleware
• RTI – DDS
• GridStat
• Indra - iSpeed
• MultiSpeak
• TeamF1 – Secure Communications
• Secure Crossing – Protocol Whitelisting
• PsiNaptic – Secure Service Distribution
• SNMP Research – SNMP Agent
• Freescale – HSM w/Vybrid SoC
• Xilinx – CompactRIO SOC
• Green Hills Software - INTEGRITY
• Altera - tamper proofing
• Microsoft – Active Directory
• Red Hat – Auth Hub
• General Electric – EMS
• Alstom Grid – EMS
• Siemens – DMS
• Viridity Energy – DR + DER
+ Microgrid
• Lemko – LTE systems
• Intel Security – SIEM + GTI
• Intel – Encanto
+ silicon support
• Sypris – Supply
Chain Root of Trust
• TCIPG
• EPRI – CIM Standards
• MIT – Security &
Privacy Standards
• EPG – Phasor Data Portfolio
• GridSense– NAN & Line Sensors
• S&C IntelliTeam
• SafeNet – Secure Key Management
• Heart - Transverter
• Freescale One Box
• Cisco Cloud-in-a-Box
• Integrated Architectures – SEIT
• MACE Fusion - DoD
• Kryptos Logic – Red Team Certification
• M2M Dynamics
• Drummond Group – C&IT
• Intel Security - Distribution
...First Stage……
• ERCOT
• ONCOR
• AEP
• NRECA
• NRTC
Suppliers
• Verizon
• Level3
• AT&T
• Internet2
• BT
• ViaSat
• Hughes
• ARINC
• Stratus
• Symmetricom
…Second Stage……
• APPA
• SDG&E
• PJM
• NYISO
• Southern Company
• Duke Energy
• CAISO
• Pecan Street
• Mueller Community
• Pike Powers
• PNNL – CyberSecurity
Test Center
• Lincoln Labs
• OMG SIG
• SmartAmerica
Managed Services
• Tazca – Connect
• CSG International
• Digi International
• N-Dimension
• SETI
• Lockheed Martin
• SAIC
• Threat Connect
To establish the security of end-to-end systems using the Security Fabric elements,
you need to do all seven… not just some.
4. Audit
– Records noteworthy events for later analysis
5. Confidentiality
– Encrypts sensitive data for matters of privacy.
6. Integrity
– Ensures that messages have not been
altered.
7. Availability
– Prevents denial of service attacks
1. Identity Management
– Ensures the device identity is established
genuinely
2. Mutual Authentication
– Allows both the Device Node and the
Controller to verify the trustworthiness their
identity to each other.
3. Authorization
– Manages permission to proceed with specific
operations.
These are the seven tenets of security
as described in the NIST-IR 7628 Guidelines.
The OMG process is more about establishing markets
as opposed to just setting standards.
SFA Reference
Builds
Certification of
Conformance &
Interoperability
The OMG is planning to standardize
the Security Fabric
for all critical infrastructure.
SFA Participants Introductions
Systems Engineering, Integration, and Test
• President – Energy One Solutions
• Secretary General – GO15
Very Large Power Grid Operators
• President and CEO
Alstom ESCA Corporation
• CTO – PJM Interconnection
• Co-founder Viridity EnergyAlain Steven
John Reynolds
Alain Steven
Rick Schaal
Mike Sisto
Jim Baller
Bob Lamont
Paul Carroll
Mike Sisto
• IBM’s Wireless Emerging Business Opportunities
• AT&T, Lucent Technologies and Hewlett-Packard
• Lemko Distributed Mobile Wireless Network solutions
Rick Schaal
• VP, Engineering – Viridity
• Executive Program Director –
Alstom ESCA
• Program Director – AREVA
• DMS Lead – Puget Sound Energy
• American Public Power Association
• Fiber to the Home Council
• Google Inc.
• National Association of Telecommunications
Officers and Advisors
• + several hundred specific broadband projects
Internet2
Christian Todorov
Texas A&M University
Named second in the nation by The Wall Street Journal among all universities,
public and private, in a survey of top U.S. corporations, non-profits and government agencies,
based on graduates that recruiters prefer to hire.
“Home of the 12th Man”
Walt Magnussen
Real-Time Innovations
AEGIS Weapons System
Total Ship Computing Environment
NASA Robotic Controls Unmanned Aircraft Systems
Tom O’Conner
Mark Hamilton
Indra
Michael Peck
Eloy Gonzalez Ortega
GridSense
Transformer IQ
Line IQ
Inspection
Brett Sargent • System Capacity
• Phase Imbalance
• Metering / Theft
• Conservation Voltage
Reduction
• Four Quadrant True
Power Factor
• Line Fault Directionality
• PQ – voltage sags/swells,
interruptions, surges,
unbalance
• Transformer Asset
Management
Lemko
LTE over Satellite
Cellular on Wheels
Utility Industry
WiMax Replacement
Security Industry
Transportation Industry
Mike Sisto
Public Safety
Healthcare industry
Subnet Solutions
SEL Substation Controller
Message Management from Substations
Ameen Hamdon
CSGi
Jarrid Hall
Eddie Day
Over 8 trillion revenue event records processed annually for major clients.
InterMediate
Electric Power Group
Direction of Grid Stress
Voltage Stability Monitoring
Vikram Budhraja
Vivek Bhaman
BaseN
Anders Viden
BearingPoint Infonova
 Concept-to-Cash
Andrew Thomson
The Orchestration of the Ecosystem.
BT America
Milton Keynes
Tom Wolf
Bryan Fite
Milsoft
Engineering Analysis
Geographic Information
Field Engineering
Outage Management
Wayne Carr
TOA
Neil Ringers
Mike Carpenter
Kevin Cantoli
TeMix
Ed Cazalet
Transactive Energy
Netronome
DJ Root
Jerome Taylor
256 GB
Green Hills Software
Smart Farming
Smart Medical Systems
GE Aircraft Engines
EMC High End Storage Systems
Transportation Systems
Phase Array Radar Systems
Weapons Control Systems
Guidance Systems
Game Systems
Automotive Systems
John Warther
John Killam
Brad Jackson
Brian Riley
LocalGrid Technologies
Power Quality Analyzer
Microgrid controls:
• Microgrid and Generation Control
• Generation and Asset Monitoring
• Storage Integration
Device EnvironmentController Environment
Hypervisor
Application
Management
Agent
Hypervisor
Application
Management
Agent
David Berg
CryoKey
Chris Ho
Identity ManagementMutual Authentication
Authorization
Secure Crossing
Randy Reeves
Robert Lorente
N-Dimension
Andrew Wright
Bruce Gordon
Secure Exchange Technology
SETI
Richard Marshall
Elysa Jones
Threat data collaboration.
Community Emergency Management.
National footprint today!
Threat Connect
Leigh Reichel
1300 Communities of Interest already in production!
Cornice Engineering
Gary McNaughton
HereNow
Brian Reynolds
Utilities Telecommunications Council
Eric Wagner
Brett Kilbourne
• Advocacy and Training
• License Sentry
• Frequency Coordination
• Microwave Coordination
• PLC Database
• RF Safety and Training
• Regulatory Filing and Tracking
General Electric
Substation Simplification
Transformer Protection System
Energy Management System
Wide Area Monitoring
System Integrity Solution
Joe Salvo
National Rural Telecommunications
Cooperative
Kurt Schaubach
National Rural Electrical Cooperative
Association
Martin Lowery
Robbin Christianson
David Pinney
Maurice Martin
Barry Lawson
Bridgette Bourge
Bob Lamouth
Doug Lambert
Paul Carrol
Craig Miller
Building a Common Language
Everyone shapes his or her view of the world
through framing, and people with different
backgrounds are likely to see their
surroundings through vastly different frames.
By themselves, frames are not inherently good
or bad…
they just are.
The quality that all of us seek in life
that has no name
includes
Simplicity.
The Laws of Simplicity are very important
in complex environments.
1. Reduce
The simplest way to achieve
simplicity is through thoughtful
reduction.
2. Organize
Organization makes a system of
many appear fewer.
3. Time
Savings in time feels like simplicity.
4. Learn
Knowledge makes everything
simpler.
5. Differences
Simplicity and complexity need each
other.
6. Context
What lies in the periphery of
simplicity is definitely not peripheral.
7. Emotion
More emotions are better than less.
8. Trust
In simplicity we trust.
9. Failure
Some things can never be made
simple.
10. The One
Simplicity is about subtracting the
obvious, and adding the meaningful.
John Maeda leads RISD:
the #1 school of design in the country.
Never design a thing without first understanding the
next larger context into which it must fit.
• A chair within a room,
• a room within a house,
• a house within a neighborhood,
• a neighborhood within a city.
- Eero Saarinen
There are two more guiding principles in all contemporary architecture.
Cranbrook Academy is the
#2 school of design in the country.
Use a system of design patterns to
allow local teams to design their own systems
out of interchangeable parts such that
integration is assured from the outset…
but such that no two local systems ever look exactly the same.
- Christopher Alexander
“The Timeless Way of Building”
Design patterns allow for organic growth.
This treatise on design patterns is now he basis of
most object-oriented systems in the world today.
Our assignment here is to build
a forest of oak trees.
First start with a vision of the end goal...
… then work backwards in time to determine the first step.
Those who are not students of history …
…are doomed to repeat it.
We always seem to build things four times,
and in a certain order.
– Make it work
– Make it fast
– Make it small
– Make it pretty
- Jim Ladd
Systems Engineering Strategy:
The Building of the Boeing 777
This iconic building remained the tallest building in the world for over 40 years…
… and yet took only one year to construct…
In their first meeting with the client,
Lamb asked Raskob about his vision
for the building.
Raskob stood a pencil on end and said,
"How high can you make it
so that it won't fall down?“
The initial plans were
ready in two weeks.
John Jakob Raskob
Chief Financial Officer
of both
Dupont and General Motors
The building of the Boeing 777
drew from the lessons learned.
• The design phase for Boeing's new twinjet was different from the
company's previous commercial jetliners. For the first time, eight major
airlines had a role in the development of the airliner. This was a
departure from industry practice, where manufacturers typically designed
aircraft with minimal customer input.
• The 777 was the first commercial aircraft designed entirely on computer.
Each design drawing was created on a three-dimensional CAD software
system. This let engineers assemble a virtual aircraft, in simulation, to
check for interference and verify that the thousands of parts fit properly—
thus reducing costly rework.
• The initial 777-200 model was launched with propulsion options from
three manufacturers, General Electric, Pratt and Whitney, and Rolls-Royce,
giving the airlines their choice of engines from competing firms.
The advice from some of the team is memorable
relevant to creating complex systems.
Chapter 3 on Reliable Delivery
recounts some of the inspiration
from the building of the
Empire State Building in 1930.
In the beginning it is
always good to come up
with at least two or
three options for how a
capability might be
implemented…
… and then defer
making a final decision
until after they are
better understood
relative to what the
overall system must do.
But how should we start?
• We should first go talk to the least capable of our customers
and walk a mile in his moccasins to see what takes place
there:
– for that feel of what events go on there
– for what their definition of happiness is all about
– for that essence of what life itself is all about
– for “the quality that has no name”… (more on this later…)
Let’s use a compelling user story to make it easy for all to see the intent.
The Vision
“The Agile Fractal Grid”
Achieving
Grid Security, Reliability, and Resiliency
through Advanced Analytics and Control
A Tale of Two Feeders
On a nice day, the
utility is running smoothly.
Everything is “Hot”
A bad storm comes through
and some areas lose power
But backup power,
distributed generation,
and stored energy allow
some areas to island
and continue operation…
Smart control systems allow
the islands to network
This may allow some
power to be restored in
additional areas as the
utility works to bring dark
areas on line
Soon, everyone has power
The smaller grids
reconnect with the utility
Collect Data
Transform and Organize Data
Perform Analysis
Derive Decision
Implement Action
Collect Data
Transform and Organize Data
Perform Analysis
Derive Decision
Implement Action
All grid applications have the same basic structure.
Collect Data
Transform and Organize
Data
Perform Analysis
Derive Decision
Implement Action
Data level
integration
Abstraction of the data layers opens the grid to
better, lower cost development
Abstraction Model for the Agile Grid
Layer Innovations Needed
Action Layer Advanced technology:
• Smart feeder switching
• CVR
• Advanced sectionalization
• Direct load control
• Storage
• Phasor measurement units
• Solid state VAR control
…
High bandwidth, high-reliability communications
Software defined networks
Decision Layer Static and dynamic power flow modeling
Event tree generation
Taxonomic system for failure classification
Analysis Layer Predictive modeling
Static and dynamic power flow modeling
AI based anomaly detection
Information layer High performance database
Distributed information stores
Cloud based computing
Data Layer High performance sensor networks
Improved interoperability standards
Passive and active capture technology
Innovations are needed at all layers.
Networking Break
<Saturn>
Discussion of the Managed Services Store
and Applications
At NRECA the private cloud-based support
needs to provide applications options for
all the participating utilities.
The Security Fabric must support all the interfaces.
Candidate Applications
• Business Functions External
to Distribution
Management
– Customer Relationship
Management (CRM) (includes
CIS)
– Meter Data Management
(MDM)
– Customer Billing (CB)
– Payment Processing (PP)
– Prepaid Metering (PPM)
– End Device Testing and
Receiving (EDTR)
– Finance and Accounting (FA)
• Distribution Engineering,
Planning, Construction, and
GIS
– Asset Management (AM)
– Project Manager -
Configuration Management
– Engineering Analysis (EA)
– Field Design (Staking)
– Geographic Information
Systems (GIS)
– GIS Viewer (GV)
– Inspection (INSP)
Candidate Applications
• Distribution Operations
– Integration Server
– Call Handling (CH)
– Distribution Automation (DA)
– FAST voltage regulation,
active power control and load
flow control in meshed power
systems.
– Interactive Voice Response
(IVR),
– Outage Detection (OD)
– Outage Management (OA)
– Supervisory Control and Data
Acquisition (SCADA)
– Substation Automation
– Switching Orders (SWO)
– Vehicle Location (AVL)
– Volt/Var Control
– Demand Response (DR)
– Load Management (LM)
– Demand Optimization
Systems (DOS)
– DRAS Server
Candidate Applications
• Distribution System
Monitoring
– Connect/Disconnect (CD)
– Load Profile (LP)
– Meter Reading (MR) (AMI)
• Work Management
– Work Task Generator (WTG)
– Work Task Originator (WTO)
– Work Task Performer (WTP)
– Work Task Scheduler (WTS)
– Work Task Viewer (WTV)
• System Providers /
Aggregators
– DRAS Home/Building
Manager
– DRAS Client Aggregator
• Customer Premises
– HAN Communications
– Energy Services Interface
– Meter
Candidate Applications
• G&T Ops
– G&T EMS
– Demand Management
– Load Forecast (Load profiles?)
– Distributed Storage EMS
– Distributed Generation EMS
– Market Services
• (External Market
Functions)
– Energy Management
Clearinghouse
– ISO EMS
To be relevant as a digital services provider,
you must develop new repeatable capabilities
to do the following:
• Bundle service provider services
• Define new services as products
• Automate, monetize, and allocate revenue of the
contracted relationships
This is not simply just a walled garden…
Plus, it is not just simply an Amazon product shopping cart.
Candidate Functional Architecture
Industry Specific
Tenant / Resellers # 1-n
Service Providers
e.g. industry specific
service providers
Offerings on
Service Provider terms
Ecosystem Enablement Platform
Aggregator & ICT Service Broker
Service Providers
e.g. SaaS, IaaS, PaaS
providers
Service Providers
e.g. Telco, Mobile
Cloud providers
Offerings on
Reseller terms
Offerings on
ICTSB Operator terms
Generalist
Tenant / Resellers # 1-n
Offerings on
Reseller terms
R6 VSO R6 VSO
R6 VSP
“Amazon type” Digital Services Enablement
Infrastructure
Layer
Enabling &
Partnering
Layer
Digital Services
Provider
Products, Content, Applications, Services
Selection of applications to launch
will use a comparatively simple interface.
The repeatable capabilities need to enable
entity to entity partnering and C2C white labeling:
SYSTEM
Ecosystem &
Partnering Enabler /
Cloud Service Broker
on-board Service
Provider
on-board Reseller
Define SLA
resolve Incident
publish Retail Offering
on-board
End Customer
publish Wholesale
Offering
pay Invoice
report Incident
issue Invoice
Monitor SLA
Handle SLA Violation
on-board Service
Service Providers
/ Suppliers
retrieve Catalog
Information
retrieve Quote
place Order
get Order Status
Digital Service Providers
/ Resellers
End Customers
B2B2x Entity Interaction Diagram
Discussion of the Distributed Systems Elements
Electric power distribution and broadband communications
are like Siamese twins!
(They can’t go anywhere without each other.)
Digital control is needed
at each junction point.
Like electricity,
broadband can be used
for multiple things.
The Circulatory System The Nervous System
NRECA
NRTC
We will use a typical distribution path to demonstrate
the intelligent combination of power controls and broadband.
Central
Control
Local Area
Relay
Neighborhood
Relay
Substation
Relay
Management
Servers
Substation
Server/Router
NAN
Gateway
HAN
Gateway
Communications /
Firewall
FTL (E&LM)
SIEM
E&LM
Communications Communications /
Firewall
E&LM
Sensor Mgt
Communications /
Firewall
E&LM
Meter App
HomeApp
TE App
SA SA SA
SA
SA
SA
Cell Manager
Master
Agent
Posture Validation
Remediation Server
Jini SP
MA
SA
“Cell Management”
“Local Management”
There are multiple locations in the conceptual network.
Management
Signaling Server
Our communications has redundancy
built into the control protocols.
LTE
Macrocell
and
Distribution
Fiber
NAN
LTE
Picocell
Mobile
HAN
LTE
Home
Gateway
This is the only capability available
that allows handoff between terrestrial
LTE services and satellite services.
This system can simultaneously support
the public safety 700 MHz frequencies
as well as commercial usage.
Symmetric 2Mbps
10Mbps downloading and
786Kbps when uploading.
100 MHz LTE Services!
National
Interconnect
The telemetry systems occur in front of the analytic
applications and feed data to the Big Data stores.
Utility
Operations
Broadband
Operations
Service
Providers
The Fractal Pattern!
Knowledge
Monitor
Record
Analyze
Plan
Execute*
Policy
Sensor Effector
Symptom
Change
Plan
Request
Change
Request
Review
The policy execution environment
is the key to the flexibility.
This is more than just the cybersecurity dimension.
Obtain image of
network traffic
Structure data
Interpret events
using policies
Compare
current state to
baseline
Analyze options
Model
power flows
(if necessary)
Layer 1:
Data
Layer 2:
Information
Layer 3:
Understanding
Layer 4:
Decision
Layer 5:
Action
Transmit to
collector
Validate
Extract layer
3,4,7 data
1st level
anomaly
detection
Replicate
Notify
anomaly
Update baseline
model
Recommend
remediation
Notify
compromise
Monitor changes
in network
performance
Implement
network
changes
Confirm
implementation
Analyze
anomalies
Resolve
discrepancies
Human review,
adjustment, and
approval
(if necessary)
Activate
workflow
Compensate for
exceptions
Finalize actions
Options: PNNL + Secure Crossing
Investigate options: Carnegie Mellon + InterSystem?
Options: Cigital + CRB
Options: BaseN
Options: Complex
Request Broker
Activation system + configuration synchronizer
Understanding
Information
Decision
Data in – Action out
But sometimes semi-autonomic policy decisions
are made and executed in the field.
(at the small, the medium, and the large)
The policy logic is actually spread to each major active element.
MultiSpeak
Initiative
This effort has been launched with
a current research project already underway.
But the ultimate goal is to find COTS products
that are fully supported that perform these functions.
“Always find two or three candidates
and explore them fully before
making a final selection.”
Power Grid Distributed Node
Architecture
Legacy
Apps
Simulation
Libs
RT-DB
IEC
Agents
IEC
Drivers
OSGi Container
RT Linux or RTOS
DDS
JVM-RT
DDS API NIO API
ESP/CEP Engine
RDF-DB
Distributed
Cache
Reasoner
OWL-DL SWRL
API
OWL-DL
Rule Engine
SWRL/RuleML
JADE (Bundle)
Publishing Server (HTTP)
Disturbance
OK
The Logical States
We have the process flows currently used for these states.
Trigger Workflow
Affected Workflow
Provider Workflow
Isolated Workflow
Lunch
<Picture Time!>
<Synchrophasor Visualization>
Discussion of the Industrial Internet –
Security, Resiliency, Efficiency
The Security Fabric
Designed with Embedded Systems in Mind
The embedded systems include:
Our strategy is to provide certified interoperability
to the key devices controlling the grid.
Our solution would be embedded
at each critical point in the energy infrastructure.
All points must connect to each other
in an end-to-end system.
Management Agents
The Security Fabric follows the guidelines required by the
NIST 7628 for the Department of Energy.
xSystem &
Network
Management
Controller
Device
Device The
Security
Fabric
The Security Fabric is an implementation of the
Tailored Trustworthy Space.
Embedded Device
Applications
Device
Management
Hypervisor
The fundamental concept is that
you must first separate the management elements of
a device from the application payload portions.
This is similar to the AMT philosophy, but expanded to the software dimension.
Separation of Protection and Security
• The major hardware approach for security or protection is the
use of hierarchical protection domains. Prominent example
of this approach is a ring architecture with "supervisor mode"
and "user mode“ [Intel].
• This approach adopts
capabilities provided
by a lower level:
(hardware/firmware/kernel).
The Multics Style of Ring Structure
The Security Connected components need to handle
the various management agent functions.
The approach also provides for secure persistent storage.
Policy logic goes here.DDS goes here.Industrial Protocol
Whitelisting
The security
inner sanctum ring
There are multiple transports planned.
The client/service and peer-to-peer relationships of
the applications must be uniformly planned.
The channel stacks facilitate interoperability
for individual sessions.
We use an industrial protocol whitelisting technique to
avoid false positives in mission critical operations.
ContentAwareFirewall
ProtocolWhitelistingLayers
4-6
IPCommunicationsStack–Layers2-3
IPsecVPN
UDPv6
UDPv4
Connections
• Kerberos Get Credentials + Tickets
• Get Extended Credentials
• Kerberos Mutual Authentication
• Get Precision Time
• Register for Management +
Configuration Synchronization
• Service Locator
• Service Provider
• Multicast Alert
• Unicast Command
• Event Notification
• SNMP Get/Set
• Application Event: Send and Receive:
• High Priority
• Medium Priority
• Low Priority
Sessions
InterfaceA
InterfaceB
There are servers and agents in the
industrial environment.
The next greater context includes collaboration:
Cyberthreat collaboration & emergency notification
Sensing Analyze Decision Action
Picocell
Utility
SIEM
Utility
TOP
SFA Boundary
Control
Situational
Awareness
Incident
Management
Alert/
Notification
Threat Connect
SMS
Email
Phone
Sirens
Social
Media
Radio
• DHS
• NSA
• DOE
• DOD
• State&Local
• Commercial
CAP
CAP
• Culpepper
• Dallas
• Chicago
• San Joe
DHS
FEMA
IPAWS
Cell Broadcast
EAS
CMAS
NWEM
(HazCollect)
EDXL
All communications
are protected using
the Security Fabric
CEF
• 1220 subscribing
organizations
• 1300 communities
This will be part of the emergency response system for SmartAmerica.
The cybersecurity threat sharing
needs to be performed between multiple communities
to be effective.
Subscriber
Subscriber
Subscriber
Subscriber
Subscriber
Context
Top Secret
Secret
Unclassified
F
F
Threat
Connect
STIX
Custom
Community
Community
Community
1300
Communities
1200
Subscribers
On-Premises Cloud
UI
API
Private Cloud
Threat Connect
Cloud Platform
Amazon EC2
Broker
Sources
Free, $, other
The data arrangements can be hierarchical
to facilitate multi agency awareness.
IODEF
At a higher level of correlation,
the Saturn cyberthreat real-time analysis
system will literally run rings around attacks.
Self-organizing Adaptive Technology Underlying Resilient Networks
The “Concierge” Service
• Attention! Some of the co-ops have very tiny IT staffs. (Like
one person)
• The coming cyber attacks will be very sophisticated.
• Even the central staff will sometimes be challenged to deal
with the complexities associated with cyberdefense.
• Thus, even with collaboration and data sharing, from time to
time, a co-op technician would like to have an “OnStar”
button to push to get instant help on demand from a
specialist.
This Concierge service from ThreatConnect may be very desirable.
Saturn comes in here to see the bigger picture.
Scope of the SmartAmerica Challenge
vs. the Production Rollout
SmartAmerica Architecture
“Open, secure, high-confidence and collaborative CPS network “
CPS
Communications
Fabric
Healthcare TBs*
Transportation TBs*Energy TBs*
Emergency Response
System TBs*
Building TBs*
Smart Manufacturing TBs*
SmartAmerica
Data Center(s)Avionics TBs* Technology TBs*
NRECA + NRTC
FirstNet + AlertSense
Terremark
MIT CIC
Alphaville
Pecan Street
Industrial
Internet
Security
Fabric
Our part of the demonstration will feature the
initial use of the Industrial Internet.
• Chuck Speicher will be the principal leader for this effort.
• General Electric will be a key member of the effort.
• Internet2 will be a primary contributor for the effort.
• There will be many other partners from the Security Fabric
Alliance that will participate.
• We will feature concepts from the NRECA and NRTC
inspired movement for the smart grid element.
• Other elements will be added where advantageous.
Let it be said that the Industrial Internet started right here.
As envisioned, Internet2 would eventually provide the requested
DWDM-based network for the Industrial Internet.
Ultimately, there would be four regional control centers but all serve as redundant backups.
There are 27 core points that connect to feeders.
However, if we are true to our strategy, we should never design
a thing without first understanding its next greater context.
And the rest as they say will be called history.
The objective is unusual:
Arbitrary results are not the point!
What we do is not so important as how we do it.
Lean development will produce lasting results in half the time
and cost half as much.
We are producing the real production product,
not conducting a high school science experiment.
We will learn the “other 90%” of what we need to learn
using this TPS process.
SEIT Process and Phase 1 Planning
The Nature of the First Iteration
Inter
Mediate
There would be multiple phases to allow for
piloting and then production status.
Trans-
former
IQ
Subnet Subnet
InSite
Storage
Platform
Gateway
Config
BaseN
OpCenter
SIEM
Active
Directory
R6
Authentication
Time Synchronization
CMDB
Security
Event
Management
Console
Fault Mgt
Performance Mgt
EcoSystem
Orchestration
•Validation
•Repair
•Gap / Dup
•Reformat
•Correlation
•Distribution
ePDC
Inter
Mediate
There would be multiple phases to allow for
piloting and then production status.
Trans-
former
IQ
Subnet
InSite
Storage
Platform
Gateway
Config
BaseN
OpCenter
SIEM
Active
Directory
R6
Authentication
Time Synchronization
CMDB
Security
Event
Management
Console
Fault Mgt
Performance Mgt
EcoSystem
Orchestration
•Validation
•Repair
•Gap / Dup
•Reformat
•Correlation
•Distribution
RTDMS
PMU
ePDC
Subnet
ePDC
Inter
Mediate
There would be multiple phases to allow for
piloting and then production status.
Trans-
former
IQ
Subnet
InSite
Storage
Platform
Gateway
Config
BaseN
OpCenter
SIEM
Active
Directory
R6
Authentication
Time Synchronization
CMDB
Security
Event
Management
Console
Fault Mgt
Performance Mgt
EcoSystem
Orchestration
•Validation
•Repair
•Gap / Dup
•Reformat
•Correlation
•Distribution
RTDMS
PMU
ePDC
Subnet
One Box
HAN Gateway
TeMix
Transactive
Energy
ePDC
Inter
Mediate
There would be multiple phases to allow for
piloting and then production status.
Trans-
former
IQ
Subnet
InSite
Storage
Platform
Gateway
Config
BaseN
OpCenter
SIEM
Active
Directory
R6
Authentication
Time Synchronization
CMDB
Security
Event
Management
Console
Fault Mgt
Performance Mgt
EcoSystem
Orchestration
•Validation
•Repair
•Gap / Dup
•Reformat
•Correlation
•Distribution
RTDMS
PMU
ePDC
Subnet
One Box
HAN Gateway
TeMix
Transactive
Energy
Threat
Connect
Saturn
Networking Break
In the iterative nature of the agile lean development,
the customer recommends the following beta candidates:
• MCNC – North Carolina (distribution)
• Pedernales – Texas (distribution)
• Tri-State – Colorado (generation and transmission)
• Grant County PUD – Washington (muni)
• San Diego Gas & Electric – California (IOU)
• SPEC – Texas (generation and transmission - wind)
• Fort Myers – Florida (smart community – solar)
We should be true to the Agile Manifesto and let the scope float a bit
based on what is learned in each two week sprint.
Agile Lean Development:
an integral part of the process
• The frame of reference for this program is the lean mindset.
• Delivery of value to delighted customers is the goal.
• We will use Kanban to manage the flow of learning during the
quarterly releases, the two week sprints, and the scrum
meetings.
– The backlog
– The in process sprints
– The finished feature support
• Optimization and the elimination of waste and technical debt
go on forever.
Methodology for SmartAmerica
Phase 1
Phase 2
Estimated Phase 1 Schedule
Milestone Week ending
• Kickoff meeting 1
• Objectives section complete 1
• Requirements assessment section
complete 8
• Strategy section complete 9
• Technology evaluation section
complete 9
• Architecture section complete 11
• Leadership presentation 12
• NRECA management presentation 13
Solution provider SEs
Acquisition SEs
At large scale, the effort is divided into
parallel threads with cross-thread interactions.
Architecture Development
Modeling & Simulation
Interface Management
Data Characterization
Requirements Management
Milestone Documentation
Scheduling
Integration & Test
SE Functional Role Focus
Cross-Thread Analysis Focus
Mission Thread SE Focus
Deployment/Baseline Focus
Deployment Team Focus
Thread 1 Thread NThread 2
Presentation/Query Interface
Policies/metadata/knowledge management
Analytic processing
Data ingest processing
End-to-end security The thread leaders are the key
to complex systems engineering.
Phase 2 parallel threads currently include:
1. Creation of the Security Fabric Management Agent Simulator
2. Deployment of the systems management servers
3. Creation of the Industrial Internet on the I2 lambda rail
4. Implementation of the Cloud Broker
5. Implementation of the neighborhood LTE picocells
6. Implementation of the GridSense sensors
7. Implementation of the Subnet substation servers
8. Implementation of the takeout node with data ingest server
9. Implementation of the GridSense InSite analytics
10. Implementation of the EPG visualization service
11. Implementation of the SETI data sharing and emergency notification
12. Implementation of the CyberThreat Collaboration Network
13. Implementation of Saturn and the Concierge Service
14. Implementation of the Transactive Energy pilot
15. Followed by an interim demonstration of capability
The entire system will be continuously integrated and tested each day.
The Nature of
Global Development Teams
Virtual Organization
• Organizing entities use a structure that resembles a network
rather than a hierarchy.
• Organizations are driven to virtual forms to be more:
– Flexible
– Agile
– Responsive
– Inexpensive
Architecture and Task Allocation
Low
High
Good
Bad
Coupling
Cohesion
High
Low
This is easier when the team locations align with the architecture a bit.
The Loss of “Communication Richness”
• Rich “high-touch” communication is defined as
two-way interaction involving more than one
sensory channel.
• A substantial portion (80%) is non-verbal and
implicit. It consists of body language such as:
– Gestures
– Facial expressions
– Postures
• Richer media conveys more information and
emotion.
We need to decide how we are going to do
these things this time:
• Colocation period
• Scrum calls
– Electronic kanban boards to plan and follow progress
– Continuous delivery system (integration, testing, &
deployment)
– Configuration management and automated build
processes
• Regroup huddles
• Estimates
• Funding process
General Discussion –
Issues, Action Items, and Understandings
Wrap Up and Conclusion
The Timeless Way of Building
Indeed this ageless character has nothing, in the end, to do
with languages.
The language, and the processes which stem from it, merely
release the fundamental order which is native to us all.
They do not teach us,
they only remind us of what we know already,
and of what we shall discover time and time
again,
when we release our ideas and opinions,
and do exactly what emerges
from ourselves.
Closing
776 B.C.
“Let the Threads Begin”
Extras
Background
Focus
Functions
Tasks for Performing EBV
in the EMS-DMS-SCADA Platform
Collaboration Scheme among Intelligent Nodes
supporting the EBV in the ENERGOS Smart Grid
Osterwalder - Business Model Canvas - page 1
Element Sub-element Semantics
Business
model
Name The name of the business model
Short description Short description of the business model [extension to Osterwalder’s canvas]
Market players/
competition
Who are the relevant players in the market, running this business model? How competitive is the business
model? [extension to Osterwalder’s canvas]
Maturity level What is the level of maturity of the business model within the market? (e.g. innovative, well established)
[extension to Osterwalder’s canvas]
Priority What is the priority (relevance, importance) of the business model from a CSP perspective? [extension to
Osterwalder’s canvas]
Customer
/Market
Customer
Segment
What is the customer segment(s), addressed by the business model?
Customer Segments define the different groups of people or organizations an enterprise aims to reach and serve. A
customer segment is a sub-set of a market made up of people or organizations with one or more characteristics that
cause them to demand similar product and/or services based on qualities of those products such as price or function.
Channel What are the relevant channels (communication as well as sales & distribution channels) to reach the addressed
customers? Channels (communication, distribution & sales channels) comprise a company´s interface with
customers. Channels are customer touch points that play an important role in the customer experience.
Relationship What kind of relationship is expected by the customer/needs to be established for the business model? (e.g. self-
service, communities, personal assistance). Relationships can range from personal to automated.
Product
Offering
Value proposition What kind of products and services are offered to the customer? What value will be delivered through the business
model?
The value proposition is the reason why customers turn to one company over another. It solves a customer problem
or satisfies a customer need. Each value proposition consists of a selected bundle of products and/or services that
caters to the requirements of a specific customer segment. In this sense, the value proposition is an aggregation, or
bundle, of benefits that a company offers customers.
Element Sub-
element
Semantics
C2M
(concept to
market)
Key
Activities
Key activities are the most important things a company must do to make its business model work. What are the key
activities, to launch the offers product/services to the market, to establish the channels, to maintain the customer
relationship and to ensure the revenue streams? (e.g. development of community site, implementation of new
billing concepts).
Key
Resources
Key resources are the most important assets required to make a business model work. What are the required key
resources, to launch the offers product/services to the market, to establish the channels, to maintain the customer
relationship and to ensure the revenue streams? (e.g. development of community site, implementation of new
billing concepts).
Key
Partners
Who are the key suppliers/partners, what are the key activities and resources, which need to be acquired from
those? (e.g. external call center, supplementary content from a content provider)
Enterprise
Management
Cost
Structure
The Cost Structure describes the most important costs incurred to operate the business model.
Revenue
Streams
Revenue Streams are the cash a company generates from each Customer Segment; A business model can involve
several different types of Revenue Streams:
• Transaction revenues resulting from one-time customer payments;
• Recurring revenues resulting from ongoing payments to either deliver a Value Proposition to customers or provide
post-purchase customer support;
-Shared Revenue – resulting from operations carried out by a B2B partner who uses enterprise’s products or
services to generate its own revenue from its own end customer but does not pay upfront or recurrent for
products/services from the enterprise – just % of actual revenue;
- 3-rd party revenue – revenue from a 3-rd party to include its own services in the enterprise offerings to its
customer segments.
Osterwalder - Business Model Canvas - page 2
Element Sub-element Semantics
Barriers Business
related
What are the business related barriers, to implement the business model? (e.g. high risk regarding
cash flow) [extension to Osterwalder’s canvas]
Technical What are the technical barriers to implementing the business model? (e.g. high risk due to immature
technology) [extension to Osterwalder’s canvas]
Drivers Strategic
portfolio
What are the drivers to implement the business model regarding the strategic portfolio planning? (e.g.
complementary to the existing portfolio strategy) [extension to Osterwalder’s canvas]
Revenue
Streams
What are the drivers to implement the business model regarding the revenue streams? (e.g. new
revenue opportunities to compensate decreasing airtime prices) [extension to Osterwalder’s canvas]
Touchpoints/Use
Cases
Upstream What are the key touchpoint/use cases/interaction patterns to interact with upstream customers? (e.g.
registering app in app store).Upstream customers are B2B partners/enterprise customers (e.g.
retailers, media, advertisers, utilities, finance etc.) [extension to Osterwalder’s canvas]
Downstream What are the key touchpoint/use cases/interaction patterns to interact with downstream customers?
(e.g. end customer billing). Downstream customers are the end users of a product or service, this can
be consumers as well as companies [extension to Osterwalder’s canvas]
Osterwalder - Business Model Canvas - page 3
BT’s Cloud Service Broker
Low Cost
Compute
- for test and dev
Secure SaaS
- e.g. CRM
Private Compute
job
- e.g. pharma,
finance
Extra resources-
- e.g. legacy
Application out of
space/power
CollaborationLow Cost
Compute
Secure SaaS
- e.g. CRM
Private Compute
job
Extra resources-
- e.g. legacy
Application out of
space/power
Collaboration
Low SLA
SaaS
BPOS
Provider
High SLA
Compute
Commerce
MPLS
Connected
VDC
Video
Low SLA
Compute Low cost
Storage
High SLA
Carrier
Preventing
Runaway costs
Security
Avoiding Vendor
lock-in
Application
Performance
Compliance
and Audit
Transparency
Assurance
Cloud Service
Broker
(EEP)
Monitor & Assure
Compliance and
Audit
The “Ecosystem Enablement Platform” (EEP) fulfills the role of the CSB
The NRTC has a variety of broadband services that could
be tunneled through the Industrial Internet.
• OTT & TVE services
– Video services
• Walt Disney comprehensive long term
distribution sports, news,
entertainment
• NBCUniversal comprehensive content
affiliation
• 100 HD channels
– NeoNova Cloud Services
– ViaSat Satellite Distribution
– Exede satellite broadband services
– Telispire – MVNO services
– WiMax service
– Planning for First Responder
network
• Power services
– OATI demand response options
– Efacec – Advanced Control Services
– Clevest – workforce management
and smart grid operations
– Power Secure LED lighting
– Sensus – Flexnet AMI; smart
meters; distribution automation;
demand response
– GeoNav – nVIEW 360o
– TenKsolar – solar voltaic systems
– Wind farm deployment
– Milsoft and Clevest MultiSpeak
certification
“The Prolog”
The Tower of Babel is alive and well in the 21st Century.
In general, it is a good thing to address this reality right up front.
Frames of Reference
• According to cognitive scientists, we all interpret our surroundings
through frames – mental constructs that shape our perspectives of
the world.
• Frames are sets of beliefs about what elements to pay attention to
and how these elements interact with each other.
• Frames place significant limits on our perspective; we can only see
what our frames tell us is meaningful, and we usually ignore what
lies outside the boundaries.
• Most of us are unaware of the way our background and
experience shape the way we frame our decisions and actions;
only a few of us consciously adjust our frames as if we were
photographers.
• In fact, we seldom even think about the direction in which we are
pointing our cameras.
Frames of Reference
• Everyone shapes his or her view of the world through framing, and
people with different backgrounds are likely to see their
surroundings through vastly different frames.
• By themselves, frames are not inherently good or bad…
they just are.
• However, evidence has shown that certain frames are more likely
than others to lead to long-term success.
We need to derive a good pattern language to get things properly rolling.
Osterwalder - Business Model Canvas
• …
Ecosystem & Partnering Capabilities Articulation
Suggested Procedure
• Discover “repeatable” functional building blocks
from different business models
– Describe business model
using Osterwalder’s Business
Model Canvas
– Derive “ecosystem” canvas and
find “repeatable” patterns
– Derive reusable “architecture
building blocks”
• Refinement of a candidate architecture to a detailed architecture
blueprint
• Implementation of prototype scenarios
The Logical States
We have the process flows currently used for these states.
PsiNaptic
Jmatos
Aaron Dagan
Cameron Roe
Change Control Interactions
Ring 2
Change Mgt
Change Control
Service Locator
Service Provider
Service
Consumer
Workflow
Control
Attestation
Directory
Service
Repository
Transition
Control
1
2
3
4
5
Dynamic
Binding
Promote &
Store
Activate
Service Instance
8
6
7
KerberosDirectory
1
9
Credentials include
Chain of Trust Certificates
Department of Defense
James Galvin
Daryl Haegley
Michael Aimone
Kathleen Ahsing
Booze Allen Hamilton
Aaron Kraus
Change in Level of Trust Between Sites
Trust
Time
Sufficient level
to work together
effectively
Kick-off
meeting Milestone
meeting
“MBFA”
(Management by Flying Around)
High Tech
Requires
High Touch
But the greatest engineering achievement of the 21st Century
is likely to be the reengineering of the electric grid into
secure, resilient, agile fractal patterns.
- Annonymous
But the greatest engineering achievement of the 21st Century
is likely to be the reengineering of the electric grid into
secure, resilient, agile fractal patterns.
- Annonymous
(Aye, but there is always a grain of truth
in every word spoken in jest.)
- William Shakespeare
Characteristics of Teams: Yesterday vs. Today
Traditional Teams Virtual Teams
Co-located members Distributed members
Face-to-face interaction Electronic communication
Members from the same Members from different
Organization organizations
Hierarchical Networked
Mostly informal communication Continuous structured
communication
Position authority Process and knowledge
authority
Informal distribution (push) Information access (pull)
Information on paper Information electronic
Sharing completed work Continuous sharing of
incomplete work
Knowledge hoarding Knowledge sharing
Transparent process Computer-visible process
Culture learned through osmosis Culture learned through
electronic-based
communications and artifacts
Merit Networks
Joe Adams
MACE
Multi Agency
Collaboration Environment
Norman Eaglestone
Freescale
Mike Dow
Vybrid – first SFA compatible silicon

Contenu connexe

Tendances

Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid systemamaljose949563
 
Cybersecurity of powergrid
Cybersecurity of powergrid Cybersecurity of powergrid
Cybersecurity of powergrid Rajesh Sawale
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...University of Southern California
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDSiva Sasthri
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
 
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...sidhota
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentKEERTHANA M
 
Software defined network based smart grid communication
Software defined network based smart grid communicationSoftware defined network based smart grid communication
Software defined network based smart grid communicationHaider Tarish Haider
 
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...AM Publications
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryChristian Glover Wilson
 
A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...Pawan Arya
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Ahmed Banafa
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesIRJET Journal
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Power System Operation
 

Tendances (20)

Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Cybersecurity of powergrid
Cybersecurity of powergrid Cybersecurity of powergrid
Cybersecurity of powergrid
 
Smart grid security
Smart grid securitySmart grid security
Smart grid security
 
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
Cyber security for the smart grid, Clifford Neuman, Information Sciences Inst...
 
CYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRIDCYBER SECURITY IN THE SMART GRID
CYBER SECURITY IN THE SMART GRID
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...Cyber security of smart grid communication: Risk analysis and experimental te...
Cyber security of smart grid communication: Risk analysis and experimental te...
 
Report-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living EnvironmentReport-Fog Based Emergency System For Smart Enhanced Living Environment
Report-Fog Based Emergency System For Smart Enhanced Living Environment
 
Software defined network based smart grid communication
Software defined network based smart grid communicationSoftware defined network based smart grid communication
Software defined network based smart grid communication
 
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
A LOW COST AND FLEXIBLE ZIGBEE SYSTEM FOR LOGISTICS USING WIRELESS SENSOR NET...
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...A secure cloud computing based framework for big information management syste...
A secure cloud computing based framework for big information management syste...
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
 
Control on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing ServicesControl on Remote Sensing Network using Cloud Computing Services
Control on Remote Sensing Network using Cloud Computing Services
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
Cybersecurity Considerations for Power Substation SCADA Systems Using IEC 618...
 

En vedette

B2b Project Kick Off 012208
B2b Project Kick Off 012208B2b Project Kick Off 012208
B2b Project Kick Off 012208rapplebee
 
Smart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart GridSmart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart GridCharles "Chuck" Speicher Jr.
 
The Agile Fractal Grid orchestrated by a platform of platforms
The Agile Fractal Grid  orchestrated by a platform of platformsThe Agile Fractal Grid  orchestrated by a platform of platforms
The Agile Fractal Grid orchestrated by a platform of platformsCharles "Chuck" Speicher Jr.
 
6 New Ways to Give Your Sales Kickoff Meeting a Boost
6 New Ways to Give Your Sales Kickoff Meeting a Boost6 New Ways to Give Your Sales Kickoff Meeting a Boost
6 New Ways to Give Your Sales Kickoff Meeting a BoostDoubleDutch
 
BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John WestrikBK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrikjornvorn
 
Urban complexity's role in a practical emergent urbanism
Urban complexity's role in a practical emergent urbanismUrban complexity's role in a practical emergent urbanism
Urban complexity's role in a practical emergent urbanismMathieu Hélie
 
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han MeyerBK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyerjornvorn
 
Keynote Sales Kickoff Interoute
Keynote Sales Kickoff InterouteKeynote Sales Kickoff Interoute
Keynote Sales Kickoff Interoute247 Invest
 
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien BrandesBK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandesjornvorn
 
BK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien BrandesBK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien Brandesjornvorn
 

En vedette (14)

B2b Project Kick Off 012208
B2b Project Kick Off 012208B2b Project Kick Off 012208
B2b Project Kick Off 012208
 
Smart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart GridSmart Cities link to a real operational Smart Grid
Smart Cities link to a real operational Smart Grid
 
The Agile Fractal Grid orchestrated by a platform of platforms
The Agile Fractal Grid  orchestrated by a platform of platformsThe Agile Fractal Grid  orchestrated by a platform of platforms
The Agile Fractal Grid orchestrated by a platform of platforms
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
6 New Ways to Give Your Sales Kickoff Meeting a Boost
6 New Ways to Give Your Sales Kickoff Meeting a Boost6 New Ways to Give Your Sales Kickoff Meeting a Boost
6 New Ways to Give Your Sales Kickoff Meeting a Boost
 
BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John WestrikBK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
BK 7210 Design principles urbanism and Kop van Zuid – ir. John Westrik
 
New Urbanism: Just... performs...better
New Urbanism: Just... performs...betterNew Urbanism: Just... performs...better
New Urbanism: Just... performs...better
 
Urban complexity's role in a practical emergent urbanism
Urban complexity's role in a practical emergent urbanismUrban complexity's role in a practical emergent urbanism
Urban complexity's role in a practical emergent urbanism
 
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han MeyerBK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
BK 7210 Urbanism Rotterdam and the Delta – ir. Han Meyer
 
Platforms Transitions
Platforms TransitionsPlatforms Transitions
Platforms Transitions
 
Keynote Sales Kickoff Interoute
Keynote Sales Kickoff InterouteKeynote Sales Kickoff Interoute
Keynote Sales Kickoff Interoute
 
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien BrandesBK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
BK 7210 Urban plan typology Rotterdam Zuid – ir. Evelien Brandes
 
BK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien BrandesBK 7210 Urban analysis and design principles – ir. Evelien Brandes
BK 7210 Urban analysis and design principles – ir. Evelien Brandes
 
Urban Design Definition
Urban Design DefinitionUrban Design Definition
Urban Design Definition
 

Similaire à NRECA Agile Fractal Grid Kickoff Meeting Agenda

Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingCharles "Chuck" Speicher Jr.
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingChuck Speicher
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryAbner Germanow
 
Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"Charles "Chuck" Speicher Jr.
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1EnergySec
 
Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranGSTF
 
Power Grid Identity Management addressed with NIST 1-800
Power Grid Identity Management addressed with NIST 1-800Power Grid Identity Management addressed with NIST 1-800
Power Grid Identity Management addressed with NIST 1-800David Sweigert
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...元 黄
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...Dale Butler
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada securityYulia Rotar
 
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPSecurity of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPEnergySec
 

Similaire à NRECA Agile Fractal Grid Kickoff Meeting Agenda (20)

Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
T063500000200201 ppte
T063500000200201 ppteT063500000200201 ppte
T063500000200201 ppte
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 
Detroit A Smart City..... inspired by a "Community of Practice"
Detroit  A Smart City..... inspired by a "Community of Practice"Detroit  A Smart City..... inspired by a "Community of Practice"
Detroit A Smart City..... inspired by a "Community of Practice"
 
Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton Ravindran
 
Power Grid Identity Management addressed with NIST 1-800
Power Grid Identity Management addressed with NIST 1-800Power Grid Identity Management addressed with NIST 1-800
Power Grid Identity Management addressed with NIST 1-800
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Power Grid Cybersecurity
Power Grid CybersecurityPower Grid Cybersecurity
Power Grid Cybersecurity
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
 
European smart grid cyber and scada security
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
 
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPSecurity of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
 

Dernier

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Dernier (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

NRECA Agile Fractal Grid Kickoff Meeting Agenda

  • 1. NRECA The Agile Fractal Grid “The Gathering of Eagles” Tuesday, February 25, 2014 Arlington, VA
  • 3. Agenda for NRECA Agile Fractal Grid Kickoff Meeting 8:00 Welcome by Martin Lowery; Opening by Chuck Speicher 8:15 Introductions of the Participants – John Reynolds 8:45 Achieving the Common Language through Design Patterns 9:20 The Vision of the Agile Fractal Grid – Craig Miller 9:45 Break 10:00 Discussion of the Managed Services Store and Applications 10:20 Discussion of the Distributed Systems Elements 11:45 Discussion of the Industrial Internet – Security, Resiliency, Efficiency 12:15 Lunch 1:00 Scope of the SmartAmerica Challenge vs. the Production Rollout 2:00 SEIT Process and Phase 1 Planning 2:30 Break 3:00 Phase 2 Implementation and Thread Assignments 3:30 General Discussion, Issues, Action Items, and Understandings 4:00 Wrap Up and Conclusion
  • 5. Background on the National Rural Electric Cooperative Association
  • 6. Convening of the Security Fabric Alliance Chuck Speicher
  • 7. Announcement of House SFA Rules John Reynolds
  • 8. It has been said that the greatest engineering achievement of the 20th century has been the building of the electric grid. - The National Academy of Engineering
  • 10. Department of Energy Carol Hawk Program Manager, Cyber Security for Energy Delivery Systems Ivanpah World's largest solar plant started producing electricity today Ivanpah was supported by $1.6 billion in investments from the Energy Department's Loan Programs Office. It represents the future of energy – utility-scale renewable power generation that uses the latest technology to harness the sun where it is most abundant.
  • 12. Office of the Secretary of Defense Rollie Wicks
  • 13. Department of Homeland Security Lisa Kaiser Sarah Mahmood Executive Order (EO) 13636: Improving Critical Infrastructure Cybersecurity Presidential Policy Directive (PPD)-21: Critical Infrastructure Security and Resilience, Critical Infrastructure Cyber Community Voluntary Program Secretary of Homeland Security Jeh Johnson
  • 14. PM – ISE DNI Pamela Wise-Martinez Mike Howell Kshemendra Paul Mission Partners
  • 15. Congress Diane Rinaldo Legislative Director For Mike RogersMike Rogers – Michigan 8th District U.S. House of Representatives Chairman, House Intelligence Committee Member, Energy and Commerce Committee United States House Energy Subcommittee on Communications and Technology United States House Energy Subcommittee on Health Cyberthreat Data Sharing and Protection
  • 18. We are planning to support the 940 rural co-ops in the U.S. with hybrid cloud/device services protected by the Security Fabric. This is also the candidate energy “testbed” for the SmartAmerica demonstration.
  • 19. What NRECA has asked us to do. 1. Stand up an “app store” for both operational and analytical applications for the cooperatives. 2. Participate in the “Substation of the Future” for the remote equipment and subsystems. 3. Apply the Security Fabric within the emerging Industrial Internet to protect all communications between the elements.
  • 20. Introduction to the Security Fabric Alliance • The Security Fabric Alliance is a working association dedicated to practical deployment of the power grid and critical infrastructure complex system solution in the United States: – Utilities and telecommunications providers – Systems integrators – Manufacturers – Technology partners – National certification and interoperability entity • The alliance is intended to give the CEO of a utility the purview of up-to-the moment knowledge of the options available to make wise investment decisions regarding infrastructure deployment for optimal returns. The variation includes the proper orientation for large, medium, and small utilities.
  • 21. There are many participants at different levels in the Security Fabric Alliance. ComponentsProductsSubsystems ResearchIntegration Utility Customers • Intel – servers with Quark + TPM • Wind River – Security Connect • Middleware • RTI – DDS • GridStat • Indra - iSpeed • MultiSpeak • TeamF1 – Secure Communications • Secure Crossing – Protocol Whitelisting • PsiNaptic – Secure Service Distribution • SNMP Research – SNMP Agent • Freescale – HSM w/Vybrid SoC • Xilinx – CompactRIO SOC • Green Hills Software - INTEGRITY • Altera - tamper proofing • Microsoft – Active Directory • Red Hat – Auth Hub • General Electric – EMS • Alstom Grid – EMS • Siemens – DMS • Viridity Energy – DR + DER + Microgrid • Lemko – LTE systems • Intel Security – SIEM + GTI • Intel – Encanto + silicon support • Sypris – Supply Chain Root of Trust • TCIPG • EPRI – CIM Standards • MIT – Security & Privacy Standards • EPG – Phasor Data Portfolio • GridSense– NAN & Line Sensors • S&C IntelliTeam • SafeNet – Secure Key Management • Heart - Transverter • Freescale One Box • Cisco Cloud-in-a-Box • Integrated Architectures – SEIT • MACE Fusion - DoD • Kryptos Logic – Red Team Certification • M2M Dynamics • Drummond Group – C&IT • Intel Security - Distribution ...First Stage…… • ERCOT • ONCOR • AEP • NRECA • NRTC Suppliers • Verizon • Level3 • AT&T • Internet2 • BT • ViaSat • Hughes • ARINC • Stratus • Symmetricom …Second Stage…… • APPA • SDG&E • PJM • NYISO • Southern Company • Duke Energy • CAISO • Pecan Street • Mueller Community • Pike Powers • PNNL – CyberSecurity Test Center • Lincoln Labs • OMG SIG • SmartAmerica Managed Services • Tazca – Connect • CSG International • Digi International • N-Dimension • SETI • Lockheed Martin • SAIC • Threat Connect
  • 22. To establish the security of end-to-end systems using the Security Fabric elements, you need to do all seven… not just some. 4. Audit – Records noteworthy events for later analysis 5. Confidentiality – Encrypts sensitive data for matters of privacy. 6. Integrity – Ensures that messages have not been altered. 7. Availability – Prevents denial of service attacks 1. Identity Management – Ensures the device identity is established genuinely 2. Mutual Authentication – Allows both the Device Node and the Controller to verify the trustworthiness their identity to each other. 3. Authorization – Manages permission to proceed with specific operations. These are the seven tenets of security as described in the NIST-IR 7628 Guidelines.
  • 23. The OMG process is more about establishing markets as opposed to just setting standards. SFA Reference Builds Certification of Conformance & Interoperability The OMG is planning to standardize the Security Fabric for all critical infrastructure.
  • 25. Systems Engineering, Integration, and Test • President – Energy One Solutions • Secretary General – GO15 Very Large Power Grid Operators • President and CEO Alstom ESCA Corporation • CTO – PJM Interconnection • Co-founder Viridity EnergyAlain Steven John Reynolds Alain Steven Rick Schaal Mike Sisto Jim Baller Bob Lamont Paul Carroll Mike Sisto • IBM’s Wireless Emerging Business Opportunities • AT&T, Lucent Technologies and Hewlett-Packard • Lemko Distributed Mobile Wireless Network solutions Rick Schaal • VP, Engineering – Viridity • Executive Program Director – Alstom ESCA • Program Director – AREVA • DMS Lead – Puget Sound Energy • American Public Power Association • Fiber to the Home Council • Google Inc. • National Association of Telecommunications Officers and Advisors • + several hundred specific broadband projects
  • 27. Texas A&M University Named second in the nation by The Wall Street Journal among all universities, public and private, in a survey of top U.S. corporations, non-profits and government agencies, based on graduates that recruiters prefer to hire. “Home of the 12th Man” Walt Magnussen
  • 28. Real-Time Innovations AEGIS Weapons System Total Ship Computing Environment NASA Robotic Controls Unmanned Aircraft Systems Tom O’Conner Mark Hamilton
  • 30. GridSense Transformer IQ Line IQ Inspection Brett Sargent • System Capacity • Phase Imbalance • Metering / Theft • Conservation Voltage Reduction • Four Quadrant True Power Factor • Line Fault Directionality • PQ – voltage sags/swells, interruptions, surges, unbalance • Transformer Asset Management
  • 31. Lemko LTE over Satellite Cellular on Wheels Utility Industry WiMax Replacement Security Industry Transportation Industry Mike Sisto Public Safety Healthcare industry
  • 32. Subnet Solutions SEL Substation Controller Message Management from Substations Ameen Hamdon
  • 33. CSGi Jarrid Hall Eddie Day Over 8 trillion revenue event records processed annually for major clients. InterMediate
  • 34. Electric Power Group Direction of Grid Stress Voltage Stability Monitoring Vikram Budhraja Vivek Bhaman
  • 36. BearingPoint Infonova  Concept-to-Cash Andrew Thomson The Orchestration of the Ecosystem.
  • 37. BT America Milton Keynes Tom Wolf Bryan Fite
  • 38. Milsoft Engineering Analysis Geographic Information Field Engineering Outage Management Wayne Carr
  • 42. Green Hills Software Smart Farming Smart Medical Systems GE Aircraft Engines EMC High End Storage Systems Transportation Systems Phase Array Radar Systems Weapons Control Systems Guidance Systems Game Systems Automotive Systems John Warther John Killam Brad Jackson Brian Riley
  • 43. LocalGrid Technologies Power Quality Analyzer Microgrid controls: • Microgrid and Generation Control • Generation and Asset Monitoring • Storage Integration Device EnvironmentController Environment Hypervisor Application Management Agent Hypervisor Application Management Agent David Berg
  • 44. CryoKey Chris Ho Identity ManagementMutual Authentication Authorization
  • 47. Secure Exchange Technology SETI Richard Marshall Elysa Jones Threat data collaboration. Community Emergency Management. National footprint today!
  • 48. Threat Connect Leigh Reichel 1300 Communities of Interest already in production!
  • 51. Utilities Telecommunications Council Eric Wagner Brett Kilbourne • Advocacy and Training • License Sentry • Frequency Coordination • Microwave Coordination • PLC Database • RF Safety and Training • Regulatory Filing and Tracking
  • 52. General Electric Substation Simplification Transformer Protection System Energy Management System Wide Area Monitoring System Integrity Solution Joe Salvo
  • 54. National Rural Electrical Cooperative Association Martin Lowery Robbin Christianson David Pinney Maurice Martin Barry Lawson Bridgette Bourge Bob Lamouth Doug Lambert Paul Carrol Craig Miller
  • 55. Building a Common Language Everyone shapes his or her view of the world through framing, and people with different backgrounds are likely to see their surroundings through vastly different frames. By themselves, frames are not inherently good or bad… they just are.
  • 56. The quality that all of us seek in life that has no name includes Simplicity.
  • 57. The Laws of Simplicity are very important in complex environments. 1. Reduce The simplest way to achieve simplicity is through thoughtful reduction. 2. Organize Organization makes a system of many appear fewer. 3. Time Savings in time feels like simplicity. 4. Learn Knowledge makes everything simpler. 5. Differences Simplicity and complexity need each other. 6. Context What lies in the periphery of simplicity is definitely not peripheral. 7. Emotion More emotions are better than less. 8. Trust In simplicity we trust. 9. Failure Some things can never be made simple. 10. The One Simplicity is about subtracting the obvious, and adding the meaningful. John Maeda leads RISD: the #1 school of design in the country.
  • 58. Never design a thing without first understanding the next larger context into which it must fit. • A chair within a room, • a room within a house, • a house within a neighborhood, • a neighborhood within a city. - Eero Saarinen There are two more guiding principles in all contemporary architecture. Cranbrook Academy is the #2 school of design in the country.
  • 59. Use a system of design patterns to allow local teams to design their own systems out of interchangeable parts such that integration is assured from the outset… but such that no two local systems ever look exactly the same. - Christopher Alexander “The Timeless Way of Building” Design patterns allow for organic growth. This treatise on design patterns is now he basis of most object-oriented systems in the world today.
  • 60. Our assignment here is to build a forest of oak trees. First start with a vision of the end goal... … then work backwards in time to determine the first step.
  • 61. Those who are not students of history … …are doomed to repeat it. We always seem to build things four times, and in a certain order. – Make it work – Make it fast – Make it small – Make it pretty - Jim Ladd
  • 62. Systems Engineering Strategy: The Building of the Boeing 777
  • 63. This iconic building remained the tallest building in the world for over 40 years… … and yet took only one year to construct… In their first meeting with the client, Lamb asked Raskob about his vision for the building. Raskob stood a pencil on end and said, "How high can you make it so that it won't fall down?“ The initial plans were ready in two weeks. John Jakob Raskob Chief Financial Officer of both Dupont and General Motors
  • 64. The building of the Boeing 777 drew from the lessons learned. • The design phase for Boeing's new twinjet was different from the company's previous commercial jetliners. For the first time, eight major airlines had a role in the development of the airliner. This was a departure from industry practice, where manufacturers typically designed aircraft with minimal customer input. • The 777 was the first commercial aircraft designed entirely on computer. Each design drawing was created on a three-dimensional CAD software system. This let engineers assemble a virtual aircraft, in simulation, to check for interference and verify that the thousands of parts fit properly— thus reducing costly rework. • The initial 777-200 model was launched with propulsion options from three manufacturers, General Electric, Pratt and Whitney, and Rolls-Royce, giving the airlines their choice of engines from competing firms.
  • 65. The advice from some of the team is memorable relevant to creating complex systems. Chapter 3 on Reliable Delivery recounts some of the inspiration from the building of the Empire State Building in 1930. In the beginning it is always good to come up with at least two or three options for how a capability might be implemented… … and then defer making a final decision until after they are better understood relative to what the overall system must do.
  • 66. But how should we start? • We should first go talk to the least capable of our customers and walk a mile in his moccasins to see what takes place there: – for that feel of what events go on there – for what their definition of happiness is all about – for that essence of what life itself is all about – for “the quality that has no name”… (more on this later…) Let’s use a compelling user story to make it easy for all to see the intent.
  • 67. The Vision “The Agile Fractal Grid” Achieving Grid Security, Reliability, and Resiliency through Advanced Analytics and Control
  • 68. A Tale of Two Feeders
  • 69. On a nice day, the utility is running smoothly. Everything is “Hot”
  • 70.
  • 71. A bad storm comes through and some areas lose power
  • 72.
  • 73. But backup power, distributed generation, and stored energy allow some areas to island and continue operation…
  • 74.
  • 75. Smart control systems allow the islands to network
  • 76.
  • 77. This may allow some power to be restored in additional areas as the utility works to bring dark areas on line
  • 78.
  • 80.
  • 81. The smaller grids reconnect with the utility
  • 82.
  • 83. Collect Data Transform and Organize Data Perform Analysis Derive Decision Implement Action Collect Data Transform and Organize Data Perform Analysis Derive Decision Implement Action All grid applications have the same basic structure.
  • 84. Collect Data Transform and Organize Data Perform Analysis Derive Decision Implement Action Data level integration Abstraction of the data layers opens the grid to better, lower cost development
  • 85. Abstraction Model for the Agile Grid
  • 86. Layer Innovations Needed Action Layer Advanced technology: • Smart feeder switching • CVR • Advanced sectionalization • Direct load control • Storage • Phasor measurement units • Solid state VAR control … High bandwidth, high-reliability communications Software defined networks Decision Layer Static and dynamic power flow modeling Event tree generation Taxonomic system for failure classification Analysis Layer Predictive modeling Static and dynamic power flow modeling AI based anomaly detection Information layer High performance database Distributed information stores Cloud based computing Data Layer High performance sensor networks Improved interoperability standards Passive and active capture technology Innovations are needed at all layers.
  • 88. Discussion of the Managed Services Store and Applications
  • 89. At NRECA the private cloud-based support needs to provide applications options for all the participating utilities. The Security Fabric must support all the interfaces.
  • 90. Candidate Applications • Business Functions External to Distribution Management – Customer Relationship Management (CRM) (includes CIS) – Meter Data Management (MDM) – Customer Billing (CB) – Payment Processing (PP) – Prepaid Metering (PPM) – End Device Testing and Receiving (EDTR) – Finance and Accounting (FA) • Distribution Engineering, Planning, Construction, and GIS – Asset Management (AM) – Project Manager - Configuration Management – Engineering Analysis (EA) – Field Design (Staking) – Geographic Information Systems (GIS) – GIS Viewer (GV) – Inspection (INSP)
  • 91. Candidate Applications • Distribution Operations – Integration Server – Call Handling (CH) – Distribution Automation (DA) – FAST voltage regulation, active power control and load flow control in meshed power systems. – Interactive Voice Response (IVR), – Outage Detection (OD) – Outage Management (OA) – Supervisory Control and Data Acquisition (SCADA) – Substation Automation – Switching Orders (SWO) – Vehicle Location (AVL) – Volt/Var Control – Demand Response (DR) – Load Management (LM) – Demand Optimization Systems (DOS) – DRAS Server
  • 92. Candidate Applications • Distribution System Monitoring – Connect/Disconnect (CD) – Load Profile (LP) – Meter Reading (MR) (AMI) • Work Management – Work Task Generator (WTG) – Work Task Originator (WTO) – Work Task Performer (WTP) – Work Task Scheduler (WTS) – Work Task Viewer (WTV) • System Providers / Aggregators – DRAS Home/Building Manager – DRAS Client Aggregator • Customer Premises – HAN Communications – Energy Services Interface – Meter
  • 93. Candidate Applications • G&T Ops – G&T EMS – Demand Management – Load Forecast (Load profiles?) – Distributed Storage EMS – Distributed Generation EMS – Market Services • (External Market Functions) – Energy Management Clearinghouse – ISO EMS
  • 94. To be relevant as a digital services provider, you must develop new repeatable capabilities to do the following: • Bundle service provider services • Define new services as products • Automate, monetize, and allocate revenue of the contracted relationships This is not simply just a walled garden… Plus, it is not just simply an Amazon product shopping cart.
  • 95. Candidate Functional Architecture Industry Specific Tenant / Resellers # 1-n Service Providers e.g. industry specific service providers Offerings on Service Provider terms Ecosystem Enablement Platform Aggregator & ICT Service Broker Service Providers e.g. SaaS, IaaS, PaaS providers Service Providers e.g. Telco, Mobile Cloud providers Offerings on Reseller terms Offerings on ICTSB Operator terms Generalist Tenant / Resellers # 1-n Offerings on Reseller terms R6 VSO R6 VSO R6 VSP “Amazon type” Digital Services Enablement Infrastructure Layer Enabling & Partnering Layer Digital Services Provider Products, Content, Applications, Services
  • 96. Selection of applications to launch will use a comparatively simple interface.
  • 97. The repeatable capabilities need to enable entity to entity partnering and C2C white labeling: SYSTEM Ecosystem & Partnering Enabler / Cloud Service Broker on-board Service Provider on-board Reseller Define SLA resolve Incident publish Retail Offering on-board End Customer publish Wholesale Offering pay Invoice report Incident issue Invoice Monitor SLA Handle SLA Violation on-board Service Service Providers / Suppliers retrieve Catalog Information retrieve Quote place Order get Order Status Digital Service Providers / Resellers End Customers B2B2x Entity Interaction Diagram
  • 98.
  • 99. Discussion of the Distributed Systems Elements
  • 100. Electric power distribution and broadband communications are like Siamese twins! (They can’t go anywhere without each other.) Digital control is needed at each junction point. Like electricity, broadband can be used for multiple things. The Circulatory System The Nervous System NRECA NRTC
  • 101. We will use a typical distribution path to demonstrate the intelligent combination of power controls and broadband. Central Control Local Area Relay Neighborhood Relay Substation Relay Management Servers Substation Server/Router NAN Gateway HAN Gateway Communications / Firewall FTL (E&LM) SIEM E&LM Communications Communications / Firewall E&LM Sensor Mgt Communications / Firewall E&LM Meter App HomeApp TE App SA SA SA SA SA SA Cell Manager Master Agent Posture Validation Remediation Server Jini SP MA SA “Cell Management” “Local Management” There are multiple locations in the conceptual network. Management Signaling Server
  • 102. Our communications has redundancy built into the control protocols. LTE Macrocell and Distribution Fiber NAN LTE Picocell Mobile HAN LTE Home Gateway This is the only capability available that allows handoff between terrestrial LTE services and satellite services. This system can simultaneously support the public safety 700 MHz frequencies as well as commercial usage. Symmetric 2Mbps 10Mbps downloading and 786Kbps when uploading. 100 MHz LTE Services! National Interconnect
  • 103. The telemetry systems occur in front of the analytic applications and feed data to the Big Data stores. Utility Operations Broadband Operations Service Providers The Fractal Pattern!
  • 104. Knowledge Monitor Record Analyze Plan Execute* Policy Sensor Effector Symptom Change Plan Request Change Request Review The policy execution environment is the key to the flexibility. This is more than just the cybersecurity dimension.
  • 105. Obtain image of network traffic Structure data Interpret events using policies Compare current state to baseline Analyze options Model power flows (if necessary) Layer 1: Data Layer 2: Information Layer 3: Understanding Layer 4: Decision Layer 5: Action Transmit to collector Validate Extract layer 3,4,7 data 1st level anomaly detection Replicate Notify anomaly Update baseline model Recommend remediation Notify compromise Monitor changes in network performance Implement network changes Confirm implementation Analyze anomalies Resolve discrepancies Human review, adjustment, and approval (if necessary) Activate workflow Compensate for exceptions Finalize actions Options: PNNL + Secure Crossing Investigate options: Carnegie Mellon + InterSystem? Options: Cigital + CRB Options: BaseN Options: Complex Request Broker Activation system + configuration synchronizer
  • 106. Understanding Information Decision Data in – Action out But sometimes semi-autonomic policy decisions are made and executed in the field. (at the small, the medium, and the large) The policy logic is actually spread to each major active element. MultiSpeak Initiative
  • 107. This effort has been launched with a current research project already underway. But the ultimate goal is to find COTS products that are fully supported that perform these functions. “Always find two or three candidates and explore them fully before making a final selection.”
  • 108.
  • 109. Power Grid Distributed Node Architecture Legacy Apps Simulation Libs RT-DB IEC Agents IEC Drivers OSGi Container RT Linux or RTOS DDS JVM-RT DDS API NIO API ESP/CEP Engine RDF-DB Distributed Cache Reasoner OWL-DL SWRL API OWL-DL Rule Engine SWRL/RuleML JADE (Bundle) Publishing Server (HTTP)
  • 111. The Logical States We have the process flows currently used for these states.
  • 116.
  • 118. Discussion of the Industrial Internet – Security, Resiliency, Efficiency
  • 119. The Security Fabric Designed with Embedded Systems in Mind
  • 120. The embedded systems include: Our strategy is to provide certified interoperability to the key devices controlling the grid. Our solution would be embedded at each critical point in the energy infrastructure. All points must connect to each other in an end-to-end system. Management Agents
  • 121. The Security Fabric follows the guidelines required by the NIST 7628 for the Department of Energy. xSystem & Network Management Controller Device Device The Security Fabric The Security Fabric is an implementation of the Tailored Trustworthy Space.
  • 122. Embedded Device Applications Device Management Hypervisor The fundamental concept is that you must first separate the management elements of a device from the application payload portions. This is similar to the AMT philosophy, but expanded to the software dimension.
  • 123. Separation of Protection and Security • The major hardware approach for security or protection is the use of hierarchical protection domains. Prominent example of this approach is a ring architecture with "supervisor mode" and "user mode“ [Intel]. • This approach adopts capabilities provided by a lower level: (hardware/firmware/kernel). The Multics Style of Ring Structure
  • 124. The Security Connected components need to handle the various management agent functions. The approach also provides for secure persistent storage. Policy logic goes here.DDS goes here.Industrial Protocol Whitelisting The security inner sanctum ring
  • 125. There are multiple transports planned.
  • 126. The client/service and peer-to-peer relationships of the applications must be uniformly planned.
  • 127. The channel stacks facilitate interoperability for individual sessions.
  • 128. We use an industrial protocol whitelisting technique to avoid false positives in mission critical operations. ContentAwareFirewall ProtocolWhitelistingLayers 4-6 IPCommunicationsStack–Layers2-3 IPsecVPN UDPv6 UDPv4 Connections • Kerberos Get Credentials + Tickets • Get Extended Credentials • Kerberos Mutual Authentication • Get Precision Time • Register for Management + Configuration Synchronization • Service Locator • Service Provider • Multicast Alert • Unicast Command • Event Notification • SNMP Get/Set • Application Event: Send and Receive: • High Priority • Medium Priority • Low Priority Sessions InterfaceA InterfaceB
  • 129. There are servers and agents in the industrial environment.
  • 130. The next greater context includes collaboration: Cyberthreat collaboration & emergency notification Sensing Analyze Decision Action Picocell Utility SIEM Utility TOP SFA Boundary Control Situational Awareness Incident Management Alert/ Notification Threat Connect SMS Email Phone Sirens Social Media Radio • DHS • NSA • DOE • DOD • State&Local • Commercial CAP CAP • Culpepper • Dallas • Chicago • San Joe DHS FEMA IPAWS Cell Broadcast EAS CMAS NWEM (HazCollect) EDXL All communications are protected using the Security Fabric CEF • 1220 subscribing organizations • 1300 communities This will be part of the emergency response system for SmartAmerica.
  • 131. The cybersecurity threat sharing needs to be performed between multiple communities to be effective. Subscriber Subscriber Subscriber Subscriber Subscriber Context Top Secret Secret Unclassified F F Threat Connect STIX Custom Community Community Community 1300 Communities 1200 Subscribers On-Premises Cloud UI API Private Cloud Threat Connect Cloud Platform Amazon EC2 Broker Sources Free, $, other The data arrangements can be hierarchical to facilitate multi agency awareness. IODEF
  • 132. At a higher level of correlation, the Saturn cyberthreat real-time analysis system will literally run rings around attacks. Self-organizing Adaptive Technology Underlying Resilient Networks
  • 133. The “Concierge” Service • Attention! Some of the co-ops have very tiny IT staffs. (Like one person) • The coming cyber attacks will be very sophisticated. • Even the central staff will sometimes be challenged to deal with the complexities associated with cyberdefense. • Thus, even with collaboration and data sharing, from time to time, a co-op technician would like to have an “OnStar” button to push to get instant help on demand from a specialist. This Concierge service from ThreatConnect may be very desirable. Saturn comes in here to see the bigger picture.
  • 134.
  • 135. Scope of the SmartAmerica Challenge vs. the Production Rollout
  • 136. SmartAmerica Architecture “Open, secure, high-confidence and collaborative CPS network “ CPS Communications Fabric Healthcare TBs* Transportation TBs*Energy TBs* Emergency Response System TBs* Building TBs* Smart Manufacturing TBs* SmartAmerica Data Center(s)Avionics TBs* Technology TBs* NRECA + NRTC FirstNet + AlertSense Terremark MIT CIC Alphaville Pecan Street Industrial Internet Security Fabric
  • 137. Our part of the demonstration will feature the initial use of the Industrial Internet. • Chuck Speicher will be the principal leader for this effort. • General Electric will be a key member of the effort. • Internet2 will be a primary contributor for the effort. • There will be many other partners from the Security Fabric Alliance that will participate. • We will feature concepts from the NRECA and NRTC inspired movement for the smart grid element. • Other elements will be added where advantageous.
  • 138. Let it be said that the Industrial Internet started right here.
  • 139. As envisioned, Internet2 would eventually provide the requested DWDM-based network for the Industrial Internet. Ultimately, there would be four regional control centers but all serve as redundant backups. There are 27 core points that connect to feeders.
  • 140. However, if we are true to our strategy, we should never design a thing without first understanding its next greater context. And the rest as they say will be called history.
  • 141. The objective is unusual: Arbitrary results are not the point! What we do is not so important as how we do it. Lean development will produce lasting results in half the time and cost half as much. We are producing the real production product, not conducting a high school science experiment. We will learn the “other 90%” of what we need to learn using this TPS process.
  • 142. SEIT Process and Phase 1 Planning The Nature of the First Iteration
  • 143. Inter Mediate There would be multiple phases to allow for piloting and then production status. Trans- former IQ Subnet Subnet InSite Storage Platform Gateway Config BaseN OpCenter SIEM Active Directory R6 Authentication Time Synchronization CMDB Security Event Management Console Fault Mgt Performance Mgt EcoSystem Orchestration •Validation •Repair •Gap / Dup •Reformat •Correlation •Distribution
  • 144. ePDC Inter Mediate There would be multiple phases to allow for piloting and then production status. Trans- former IQ Subnet InSite Storage Platform Gateway Config BaseN OpCenter SIEM Active Directory R6 Authentication Time Synchronization CMDB Security Event Management Console Fault Mgt Performance Mgt EcoSystem Orchestration •Validation •Repair •Gap / Dup •Reformat •Correlation •Distribution RTDMS PMU ePDC Subnet
  • 145. ePDC Inter Mediate There would be multiple phases to allow for piloting and then production status. Trans- former IQ Subnet InSite Storage Platform Gateway Config BaseN OpCenter SIEM Active Directory R6 Authentication Time Synchronization CMDB Security Event Management Console Fault Mgt Performance Mgt EcoSystem Orchestration •Validation •Repair •Gap / Dup •Reformat •Correlation •Distribution RTDMS PMU ePDC Subnet One Box HAN Gateway TeMix Transactive Energy
  • 146. ePDC Inter Mediate There would be multiple phases to allow for piloting and then production status. Trans- former IQ Subnet InSite Storage Platform Gateway Config BaseN OpCenter SIEM Active Directory R6 Authentication Time Synchronization CMDB Security Event Management Console Fault Mgt Performance Mgt EcoSystem Orchestration •Validation •Repair •Gap / Dup •Reformat •Correlation •Distribution RTDMS PMU ePDC Subnet One Box HAN Gateway TeMix Transactive Energy Threat Connect Saturn
  • 148. In the iterative nature of the agile lean development, the customer recommends the following beta candidates: • MCNC – North Carolina (distribution) • Pedernales – Texas (distribution) • Tri-State – Colorado (generation and transmission) • Grant County PUD – Washington (muni) • San Diego Gas & Electric – California (IOU) • SPEC – Texas (generation and transmission - wind) • Fort Myers – Florida (smart community – solar) We should be true to the Agile Manifesto and let the scope float a bit based on what is learned in each two week sprint.
  • 149. Agile Lean Development: an integral part of the process • The frame of reference for this program is the lean mindset. • Delivery of value to delighted customers is the goal. • We will use Kanban to manage the flow of learning during the quarterly releases, the two week sprints, and the scrum meetings. – The backlog – The in process sprints – The finished feature support • Optimization and the elimination of waste and technical debt go on forever.
  • 151. Estimated Phase 1 Schedule Milestone Week ending • Kickoff meeting 1 • Objectives section complete 1 • Requirements assessment section complete 8 • Strategy section complete 9 • Technology evaluation section complete 9 • Architecture section complete 11 • Leadership presentation 12 • NRECA management presentation 13
  • 152. Solution provider SEs Acquisition SEs At large scale, the effort is divided into parallel threads with cross-thread interactions. Architecture Development Modeling & Simulation Interface Management Data Characterization Requirements Management Milestone Documentation Scheduling Integration & Test SE Functional Role Focus Cross-Thread Analysis Focus Mission Thread SE Focus Deployment/Baseline Focus Deployment Team Focus Thread 1 Thread NThread 2 Presentation/Query Interface Policies/metadata/knowledge management Analytic processing Data ingest processing End-to-end security The thread leaders are the key to complex systems engineering.
  • 153. Phase 2 parallel threads currently include: 1. Creation of the Security Fabric Management Agent Simulator 2. Deployment of the systems management servers 3. Creation of the Industrial Internet on the I2 lambda rail 4. Implementation of the Cloud Broker 5. Implementation of the neighborhood LTE picocells 6. Implementation of the GridSense sensors 7. Implementation of the Subnet substation servers 8. Implementation of the takeout node with data ingest server 9. Implementation of the GridSense InSite analytics 10. Implementation of the EPG visualization service 11. Implementation of the SETI data sharing and emergency notification 12. Implementation of the CyberThreat Collaboration Network 13. Implementation of Saturn and the Concierge Service 14. Implementation of the Transactive Energy pilot 15. Followed by an interim demonstration of capability The entire system will be continuously integrated and tested each day.
  • 154. The Nature of Global Development Teams
  • 155. Virtual Organization • Organizing entities use a structure that resembles a network rather than a hierarchy. • Organizations are driven to virtual forms to be more: – Flexible – Agile – Responsive – Inexpensive
  • 156. Architecture and Task Allocation Low High Good Bad Coupling Cohesion High Low This is easier when the team locations align with the architecture a bit.
  • 157. The Loss of “Communication Richness” • Rich “high-touch” communication is defined as two-way interaction involving more than one sensory channel. • A substantial portion (80%) is non-verbal and implicit. It consists of body language such as: – Gestures – Facial expressions – Postures • Richer media conveys more information and emotion.
  • 158. We need to decide how we are going to do these things this time: • Colocation period • Scrum calls – Electronic kanban boards to plan and follow progress – Continuous delivery system (integration, testing, & deployment) – Configuration management and automated build processes • Regroup huddles • Estimates • Funding process
  • 159. General Discussion – Issues, Action Items, and Understandings
  • 160. Wrap Up and Conclusion
  • 161. The Timeless Way of Building Indeed this ageless character has nothing, in the end, to do with languages. The language, and the processes which stem from it, merely release the fundamental order which is native to us all. They do not teach us, they only remind us of what we know already, and of what we shall discover time and time again, when we release our ideas and opinions, and do exactly what emerges from ourselves.
  • 162. Closing 776 B.C. “Let the Threads Begin”
  • 163.
  • 164.
  • 165. Extras
  • 166.
  • 168.
  • 169.
  • 171. Tasks for Performing EBV in the EMS-DMS-SCADA Platform
  • 172.
  • 173. Collaboration Scheme among Intelligent Nodes supporting the EBV in the ENERGOS Smart Grid
  • 174.
  • 175. Osterwalder - Business Model Canvas - page 1 Element Sub-element Semantics Business model Name The name of the business model Short description Short description of the business model [extension to Osterwalder’s canvas] Market players/ competition Who are the relevant players in the market, running this business model? How competitive is the business model? [extension to Osterwalder’s canvas] Maturity level What is the level of maturity of the business model within the market? (e.g. innovative, well established) [extension to Osterwalder’s canvas] Priority What is the priority (relevance, importance) of the business model from a CSP perspective? [extension to Osterwalder’s canvas] Customer /Market Customer Segment What is the customer segment(s), addressed by the business model? Customer Segments define the different groups of people or organizations an enterprise aims to reach and serve. A customer segment is a sub-set of a market made up of people or organizations with one or more characteristics that cause them to demand similar product and/or services based on qualities of those products such as price or function. Channel What are the relevant channels (communication as well as sales & distribution channels) to reach the addressed customers? Channels (communication, distribution & sales channels) comprise a company´s interface with customers. Channels are customer touch points that play an important role in the customer experience. Relationship What kind of relationship is expected by the customer/needs to be established for the business model? (e.g. self- service, communities, personal assistance). Relationships can range from personal to automated. Product Offering Value proposition What kind of products and services are offered to the customer? What value will be delivered through the business model? The value proposition is the reason why customers turn to one company over another. It solves a customer problem or satisfies a customer need. Each value proposition consists of a selected bundle of products and/or services that caters to the requirements of a specific customer segment. In this sense, the value proposition is an aggregation, or bundle, of benefits that a company offers customers.
  • 176. Element Sub- element Semantics C2M (concept to market) Key Activities Key activities are the most important things a company must do to make its business model work. What are the key activities, to launch the offers product/services to the market, to establish the channels, to maintain the customer relationship and to ensure the revenue streams? (e.g. development of community site, implementation of new billing concepts). Key Resources Key resources are the most important assets required to make a business model work. What are the required key resources, to launch the offers product/services to the market, to establish the channels, to maintain the customer relationship and to ensure the revenue streams? (e.g. development of community site, implementation of new billing concepts). Key Partners Who are the key suppliers/partners, what are the key activities and resources, which need to be acquired from those? (e.g. external call center, supplementary content from a content provider) Enterprise Management Cost Structure The Cost Structure describes the most important costs incurred to operate the business model. Revenue Streams Revenue Streams are the cash a company generates from each Customer Segment; A business model can involve several different types of Revenue Streams: • Transaction revenues resulting from one-time customer payments; • Recurring revenues resulting from ongoing payments to either deliver a Value Proposition to customers or provide post-purchase customer support; -Shared Revenue – resulting from operations carried out by a B2B partner who uses enterprise’s products or services to generate its own revenue from its own end customer but does not pay upfront or recurrent for products/services from the enterprise – just % of actual revenue; - 3-rd party revenue – revenue from a 3-rd party to include its own services in the enterprise offerings to its customer segments. Osterwalder - Business Model Canvas - page 2
  • 177. Element Sub-element Semantics Barriers Business related What are the business related barriers, to implement the business model? (e.g. high risk regarding cash flow) [extension to Osterwalder’s canvas] Technical What are the technical barriers to implementing the business model? (e.g. high risk due to immature technology) [extension to Osterwalder’s canvas] Drivers Strategic portfolio What are the drivers to implement the business model regarding the strategic portfolio planning? (e.g. complementary to the existing portfolio strategy) [extension to Osterwalder’s canvas] Revenue Streams What are the drivers to implement the business model regarding the revenue streams? (e.g. new revenue opportunities to compensate decreasing airtime prices) [extension to Osterwalder’s canvas] Touchpoints/Use Cases Upstream What are the key touchpoint/use cases/interaction patterns to interact with upstream customers? (e.g. registering app in app store).Upstream customers are B2B partners/enterprise customers (e.g. retailers, media, advertisers, utilities, finance etc.) [extension to Osterwalder’s canvas] Downstream What are the key touchpoint/use cases/interaction patterns to interact with downstream customers? (e.g. end customer billing). Downstream customers are the end users of a product or service, this can be consumers as well as companies [extension to Osterwalder’s canvas] Osterwalder - Business Model Canvas - page 3
  • 178. BT’s Cloud Service Broker Low Cost Compute - for test and dev Secure SaaS - e.g. CRM Private Compute job - e.g. pharma, finance Extra resources- - e.g. legacy Application out of space/power CollaborationLow Cost Compute Secure SaaS - e.g. CRM Private Compute job Extra resources- - e.g. legacy Application out of space/power Collaboration Low SLA SaaS BPOS Provider High SLA Compute Commerce MPLS Connected VDC Video Low SLA Compute Low cost Storage High SLA Carrier Preventing Runaway costs Security Avoiding Vendor lock-in Application Performance Compliance and Audit Transparency Assurance Cloud Service Broker (EEP) Monitor & Assure Compliance and Audit The “Ecosystem Enablement Platform” (EEP) fulfills the role of the CSB
  • 179. The NRTC has a variety of broadband services that could be tunneled through the Industrial Internet. • OTT & TVE services – Video services • Walt Disney comprehensive long term distribution sports, news, entertainment • NBCUniversal comprehensive content affiliation • 100 HD channels – NeoNova Cloud Services – ViaSat Satellite Distribution – Exede satellite broadband services – Telispire – MVNO services – WiMax service – Planning for First Responder network • Power services – OATI demand response options – Efacec – Advanced Control Services – Clevest – workforce management and smart grid operations – Power Secure LED lighting – Sensus – Flexnet AMI; smart meters; distribution automation; demand response – GeoNav – nVIEW 360o – TenKsolar – solar voltaic systems – Wind farm deployment – Milsoft and Clevest MultiSpeak certification
  • 180. “The Prolog” The Tower of Babel is alive and well in the 21st Century. In general, it is a good thing to address this reality right up front.
  • 181. Frames of Reference • According to cognitive scientists, we all interpret our surroundings through frames – mental constructs that shape our perspectives of the world. • Frames are sets of beliefs about what elements to pay attention to and how these elements interact with each other. • Frames place significant limits on our perspective; we can only see what our frames tell us is meaningful, and we usually ignore what lies outside the boundaries. • Most of us are unaware of the way our background and experience shape the way we frame our decisions and actions; only a few of us consciously adjust our frames as if we were photographers. • In fact, we seldom even think about the direction in which we are pointing our cameras.
  • 182. Frames of Reference • Everyone shapes his or her view of the world through framing, and people with different backgrounds are likely to see their surroundings through vastly different frames. • By themselves, frames are not inherently good or bad… they just are. • However, evidence has shown that certain frames are more likely than others to lead to long-term success. We need to derive a good pattern language to get things properly rolling.
  • 183. Osterwalder - Business Model Canvas • …
  • 184. Ecosystem & Partnering Capabilities Articulation Suggested Procedure • Discover “repeatable” functional building blocks from different business models – Describe business model using Osterwalder’s Business Model Canvas – Derive “ecosystem” canvas and find “repeatable” patterns – Derive reusable “architecture building blocks” • Refinement of a candidate architecture to a detailed architecture blueprint • Implementation of prototype scenarios
  • 185. The Logical States We have the process flows currently used for these states.
  • 187. Change Control Interactions Ring 2 Change Mgt Change Control Service Locator Service Provider Service Consumer Workflow Control Attestation Directory Service Repository Transition Control 1 2 3 4 5 Dynamic Binding Promote & Store Activate Service Instance 8 6 7 KerberosDirectory 1 9 Credentials include Chain of Trust Certificates
  • 188. Department of Defense James Galvin Daryl Haegley Michael Aimone Kathleen Ahsing
  • 190. Change in Level of Trust Between Sites Trust Time Sufficient level to work together effectively Kick-off meeting Milestone meeting “MBFA” (Management by Flying Around) High Tech Requires High Touch
  • 191. But the greatest engineering achievement of the 21st Century is likely to be the reengineering of the electric grid into secure, resilient, agile fractal patterns. - Annonymous
  • 192. But the greatest engineering achievement of the 21st Century is likely to be the reengineering of the electric grid into secure, resilient, agile fractal patterns. - Annonymous (Aye, but there is always a grain of truth in every word spoken in jest.) - William Shakespeare
  • 193. Characteristics of Teams: Yesterday vs. Today Traditional Teams Virtual Teams Co-located members Distributed members Face-to-face interaction Electronic communication Members from the same Members from different Organization organizations Hierarchical Networked Mostly informal communication Continuous structured communication Position authority Process and knowledge authority Informal distribution (push) Information access (pull) Information on paper Information electronic Sharing completed work Continuous sharing of incomplete work Knowledge hoarding Knowledge sharing Transparent process Computer-visible process Culture learned through osmosis Culture learned through electronic-based communications and artifacts
  • 196. Freescale Mike Dow Vybrid – first SFA compatible silicon