SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
MISO CIP Process
Improvement
Program
September 2013
MISO Overview
2
MISO Reliability Coordination Area, June 2013
•  Independent
•  Non-profit
•  2001 – Reliability Coordinator
•  2005 – Energy Markets
•  2009 – Ancillary Services
•  2012 – Independent Coordinator
of Transmission for Entergy
Region
•  Large Footprint – Midwest and
Southern Regions
Current Scope of Operations
as of June 1, 2013
•  Generation Capacity
–  131,522 MW (market - Midwest)
–  205,759 MW (reliability – Midwest + Southern regions)
•  Historic Peak Load (Midwest Region)
(July 23, 2012)
–  98,576 MW (market)
–  133,368 MW (reliability)
•  65,250 miles of transmission (Midwest Region)
–  15,752 Southern Region
–  49,528 Midwest Region
•  Midwest Region: 11 states, 1 Canadian province
•  Southern Region: 4 states (AR, LA, MS, TX)
(reliability only until Southern Region market integration in December 2013)
3
Speaker
•  Chris Unton
–  Currently: Sr. Manager, IT Compliance
–  Past roles include:
•  Identity & Access Management
•  Disaster Recovery & Problem Management
•  Enterprise Systems Management / Network Operations Center
•  Data Networking
–  Education
•  BS Computer Science – Rose-Hulman Institute of Technology
•  MBA – Indiana University Kelley School of Business
4
Disclaimer
•  Any views and opinions represented are those of Chris
Unton and do not necessarily reflect those of MISO
•  Many of the activities described are in-flight rather than
complete. Your mileage may vary.
5
Agenda
•  Process Driven Approach to Compliance
•  Ownership
•  Six Sigma
•  Program Structure
•  Process Improvement Tools
•  Governance and Execution
6
Traditional Model / “Audit Hamster Wheel”
7
Process Driven Approach
•  Traditional Model does not drive behavior towards:
–  Real-time compliance
–  Security driven compliance
–  Harmonization of approach across regulatory needs (NERC,
FERC, SSAE 16, SOx)
•  Process Based approach drives behavior towards:
–  Baking in compliance evidence as a natural part of the process
–  Ownership of the necessary activities
–  Documentation of control objectives & activities
–  Metrics to assess performance
8
Ownership Detail (Visual)
9
Requirement
Owner
Process Owner
Activity (Control) Owner
Executive Oversight
•  65 processes which support
CIP compliance
•  Majority (34 of 65) of the
processes have more than
three teams (or more than one
division) involved in the core
execution of the process
•  Clearly defined roles &
responsibilities of ownership
are critical to success
–  Process ownership in particular
10
CIP ROLES
(Arrows denote evidence flow)
IT Compliance
•  Accountable for
oversight to MISO’s
compliance with CIP
requirements.
•  Supports the
Requirement Owner
by assisting with
MISO’s interpretation
of the CIP
requirements.
•  Validates that the
processes under the
Requirement Owner
do meet compliance
with the standard.
•  Communicates
changes/updates/
guidance to standards
and requirements to
the Requirement
Owners.
•  Validates sufficiency
of supporting
evidence to
demonstrate
compliance.
•  Drives MISO’s
CIP Compliance
Program
Requirement Owner
•  Accountable for assuring MISO’s compliance
with that particular requirement.
•  Interprets what the requirement truly means to MISO
and devises MISO’s response to support compliance
with that requirement (with assistance of support
teams).
•  Identifies the processes needed to support
compliance and gathers the appropriate people
(process owners) together to ensure an end-to-end
solution with no gaps. The requirement owner likely is
also a process owner or manages process owners.
•  Looks forward to ensure MISO adapts to changing
regulations appropriately, while also designing
solutions that support the objective of the regulation.
•  Gathers evidence from process owners for self-
assessments and audits, to make sure the evidence
is in line with the expectations of the requirement.
•  Drives the creation of RSAW narrative that describes
MISO’s compliance approach.
•  First person to be interviewed by auditors who are
evaluating MISO’s compliance with that requirement.
•  If compliance issues arise, the requirement owner is
accountable (coordinating with Compliance Services
and other support staff) for the content of self-reports
and mitigation plans to restore compliance with that
requirement.	
  
Process Owner
•  Functional responsibility for the
operation of a process that
supports one or more compliance
requirements.
•  Designs solid, robust
processes that support
operational excellence and
security/compliance needs.
Recognizes inputs (upstream
impacts) and outputs
(downstream impacts) of the
process.
•  Responds to self-assessments
and provides evidence (upon
request) to the requirement owner
demonstrating effective process
operation.
•  Identifies key activities (controls)
within the process and assigns
personnel to execute those control
activities.
•  Subject matter expert in his/her
area of responsibility. This person
uses multiple sources (compliance
support staff, internal peers,
industry counterparts,
conferences, and training) to
continually improve the process
he/she owns.
	
  
Activity / Control
Owner
•  Responsible for
a particular
component of an
overall process.
•  Executes an activity
according to procedure.
•  Understands how
activity execution fits
into the larger process.
•  Generates evidence as
part of the activity
execution, or assures
that automated
activities produce the
expected output.
•  Provides the evidence
to downstream
activities. During self-
assessments or audit
preparation, the control
owner provides
evidence to the process
owner if it cannot be
directly queried by the
process owner.
	
  
Six Sigma
11
•  Six Sigma is a fact–based, data–driven philosophy of quality
improvement that values defect prevention over defect detection. It
drives customer satisfaction and bottom-line results by reducing variation
and waste, thereby promoting a competitive advantage. It applies
anywhere variation and waste exist, and every employee should be
involved.
•  In simple terms, Six Sigma quality performance means no more than 3.4
defects per million opportunities.
•  Methodology that takes an objective view of current performance and
structured approach to measurably improve performance
DMAIC
12
Program Structure
•  Techniques (Comprehensive Review)
1.  Identify/validate current requirement owners
2.  Map requirements to processes
3.  Identify/validate process owners
4.  Identify areas that need improvement (health check)
•  Attributes: ownership, documentation, monitoring, complexity, automation
•  Mechanisms: survey, past performance, expert assessment
5.  Analysis and Improvement
•  Kaizen events: Process (re)design, RACI, Policy and Procedures, Evidence, Automation / Tool Integration
opportunities
6.  Control – structure for on-going self-assessment and measurement
•  Training
1.  End-to-end requirement & process awareness
2.  Effective self-assessment (control design & execution)
3.  Process improvement
•  Technology Integration
1.  Utilize available tools
2.  Schedule process improvement activities to coincide with tool deployment where appropriate
•  Team
1.  Concerted effort from a diverse skillset (projecting ~6000 hours of internal effort over 16 months)
2.  Some consistent program support personnel, some subject matter experts as needed
13
Process Improvement Tools
•  Kaizen Events
•  Process Mapping
•  SIPOC
•  Data Analysis
•  Piloting
•  Workflow
•  Automation
14
Kaizen Events
•  Short duration (weeks), high intensity mini-project
•  Focuses on the Analyze & Improve phases of the
DMAIC cycle
•  Produces evidence that can be used for the
Control phase going forward
–  Business Process Diagrams, procedures, RACI
matrix
15
•  Cross-functional team makes improvements in a methodological way
–  Led by process owner
–  Supported by a Six Sigma black belt
Process Mapping
•  Visualize current &
future processes
•  Gain common
understanding
•  Identify pain points
•  Speeds training/
adoption
16
SIPOC
17
Data Analysis
•  Asset based
–  How many CIP cyber assets do we have?
–  How many backup types?
–  How many baseline configurations?
•  Process based
–  How many server commissions do we execute each year?
–  How many firewall rule updates?
–  How many significant changes?
•  Reduce Complexity
•  Align effort with volume
Piloting
•  Take the new process through a trial run on real data
during the Kaizen event
•  Demonstrates operational as well as compliance benefits
•  Provides a chance to change or tweak a process
•  Offers insight into the time and training required for a full
roll-out
Workflow
•  Many of the CIP processes require a sequence of steps to
be executed (including multiple teams)
–  Ex: Security Controls Testing
1)  Determine if the change is significant
2)  Test the security impact of the change
3)  Link the production work to the pre-production testing
•  Remedy ticketing system has been our workflow engine
of choice
•  Other options exist
–  Sharepoint
–  Lombardi Teamworks
–  Calendar reminders
Automation
•  Philosophy: process first, automation second
•  Sometimes, automation is essential to achieve a robust,
efficient process
•  Process areas we’ve explored or are planning for
automation:
–  Compliance training at onboarding
–  Quarterly entitlement reviews
–  Change monitoring
–  Cyber Security event log review
Training / Awareness
•  Online Learning Management System
–  Quick, 10-15 minute slide decks with voice over
–  Wide reach (some 200 person audiences)
–  Employees familiar with the system already
–  Repository that future employees can access
•  Face to face sessions at team meetings
–  In-depth knowledge transfer
–  Interactive
–  Time intensive
•  “Plugged In” Communications
–  News items, short story features
22
Steering Committee
Program Governance
23
Executive Sponsors
Program
Lead
Ongoing MISO Governance Committees
Capability
MATURITY
Highly MatureImmature
TIME
Named requirement owners
Evidence mapped to requirements
Process orientation for compliance
Processes mapped
Processes
comprehensive
Manage to metrics
Internal self assessments are audit comprehensive
Processes optimized for efficiency
Proactive adoption
of future standards
Controls documented
Processes deliver Six Sigma quality
Workflow automation
Interpretations documented
Compliance is a by-product of security
Execution
•  Ensure process has trackable metrics built in
–  Quantity
–  Timeliness
–  Completeness
•  Maintain a robust internal assessment process
•  Don’t forget to update QRSAW narratives – these should
be living and breathing as the process changes
25
Contact Info
•  Chris Unton
–  crunton@misoenergy.org
26

Contenu connexe

Tendances

Beyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentBeyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentDamon Small
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample ReportRandy James
 
DevOpsDays Chicago 2014 - Controlling Devops
DevOpsDays Chicago 2014 -  Controlling DevopsDevOpsDays Chicago 2014 -  Controlling Devops
DevOpsDays Chicago 2014 - Controlling DevopsBrian Henerey
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightResilient Systems
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010Donald E. Hester
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetwrix Corporation
 
IT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterIT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterSameer Paradia
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureNetwrix Corporation
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
20180529 scaf and cosmic presentaiton s rajagopal
20180529 scaf and cosmic presentaiton  s rajagopal20180529 scaf and cosmic presentaiton  s rajagopal
20180529 scaf and cosmic presentaiton s rajagopalCharles Symons
 
Abidance Cip Presentation
Abidance Cip PresentationAbidance Cip Presentation
Abidance Cip Presentationjamesholler
 
Fluke Connect Condition Based Maintenance
Fluke Connect Condition Based MaintenanceFluke Connect Condition Based Maintenance
Fluke Connect Condition Based MaintenanceFrederic Baudart, CMRP
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyControlCase
 

Tendances (20)

Beyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability AssessmentBeyond the Scan: The Value Proposition of Vulnerability Assessment
Beyond the Scan: The Value Proposition of Vulnerability Assessment
 
Network Operations Center Processes- Isaac Mwesigwa
Network Operations Center Processes- Isaac MwesigwaNetwork Operations Center Processes- Isaac Mwesigwa
Network Operations Center Processes- Isaac Mwesigwa
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
DevOpsDays Chicago 2014 - Controlling Devops
DevOpsDays Chicago 2014 -  Controlling DevopsDevOpsDays Chicago 2014 -  Controlling Devops
DevOpsDays Chicago 2014 - Controlling Devops
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Adam Berke Resume
Adam Berke ResumeAdam Berke Resume
Adam Berke Resume
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Network Operation Center Best Practices
Network Operation Center Best PracticesNetwork Operation Center Best Practices
Network Operation Center Best Practices
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
 
NetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don JonesNetWrix Change Reporter Suite - Product Review by Don Jones
NetWrix Change Reporter Suite - Product Review by Don Jones
 
IT - Enterprise Service Operation Center
IT - Enterprise Service Operation CenterIT - Enterprise Service Operation Center
IT - Enterprise Service Operation Center
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Top 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructureTop 10 critical changes to audit in your it infrastructure
Top 10 critical changes to audit in your it infrastructure
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
20180529 scaf and cosmic presentaiton s rajagopal
20180529 scaf and cosmic presentaiton  s rajagopal20180529 scaf and cosmic presentaiton  s rajagopal
20180529 scaf and cosmic presentaiton s rajagopal
 
Abidance Cip Presentation
Abidance Cip PresentationAbidance Cip Presentation
Abidance Cip Presentation
 
Fluke Connect Condition Based Maintenance
Fluke Connect Condition Based MaintenanceFluke Connect Condition Based Maintenance
Fluke Connect Condition Based Maintenance
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to Many
 

En vedette

NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesNERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesSchneider Electric
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPSecurity of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPEnergySec
 
Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...
Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...
Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...Tim Davies
 
Energy Biographies Final Research report
Energy Biographies Final Research reportEnergy Biographies Final Research report
Energy Biographies Final Research reportenergybiographies
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayEnergySec
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedEnergySec
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through SecurityEnergySec
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationEnergySec
 
Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration EnergySec
 
Come See What’s Cooking in My Lab
Come See What’s Cooking in My LabCome See What’s Cooking in My Lab
Come See What’s Cooking in My LabEnergySec
 
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...energybiographies
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber DefenseEnergySec
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardEnergySec
 
How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterEnergySec
 
Building an Incident Response Team
Building an Incident Response TeamBuilding an Incident Response Team
Building an Incident Response TeamEnergySec
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayEnergySec
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergySec
 
Security Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersSecurity Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersEnergySec
 

En vedette (20)

NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesNERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Security of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIPSecurity of the Electric Grid: It's more than just NERC CIP
Security of the Electric Grid: It's more than just NERC CIP
 
Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...
Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...
Annotated Version: EU Safer Internet Forum - Rethinking Responses to Young Pe...
 
Energy Biographies Final Research report
Energy Biographies Final Research reportEnergy Biographies Final Research report
Energy Biographies Final Research report
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator Display
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration
 
Come See What’s Cooking in My Lab
Come See What’s Cooking in My LabCome See What’s Cooking in My Lab
Come See What’s Cooking in My Lab
 
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
 
How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart Meter
 
Building an Incident Response Team
Building an Incident Response TeamBuilding an Incident Response Team
Building an Incident Response Team
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
Security Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersSecurity Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for Beginners
 

Similaire à Structured NERC CIP Process Improvement Using Six Sigma

Leveraging Your CMMS - From Selection to Daily Use
Leveraging Your CMMS - From Selection to Daily UseLeveraging Your CMMS - From Selection to Daily Use
Leveraging Your CMMS - From Selection to Daily Usejohnnyg14
 
ITIL Service Operation
ITIL Service OperationITIL Service Operation
ITIL Service OperationMarvin Sirait
 
Review of Data Management Maturity Models
Review of Data Management Maturity ModelsReview of Data Management Maturity Models
Review of Data Management Maturity ModelsAlan McSweeney
 
Documentation Framework for IT Service Delivery
Documentation Framework for IT Service DeliveryDocumentation Framework for IT Service Delivery
Documentation Framework for IT Service DeliverySimon Denton
 
Governance Strategies for Office 365
Governance Strategies for Office 365Governance Strategies for Office 365
Governance Strategies for Office 365Montrium
 
ITIL Best Practice for Software Companies
ITIL Best Practice for Software CompaniesITIL Best Practice for Software Companies
ITIL Best Practice for Software CompaniesDaniel Brody
 
management system development and planning
management system development and planningmanagement system development and planning
management system development and planningmilkesa13
 
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...Perficient
 
Trends in-om-scm-27-july-2012-2
Trends in-om-scm-27-july-2012-2Trends in-om-scm-27-july-2012-2
Trends in-om-scm-27-july-2012-2Sanjeev Deshmukh
 
Business Process Reengineering | Case studies
Business Process Reengineering | Case studiesBusiness Process Reengineering | Case studies
Business Process Reengineering | Case studiesSumit Sanyal
 
Focus your investments in innovations
Focus your investments in innovationsFocus your investments in innovations
Focus your investments in innovationsKobi Vider
 
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsBeyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsMontrium
 
Information system audit
Information system audit Information system audit
Information system audit Jayant Dalvi
 
Adaptive case study on setting up of PMO for large it organization
Adaptive case study on setting up of PMO for large it organizationAdaptive case study on setting up of PMO for large it organization
Adaptive case study on setting up of PMO for large it organizationLN Mishra CBAP
 
Internal Process Audit
Internal Process AuditInternal Process Audit
Internal Process Auditintellisenseit
 

Similaire à Structured NERC CIP Process Improvement Using Six Sigma (20)

Leveraging Your CMMS - From Selection to Daily Use
Leveraging Your CMMS - From Selection to Daily UseLeveraging Your CMMS - From Selection to Daily Use
Leveraging Your CMMS - From Selection to Daily Use
 
ITIL Service Operation
ITIL Service OperationITIL Service Operation
ITIL Service Operation
 
ISA 3 COBIT
ISA 3 COBITISA 3 COBIT
ISA 3 COBIT
 
Review of Data Management Maturity Models
Review of Data Management Maturity ModelsReview of Data Management Maturity Models
Review of Data Management Maturity Models
 
CPI_MOM_KBR_20110909_v1
CPI_MOM_KBR_20110909_v1CPI_MOM_KBR_20110909_v1
CPI_MOM_KBR_20110909_v1
 
Documentation Framework for IT Service Delivery
Documentation Framework for IT Service DeliveryDocumentation Framework for IT Service Delivery
Documentation Framework for IT Service Delivery
 
Governance Strategies for Office 365
Governance Strategies for Office 365Governance Strategies for Office 365
Governance Strategies for Office 365
 
ITIL Best Practice for Software Companies
ITIL Best Practice for Software CompaniesITIL Best Practice for Software Companies
ITIL Best Practice for Software Companies
 
management system development and planning
management system development and planningmanagement system development and planning
management system development and planning
 
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
How to Migrate Drug Safety and Pharmacovigilance Data Cost-Effectively and wi...
 
Trends in-om-scm-27-july-2012-2
Trends in-om-scm-27-july-2012-2Trends in-om-scm-27-july-2012-2
Trends in-om-scm-27-july-2012-2
 
Sadchap04
Sadchap04Sadchap04
Sadchap04
 
Business Process Reengineering | Case studies
Business Process Reengineering | Case studiesBusiness Process Reengineering | Case studies
Business Process Reengineering | Case studies
 
Focus your investments in innovations
Focus your investments in innovationsFocus your investments in innovations
Focus your investments in innovations
 
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsBeyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
 
Information system audit
Information system audit Information system audit
Information system audit
 
Robert Latest cv
Robert Latest cvRobert Latest cv
Robert Latest cv
 
Adaptive case study on setting up of PMO for large it organization
Adaptive case study on setting up of PMO for large it organizationAdaptive case study on setting up of PMO for large it organization
Adaptive case study on setting up of PMO for large it organization
 
Hcm file-wp
Hcm file-wpHcm file-wp
Hcm file-wp
 
Internal Process Audit
Internal Process AuditInternal Process Audit
Internal Process Audit
 

Plus de EnergySec

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...EnergySec
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityEnergySec
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementEnergySec
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachEnergySec
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsEnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueEnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherEnergySec
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherEnergySec
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...EnergySec
 
Sea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesSea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesEnergySec
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityEnergySec
 

Plus de EnergySec (20)

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
 
Sea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber PerspectivesSea Changes, Strategic Implications, Board Cyber Perspectives
Sea Changes, Strategic Implications, Board Cyber Perspectives
 
Red Teaming and Energy Grid Security
Red Teaming and Energy Grid SecurityRed Teaming and Energy Grid Security
Red Teaming and Energy Grid Security
 

Dernier

Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 

Dernier (20)

Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 

Structured NERC CIP Process Improvement Using Six Sigma

  • 2. MISO Overview 2 MISO Reliability Coordination Area, June 2013 •  Independent •  Non-profit •  2001 – Reliability Coordinator •  2005 – Energy Markets •  2009 – Ancillary Services •  2012 – Independent Coordinator of Transmission for Entergy Region •  Large Footprint – Midwest and Southern Regions
  • 3. Current Scope of Operations as of June 1, 2013 •  Generation Capacity –  131,522 MW (market - Midwest) –  205,759 MW (reliability – Midwest + Southern regions) •  Historic Peak Load (Midwest Region) (July 23, 2012) –  98,576 MW (market) –  133,368 MW (reliability) •  65,250 miles of transmission (Midwest Region) –  15,752 Southern Region –  49,528 Midwest Region •  Midwest Region: 11 states, 1 Canadian province •  Southern Region: 4 states (AR, LA, MS, TX) (reliability only until Southern Region market integration in December 2013) 3
  • 4. Speaker •  Chris Unton –  Currently: Sr. Manager, IT Compliance –  Past roles include: •  Identity & Access Management •  Disaster Recovery & Problem Management •  Enterprise Systems Management / Network Operations Center •  Data Networking –  Education •  BS Computer Science – Rose-Hulman Institute of Technology •  MBA – Indiana University Kelley School of Business 4
  • 5. Disclaimer •  Any views and opinions represented are those of Chris Unton and do not necessarily reflect those of MISO •  Many of the activities described are in-flight rather than complete. Your mileage may vary. 5
  • 6. Agenda •  Process Driven Approach to Compliance •  Ownership •  Six Sigma •  Program Structure •  Process Improvement Tools •  Governance and Execution 6
  • 7. Traditional Model / “Audit Hamster Wheel” 7
  • 8. Process Driven Approach •  Traditional Model does not drive behavior towards: –  Real-time compliance –  Security driven compliance –  Harmonization of approach across regulatory needs (NERC, FERC, SSAE 16, SOx) •  Process Based approach drives behavior towards: –  Baking in compliance evidence as a natural part of the process –  Ownership of the necessary activities –  Documentation of control objectives & activities –  Metrics to assess performance 8
  • 9. Ownership Detail (Visual) 9 Requirement Owner Process Owner Activity (Control) Owner Executive Oversight •  65 processes which support CIP compliance •  Majority (34 of 65) of the processes have more than three teams (or more than one division) involved in the core execution of the process •  Clearly defined roles & responsibilities of ownership are critical to success –  Process ownership in particular
  • 10. 10 CIP ROLES (Arrows denote evidence flow) IT Compliance •  Accountable for oversight to MISO’s compliance with CIP requirements. •  Supports the Requirement Owner by assisting with MISO’s interpretation of the CIP requirements. •  Validates that the processes under the Requirement Owner do meet compliance with the standard. •  Communicates changes/updates/ guidance to standards and requirements to the Requirement Owners. •  Validates sufficiency of supporting evidence to demonstrate compliance. •  Drives MISO’s CIP Compliance Program Requirement Owner •  Accountable for assuring MISO’s compliance with that particular requirement. •  Interprets what the requirement truly means to MISO and devises MISO’s response to support compliance with that requirement (with assistance of support teams). •  Identifies the processes needed to support compliance and gathers the appropriate people (process owners) together to ensure an end-to-end solution with no gaps. The requirement owner likely is also a process owner or manages process owners. •  Looks forward to ensure MISO adapts to changing regulations appropriately, while also designing solutions that support the objective of the regulation. •  Gathers evidence from process owners for self- assessments and audits, to make sure the evidence is in line with the expectations of the requirement. •  Drives the creation of RSAW narrative that describes MISO’s compliance approach. •  First person to be interviewed by auditors who are evaluating MISO’s compliance with that requirement. •  If compliance issues arise, the requirement owner is accountable (coordinating with Compliance Services and other support staff) for the content of self-reports and mitigation plans to restore compliance with that requirement.   Process Owner •  Functional responsibility for the operation of a process that supports one or more compliance requirements. •  Designs solid, robust processes that support operational excellence and security/compliance needs. Recognizes inputs (upstream impacts) and outputs (downstream impacts) of the process. •  Responds to self-assessments and provides evidence (upon request) to the requirement owner demonstrating effective process operation. •  Identifies key activities (controls) within the process and assigns personnel to execute those control activities. •  Subject matter expert in his/her area of responsibility. This person uses multiple sources (compliance support staff, internal peers, industry counterparts, conferences, and training) to continually improve the process he/she owns.   Activity / Control Owner •  Responsible for a particular component of an overall process. •  Executes an activity according to procedure. •  Understands how activity execution fits into the larger process. •  Generates evidence as part of the activity execution, or assures that automated activities produce the expected output. •  Provides the evidence to downstream activities. During self- assessments or audit preparation, the control owner provides evidence to the process owner if it cannot be directly queried by the process owner.  
  • 11. Six Sigma 11 •  Six Sigma is a fact–based, data–driven philosophy of quality improvement that values defect prevention over defect detection. It drives customer satisfaction and bottom-line results by reducing variation and waste, thereby promoting a competitive advantage. It applies anywhere variation and waste exist, and every employee should be involved. •  In simple terms, Six Sigma quality performance means no more than 3.4 defects per million opportunities. •  Methodology that takes an objective view of current performance and structured approach to measurably improve performance
  • 13. Program Structure •  Techniques (Comprehensive Review) 1.  Identify/validate current requirement owners 2.  Map requirements to processes 3.  Identify/validate process owners 4.  Identify areas that need improvement (health check) •  Attributes: ownership, documentation, monitoring, complexity, automation •  Mechanisms: survey, past performance, expert assessment 5.  Analysis and Improvement •  Kaizen events: Process (re)design, RACI, Policy and Procedures, Evidence, Automation / Tool Integration opportunities 6.  Control – structure for on-going self-assessment and measurement •  Training 1.  End-to-end requirement & process awareness 2.  Effective self-assessment (control design & execution) 3.  Process improvement •  Technology Integration 1.  Utilize available tools 2.  Schedule process improvement activities to coincide with tool deployment where appropriate •  Team 1.  Concerted effort from a diverse skillset (projecting ~6000 hours of internal effort over 16 months) 2.  Some consistent program support personnel, some subject matter experts as needed 13
  • 14. Process Improvement Tools •  Kaizen Events •  Process Mapping •  SIPOC •  Data Analysis •  Piloting •  Workflow •  Automation 14
  • 15. Kaizen Events •  Short duration (weeks), high intensity mini-project •  Focuses on the Analyze & Improve phases of the DMAIC cycle •  Produces evidence that can be used for the Control phase going forward –  Business Process Diagrams, procedures, RACI matrix 15 •  Cross-functional team makes improvements in a methodological way –  Led by process owner –  Supported by a Six Sigma black belt
  • 16. Process Mapping •  Visualize current & future processes •  Gain common understanding •  Identify pain points •  Speeds training/ adoption 16
  • 18. Data Analysis •  Asset based –  How many CIP cyber assets do we have? –  How many backup types? –  How many baseline configurations? •  Process based –  How many server commissions do we execute each year? –  How many firewall rule updates? –  How many significant changes? •  Reduce Complexity •  Align effort with volume
  • 19. Piloting •  Take the new process through a trial run on real data during the Kaizen event •  Demonstrates operational as well as compliance benefits •  Provides a chance to change or tweak a process •  Offers insight into the time and training required for a full roll-out
  • 20. Workflow •  Many of the CIP processes require a sequence of steps to be executed (including multiple teams) –  Ex: Security Controls Testing 1)  Determine if the change is significant 2)  Test the security impact of the change 3)  Link the production work to the pre-production testing •  Remedy ticketing system has been our workflow engine of choice •  Other options exist –  Sharepoint –  Lombardi Teamworks –  Calendar reminders
  • 21. Automation •  Philosophy: process first, automation second •  Sometimes, automation is essential to achieve a robust, efficient process •  Process areas we’ve explored or are planning for automation: –  Compliance training at onboarding –  Quarterly entitlement reviews –  Change monitoring –  Cyber Security event log review
  • 22. Training / Awareness •  Online Learning Management System –  Quick, 10-15 minute slide decks with voice over –  Wide reach (some 200 person audiences) –  Employees familiar with the system already –  Repository that future employees can access •  Face to face sessions at team meetings –  In-depth knowledge transfer –  Interactive –  Time intensive •  “Plugged In” Communications –  News items, short story features 22
  • 23. Steering Committee Program Governance 23 Executive Sponsors Program Lead Ongoing MISO Governance Committees
  • 24. Capability MATURITY Highly MatureImmature TIME Named requirement owners Evidence mapped to requirements Process orientation for compliance Processes mapped Processes comprehensive Manage to metrics Internal self assessments are audit comprehensive Processes optimized for efficiency Proactive adoption of future standards Controls documented Processes deliver Six Sigma quality Workflow automation Interpretations documented Compliance is a by-product of security
  • 25. Execution •  Ensure process has trackable metrics built in –  Quantity –  Timeliness –  Completeness •  Maintain a robust internal assessment process •  Don’t forget to update QRSAW narratives – these should be living and breathing as the process changes 25
  • 26. Contact Info •  Chris Unton –  crunton@misoenergy.org 26