SlideShare une entreprise Scribd logo
1  sur  27
Télécharger pour lire hors ligne
Julie	
  Soutuyo	
  
Senior	
  Program	
  Manager	
  
Tennessee	
  Valley	
  Authority	
  
Improving	
  Organiza.onal	
  
Resilience	
  to	
  an	
  Increasing	
  and	
  
Evolving	
  Threat	
  
	
  
EnergySec	
  9th	
  Annual	
  Security	
  Summit	
  
September	
  18,	
  2013	
  
Denver,	
  CO	
  
Organiza.onal	
  Cyber	
  Resilience	
  
2	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
Table	
  of	
  Contents	
  
•  The	
  CEO’s	
  Challenge	
  
•  Cybersecurity	
  in	
  Context	
  
•  The	
  Cyber	
  Risk	
  
•  Possible	
  Solu=ons	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  	
  
3	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
On	
  July	
  25th,	
  our	
  CEO	
  challenged	
  the	
  TVA	
  staff	
  
to	
  improve	
  our	
  future	
  economic	
  posture	
  
•  Doing	
  so	
  while	
  effec=vely	
  opera=ng	
  across	
  four	
  impera=ves:	
  	
  
–  Debt,	
  
–  Rates,	
  	
  
–  Stewardship,	
  and	
  	
  
–  Asset	
  PorNolio	
  	
  
•  In	
  an	
  opera=ng	
  environment	
  focused	
  on	
  	
  
–  Trust,	
  	
  
–  Safety,	
  and	
  	
  
–  Change	
  
•  And	
  a	
  significant	
  evolu=on	
  of	
  our	
  culture	
  
•  His	
  message	
  was	
  clear…the	
  TVA	
  must	
  undertake	
  major	
  
transforma=on	
  	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
The	
  company	
  is	
  undergoing	
  a	
  
transforma.on	
  of	
  business	
  and	
  culture…	
  
•  This	
  is	
  an	
  op=mal	
  =me	
  to	
  make	
  progress	
  on	
  
communica=ng	
  the	
  benefits	
  of	
  becoming	
  more	
  cyber	
  
resilient;	
  
–  New	
  CEO	
  
–  Economic	
  challenges	
  
–  Changes	
  in	
  organiza=onal	
  	
  
structure	
  and	
  strategic	
  	
  
direc=on	
  
–  Increased	
  focus	
  on	
  	
  
reducing	
  risk	
  
–  An	
  appeal	
  to	
  all	
  employees	
  to	
  be	
  innova=ve	
  in	
  finding	
  solu=ons	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
The	
  challenge	
  is	
  that	
  “Cyber”	
  is	
  not	
  always	
  
well	
  understood	
  by	
  u.li.es…	
  
•  Cyber	
  security	
  is	
  seen	
  as	
  
important	
  but	
  many	
  
employees	
  	
  don’t	
  
understand	
  the	
  threat:	
  
–  Cyber	
  terminology	
  is	
  
confusing	
  
–  Some	
  don’t	
  believe	
  the	
  threat	
  
is	
  “real”	
  	
  	
  
–  Many	
  feel	
  that	
  sensi=ve	
  
networks	
  and	
  assets	
  are	
  
sufficiently	
  isolated	
  
–  “No	
  way!	
  I’m	
  not	
  shuZng	
  
down	
  to	
  patch	
  anything!	
  My	
  
1995	
  ICS	
  technology	
  (with	
  no	
  
maintenance	
  agreement	
  in	
  
place)	
  is	
  safe!!”	
  
	
  
	
  
	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
•  Execu=ves	
  are	
  o`en	
  in	
  the	
  
same	
  “boat”:	
  
–  Didn’t	
  we	
  fix	
  that	
  already?	
  
–  NERC	
  CIP	
  must	
  be	
  addressing	
  
my	
  requirements	
  
–  Not	
  cri=cal	
  to	
  making	
  
electricity	
  
–  What	
  am	
  I	
  geZng	
  in	
  return	
  
for	
  this	
  investment?	
  
–  Who	
  else	
  is	
  experiencing	
  this?	
  
Nobody	
  in	
  the	
  industry?	
  Why	
  
am	
  I	
  spending	
  so	
  much????	
  
“Uh, I think your Stuxnet ate my Poison Ivy
and caused my Duqu to explode after a
denial of service…..then the Aurora came
after the Shamoon and finally, I just decided
to go phishing with my kill chain…”
Note:	
  Cyber	
  Terms	
  are	
  not	
  “common”	
  u.lity	
  jargon!	
  
6	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
A	
  key	
  component	
  of	
  influencing	
  change	
  within	
  
an	
  organiza.on’s	
  culture	
  is	
  to	
  tell	
  a	
  story….	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
My story about how to become
more cyber resilient starts with
the network....
...and ends with TVA in a much better
cybersecurity posture by 2020; ready
to face next generation cyber
threats.
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
Like	
  other	
  U.li.es,	
  TVA	
  has	
  many	
  different	
  
networks	
  used	
  to	
  operate	
  the	
  company	
  
•  Different	
  types	
  of	
  networks	
  	
  across	
  the	
  
corporate	
  and	
  power	
  environments	
  are	
  the	
  
means	
  for	
  execu=ng	
  the	
  TVA	
  mission	
  
–  Opera=ons	
  managed;	
  sensor	
  data	
  and	
  	
  
decisions	
  from	
  ICS	
  
–  Safely	
  operate	
  and	
  maintain	
  power	
  plants	
  and	
  
transmissions	
  systems	
  
–  Buy	
  and	
  sell	
  power;	
  bill	
  customers;	
  receive	
  
revenues	
  
–  Communicate	
  internally	
  and	
  externally	
  
–  Manage	
  environmental	
  requirements	
  
•  These	
  same	
  networks	
  are	
  	
  the	
  target	
  of	
  cyber	
  
afacks	
  and	
  the	
  poten=al	
  means	
  for	
  afacking	
  
TVA	
  Cri=cal	
  Assets	
  or	
  Business	
  Processes	
  
•  The	
  afackers	
  are…	
  
–  More	
  sophis=cated	
  and	
  effec=ve	
  	
  
–  With	
  the	
  poten=al	
  for	
  causing	
  serious	
  
disrup=on	
  and	
  even	
  destruc=on	
  of	
  our	
  
resources	
  
–  Interested	
  in	
  achieving	
  various	
  objec=ves	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
8	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
Even	
  as	
  we	
  resolve	
  our	
  financial	
  challenges,	
  
we	
  have	
  an	
  opportunity	
  to	
  drive	
  change…	
  
•  Working	
  collec=vely	
  on	
  solu=ons	
  to	
  our	
  networked	
  security…	
  	
  
–  Across	
  func=onal	
  lines	
  that	
  have	
  common	
  ground	
  
–  To	
  iden=fy	
  mutually	
  suppor=ve	
  solu=ons	
  	
  
–  Towards	
  becoming	
  opera=onally	
  resilient	
  to	
  cyber	
  afacks	
  
–  And,	
  the	
  means	
  to	
  tackle	
  the	
  broader	
  financial	
  challenges	
  
•  NOW	
  is	
  the	
  =me	
  for	
  developing	
  our	
  cybersecurity	
  resilience	
  to	
  protect	
  our	
  
networked	
  resources	
  and	
  con=nue	
  to	
  fulfill	
  our	
  mission	
  requirements	
  
–  Make	
  recommenda=ons	
  to	
  evolve	
  our	
  cyber	
  opera=ons	
  posture	
  from…	
  
•  Compliance	
  
•  To	
  becoming	
  agile	
  
•  And	
  ul=mately	
  resilient	
  
–  Which	
  will	
  allow	
  TVA	
  to	
  recognize	
  	
  
•  Enhanced	
  cybersecurity	
  safety	
  
•  Building	
  trust	
  and	
  confidence	
  across	
  our	
  enterprise	
  and	
  with	
  our	
  customers	
  
•  Avoid	
  catastrophic	
  costs	
  resul=ng	
  from	
  an	
  increasingly	
  likely	
  cyber	
  afack	
  
•  While	
  embracing	
  change	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
9	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
1970s.	
  	
  Introduc=on	
  of	
  1st	
  
genera=on	
  “monolithic”	
  
SCADA	
  systems	
  
The	
  TVA	
  has	
  been	
  a	
  technology	
  leader	
  
through	
  the	
  20th	
  Century	
  
40s	
  –	
  expanded	
  
hydropower	
  
construc=on	
  
60s	
  –	
  Introduc=on	
  of	
  
nuclear	
  power	
  plants	
  
50s	
  –	
  Largest	
  electricity	
  
supplier	
  
70s	
  –	
  80s	
  –	
  Focus	
  on	
  
energy	
  conserva=on	
  	
  
90s	
  –	
  Increased	
  
compe==on;	
  clean	
  
air	
  focus	
  
2000s	
  –	
  focus	
  on	
  energy,	
  
environment,	
  and	
  economic	
  
development	
  
1933.	
  TVA	
  established	
  by	
  Congress	
  
to	
  address	
  environmental,	
  
economic,	
  and	
  technological	
  
challenges	
  including	
  delivery	
  of	
  
low-­‐cost	
  electricity	
  
1969.	
  The	
  Internet	
  
(ARPANET)	
  brought	
  on	
  line	
  
1959.	
  Federal	
  
appropria=ons	
  ended;	
  
TVA	
  becomes	
  self-­‐
financing	
  
Major	
  TVA	
  events	
  
Major	
  Internet	
  events	
  
1991.	
  	
  World	
  Wide	
  Web	
  evolves	
  
through	
  new	
  protocol,	
  hypertext	
  
• Explosive	
  growth	
  of	
  the	
  internet	
  
• Rise	
  of	
  social	
  networking	
  (e.g.,	
  
Facebook,	
  Twifer)	
  
• Exponen=al	
  growth	
  of	
  mobility	
  
planorms	
  	
  
1982:	
  Internet	
  protocol	
  
TCP/IP	
  standardized	
  
1980s.	
  Growth	
  of	
  2nd	
  genera=on	
  
“distributed”	
  SCADA	
  systems	
  
1990s.	
  	
  3rd	
  genera=on	
  
“Networked”	
  SCADA	
  systems	
  	
  
Major	
  cyber	
  a_acks	
  	
  
2000.	
  DDOS	
  afack	
  across	
  commercial	
  
web	
  sites	
  ($1.7B	
  in	
  damages)	
  
2010.	
  Stuxnet	
  infected	
  
Iranian	
  nuclear	
  facili=es	
  
2009.	
  Merrick	
  Bank	
  lost	
  $16M	
  a`er	
  hackers	
  
compromised	
  40M	
  credit	
  card	
  accounts	
  
2003.	
  Slammer	
  worm	
  infected	
  90%	
  of	
  vulnerable	
  
computers	
  within	
  10	
  min	
  ($1B	
  in	
  damage)	
  
1999.	
  Federal	
  appropria=ons	
  for	
  
environmental	
  stewardship	
  and	
  
economic	
  development	
  ac=vi=es	
  
ended	
  
2012.	
  More	
  than	
  30,000	
  computers	
  at	
  Saudi	
  
Aramco	
  (oil	
  company)	
  destroyed	
  by	
  virus	
  
•  IT	
  revolu=onized	
  our	
  industry	
  
–  Affected	
  every	
  element	
  of	
  power	
  genera=on	
  and	
  delivery	
  
–  Almost	
  always	
  “bolted	
  on”	
  and	
  not	
  “built	
  in”	
  
•  AND…introduced	
  significant	
  risk	
  from	
  cyber	
  afacks	
  
–  With	
  Increased	
  frequency,	
  from	
  more	
  	
  
adversaries,	
  with	
  greater	
  	
  
sophis=ca=on,	
  against	
  more	
  	
  
targets,	
  with	
  increased	
  	
  
success,	
  …and	
  greater	
  impact	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
10	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
…and	
  technology	
  with	
  the	
  cyber	
  threat	
  
has	
  introduced	
  risk	
  to	
  our	
  impera.ves	
  	
  
Change	
  
Trust	
  Safety	
  
Rates	
  
•  Increases	
  costs	
  from:	
  	
  
o  Disrup=on	
  of	
  service	
  and	
  restora=on	
  requirements	
  
o  Legal	
  fees	
  resul=ng	
  from	
  the`	
  or	
  destruc=on	
  of	
  data	
  
•  Poten=al	
  loss	
  of	
  customers	
  (par=cularly	
  industrial	
  
customers)	
  
Debt	
  
•  Immediate	
  impact	
  to	
  O&M	
  costs	
  to	
  restore	
  systems	
  
damaged	
  or	
  destroyed	
  by	
  a	
  cyber	
  afack	
  
o  Could	
  cause	
  TVA	
  to	
  exceed	
  its	
  debt	
  threshold	
  
	
  
Stewardship	
  
•  Loss	
  of	
  trust	
  and	
  credibility…	
  
o  Customers	
  due	
  to	
  loss	
  of	
  
privacy	
  data	
  or	
  service	
  outage	
  
o  Government	
  due	
  to	
  na=onal	
  
power	
  grid	
  impacts	
  
•  Safety	
  …	
  placing	
  staff	
  in	
  harms	
  
way	
  working	
  to	
  resolve	
  outages	
  	
  
•  Economic	
  and	
  environmental	
  	
  
impacts	
  resul=ng	
  from	
  
destruc=on	
  of	
  major	
  
environmentally	
  sensi=ve	
  TVA	
  
components	
  
Asset	
  PorNolio	
  
•  Unstable	
  and/or	
  unreliable	
  
cri=cal	
  asset	
  performance	
  
•  Poten=al	
  damage,	
  destruc=on,	
  
and	
  loss	
  of	
  assets	
  	
  
o  Both	
  short	
  and	
  long	
  term	
  
The	
  Cyber	
  Threat	
  is	
  	
  
driving	
  unwanted	
  	
  
change	
  into	
  TVA	
  	
  
and	
  in	
  turn	
  is	
  
	
  eroding	
  our	
  	
  
trust	
  and	
  	
  
safety	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
We	
  can	
  control	
  some	
  of	
  the	
  drivers	
  of	
  risk	
  
and	
  some	
  we	
  can’t	
  	
  
External	
  Drivers	
  	
  
Those	
  we	
  can’t	
  control	
  
•  Customers…those	
  whom	
  we	
  serve,	
  with	
  expecta=ons	
  for	
  
–  Uninterrupted	
  service	
  	
  
–  Reasonably	
  priced	
  electricity	
  	
  
–  Protec=on	
  of	
  Personal	
  Iden=fica=on	
  Informa=on	
  and	
  
privacy	
  expecta=ons	
  
–  Environmental	
  stewardship	
  
•  Government	
  (e.g.,	
  NERC)…Drive	
  oversight	
  &	
  regula=ons	
  
–  Drives	
  cost	
  (e.g.,	
  changes	
  in	
  “bright	
  line,”	
  EPA	
  requirements)	
  
–  Expects	
  industry	
  to	
  operate	
  systems	
  securely	
  and	
  safely	
  
(e.g.,	
  nuclear	
  facili=es	
  operate	
  in	
  a	
  virtually	
  ‘zero	
  defect	
  
environment”)	
  
•  Industry…Both	
  Partners/Compe=tors	
  
–  Jointly	
  managing	
  the	
  Na=on’s	
  power	
  grid	
  
•  Vendors…suppor=ng	
  TVA	
  	
  
–  Drive	
  change	
  with	
  updates	
  and	
  new	
  capabili=es	
  
	
  
•  Threat	
  Actors	
  (e.g.,	
  hac.vists,	
  criminals,	
  Na.on	
  States)	
  
–  Focused	
  on	
  embarrassment,	
  exploita=on,	
  the`,	
  disrup=on,	
  
and	
  destruc=on	
  
–  Capable	
  of	
  taking	
  over	
  Industrial	
  Control	
  Systems	
  (ICS)	
  and	
  
corporate	
  networks;	
  shuZng	
  them	
  down;	
  crea=ng	
  
significant	
  risk	
  to	
  TVA	
  staff	
  and	
  customers	
  (loss	
  of	
  service;	
  
restora=on	
  risks,	
  etc.)	
  
Internal	
  Drivers	
  	
  
Those	
  we	
  can	
  control	
  	
  
•  TVA	
  Organiza=on	
  	
  
–  Decentralized,	
  =ered,	
  &	
  distributed	
  
•  Staff	
  
–  The	
  guardians	
  of	
  TVA	
  culture	
  
–  Both	
  driving	
  and	
  resis=ng	
  change	
  
•  Culture	
  
–  Accountability	
  
•  Technology	
  
–  Constantly	
  increasing	
  the	
  pace	
  of	
  change	
  with	
  
technology	
  refresh,	
  updates,	
  patches,	
  etc.	
  	
  
•  Aged	
  Infrastructure	
  
–  Some	
  is	
  80	
  years	
  old…does	
  not	
  always	
  adapt	
  
easily	
  
–  Cybersecurity	
  technology	
  solu=ons	
  generally	
  
bolted	
  on	
  vice	
  built	
  in	
  
•  Funding	
  and	
  Budgets	
  
–  Bounded	
  (as	
  our	
  CEO	
  reminded	
  us)	
  
–  Debt	
  ceiling	
  is	
  almost	
  gone	
  	
  
Can	
  Impact	
  our	
  Costs	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
12	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
This	
  isn’t	
  to	
  suggest	
  that	
  only	
  bad	
  things	
  
evolve	
  from	
  this	
  challenging	
  period	
  of	
  change	
  
•  Large	
  scale	
  change	
  presents	
  an	
  opportunity	
  to	
  examine	
  our	
  approach	
  to	
  cybersecurity	
  	
  
•  Increase	
  trust	
  in	
  our	
  systems	
  
–  Enhance	
  our	
  cybersecurity	
  posture	
  
–  Revisit	
  how	
  we	
  fund	
  	
  
•  How	
  much	
  are	
  we	
  inves=ng	
  now	
  
•  Percentage	
  of	
  our	
  network	
  coverage	
  
•  Known	
  risks	
  in	
  different	
  opera=ng	
  environments	
  that	
  have	
  not	
  been	
  addressed	
  (e.g.,	
  corporate,	
  nuclear,	
  fossil,	
  etc.)	
  
•  Which	
  investments	
  would	
  create	
  the	
  maximum	
  value	
  (near,	
  mid,	
  and	
  long	
  term)	
  impact	
  
–  Examine	
  cybersecurity	
  across	
  func=onal	
  elements	
  (e.g.,	
  IT,	
  Opera=ons,	
  and	
  Supply/Logis=cs)	
  to	
  
collec=vely	
  develop	
  ideas	
  and	
  op=ons	
  to	
  befer	
  secure	
  our	
  networks	
  
•  Ul=mately,	
  cybersecurity	
  is	
  about	
  risk…and	
  money	
  
–  How	
  much	
  cybersecurity	
  risk	
  are	
  we	
  willing	
  to	
  accept	
  
–  At	
  what	
  cost	
  	
  
•  To	
  make	
  changes	
  
•  To	
  avoid	
  poten=al	
  catastrophic	
  costs	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
We	
  are	
  not	
  alone	
  in	
  this	
  struggle…the	
  en6re	
  industry	
  is	
  challenged	
  
13	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
The	
  CEO’s	
  challenge	
  is	
  an	
  opportunity	
  to…	
  
Define	
  the	
  cybersecurity	
  risks	
  we	
  face…	
  
	
  
…and	
  the	
  implica6ons	
  for	
  how	
  we	
  secure	
  
our	
  networks	
  
Consider	
  the	
  evolving	
  cyber	
  environment…	
   …and	
  the	
  poten6al	
  implica6ons	
  for	
  our	
  
future	
  opera6ons	
  
Jointly	
  iden.fy	
  some	
  possible	
  solu.ons…	
  
	
  
…and	
  what	
  other	
  op6ons	
  we	
  might	
  
consider	
  
Expand	
  our	
  approach	
  to	
  cybersecurity…	
  	
  
	
  
…and	
  consider	
  cross	
  organiza6onal,	
  
mul6-­‐func6onal	
  solu6ons	
  
Redefine	
  our	
  understanding	
  of	
  networks…	
  
	
  
…and	
  protect	
  them	
  as	
  vital	
  to	
  execu6ng	
  
our	
  mission	
  
Examine	
  the	
  costs	
  of	
  doing	
  so…	
  
	
  
…and	
  the	
  poten6al	
  costs	
  of	
  not	
  
Assess	
  the	
  .ming	
  of	
  making	
  changes…	
  
	
  
…in	
  the	
  near,	
  mid,	
  or	
  long	
  term	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
Today,	
  the	
  government’s	
  cybersecurity	
  response	
  
focuses	
  on	
  regula.ons	
  &	
  standards	
  
The	
  Government	
  Response	
  
•  NERC	
  CIP	
  has	
  issued	
  28	
  documents	
  
detailing	
  Reliability	
  Standards	
  
–  Set	
  standards	
  for	
  repor=ng,	
  cyber	
  asset	
  
iden=fica=on,	
  system	
  categoriza=on,	
  
security	
  management	
  controls,	
  personnel	
  
and	
  training	
  standards,	
  management	
  
(electronic,	
  physical,	
  and	
  systems	
  security	
  
management),	
  configura=on	
  management,	
  
informa=on	
  protec=on	
  
–  Each	
  includes	
  requirements	
  and	
  measures;	
  
for	
  example…	
  
•  CIP-­‐001-­‐2a	
  has	
  4	
  requirements	
  and	
  4	
  
measures	
  
•  CIP-­‐002-­‐3	
  has	
  4	
  requirements	
  with	
  5	
  sub-­‐
requirements	
  and	
  7	
  sub-­‐sub	
  requirements,	
  
and	
  4	
  measures	
  
…	
  And	
  Industry	
  Complies	
  
•  Developed	
  large	
  IT	
  organiza=onal	
  
structures	
  to	
  meet	
  requirements	
  
•  Expended	
  significant	
  resources	
  to	
  protect	
  
systems	
  and	
  networks	
  
•  Has	
  not	
  been	
  as	
  likely	
  to	
  adopt	
  
recommenda=ons	
  (vice	
  requirements)	
  
	
  
	
  
•  In	
  fact…compliance,	
  all	
  too	
  oAen	
  is	
  the	
  
founda6on	
  and	
  primary	
  means	
  for	
  
mi6ga6ng	
  risk	
  …	
  
	
  
	
  	
  	
  	
  	
  “If	
  I	
  comply,	
  I’m	
  protected”	
  
Standards,	
  requirements,	
  alerts,	
  repor6ng	
  and	
  compliance	
  serve	
  an	
  important	
  
func6on	
  for	
  fulfilling	
  organiza6onal	
  objec6ves	
  opera6ng	
  in	
  cyberspace	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
15	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
But,	
  compliance	
  alone	
  is	
  risky	
  and	
  the	
  nature	
  of	
  
the	
  energy	
  industry	
  poses	
  addi.onal	
  challenges	
  
Opera.onal	
   Organiza.onal	
   Resourcing	
  
Focus	
  
Compliance-based defense (e.g.,
NERC CIP and NIST guidelines)
Leadership and technical staff
from corporate headquarters to
distributors are independent
Primarily on O&M (vice capital
expenditures) to meet regulatory
requirements
	
  
Challenges	
  
Complex situational
awareness; discerning source of
disruption or destruction between
routine failures vice cyber attacks
Need to integrate across diverse
operational platforms to establish
an operational framework and
increase employee awareness
Increased costs
•  Operating and maintaining multiple IT
solutions and architectures
•  Executing compliance requirements
across multiple organizational
elements
•  Capital IT expenditures are
accomplished independently; plants,
vendors, distributors adopt different
solutions that frequently aren’t
interoperable or require expensive
interfaces
•  Missed opportunities to gain
efficiencies and savings through
consolidated, organization-wide
negotiations with vendors (vendors
often drive solutions)
Limited response actions:
•  Frequently “after the event”
•  Reluctance to shut systems
down
Organiza=on-­‐wide	
  solu=ons	
  to	
  
cyber	
  afacks	
  difficult	
  and	
  costly	
  
due	
  to	
  loose	
  federa=on	
  of	
  IT	
  
infrastructures,	
  complex	
  and	
  
different	
  network	
  environments,	
  
requiring	
  specialized	
  solu=ons	
  
Slowed response waiting for
developed, tested, deployed, and
approved solutions
Result	
  
Increased potential for success of cyber attacks with resulting
energy disruption, loss of data and corresponding legal and financial impacts
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
16	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
Those	
  challenges	
  affect	
  our	
  ability	
  to	
  respond	
  
quickly…and	
  in	
  cyberspace	
  it’s	
  all	
  about	
  speed	
  
“Time	
  is	
  Money”	
  was	
  never	
  more	
  true…and	
  it’s	
  not	
  just	
  one	
  cyber	
  aKack…it’s	
  
hundreds…thousands	
  and	
  they	
  aren’t	
  going	
  to	
  stop…	
  because	
  it	
  works	
  
Discovery	
   Detec=on	
   Response	
   Recovery	
  
• Time	
  between	
  
discovery	
  of	
  a	
  zero	
  
day	
  vulnerability	
  and	
  
the	
  development,	
  
tes=ng,	
  deployment,	
  
and	
  implementa=on	
  
of	
  a	
  solu=on	
  
• Time	
  between	
  a	
  
successful	
  breach	
  of	
  
a	
  network/system	
  
and	
  discovery	
  by	
  
the	
  organiza=on	
  
• Time	
  to	
  develop,	
  
test,	
  deploy,	
  and	
  
implement	
  solu=ons	
  
• Time	
  to	
  restore	
  
network/systems	
  to	
  
full	
  opera=onal	
  
capabili=es	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
17	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
…and	
  cyberspace	
  is	
  not	
  gehng	
  any	
  	
  
slower	
  or	
  safer	
  
•  Cyber	
  afacks	
  are	
  increasing	
  every	
  day	
  
–  Across	
  the	
  Na=on	
  
–  Our	
  industry	
  
–  …and	
  against	
  TVA	
  
•  Using	
  a	
  wide	
  variety	
  of	
  methodologies	
  
–  “Phishing”	
  …	
  social	
  engineering	
  of	
  email	
  
–  Malware	
  …	
  plan=ng	
  tools	
  and	
  so`ware	
  
in	
  our	
  networks	
  
–  Denial	
  of	
  Service	
  …	
  denying	
  us	
  and	
  our	
  
customers	
  access	
  to	
  our	
  networks	
  	
  
–  Ransomware	
  …	
  hijacking	
  computers	
  
forcing	
  payment	
  for	
  release	
  
•  And	
  it’s	
  not	
  going	
  to	
  get	
  any	
  befer	
  for	
  
the	
  foreseeable	
  future	
  
–  …because	
  it	
  works	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
•  DHS	
  reported	
  198	
  afacks	
  on	
  cri=cal	
  U.S.	
  
infrastructure	
  in	
  2012…up	
  from	
  9	
  in	
  2009	
  
•  In	
  2012	
  ,	
  ICS-­‐CERT	
  tracked	
  171	
  unique	
  
vulnerabili=es	
  affec=ng	
  ICS	
  products	
  across	
  
55	
  vendors	
  
•  The	
  TVA	
  experienced	
  an	
  almost	
  30%	
  
increase	
  in	
  afacks	
  year	
  over	
  year	
  
•  Over	
  the	
  last	
  quarter,	
  DELL	
  SecureWorks	
  has	
  
escalated	
  269	
  incidents	
  beyond	
  the	
  SOC	
  
18	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
Given	
  “Time	
  is	
  Money”…we	
  must…	
  
•  Be	
  more	
  than	
  compliant…compliance	
  ac6vi6es	
  are	
  “table	
  stakes”	
  
•  Be	
  faster…	
  
–  Iden=fy	
  vulnerabili=es	
  faster	
  across	
  the	
  enterprise	
  
–  Iden=fy	
  afacks	
  faster	
  
–  Work	
  the	
  development,	
  tes=ng,	
  and	
  deployment	
  of	
  	
  
solu=ons	
  faster	
  
–  Make	
  decisions	
  faster	
  
–  Restore	
  networks	
  and	
  systems	
  faster	
  
•  Be	
  more	
  agile	
  by	
  crea=ng	
  response	
  op:ons	
  vice	
  just	
  “stopping	
  the	
  pain”	
  
•  Systema=cally	
  build	
  a	
  plan	
  towards	
  becoming	
  resilient,	
  able	
  to	
  meet	
  mission	
  
requirements	
  by	
  “figh=ng	
  through”	
  cyber	
  afacks	
  
•  We	
  need	
  a	
  paradigm	
  shi`	
  in	
  our	
  approach	
  beyond	
  compliance	
  to	
  become	
  agile	
  
and	
  ul=mately	
  resilient	
  	
  
Time/Speed	
  
Money	
  
Cost	
  of	
  a	
  Cyber	
  Afack	
  
$$$	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu=ons	
  
The	
  average	
  cost	
  of	
  a	
  breach	
  is	
  about	
  $188	
  per	
  stolen	
  
record,	
  and	
  the	
  average	
  loss	
  per	
  incident	
  is	
  $9.4	
  million	
  
Ponemon	
  Ins=tute	
  
19	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
A	
  journey	
  towards	
  resilience	
  can	
  be	
  itera.ve	
  
Compliant	
  
	
  
•  Con=nue	
  to	
  meet	
  
requirements	
  
•  Expand	
  to	
  execu=ng	
  
NERC/NIST	
  
recommenda=ons	
  
•  Develop	
  op=ons	
  for	
  
becoming	
  more	
  agile	
  
and	
  make	
  plans	
  to	
  
become	
  resilient	
  
•  Evolve	
  the	
  TVA	
  
culture	
  to	
  embrace	
  
cybersecurity	
  safety	
  
Agile	
  	
  
	
  
•  Harden	
  network	
  infrastructure	
  
and	
  develop	
  op=ons	
  and	
  
alterna=ves	
  to	
  become	
  more	
  
robust	
  to	
  withstanding	
  cyber	
  
afacks	
  
•  Develop	
  architectures	
  and	
  
acquisi=on	
  strategies	
  that	
  will	
  
serve	
  as	
  the	
  founda=on	
  for	
  
becoming	
  resilient	
  
•  1-­‐3	
  year	
  =me	
  frame	
  to	
  develop	
  
and	
  deploy	
  in	
  stages	
  	
  
	
  
Resilient	
  
	
  
•  Build	
  security	
  in	
  to	
  our	
  
infrastructure	
  
•  Execute	
  a	
  plan	
  and	
  
suppor=ng	
  architectures	
  and	
  
acquisi=on	
  strategy	
  
•  Withstand,	
  mi=gate,	
  and	
  
defeat	
  cyber	
  afacks	
  with	
  
planned,	
  rehearsed,	
  
responses	
  that	
  ensure	
  
mission	
  execu=on	
  
•  3-­‐7	
  years	
  synchronized	
  with	
  
other	
  programs	
  and	
  
opera=ons	
  across	
  TVA	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu.ons	
  
3-­‐7	
  Years	
  1-­‐3	
  Years	
  Today	
  
20	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
Resiliency	
  is	
  a	
  complex	
  set	
  of	
  ac.vi.es	
  that	
  must	
  be	
  
programmed	
  into	
  our	
  “opera.onal	
  DNA”	
  and	
  be…	
  
…Planned	
   …Prac.ced	
   …Unified	
   …	
  and	
  Resourced	
  
•  Execute	
  compliance	
  based	
  
requirements…as	
  well	
  as	
  
recommenda=ons	
  
•  Develop	
  IT/Cyber	
  architecture	
  
integrated	
  with	
  other	
  u=lity	
  
disciplines	
  for	
  next	
  genera=on	
  
systems	
  
•  With	
  corresponding	
  and	
  
suppor=ng	
  policy	
  implementa=ons	
  
•  And	
  suppor=ng	
  acquisi.on	
  
strategies	
  for	
  the	
  “long	
  haul”	
  
•  Interdependencies	
  must	
  be	
  
understood	
  and	
  documented	
  	
  
•  Services,	
  data	
  storage,	
  system	
  
cri=cality	
  must	
  be	
  documented	
  in	
  
advance	
  to	
  program	
  response	
  
ac=ons	
  in	
  a	
  =mely	
  manner	
  	
  
•  Cyber	
  resiliency	
  must	
  be	
  
prac=ced	
  
•  Leaders	
  and	
  technical	
  staff	
  
trained	
  and	
  exercised	
  in	
  
roles	
  and	
  responsibili=es	
  
•  Immediate	
  ac=on	
  drills	
  
must	
  be	
  documented	
  and	
  
rehearsed	
  	
  
Across	
  large,	
  diverse,	
  
decentralized	
  
organiza=ons	
  (e.g.,	
  TVA)	
  
requires:	
  
•  Coordinated	
  and	
  
integrated	
  architectures	
  
•  Standardize	
  with	
  
“controlled	
  diversity”	
  of	
  
approved	
  tools,	
  
equipment	
  and	
  vendors	
  
•  Comprehensive	
  
situa=onal	
  awareness	
  
across	
  all	
  components	
  
•  Consolidated	
  and	
  
centralized	
  decision	
  –	
  
making…there’s	
  no	
  =me	
  
for	
  debate	
  
•  Acquisi.on	
  strategy	
  that	
  
addresses	
  resiliency	
  
requirements	
  
•  Supports	
  security	
  
architectures	
  
•  Maximize	
  IT/cyber	
  resources	
  
and	
  interoperability	
  through	
  
vendor	
  strategies	
  
•  Redundant	
  (backup)	
  
resources	
  must	
  be	
  iden=fied	
  
and	
  if	
  necessary	
  resourced	
  	
  
We	
  may	
  not	
  simply	
  declare	
  we	
  are	
  resilient;	
  	
  
rather	
  it	
  requires	
  a	
  set	
  of	
  comprehensive	
  reforms	
  organiza:onally	
  to	
  evolve	
  itself.	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu.ons	
  
21	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
We’ve	
  proposed	
  some	
  “ideas”	
  as	
  a	
  start	
  point	
  
for	
  op.ons	
  leading	
  to	
  resilience	
  that	
  are…	
  
•  By	
  no	
  means	
  comprehensive	
  	
  
–  But	
  intended	
  to	
  get	
  the	
  discussion	
  started	
  	
  
•  Grouped	
  by	
  
–  Network	
  and	
  Security	
  Capabili=es	
  
–  Engineering	
  
–  Organiza=onal	
  
–  Supply	
  Chain	
  
–  Enterprise	
  Risk	
  Management	
  
•  Characterized	
  along	
  spectrums	
  of…	
  
–  Costs	
  (low,	
  moderate,	
  and	
  high)	
  
–  Time	
  (near,	
  mid,	
  and	
  long)	
  
•  Opportuni=es	
  for	
  the	
  TVA	
  staff	
  
–  To	
  embrace	
  and	
  drive	
  essen=al	
  change	
  across	
  our	
  organiza=on	
  
–  Build	
  trust	
  in	
  an	
  environment	
  of	
  shared	
  cybersecurity	
  safety	
  
–  To	
  leverage	
  the	
  unique	
  cross	
  func=onal	
  quali=es	
  of	
  IT/Cyber	
  	
  	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu.ons	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
	
  Network	
  and	
  Security	
  Capabili.es	
  
•  Embed	
  TVA-­‐wide	
  IT/Cyber	
  situa.onal	
  
awareness	
  within	
  exis=ng	
  TVA	
  opera=ons	
  
center(s)	
  with	
  complete	
  performance	
  
view	
  of	
  corporate	
  and	
  power	
  WAN	
  and	
  
LAN	
  networks	
  
–  Provide	
  100%	
  situa=onal	
  awareness	
  of	
  ALL	
  TVA	
  
(transmission,	
  IT,	
  nuclear,	
  etc.)	
  
–  Efficiencies	
  and	
  cost	
  savings	
  
–  High	
  Cost	
  –	
  Long	
  Term	
  	
  
•  Enhanced	
  Incident	
  Response	
  capabili.es	
  
across	
  the	
  en=re	
  enterprise	
  
–  Enhance	
  Unity	
  of	
  Effort	
  and	
  decrease	
  response	
  
=mes	
  
–  Low	
  Cost	
  –	
  Near	
  Term	
  
•  Evaluate	
  cybersecurity	
  effec.veness	
  of	
  
network	
  carriers	
  and	
  embed	
  
corresponding	
  requirements	
  in	
  contracts	
  
–  Create	
  op=ons	
  to	
  increase	
  robust	
  network	
  
capabili=es	
  and	
  capacity	
  
–  Low	
  Cost	
  –	
  Mid	
  Term	
  
•  Work	
  with	
  vendors	
  to	
  ensure	
  
cybersecurity	
  is	
  built	
  in	
  to	
  their	
  products	
  
including	
  situa.onal	
  awareness	
  
–  Moderate	
  Cost	
  –	
  Long	
  Term	
  
•  Examine	
  op.ons	
  for	
  establishing	
  the	
  
means	
  for	
  tes.ng	
  Vendor	
  products	
  and	
  
our	
  own	
  (e.g.,	
  incorporated	
  network	
  
firewalls,	
  wireless	
  encryp=on	
  and	
  DMZ’s	
  
as	
  the	
  primary	
  maintenance	
  and	
  
diagnos=c	
  hub	
  for	
  plant	
  )	
  
–  Require	
  Vendor	
  cer=fica=on	
  through	
  the	
  facility	
  	
  
–  Moderate	
  cost	
  –	
  Mid	
  Term	
  
•  Con.nue	
  to	
  expand	
  and	
  build	
  on	
  current	
  
government	
  rela.onships	
  at	
  the	
  network	
  
level	
  and	
  through	
  policies	
  and	
  procedures	
  
–  Low	
  Cost	
  –	
  Near	
  Term	
  	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu.ons	
  
…and…	
  
Engineering	
  
•  Embed	
  cybersecurity	
  technology	
  in	
  all	
  
Engineering	
  ini.a.ves	
  and	
  architectures	
  (all	
  
forms,	
  civil,	
  mechanical,	
  power,	
  IT)	
  	
  as	
  a	
  
requirement	
  for	
  program	
  approval	
  
–  Require	
  resiliency	
  strategies	
  in	
  opera=onal	
  and	
  
acquisi=on	
  reviews	
  and	
  escalate	
  the	
  concept	
  into	
  
the	
  strategic	
  plan	
  
–  Cultural	
  shi`	
  
–  Low	
  cost	
  –	
  Near	
  Term	
  
•  Build	
  an	
  IT/cyber	
  architecture	
  that	
  captures	
  the	
  
ideas,	
  op=ons,	
  and	
  plans	
  for	
  securing	
  the	
  
network	
  to	
  serve	
  as	
  the	
  founda=on	
  of	
  our	
  cyber	
  
resiliency	
  
–  Low	
  Cost	
  –	
  Mid	
  Term	
  
•  Improve	
  and	
  invest	
  in	
  data	
  reten.on	
  and	
  back-­‐
up	
  strategies	
  across	
  TVA	
  (corporate	
  IT	
  and	
  
plant)	
  to	
  enable	
  recovery	
  when	
  needed	
  
–  Moderate	
  Costs	
  –	
  Mid	
  Term	
  
Organiza.onal	
  
•  Inextricably	
  bind	
  security	
  and	
  safety	
  e.g.	
  “If	
  it’s	
  
not	
  secure,	
  it’s	
  not	
  safe”	
  
–  Culture	
  shi`…safely	
  opera=ng	
  network,	
  individual	
  
computers,	
  etc.	
  
–  Low	
  Cost	
  –	
  Near	
  Term	
  
•  Promote	
  cybersecurity	
  safety	
  across	
  the	
  TVA	
  
(e.g.,	
  staff,	
  customers,	
  vendors,	
  etc.)	
  
–  For	
  smart	
  grid,	
  demand	
  response,	
  financial,	
  and	
  
other	
  inter-­‐connec=ons	
  
–  Low	
  Cost	
  –	
  Near	
  Term	
  
•  A_ract	
  and	
  recruit	
  technology	
  companies	
  into	
  
Tennessee	
  Valley	
  who	
  build	
  programmable	
  
components	
  and	
  thereby	
  enhance	
  the	
  defense	
  
industrial	
  base	
  security	
  and	
  that	
  of	
  u=li=es/
cri=cal	
  infrastructure	
  
–  Manufacturers	
  become	
  customers	
  
–  Low	
  Cost	
  –	
  Long	
  Term	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu.ons	
  
…and…	
  
Supply	
  Chain	
  
•  Perform	
  a	
  source	
  of	
  supply	
  analysis	
  on	
  
programmable	
  logic	
  components	
  (relays,	
  switches,	
  
routers,	
  etc.)	
  to	
  determine	
  country	
  of	
  origin;	
  
conduct	
  cost-­‐benefit	
  analysis	
  for	
  replacing	
  PLCs	
  
per	
  risk	
  analysis	
  
–  Low	
  Cost	
  –	
  Near	
  Term	
  
•  Increase	
  security	
  specifica.ons	
  on	
  all	
  acquisi=ons	
  
–  Low	
  Cost	
  –	
  Near	
  Term	
  
•  Reward	
  vendors	
  and	
  partners	
  who	
  exhibit	
  
excep.onal	
  security	
  performance	
  
–  Contractual	
  requirements,	
  measures,	
  and	
  
rewards	
  for	
  securely	
  maintaining	
  vendor	
  
supplied	
  technologies	
  
–  Create	
  vendor	
  guidelines	
  for	
  security	
  
standards	
  through	
  contracts	
  
–  Low	
  Cost	
  –	
  Near,	
  Mid,	
  and	
  Long	
  Term	
  
(contract	
  dependent)	
  
•  Use	
  pre-­‐ve_ed	
  Government	
  contract	
  vehicles	
  to	
  
acquire	
  security	
  services	
  when	
  possible	
  
–  Low	
  Cost	
  –	
  Near	
  Term	
  
Enterprise	
  Risk	
  Management	
  
•  Raise	
  cyber	
  risk	
  awareness	
  	
  
–  Understand	
  the	
  impact	
  of	
  cyber	
  threats	
  to	
  all	
  
current	
  TVA	
  Risks	
  
–  Low	
  Cost	
  –	
  Near	
  Term	
  
•  Adjust	
  Enterprise	
  Risk	
  Management	
  (ERM)	
  to	
  
more	
  fully	
  address	
  financial	
  implica=ons	
  of	
  the	
  
risks	
  and	
  impacts	
  of	
  cyber	
  afacks	
  
–  Low	
  Cost	
  –	
  Near	
  Term	
  
•  Expand	
  opera.onal	
  risk	
  view	
  to	
  “look	
  outside	
  
the	
  fence”	
  and	
  ensure	
  communica=ons	
  and	
  
collabora=on	
  are	
  occurring	
  with	
  en==es	
  
external	
  and	
  internal	
  to	
  TVA	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu.ons	
  
25	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
We	
  won’t	
  get	
  there	
  overnight	
  	
  
…	
  but	
  we	
  need	
  to	
  start	
  now	
  	
  
Acquisi=on	
  strategy	
  drawn	
  from	
  a	
  comprehensive	
  architecture	
  to	
  balance	
  capital	
  with	
  O&M	
  expenditures	
  
Consolidate	
  IT	
  Architecture	
  to	
  guide	
  IT	
  and	
  cyber	
  decisions	
  	
  
Vendor/Supplier	
  DMZ	
  established	
  elimina=ng	
  remotely	
  managed	
  systems	
  
Mission	
  Cri=cal	
  Environment	
  for	
  management	
  of	
  most	
  important	
  
data	
  and	
  systems	
  
“Smart	
  Grid”	
  deployment	
  
Unified	
  cyber	
  incidence	
  response	
  strategy	
  
Ideas	
  –	
  Op=ons	
  –	
  Plan	
  
Embed	
  IT/Cyber	
  situa=onal	
  
awareness	
  capabili=es	
  in	
  opera=ons	
  	
  
Create	
  so`ware,	
  hardware	
  tes=ng	
  capability	
  including	
  wireless	
  &	
  mobility	
  
Publish	
  Vendor	
  Security	
  requirements	
  
2013	
  -­‐	
  Compliant	
  
(meet	
  requirements)	
  
2016	
  -­‐	
  Agile	
  	
  
(have	
  op=ons)	
  
2020	
  –	
  Resilient	
  
(cybersecurity	
  built	
  in)	
  
The	
  Threat	
  
Build/Expand	
  cyber	
  intelligence	
  sources	
  
Perform	
  source	
  supply	
  analysis	
  of	
  cri=cal	
  cyber	
  components	
  
Afract/recruit	
  technology	
  companies	
  to	
  the	
  valley	
  
Our	
  goal	
  must	
  be	
  
to	
  close	
  this	
  gap	
  
The	
  CEO’s	
  Challenge	
  	
  	
  	
  	
  Cybersecurity	
  in	
  Context	
  	
  	
  	
  	
  The	
  Cyber	
  Risk	
  	
  	
  	
  	
  Possible	
  Solu.ons	
  
In the 20th Century TVA built an incredible economic engine
for the Nation and benefited immeasurably from advances in
technology; In the 21st Century we must now transform how
we employ that technology to protect our mission
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
So	
  here	
  is	
  the	
  bo_om	
  line	
  
•  We	
  face	
  serious	
  financial	
  challenges	
  	
  
•  Over	
  the	
  past	
  50	
  years,	
  advances	
  in	
  technology	
  
made	
  significant	
  contribu=ons	
  to	
  achieving	
  the	
  TVA	
  
mission	
  
–  Today,	
  virtually	
  everything	
  we	
  do,	
  depends	
  on	
  
the	
  network	
  
–  That	
  reliance	
  has	
  introduced	
  significant	
  
business	
  risk	
  …	
  and	
  the	
  cyber	
  threat	
  is	
  
growing	
  
•  Our	
  approach	
  to	
  cybersecurity	
  has	
  been	
  
par=ally	
  compliance	
  based…but	
  we	
  are	
  
making	
  cuZng	
  edge	
  investments	
  to	
  develop	
  
a	
  broader	
  capability	
  and	
  have	
  been	
  lauded	
  
by	
  mul=ple	
  agencies	
  for	
  our	
  dynamic	
  
approach	
  
•  We	
  s=ll	
  need	
  a	
  paradigm	
  shi`	
  across	
  the	
  
agency	
  
–  Con=nue	
  to	
  be	
  fully	
  compliant	
  
–  Increase	
  response	
  op=ons	
  to	
  become	
  
resilient;	
  focused	
  on	
  con=nuing	
  the	
  mission	
  	
  
–  Engineer	
  cybersecurity	
  standards	
  in	
  the	
  
system	
  design	
  process	
  and	
  a	
  suppor=ng	
  
cyber/IT	
  acquisi=on	
  strategy	
  	
  
•  We’ve	
  captured	
  ideas	
  from	
  across	
  the	
  TVA	
  
…	
  we	
  need	
  to	
  examine	
  them	
  and	
  iden=fy	
  
more	
  	
  
•  And	
  as	
  we	
  do	
  so…	
  fulfill	
  our	
  CEO’s	
  
challenge	
  
•  And	
  the	
  broader	
  set	
  of	
  benefits	
  we	
  may	
  
derive	
  are	
  compelling	
  
–  Serve	
  as	
  an	
  industry	
  leader	
  for	
  how	
  to	
  
integrate	
  cybersecurity	
  and	
  energy/power	
  
–  Leverage	
  the	
  collec=ve	
  efforts	
  to	
  evolve	
  
our	
  culture	
  	
  
–  Exercise	
  cross	
  func=onal	
  ini=a=ves	
  in	
  
developing	
  workable	
  op=ons	
  	
  
–  Enhance	
  both	
  trust	
  and	
  safety	
  through	
  the	
  
process	
  	
  
There	
  will	
  be	
  costs…but	
  the	
  cost	
  of	
  
doing	
  nothing	
  could	
  be	
  staggering	
  
TVA	
  Restricted	
  Informa=on	
  –	
  Delibera=ve	
  and	
  Pre-­‐Decisional	
  Privileged	
  
Tennessee	
  Valley	
  Authority	
  
Julie	
  Soutuyo	
  
Senior	
  Program	
  Manager	
  
Email:	
  	
  jsoutuyo@tva.gov	
  
Phone:	
  (703)	
  862-­‐0819	
  
Discussion,	
  Ques.ons,	
  and	
  Feedback	
  
Discussion,	
  Ques=ons	
  &	
  Feedback	
  

Contenu connexe

Tendances

New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 DaysResilient Systems
 
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityHackerOne
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatResilient Systems
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017Doug Copley
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsIgnyte Assurance Platform
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesAlex Rudie
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?centralohioissa
 

Tendances (20)

New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017What it Takes to be a CISO in 2017
What it Takes to be a CISO in 2017
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 

En vedette

Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementEnergySec
 
Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration EnergySec
 
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...energybiographies
 
Energy Biographies Final Research report
Energy Biographies Final Research reportEnergy Biographies Final Research report
Energy Biographies Final Research reportenergybiographies
 
Come See What’s Cooking in My Lab
Come See What’s Cooking in My LabCome See What’s Cooking in My Lab
Come See What’s Cooking in My LabEnergySec
 
6 Tools for Improving IT Operations in ICS Environments
6 Tools for Improving IT Operations in ICS Environments6 Tools for Improving IT Operations in ICS Environments
6 Tools for Improving IT Operations in ICS EnvironmentsEnergySec
 
How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterEnergySec
 
Building an Incident Response Team
Building an Incident Response TeamBuilding an Incident Response Team
Building an Incident Response TeamEnergySec
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayEnergySec
 
Security Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersSecurity Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersEnergySec
 
Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaEnergySec
 
Energy biographies: narrative genres, lifecourse transitions and practice change
Energy biographies: narrative genres, lifecourse transitions and practice changeEnergy biographies: narrative genres, lifecourse transitions and practice change
Energy biographies: narrative genres, lifecourse transitions and practice changeenergybiographies
 
Living the "Good Life"?: energy biographies, identities and competing normati...
Living the "Good Life"?: energy biographies, identities and competing normati...Living the "Good Life"?: energy biographies, identities and competing normati...
Living the "Good Life"?: energy biographies, identities and competing normati...energybiographies
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...Eneni Oduwole
 
Operation Risk Management in Banking Sector
Operation Risk Management in Banking SectorOperation Risk Management in Banking Sector
Operation Risk Management in Banking SectorSanjay Kumbhar
 
Risk management using FMEA in pharma
Risk management using FMEA in pharmaRisk management using FMEA in pharma
Risk management using FMEA in pharmaSandeep Naik
 
Operational risk management (orm)
Operational risk management (orm)Operational risk management (orm)
Operational risk management (orm)Bushra Angbeen
 

En vedette (19)

Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration Understanding Hacker Tools and Techniques: A live Demonstration
Understanding Hacker Tools and Techniques: A live Demonstration
 
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
Energy Challenges for Wales: The Flexible Integrated Energy Systems (FLEXIS) ...
 
Energy Biographies Final Research report
Energy Biographies Final Research reportEnergy Biographies Final Research report
Energy Biographies Final Research report
 
Come See What’s Cooking in My Lab
Come See What’s Cooking in My LabCome See What’s Cooking in My Lab
Come See What’s Cooking in My Lab
 
6 Tools for Improving IT Operations in ICS Environments
6 Tools for Improving IT Operations in ICS Environments6 Tools for Improving IT Operations in ICS Environments
6 Tools for Improving IT Operations in ICS Environments
 
How I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart MeterHow I learned to Stop Worrying and Start Loving the Smart Meter
How I learned to Stop Worrying and Start Loving the Smart Meter
 
Building an Incident Response Team
Building an Incident Response TeamBuilding an Incident Response Team
Building an Incident Response Team
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Security Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersSecurity Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for Beginners
 
Structured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six SigmaStructured NERC CIP Process Improvement Using Six Sigma
Structured NERC CIP Process Improvement Using Six Sigma
 
The grit in the oyster:
The grit in the oyster: The grit in the oyster:
The grit in the oyster:
 
Energy biographies: narrative genres, lifecourse transitions and practice change
Energy biographies: narrative genres, lifecourse transitions and practice changeEnergy biographies: narrative genres, lifecourse transitions and practice change
Energy biographies: narrative genres, lifecourse transitions and practice change
 
Living the "Good Life"?: energy biographies, identities and competing normati...
Living the "Good Life"?: energy biographies, identities and competing normati...Living the "Good Life"?: energy biographies, identities and competing normati...
Living the "Good Life"?: energy biographies, identities and competing normati...
 
Operational Risk Management - A Gateway to managing the risk profile of your...
Operational Risk Management -  A Gateway to managing the risk profile of your...Operational Risk Management -  A Gateway to managing the risk profile of your...
Operational Risk Management - A Gateway to managing the risk profile of your...
 
Operation Risk Management in Banking Sector
Operation Risk Management in Banking SectorOperation Risk Management in Banking Sector
Operation Risk Management in Banking Sector
 
Risk management using FMEA in pharma
Risk management using FMEA in pharmaRisk management using FMEA in pharma
Risk management using FMEA in pharma
 
Operational risk management (orm)
Operational risk management (orm)Operational risk management (orm)
Operational risk management (orm)
 
Quality Risk management Application of FMEA
Quality Risk management  Application of FMEAQuality Risk management  Application of FMEA
Quality Risk management Application of FMEA
 

Similaire à Energy Industry Organizational Strategies to Increase Cyber Resiliency

Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain SecurityICSA, LLC
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards ComplianceDr. Prashant Vats
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
Cybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, SecureCybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, SecureYokogawa1
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
The global fund: center of excellence. ISTARI.
The global fund: center of excellence. ISTARI.The global fund: center of excellence. ISTARI.
The global fund: center of excellence. ISTARI.Weloveppt
 
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Livingstone Advisory
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsAPNIC
 

Similaire à Energy Industry Organizational Strategies to Increase Cyber Resiliency (20)

Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain Security
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
Wax Switch
Wax SwitchWax Switch
Wax Switch
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, SecureCybersecurity - Simple, Sustainable, Secure
Cybersecurity - Simple, Sustainable, Secure
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
The global fund: center of excellence. ISTARI.
The global fund: center of excellence. ISTARI.The global fund: center of excellence. ISTARI.
The global fund: center of excellence. ISTARI.
 
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012Rob livingstone  CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
Rob livingstone CIO Strategy Summit - Park Hyatt Melbourne 17th feb 2012
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Strategic Cybersecurity
Strategic CybersecurityStrategic Cybersecurity
Strategic Cybersecurity
 
Philippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTsPhilippines Cybersecurity Conference 2021: The role of CERTs
Philippines Cybersecurity Conference 2021: The role of CERTs
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 

Plus de EnergySec

Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...EnergySec
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityEnergySec
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementEnergySec
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachEnergySec
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsEnergySec
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueEnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherEnergySec
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherEnergySec
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramEnergySec
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...EnergySec
 

Plus de EnergySec (20)

Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 
Third Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
 
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
Beyond Public Private Partnerships: Collaboration, Coordination and Commitmen...
 

Dernier

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Dernier (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Energy Industry Organizational Strategies to Increase Cyber Resiliency

  • 1. Julie  Soutuyo   Senior  Program  Manager   Tennessee  Valley  Authority   Improving  Organiza.onal   Resilience  to  an  Increasing  and   Evolving  Threat     EnergySec  9th  Annual  Security  Summit   September  18,  2013   Denver,  CO   Organiza.onal  Cyber  Resilience  
  • 2. 2   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   Table  of  Contents   •  The  CEO’s  Challenge   •  Cybersecurity  in  Context   •  The  Cyber  Risk   •  Possible  Solu=ons   The  CEO’s  Challenge          Cybersecurity  in  Context            The  Cyber  Risk          Possible  Solu=ons    
  • 3. 3   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   On  July  25th,  our  CEO  challenged  the  TVA  staff   to  improve  our  future  economic  posture   •  Doing  so  while  effec=vely  opera=ng  across  four  impera=ves:     –  Debt,   –  Rates,     –  Stewardship,  and     –  Asset  PorNolio     •  In  an  opera=ng  environment  focused  on     –  Trust,     –  Safety,  and     –  Change   •  And  a  significant  evolu=on  of  our  culture   •  His  message  was  clear…the  TVA  must  undertake  major   transforma=on     The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons  
  • 4. TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   The  company  is  undergoing  a   transforma.on  of  business  and  culture…   •  This  is  an  op=mal  =me  to  make  progress  on   communica=ng  the  benefits  of  becoming  more  cyber   resilient;   –  New  CEO   –  Economic  challenges   –  Changes  in  organiza=onal     structure  and  strategic     direc=on   –  Increased  focus  on     reducing  risk   –  An  appeal  to  all  employees  to  be  innova=ve  in  finding  solu=ons   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons  
  • 5. TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   The  challenge  is  that  “Cyber”  is  not  always   well  understood  by  u.li.es…   •  Cyber  security  is  seen  as   important  but  many   employees    don’t   understand  the  threat:   –  Cyber  terminology  is   confusing   –  Some  don’t  believe  the  threat   is  “real”       –  Many  feel  that  sensi=ve   networks  and  assets  are   sufficiently  isolated   –  “No  way!  I’m  not  shuZng   down  to  patch  anything!  My   1995  ICS  technology  (with  no   maintenance  agreement  in   place)  is  safe!!”         The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons   •  Execu=ves  are  o`en  in  the   same  “boat”:   –  Didn’t  we  fix  that  already?   –  NERC  CIP  must  be  addressing   my  requirements   –  Not  cri=cal  to  making   electricity   –  What  am  I  geZng  in  return   for  this  investment?   –  Who  else  is  experiencing  this?   Nobody  in  the  industry?  Why   am  I  spending  so  much????   “Uh, I think your Stuxnet ate my Poison Ivy and caused my Duqu to explode after a denial of service…..then the Aurora came after the Shamoon and finally, I just decided to go phishing with my kill chain…” Note:  Cyber  Terms  are  not  “common”  u.lity  jargon!  
  • 6. 6   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   A  key  component  of  influencing  change  within   an  organiza.on’s  culture  is  to  tell  a  story….   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons   My story about how to become more cyber resilient starts with the network.... ...and ends with TVA in a much better cybersecurity posture by 2020; ready to face next generation cyber threats.
  • 7. TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   Like  other  U.li.es,  TVA  has  many  different   networks  used  to  operate  the  company   •  Different  types  of  networks    across  the   corporate  and  power  environments  are  the   means  for  execu=ng  the  TVA  mission   –  Opera=ons  managed;  sensor  data  and     decisions  from  ICS   –  Safely  operate  and  maintain  power  plants  and   transmissions  systems   –  Buy  and  sell  power;  bill  customers;  receive   revenues   –  Communicate  internally  and  externally   –  Manage  environmental  requirements   •  These  same  networks  are    the  target  of  cyber   afacks  and  the  poten=al  means  for  afacking   TVA  Cri=cal  Assets  or  Business  Processes   •  The  afackers  are…   –  More  sophis=cated  and  effec=ve     –  With  the  poten=al  for  causing  serious   disrup=on  and  even  destruc=on  of  our   resources   –  Interested  in  achieving  various  objec=ves   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons  
  • 8. 8   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   Even  as  we  resolve  our  financial  challenges,   we  have  an  opportunity  to  drive  change…   •  Working  collec=vely  on  solu=ons  to  our  networked  security…     –  Across  func=onal  lines  that  have  common  ground   –  To  iden=fy  mutually  suppor=ve  solu=ons     –  Towards  becoming  opera=onally  resilient  to  cyber  afacks   –  And,  the  means  to  tackle  the  broader  financial  challenges   •  NOW  is  the  =me  for  developing  our  cybersecurity  resilience  to  protect  our   networked  resources  and  con=nue  to  fulfill  our  mission  requirements   –  Make  recommenda=ons  to  evolve  our  cyber  opera=ons  posture  from…   •  Compliance   •  To  becoming  agile   •  And  ul=mately  resilient   –  Which  will  allow  TVA  to  recognize     •  Enhanced  cybersecurity  safety   •  Building  trust  and  confidence  across  our  enterprise  and  with  our  customers   •  Avoid  catastrophic  costs  resul=ng  from  an  increasingly  likely  cyber  afack   •  While  embracing  change   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons  
  • 9. 9   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   1970s.    Introduc=on  of  1st   genera=on  “monolithic”   SCADA  systems   The  TVA  has  been  a  technology  leader   through  the  20th  Century   40s  –  expanded   hydropower   construc=on   60s  –  Introduc=on  of   nuclear  power  plants   50s  –  Largest  electricity   supplier   70s  –  80s  –  Focus  on   energy  conserva=on     90s  –  Increased   compe==on;  clean   air  focus   2000s  –  focus  on  energy,   environment,  and  economic   development   1933.  TVA  established  by  Congress   to  address  environmental,   economic,  and  technological   challenges  including  delivery  of   low-­‐cost  electricity   1969.  The  Internet   (ARPANET)  brought  on  line   1959.  Federal   appropria=ons  ended;   TVA  becomes  self-­‐ financing   Major  TVA  events   Major  Internet  events   1991.    World  Wide  Web  evolves   through  new  protocol,  hypertext   • Explosive  growth  of  the  internet   • Rise  of  social  networking  (e.g.,   Facebook,  Twifer)   • Exponen=al  growth  of  mobility   planorms     1982:  Internet  protocol   TCP/IP  standardized   1980s.  Growth  of  2nd  genera=on   “distributed”  SCADA  systems   1990s.    3rd  genera=on   “Networked”  SCADA  systems     Major  cyber  a_acks     2000.  DDOS  afack  across  commercial   web  sites  ($1.7B  in  damages)   2010.  Stuxnet  infected   Iranian  nuclear  facili=es   2009.  Merrick  Bank  lost  $16M  a`er  hackers   compromised  40M  credit  card  accounts   2003.  Slammer  worm  infected  90%  of  vulnerable   computers  within  10  min  ($1B  in  damage)   1999.  Federal  appropria=ons  for   environmental  stewardship  and   economic  development  ac=vi=es   ended   2012.  More  than  30,000  computers  at  Saudi   Aramco  (oil  company)  destroyed  by  virus   •  IT  revolu=onized  our  industry   –  Affected  every  element  of  power  genera=on  and  delivery   –  Almost  always  “bolted  on”  and  not  “built  in”   •  AND…introduced  significant  risk  from  cyber  afacks   –  With  Increased  frequency,  from  more     adversaries,  with  greater     sophis=ca=on,  against  more     targets,  with  increased     success,  …and  greater  impact   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons  
  • 10. 10   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   …and  technology  with  the  cyber  threat   has  introduced  risk  to  our  impera.ves     Change   Trust  Safety   Rates   •  Increases  costs  from:     o  Disrup=on  of  service  and  restora=on  requirements   o  Legal  fees  resul=ng  from  the`  or  destruc=on  of  data   •  Poten=al  loss  of  customers  (par=cularly  industrial   customers)   Debt   •  Immediate  impact  to  O&M  costs  to  restore  systems   damaged  or  destroyed  by  a  cyber  afack   o  Could  cause  TVA  to  exceed  its  debt  threshold     Stewardship   •  Loss  of  trust  and  credibility…   o  Customers  due  to  loss  of   privacy  data  or  service  outage   o  Government  due  to  na=onal   power  grid  impacts   •  Safety  …  placing  staff  in  harms   way  working  to  resolve  outages     •  Economic  and  environmental     impacts  resul=ng  from   destruc=on  of  major   environmentally  sensi=ve  TVA   components   Asset  PorNolio   •  Unstable  and/or  unreliable   cri=cal  asset  performance   •  Poten=al  damage,  destruc=on,   and  loss  of  assets     o  Both  short  and  long  term   The  Cyber  Threat  is     driving  unwanted     change  into  TVA     and  in  turn  is    eroding  our     trust  and     safety   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons  
  • 11. We  can  control  some  of  the  drivers  of  risk   and  some  we  can’t     External  Drivers     Those  we  can’t  control   •  Customers…those  whom  we  serve,  with  expecta=ons  for   –  Uninterrupted  service     –  Reasonably  priced  electricity     –  Protec=on  of  Personal  Iden=fica=on  Informa=on  and   privacy  expecta=ons   –  Environmental  stewardship   •  Government  (e.g.,  NERC)…Drive  oversight  &  regula=ons   –  Drives  cost  (e.g.,  changes  in  “bright  line,”  EPA  requirements)   –  Expects  industry  to  operate  systems  securely  and  safely   (e.g.,  nuclear  facili=es  operate  in  a  virtually  ‘zero  defect   environment”)   •  Industry…Both  Partners/Compe=tors   –  Jointly  managing  the  Na=on’s  power  grid   •  Vendors…suppor=ng  TVA     –  Drive  change  with  updates  and  new  capabili=es     •  Threat  Actors  (e.g.,  hac.vists,  criminals,  Na.on  States)   –  Focused  on  embarrassment,  exploita=on,  the`,  disrup=on,   and  destruc=on   –  Capable  of  taking  over  Industrial  Control  Systems  (ICS)  and   corporate  networks;  shuZng  them  down;  crea=ng   significant  risk  to  TVA  staff  and  customers  (loss  of  service;   restora=on  risks,  etc.)   Internal  Drivers     Those  we  can  control     •  TVA  Organiza=on     –  Decentralized,  =ered,  &  distributed   •  Staff   –  The  guardians  of  TVA  culture   –  Both  driving  and  resis=ng  change   •  Culture   –  Accountability   •  Technology   –  Constantly  increasing  the  pace  of  change  with   technology  refresh,  updates,  patches,  etc.     •  Aged  Infrastructure   –  Some  is  80  years  old…does  not  always  adapt   easily   –  Cybersecurity  technology  solu=ons  generally   bolted  on  vice  built  in   •  Funding  and  Budgets   –  Bounded  (as  our  CEO  reminded  us)   –  Debt  ceiling  is  almost  gone     Can  Impact  our  Costs   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons  
  • 12. 12   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   This  isn’t  to  suggest  that  only  bad  things   evolve  from  this  challenging  period  of  change   •  Large  scale  change  presents  an  opportunity  to  examine  our  approach  to  cybersecurity     •  Increase  trust  in  our  systems   –  Enhance  our  cybersecurity  posture   –  Revisit  how  we  fund     •  How  much  are  we  inves=ng  now   •  Percentage  of  our  network  coverage   •  Known  risks  in  different  opera=ng  environments  that  have  not  been  addressed  (e.g.,  corporate,  nuclear,  fossil,  etc.)   •  Which  investments  would  create  the  maximum  value  (near,  mid,  and  long  term)  impact   –  Examine  cybersecurity  across  func=onal  elements  (e.g.,  IT,  Opera=ons,  and  Supply/Logis=cs)  to   collec=vely  develop  ideas  and  op=ons  to  befer  secure  our  networks   •  Ul=mately,  cybersecurity  is  about  risk…and  money   –  How  much  cybersecurity  risk  are  we  willing  to  accept   –  At  what  cost     •  To  make  changes   •  To  avoid  poten=al  catastrophic  costs   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons   We  are  not  alone  in  this  struggle…the  en6re  industry  is  challenged  
  • 13. 13   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   The  CEO’s  challenge  is  an  opportunity  to…   Define  the  cybersecurity  risks  we  face…     …and  the  implica6ons  for  how  we  secure   our  networks   Consider  the  evolving  cyber  environment…   …and  the  poten6al  implica6ons  for  our   future  opera6ons   Jointly  iden.fy  some  possible  solu.ons…     …and  what  other  op6ons  we  might   consider   Expand  our  approach  to  cybersecurity…       …and  consider  cross  organiza6onal,   mul6-­‐func6onal  solu6ons   Redefine  our  understanding  of  networks…     …and  protect  them  as  vital  to  execu6ng   our  mission   Examine  the  costs  of  doing  so…     …and  the  poten6al  costs  of  not   Assess  the  .ming  of  making  changes…     …in  the  near,  mid,  or  long  term   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons  
  • 14. Today,  the  government’s  cybersecurity  response   focuses  on  regula.ons  &  standards   The  Government  Response   •  NERC  CIP  has  issued  28  documents   detailing  Reliability  Standards   –  Set  standards  for  repor=ng,  cyber  asset   iden=fica=on,  system  categoriza=on,   security  management  controls,  personnel   and  training  standards,  management   (electronic,  physical,  and  systems  security   management),  configura=on  management,   informa=on  protec=on   –  Each  includes  requirements  and  measures;   for  example…   •  CIP-­‐001-­‐2a  has  4  requirements  and  4   measures   •  CIP-­‐002-­‐3  has  4  requirements  with  5  sub-­‐ requirements  and  7  sub-­‐sub  requirements,   and  4  measures   …  And  Industry  Complies   •  Developed  large  IT  organiza=onal   structures  to  meet  requirements   •  Expended  significant  resources  to  protect   systems  and  networks   •  Has  not  been  as  likely  to  adopt   recommenda=ons  (vice  requirements)       •  In  fact…compliance,  all  too  oAen  is  the   founda6on  and  primary  means  for   mi6ga6ng  risk  …              “If  I  comply,  I’m  protected”   Standards,  requirements,  alerts,  repor6ng  and  compliance  serve  an  important   func6on  for  fulfilling  organiza6onal  objec6ves  opera6ng  in  cyberspace   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons  
  • 15. 15   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   But,  compliance  alone  is  risky  and  the  nature  of   the  energy  industry  poses  addi.onal  challenges   Opera.onal   Organiza.onal   Resourcing   Focus   Compliance-based defense (e.g., NERC CIP and NIST guidelines) Leadership and technical staff from corporate headquarters to distributors are independent Primarily on O&M (vice capital expenditures) to meet regulatory requirements   Challenges   Complex situational awareness; discerning source of disruption or destruction between routine failures vice cyber attacks Need to integrate across diverse operational platforms to establish an operational framework and increase employee awareness Increased costs •  Operating and maintaining multiple IT solutions and architectures •  Executing compliance requirements across multiple organizational elements •  Capital IT expenditures are accomplished independently; plants, vendors, distributors adopt different solutions that frequently aren’t interoperable or require expensive interfaces •  Missed opportunities to gain efficiencies and savings through consolidated, organization-wide negotiations with vendors (vendors often drive solutions) Limited response actions: •  Frequently “after the event” •  Reluctance to shut systems down Organiza=on-­‐wide  solu=ons  to   cyber  afacks  difficult  and  costly   due  to  loose  federa=on  of  IT   infrastructures,  complex  and   different  network  environments,   requiring  specialized  solu=ons   Slowed response waiting for developed, tested, deployed, and approved solutions Result   Increased potential for success of cyber attacks with resulting energy disruption, loss of data and corresponding legal and financial impacts The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons  
  • 16. 16   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   Those  challenges  affect  our  ability  to  respond   quickly…and  in  cyberspace  it’s  all  about  speed   “Time  is  Money”  was  never  more  true…and  it’s  not  just  one  cyber  aKack…it’s   hundreds…thousands  and  they  aren’t  going  to  stop…  because  it  works   Discovery   Detec=on   Response   Recovery   • Time  between   discovery  of  a  zero   day  vulnerability  and   the  development,   tes=ng,  deployment,   and  implementa=on   of  a  solu=on   • Time  between  a   successful  breach  of   a  network/system   and  discovery  by   the  organiza=on   • Time  to  develop,   test,  deploy,  and   implement  solu=ons   • Time  to  restore   network/systems  to   full  opera=onal   capabili=es   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons  
  • 17. 17   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   …and  cyberspace  is  not  gehng  any     slower  or  safer   •  Cyber  afacks  are  increasing  every  day   –  Across  the  Na=on   –  Our  industry   –  …and  against  TVA   •  Using  a  wide  variety  of  methodologies   –  “Phishing”  …  social  engineering  of  email   –  Malware  …  plan=ng  tools  and  so`ware   in  our  networks   –  Denial  of  Service  …  denying  us  and  our   customers  access  to  our  networks     –  Ransomware  …  hijacking  computers   forcing  payment  for  release   •  And  it’s  not  going  to  get  any  befer  for   the  foreseeable  future   –  …because  it  works   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons   •  DHS  reported  198  afacks  on  cri=cal  U.S.   infrastructure  in  2012…up  from  9  in  2009   •  In  2012  ,  ICS-­‐CERT  tracked  171  unique   vulnerabili=es  affec=ng  ICS  products  across   55  vendors   •  The  TVA  experienced  an  almost  30%   increase  in  afacks  year  over  year   •  Over  the  last  quarter,  DELL  SecureWorks  has   escalated  269  incidents  beyond  the  SOC  
  • 18. 18   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   Given  “Time  is  Money”…we  must…   •  Be  more  than  compliant…compliance  ac6vi6es  are  “table  stakes”   •  Be  faster…   –  Iden=fy  vulnerabili=es  faster  across  the  enterprise   –  Iden=fy  afacks  faster   –  Work  the  development,  tes=ng,  and  deployment  of     solu=ons  faster   –  Make  decisions  faster   –  Restore  networks  and  systems  faster   •  Be  more  agile  by  crea=ng  response  op:ons  vice  just  “stopping  the  pain”   •  Systema=cally  build  a  plan  towards  becoming  resilient,  able  to  meet  mission   requirements  by  “figh=ng  through”  cyber  afacks   •  We  need  a  paradigm  shi`  in  our  approach  beyond  compliance  to  become  agile   and  ul=mately  resilient     Time/Speed   Money   Cost  of  a  Cyber  Afack   $$$   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu=ons   The  average  cost  of  a  breach  is  about  $188  per  stolen   record,  and  the  average  loss  per  incident  is  $9.4  million   Ponemon  Ins=tute  
  • 19. 19   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   A  journey  towards  resilience  can  be  itera.ve   Compliant     •  Con=nue  to  meet   requirements   •  Expand  to  execu=ng   NERC/NIST   recommenda=ons   •  Develop  op=ons  for   becoming  more  agile   and  make  plans  to   become  resilient   •  Evolve  the  TVA   culture  to  embrace   cybersecurity  safety   Agile       •  Harden  network  infrastructure   and  develop  op=ons  and   alterna=ves  to  become  more   robust  to  withstanding  cyber   afacks   •  Develop  architectures  and   acquisi=on  strategies  that  will   serve  as  the  founda=on  for   becoming  resilient   •  1-­‐3  year  =me  frame  to  develop   and  deploy  in  stages       Resilient     •  Build  security  in  to  our   infrastructure   •  Execute  a  plan  and   suppor=ng  architectures  and   acquisi=on  strategy   •  Withstand,  mi=gate,  and   defeat  cyber  afacks  with   planned,  rehearsed,   responses  that  ensure   mission  execu=on   •  3-­‐7  years  synchronized  with   other  programs  and   opera=ons  across  TVA   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu.ons   3-­‐7  Years  1-­‐3  Years  Today  
  • 20. 20   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   Resiliency  is  a  complex  set  of  ac.vi.es  that  must  be   programmed  into  our  “opera.onal  DNA”  and  be…   …Planned   …Prac.ced   …Unified   …  and  Resourced   •  Execute  compliance  based   requirements…as  well  as   recommenda=ons   •  Develop  IT/Cyber  architecture   integrated  with  other  u=lity   disciplines  for  next  genera=on   systems   •  With  corresponding  and   suppor=ng  policy  implementa=ons   •  And  suppor=ng  acquisi.on   strategies  for  the  “long  haul”   •  Interdependencies  must  be   understood  and  documented     •  Services,  data  storage,  system   cri=cality  must  be  documented  in   advance  to  program  response   ac=ons  in  a  =mely  manner     •  Cyber  resiliency  must  be   prac=ced   •  Leaders  and  technical  staff   trained  and  exercised  in   roles  and  responsibili=es   •  Immediate  ac=on  drills   must  be  documented  and   rehearsed     Across  large,  diverse,   decentralized   organiza=ons  (e.g.,  TVA)   requires:   •  Coordinated  and   integrated  architectures   •  Standardize  with   “controlled  diversity”  of   approved  tools,   equipment  and  vendors   •  Comprehensive   situa=onal  awareness   across  all  components   •  Consolidated  and   centralized  decision  –   making…there’s  no  =me   for  debate   •  Acquisi.on  strategy  that   addresses  resiliency   requirements   •  Supports  security   architectures   •  Maximize  IT/cyber  resources   and  interoperability  through   vendor  strategies   •  Redundant  (backup)   resources  must  be  iden=fied   and  if  necessary  resourced     We  may  not  simply  declare  we  are  resilient;     rather  it  requires  a  set  of  comprehensive  reforms  organiza:onally  to  evolve  itself.   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu.ons  
  • 21. 21   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   We’ve  proposed  some  “ideas”  as  a  start  point   for  op.ons  leading  to  resilience  that  are…   •  By  no  means  comprehensive     –  But  intended  to  get  the  discussion  started     •  Grouped  by   –  Network  and  Security  Capabili=es   –  Engineering   –  Organiza=onal   –  Supply  Chain   –  Enterprise  Risk  Management   •  Characterized  along  spectrums  of…   –  Costs  (low,  moderate,  and  high)   –  Time  (near,  mid,  and  long)   •  Opportuni=es  for  the  TVA  staff   –  To  embrace  and  drive  essen=al  change  across  our  organiza=on   –  Build  trust  in  an  environment  of  shared  cybersecurity  safety   –  To  leverage  the  unique  cross  func=onal  quali=es  of  IT/Cyber       The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu.ons  
  • 22. TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged    Network  and  Security  Capabili.es   •  Embed  TVA-­‐wide  IT/Cyber  situa.onal   awareness  within  exis=ng  TVA  opera=ons   center(s)  with  complete  performance   view  of  corporate  and  power  WAN  and   LAN  networks   –  Provide  100%  situa=onal  awareness  of  ALL  TVA   (transmission,  IT,  nuclear,  etc.)   –  Efficiencies  and  cost  savings   –  High  Cost  –  Long  Term     •  Enhanced  Incident  Response  capabili.es   across  the  en=re  enterprise   –  Enhance  Unity  of  Effort  and  decrease  response   =mes   –  Low  Cost  –  Near  Term   •  Evaluate  cybersecurity  effec.veness  of   network  carriers  and  embed   corresponding  requirements  in  contracts   –  Create  op=ons  to  increase  robust  network   capabili=es  and  capacity   –  Low  Cost  –  Mid  Term   •  Work  with  vendors  to  ensure   cybersecurity  is  built  in  to  their  products   including  situa.onal  awareness   –  Moderate  Cost  –  Long  Term   •  Examine  op.ons  for  establishing  the   means  for  tes.ng  Vendor  products  and   our  own  (e.g.,  incorporated  network   firewalls,  wireless  encryp=on  and  DMZ’s   as  the  primary  maintenance  and   diagnos=c  hub  for  plant  )   –  Require  Vendor  cer=fica=on  through  the  facility     –  Moderate  cost  –  Mid  Term   •  Con.nue  to  expand  and  build  on  current   government  rela.onships  at  the  network   level  and  through  policies  and  procedures   –  Low  Cost  –  Near  Term     The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu.ons  
  • 23. …and…   Engineering   •  Embed  cybersecurity  technology  in  all   Engineering  ini.a.ves  and  architectures  (all   forms,  civil,  mechanical,  power,  IT)    as  a   requirement  for  program  approval   –  Require  resiliency  strategies  in  opera=onal  and   acquisi=on  reviews  and  escalate  the  concept  into   the  strategic  plan   –  Cultural  shi`   –  Low  cost  –  Near  Term   •  Build  an  IT/cyber  architecture  that  captures  the   ideas,  op=ons,  and  plans  for  securing  the   network  to  serve  as  the  founda=on  of  our  cyber   resiliency   –  Low  Cost  –  Mid  Term   •  Improve  and  invest  in  data  reten.on  and  back-­‐ up  strategies  across  TVA  (corporate  IT  and   plant)  to  enable  recovery  when  needed   –  Moderate  Costs  –  Mid  Term   Organiza.onal   •  Inextricably  bind  security  and  safety  e.g.  “If  it’s   not  secure,  it’s  not  safe”   –  Culture  shi`…safely  opera=ng  network,  individual   computers,  etc.   –  Low  Cost  –  Near  Term   •  Promote  cybersecurity  safety  across  the  TVA   (e.g.,  staff,  customers,  vendors,  etc.)   –  For  smart  grid,  demand  response,  financial,  and   other  inter-­‐connec=ons   –  Low  Cost  –  Near  Term   •  A_ract  and  recruit  technology  companies  into   Tennessee  Valley  who  build  programmable   components  and  thereby  enhance  the  defense   industrial  base  security  and  that  of  u=li=es/ cri=cal  infrastructure   –  Manufacturers  become  customers   –  Low  Cost  –  Long  Term   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu.ons  
  • 24. …and…   Supply  Chain   •  Perform  a  source  of  supply  analysis  on   programmable  logic  components  (relays,  switches,   routers,  etc.)  to  determine  country  of  origin;   conduct  cost-­‐benefit  analysis  for  replacing  PLCs   per  risk  analysis   –  Low  Cost  –  Near  Term   •  Increase  security  specifica.ons  on  all  acquisi=ons   –  Low  Cost  –  Near  Term   •  Reward  vendors  and  partners  who  exhibit   excep.onal  security  performance   –  Contractual  requirements,  measures,  and   rewards  for  securely  maintaining  vendor   supplied  technologies   –  Create  vendor  guidelines  for  security   standards  through  contracts   –  Low  Cost  –  Near,  Mid,  and  Long  Term   (contract  dependent)   •  Use  pre-­‐ve_ed  Government  contract  vehicles  to   acquire  security  services  when  possible   –  Low  Cost  –  Near  Term   Enterprise  Risk  Management   •  Raise  cyber  risk  awareness     –  Understand  the  impact  of  cyber  threats  to  all   current  TVA  Risks   –  Low  Cost  –  Near  Term   •  Adjust  Enterprise  Risk  Management  (ERM)  to   more  fully  address  financial  implica=ons  of  the   risks  and  impacts  of  cyber  afacks   –  Low  Cost  –  Near  Term   •  Expand  opera.onal  risk  view  to  “look  outside   the  fence”  and  ensure  communica=ons  and   collabora=on  are  occurring  with  en==es   external  and  internal  to  TVA   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu.ons  
  • 25. 25   TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   We  won’t  get  there  overnight     …  but  we  need  to  start  now     Acquisi=on  strategy  drawn  from  a  comprehensive  architecture  to  balance  capital  with  O&M  expenditures   Consolidate  IT  Architecture  to  guide  IT  and  cyber  decisions     Vendor/Supplier  DMZ  established  elimina=ng  remotely  managed  systems   Mission  Cri=cal  Environment  for  management  of  most  important   data  and  systems   “Smart  Grid”  deployment   Unified  cyber  incidence  response  strategy   Ideas  –  Op=ons  –  Plan   Embed  IT/Cyber  situa=onal   awareness  capabili=es  in  opera=ons     Create  so`ware,  hardware  tes=ng  capability  including  wireless  &  mobility   Publish  Vendor  Security  requirements   2013  -­‐  Compliant   (meet  requirements)   2016  -­‐  Agile     (have  op=ons)   2020  –  Resilient   (cybersecurity  built  in)   The  Threat   Build/Expand  cyber  intelligence  sources   Perform  source  supply  analysis  of  cri=cal  cyber  components   Afract/recruit  technology  companies  to  the  valley   Our  goal  must  be   to  close  this  gap   The  CEO’s  Challenge          Cybersecurity  in  Context          The  Cyber  Risk          Possible  Solu.ons   In the 20th Century TVA built an incredible economic engine for the Nation and benefited immeasurably from advances in technology; In the 21st Century we must now transform how we employ that technology to protect our mission
  • 26. TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   So  here  is  the  bo_om  line   •  We  face  serious  financial  challenges     •  Over  the  past  50  years,  advances  in  technology   made  significant  contribu=ons  to  achieving  the  TVA   mission   –  Today,  virtually  everything  we  do,  depends  on   the  network   –  That  reliance  has  introduced  significant   business  risk  …  and  the  cyber  threat  is   growing   •  Our  approach  to  cybersecurity  has  been   par=ally  compliance  based…but  we  are   making  cuZng  edge  investments  to  develop   a  broader  capability  and  have  been  lauded   by  mul=ple  agencies  for  our  dynamic   approach   •  We  s=ll  need  a  paradigm  shi`  across  the   agency   –  Con=nue  to  be  fully  compliant   –  Increase  response  op=ons  to  become   resilient;  focused  on  con=nuing  the  mission     –  Engineer  cybersecurity  standards  in  the   system  design  process  and  a  suppor=ng   cyber/IT  acquisi=on  strategy     •  We’ve  captured  ideas  from  across  the  TVA   …  we  need  to  examine  them  and  iden=fy   more     •  And  as  we  do  so…  fulfill  our  CEO’s   challenge   •  And  the  broader  set  of  benefits  we  may   derive  are  compelling   –  Serve  as  an  industry  leader  for  how  to   integrate  cybersecurity  and  energy/power   –  Leverage  the  collec=ve  efforts  to  evolve   our  culture     –  Exercise  cross  func=onal  ini=a=ves  in   developing  workable  op=ons     –  Enhance  both  trust  and  safety  through  the   process     There  will  be  costs…but  the  cost  of   doing  nothing  could  be  staggering  
  • 27. TVA  Restricted  Informa=on  –  Delibera=ve  and  Pre-­‐Decisional  Privileged   Tennessee  Valley  Authority   Julie  Soutuyo   Senior  Program  Manager   Email:    jsoutuyo@tva.gov   Phone:  (703)  862-­‐0819   Discussion,  Ques.ons,  and  Feedback   Discussion,  Ques=ons  &  Feedback