SlideShare une entreprise Scribd logo
1  sur  20
EnergySec 2014 Summit
Brandon Dunlap
2
United States Smart Meter Deployments
History
Source: Utility-Scale Smart Meter Deployments - Innovation
Electricity Efficiency Institute of the Edison Foundation - 2013
3
Of the 46M Smart Meters currently deployed in
the US...
...three utilities are responsible for nearly a
third of installed meters.
HP Enterprise Security is a key partner to
2 of these top 3 utilities.
4
Planned Projects Through 2015
US Smart Meter Implementation Map
Source: Utility-Scale Smart Meter Deployments - Innovation Electricity
Efficiency Institute of the Edison Foundation - 2013
5
...the beginning of the Internet of Things
The Electric Grid is...
6
The Data Deluge
A small municipal electric utility in Lakeland,
Florida went from collecting 122,000 data
points per month prior to their Smart Meter
implementation to 90 Million data points per
month following implementation…
...a 73,000% increase!
7
“We're entering a new world
in which data may be more
important than software.”
Tim O’Reilly
8
But we are constrained.
9
Do More...With Less
10
“I think frugality drives
innovation, just like other
constraints do. One of the
only ways to get out of a tight
box is to invent your way
out.”
Jeff Bezos
11
What is INNOVATION?
12
December 17, 1903
13
Embrace the constraints
Many tools have multiple purposes
14
“Data is not information,
information is not knowledge,
knowledge is not
understanding, understanding
is not wisdom.”
Clifford Stoll
15
Turn Data Into Information
16
Case Study
HP technology is currently used to run a Security
Operations Center (SOC) for a very large smart meter
implementation.
Correlating and tracking events around:
• Power outage event correlation
• Meter failures and tampering
Allowing event-driven integration with internal systems
to reduce technician dispatch
17
Using the tools effectively
All of this is accomplished with ArcSight:
• HP ArcSight Connector Appliance
• HP ArcSight Logger
• HP ArcSight Enterprise Security
Management (ESM)
18
Summary
HP’s event correlation
capabilities enable utilities to
create customized Smart
Meter event responses,
increasing network visibility
and reducing cost.
19
20
Questions?

Contenu connexe

Tendances

Express yourself juan c. gonzalez
Express yourself   juan c. gonzalezExpress yourself   juan c. gonzalez
Express yourself juan c. gonzalezJuan Gonzalez
 
Employing Virtual Power Analytics and Linked Data for Enterprise IT Energy In...
Employing Virtual Power Analytics and Linked Data for Enterprise IT Energy In...Employing Virtual Power Analytics and Linked Data for Enterprise IT Energy In...
Employing Virtual Power Analytics and Linked Data for Enterprise IT Energy In...Dippy Aggarwal
 
IBM Big Data for Social Good Challenge - Submission Showcase
IBM Big Data for Social Good Challenge - Submission ShowcaseIBM Big Data for Social Good Challenge - Submission Showcase
IBM Big Data for Social Good Challenge - Submission ShowcaseIBM Analytics
 
10/28 Top 5 Deep Learning Stories
10/28 Top 5 Deep Learning Stories10/28 Top 5 Deep Learning Stories
10/28 Top 5 Deep Learning StoriesNVIDIA
 
Analytics revolution and democratization of data
Analytics revolution and democratization of dataAnalytics revolution and democratization of data
Analytics revolution and democratization of dataDerek Gibson
 
Artificial Intelligence (AI) and Climate Change
Artificial Intelligence (AI) and Climate ChangeArtificial Intelligence (AI) and Climate Change
Artificial Intelligence (AI) and Climate ChangeMilad Jahandideh
 
Big Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictionsBig Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictionsBigDataExpo
 
Top 5 Deep Learning and AI Stories - August 31, 2018
Top 5 Deep Learning and AI Stories - August 31, 2018Top 5 Deep Learning and AI Stories - August 31, 2018
Top 5 Deep Learning and AI Stories - August 31, 2018NVIDIA
 
ePlus Presents Big Data 101
ePlus Presents Big Data 101ePlus Presents Big Data 101
ePlus Presents Big Data 101ePlus
 
Big Data Expo 2015 - IBM Outside the comfort zone
Big Data Expo 2015 - IBM Outside the comfort zoneBig Data Expo 2015 - IBM Outside the comfort zone
Big Data Expo 2015 - IBM Outside the comfort zoneBigDataExpo
 
Data Intensive Computing
Data Intensive ComputingData Intensive Computing
Data Intensive ComputingBrent Sonin
 
AllSeen Summit Keynote by Tellient's Shawn Conhahan
AllSeen Summit Keynote by Tellient's Shawn ConhahanAllSeen Summit Keynote by Tellient's Shawn Conhahan
AllSeen Summit Keynote by Tellient's Shawn ConhahanTristan Barnum
 
AI for tackling climate change
AI for tackling climate changeAI for tackling climate change
AI for tackling climate changeDeakin University
 
4 Ways Artificial Intelligence Can Help Save the Planet
4 Ways Artificial Intelligence Can Help Save the Planet4 Ways Artificial Intelligence Can Help Save the Planet
4 Ways Artificial Intelligence Can Help Save the PlanetTyrone Systems
 
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate Oomph! Recruitment
 

Tendances (20)

Express yourself juan c. gonzalez
Express yourself   juan c. gonzalezExpress yourself   juan c. gonzalez
Express yourself juan c. gonzalez
 
Employing Virtual Power Analytics and Linked Data for Enterprise IT Energy In...
Employing Virtual Power Analytics and Linked Data for Enterprise IT Energy In...Employing Virtual Power Analytics and Linked Data for Enterprise IT Energy In...
Employing Virtual Power Analytics and Linked Data for Enterprise IT Energy In...
 
IBM Big Data for Social Good Challenge - Submission Showcase
IBM Big Data for Social Good Challenge - Submission ShowcaseIBM Big Data for Social Good Challenge - Submission Showcase
IBM Big Data for Social Good Challenge - Submission Showcase
 
Green Cloud
Green CloudGreen Cloud
Green Cloud
 
10/28 Top 5 Deep Learning Stories
10/28 Top 5 Deep Learning Stories10/28 Top 5 Deep Learning Stories
10/28 Top 5 Deep Learning Stories
 
7 Big Facts About Data-Driven Innovation
7 Big Facts About Data-Driven Innovation7 Big Facts About Data-Driven Innovation
7 Big Facts About Data-Driven Innovation
 
Bigdata
BigdataBigdata
Bigdata
 
Analytics revolution and democratization of data
Analytics revolution and democratization of dataAnalytics revolution and democratization of data
Analytics revolution and democratization of data
 
Artificial Intelligence (AI) and Climate Change
Artificial Intelligence (AI) and Climate ChangeArtificial Intelligence (AI) and Climate Change
Artificial Intelligence (AI) and Climate Change
 
Big Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictionsBig Data Expo 2015 - IBM 5 predictions
Big Data Expo 2015 - IBM 5 predictions
 
Top 5 Deep Learning and AI Stories - August 31, 2018
Top 5 Deep Learning and AI Stories - August 31, 2018Top 5 Deep Learning and AI Stories - August 31, 2018
Top 5 Deep Learning and AI Stories - August 31, 2018
 
ePlus Presents Big Data 101
ePlus Presents Big Data 101ePlus Presents Big Data 101
ePlus Presents Big Data 101
 
Proyecto 2
Proyecto 2 Proyecto 2
Proyecto 2
 
Big Data Expo 2015 - IBM Outside the comfort zone
Big Data Expo 2015 - IBM Outside the comfort zoneBig Data Expo 2015 - IBM Outside the comfort zone
Big Data Expo 2015 - IBM Outside the comfort zone
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Data Intensive Computing
Data Intensive ComputingData Intensive Computing
Data Intensive Computing
 
AllSeen Summit Keynote by Tellient's Shawn Conhahan
AllSeen Summit Keynote by Tellient's Shawn ConhahanAllSeen Summit Keynote by Tellient's Shawn Conhahan
AllSeen Summit Keynote by Tellient's Shawn Conhahan
 
AI for tackling climate change
AI for tackling climate changeAI for tackling climate change
AI for tackling climate change
 
4 Ways Artificial Intelligence Can Help Save the Planet
4 Ways Artificial Intelligence Can Help Save the Planet4 Ways Artificial Intelligence Can Help Save the Planet
4 Ways Artificial Intelligence Can Help Save the Planet
 
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
Quick view Big Data, brought by Oomph!, courtesy of our partner Sonovate
 

En vedette

Appriss Automates Support of 650 End-Point Routers with CA Process Automation
Appriss Automates Support of 650 End-Point Routers with CA Process AutomationAppriss Automates Support of 650 End-Point Routers with CA Process Automation
Appriss Automates Support of 650 End-Point Routers with CA Process AutomationCA Technologies
 
Introduction to Numetric (1)
Introduction to Numetric (1)Introduction to Numetric (1)
Introduction to Numetric (1)Matt Polson
 
Correlation: Why It's Important to Your Security Infrastructure
Correlation: Why It's Important to Your Security InfrastructureCorrelation: Why It's Important to Your Security Infrastructure
Correlation: Why It's Important to Your Security Infrastructureidentityautomation
 
Pre-Con Ed: What's New in CA Service Management
Pre-Con Ed: What's New in CA Service ManagementPre-Con Ed: What's New in CA Service Management
Pre-Con Ed: What's New in CA Service ManagementCA Technologies
 
Ca automation suite screen shots 2
Ca automation suite screen shots 2Ca automation suite screen shots 2
Ca automation suite screen shots 2David Resnic
 
Using data science to automate event correlation - June 2016 - Dan Turchin - ...
Using data science to automate event correlation - June 2016 - Dan Turchin - ...Using data science to automate event correlation - June 2016 - Dan Turchin - ...
Using data science to automate event correlation - June 2016 - Dan Turchin - ...PeopleReign, Inc.
 
Case Study: Taking IT Asset Management to the Next Level With Process Automation
Case Study: Taking IT Asset Management to the Next Level With Process AutomationCase Study: Taking IT Asset Management to the Next Level With Process Automation
Case Study: Taking IT Asset Management to the Next Level With Process AutomationCA Technologies
 
HfS Webinar Slides: Smart Process Automation in Enterprise Business
HfS Webinar Slides: Smart Process Automation in Enterprise BusinessHfS Webinar Slides: Smart Process Automation in Enterprise Business
HfS Webinar Slides: Smart Process Automation in Enterprise BusinessHfS Research
 
Business process automation: The past, present and future
Business process automation: The past, present and futureBusiness process automation: The past, present and future
Business process automation: The past, present and futureQorus Software
 
Robotic Process Automation for Financial Services
Robotic Process Automation for Financial ServicesRobotic Process Automation for Financial Services
Robotic Process Automation for Financial ServicesAppian
 
APIs and Process automation at APIDays Global 2016
APIs and Process automation at APIDays Global 2016APIs and Process automation at APIDays Global 2016
APIs and Process automation at APIDays Global 2016Giuliano Iacobelli
 
Chatbots + rpa (robotic process automation)
Chatbots + rpa (robotic process automation)Chatbots + rpa (robotic process automation)
Chatbots + rpa (robotic process automation)Carlos Toxtli
 
Everest Group FIT matrix for Robotic Process Automation (rpa) technology
Everest Group FIT matrix for Robotic Process Automation (rpa) technologyEverest Group FIT matrix for Robotic Process Automation (rpa) technology
Everest Group FIT matrix for Robotic Process Automation (rpa) technologyUiPath
 
Reducing MTTR and False Escalations: Event Correlation at LinkedIn
Reducing MTTR and False Escalations: Event Correlation at LinkedInReducing MTTR and False Escalations: Event Correlation at LinkedIn
Reducing MTTR and False Escalations: Event Correlation at LinkedInMichael Kehoe
 
The 2015 Millennial Majority Workforce: Study Results
The 2015 Millennial Majority Workforce: Study ResultsThe 2015 Millennial Majority Workforce: Study Results
The 2015 Millennial Majority Workforce: Study ResultsElance-oDesk
 

En vedette (17)

Appriss Automates Support of 650 End-Point Routers with CA Process Automation
Appriss Automates Support of 650 End-Point Routers with CA Process AutomationAppriss Automates Support of 650 End-Point Routers with CA Process Automation
Appriss Automates Support of 650 End-Point Routers with CA Process Automation
 
Introduction to Numetric (1)
Introduction to Numetric (1)Introduction to Numetric (1)
Introduction to Numetric (1)
 
Correlation: Why It's Important to Your Security Infrastructure
Correlation: Why It's Important to Your Security InfrastructureCorrelation: Why It's Important to Your Security Infrastructure
Correlation: Why It's Important to Your Security Infrastructure
 
Pre-Con Ed: What's New in CA Service Management
Pre-Con Ed: What's New in CA Service ManagementPre-Con Ed: What's New in CA Service Management
Pre-Con Ed: What's New in CA Service Management
 
Ca automation suite screen shots 2
Ca automation suite screen shots 2Ca automation suite screen shots 2
Ca automation suite screen shots 2
 
MUSES WP5 Final Conclusions
MUSES WP5 Final ConclusionsMUSES WP5 Final Conclusions
MUSES WP5 Final Conclusions
 
Using data science to automate event correlation - June 2016 - Dan Turchin - ...
Using data science to automate event correlation - June 2016 - Dan Turchin - ...Using data science to automate event correlation - June 2016 - Dan Turchin - ...
Using data science to automate event correlation - June 2016 - Dan Turchin - ...
 
Case Study: Taking IT Asset Management to the Next Level With Process Automation
Case Study: Taking IT Asset Management to the Next Level With Process AutomationCase Study: Taking IT Asset Management to the Next Level With Process Automation
Case Study: Taking IT Asset Management to the Next Level With Process Automation
 
HfS Webinar Slides: Smart Process Automation in Enterprise Business
HfS Webinar Slides: Smart Process Automation in Enterprise BusinessHfS Webinar Slides: Smart Process Automation in Enterprise Business
HfS Webinar Slides: Smart Process Automation in Enterprise Business
 
Business process automation: The past, present and future
Business process automation: The past, present and futureBusiness process automation: The past, present and future
Business process automation: The past, present and future
 
Robotic Process Automation for Financial Services
Robotic Process Automation for Financial ServicesRobotic Process Automation for Financial Services
Robotic Process Automation for Financial Services
 
APIs and Process automation at APIDays Global 2016
APIs and Process automation at APIDays Global 2016APIs and Process automation at APIDays Global 2016
APIs and Process automation at APIDays Global 2016
 
Chatbots + rpa (robotic process automation)
Chatbots + rpa (robotic process automation)Chatbots + rpa (robotic process automation)
Chatbots + rpa (robotic process automation)
 
Everest Group FIT matrix for Robotic Process Automation (rpa) technology
Everest Group FIT matrix for Robotic Process Automation (rpa) technologyEverest Group FIT matrix for Robotic Process Automation (rpa) technology
Everest Group FIT matrix for Robotic Process Automation (rpa) technology
 
Reducing MTTR and False Escalations: Event Correlation at LinkedIn
Reducing MTTR and False Escalations: Event Correlation at LinkedInReducing MTTR and False Escalations: Event Correlation at LinkedIn
Reducing MTTR and False Escalations: Event Correlation at LinkedIn
 
The 2015 Millennial Majority Workforce: Study Results
The 2015 Millennial Majority Workforce: Study ResultsThe 2015 Millennial Majority Workforce: Study Results
The 2015 Millennial Majority Workforce: Study Results
 
Banking in India
Banking in IndiaBanking in India
Banking in India
 

Similaire à Event Correlation Applications for Utilities

Internet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunityInternet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunityThe Marketing Distillery
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkparry prabhu
 
K tech santa clara 20131114 v1
K tech santa clara 20131114 v1K tech santa clara 20131114 v1
K tech santa clara 20131114 v1ISSIP
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart datacaniceconsulting
 
Australian Telco Digital Strategy Trends 2014 / 2015 v1
Australian Telco Digital Strategy Trends 2014 / 2015 v1Australian Telco Digital Strategy Trends 2014 / 2015 v1
Australian Telco Digital Strategy Trends 2014 / 2015 v1Neil Aitken
 
Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4GlobalForum
 
The Advisory_June2016
The Advisory_June2016The Advisory_June2016
The Advisory_June2016Jim Tyson
 
IRJET- Building a Big Data Provenance with its Applications for Smart Cities
IRJET- Building a Big Data Provenance with its Applications for Smart CitiesIRJET- Building a Big Data Provenance with its Applications for Smart Cities
IRJET- Building a Big Data Provenance with its Applications for Smart CitiesIRJET Journal
 
Sean gately internet of things
Sean gately   internet of thingsSean gately   internet of things
Sean gately internet of thingsProductCamp SoCal
 
Digital communityecosystem jurykonga_good15_digitalcommunityecosystem_may0115
Digital communityecosystem jurykonga_good15_digitalcommunityecosystem_may0115Digital communityecosystem jurykonga_good15_digitalcommunityecosystem_may0115
Digital communityecosystem jurykonga_good15_digitalcommunityecosystem_may0115GO Open Data (GOOD)
 
Digital Futures - Data & Community Ecosystems
Digital Futures - Data & Community EcosystemsDigital Futures - Data & Community Ecosystems
Digital Futures - Data & Community EcosystemsOpen Knowledge Canada
 
20130618 presentation big data in financial services English
20130618 presentation big data in financial services English20130618 presentation big data in financial services English
20130618 presentation big data in financial services EnglishPascal Spelier
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Nikhil Dikshit
 
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...Smart City
 

Similaire à Event Correlation Applications for Utilities (20)

Internet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunityInternet of Things: manage the complexity, seize the opportunity
Internet of Things: manage the complexity, seize the opportunity
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Big Data et eGovernment
Big Data et eGovernmentBig Data et eGovernment
Big Data et eGovernment
 
K tech santa clara 20131114 v1
K tech santa clara 20131114 v1K tech santa clara 20131114 v1
K tech santa clara 20131114 v1
 
Smart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart dataSmart Data Module 1 introduction to big and smart data
Smart Data Module 1 introduction to big and smart data
 
Australian Telco Digital Strategy Trends 2014 / 2015 v1
Australian Telco Digital Strategy Trends 2014 / 2015 v1Australian Telco Digital Strategy Trends 2014 / 2015 v1
Australian Telco Digital Strategy Trends 2014 / 2015 v1
 
Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4
 
Applications of Big Data
Applications of Big DataApplications of Big Data
Applications of Big Data
 
The Advisory_June2016
The Advisory_June2016The Advisory_June2016
The Advisory_June2016
 
Business with Big data
Business with Big dataBusiness with Big data
Business with Big data
 
IRJET- Building a Big Data Provenance with its Applications for Smart Cities
IRJET- Building a Big Data Provenance with its Applications for Smart CitiesIRJET- Building a Big Data Provenance with its Applications for Smart Cities
IRJET- Building a Big Data Provenance with its Applications for Smart Cities
 
Sean gately internet of things
Sean gately   internet of thingsSean gately   internet of things
Sean gately internet of things
 
Datapreneurs
DatapreneursDatapreneurs
Datapreneurs
 
Digital communityecosystem jurykonga_good15_digitalcommunityecosystem_may0115
Digital communityecosystem jurykonga_good15_digitalcommunityecosystem_may0115Digital communityecosystem jurykonga_good15_digitalcommunityecosystem_may0115
Digital communityecosystem jurykonga_good15_digitalcommunityecosystem_may0115
 
Digital Futures - Data & Community Ecosystems
Digital Futures - Data & Community EcosystemsDigital Futures - Data & Community Ecosystems
Digital Futures - Data & Community Ecosystems
 
20130618 presentation big data in financial services English
20130618 presentation big data in financial services English20130618 presentation big data in financial services English
20130618 presentation big data in financial services English
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
 
iX_POV_FinalDraft
iX_POV_FinalDraftiX_POV_FinalDraft
iX_POV_FinalDraft
 
iX_POV_FinalDraft
iX_POV_FinalDraftiX_POV_FinalDraft
iX_POV_FinalDraft
 
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
Making a Smart Community: Finding Resiliency & Efficiencies through Infrastru...
 

Plus de EnergySec

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...EnergySec
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityEnergySec
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementEnergySec
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachEnergySec
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsEnergySec
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueEnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherEnergySec
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherEnergySec
 

Plus de EnergySec (20)

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 

Dernier

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Dernier (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Event Correlation Applications for Utilities

  • 2. 2 United States Smart Meter Deployments History Source: Utility-Scale Smart Meter Deployments - Innovation Electricity Efficiency Institute of the Edison Foundation - 2013
  • 3. 3 Of the 46M Smart Meters currently deployed in the US... ...three utilities are responsible for nearly a third of installed meters. HP Enterprise Security is a key partner to 2 of these top 3 utilities.
  • 4. 4 Planned Projects Through 2015 US Smart Meter Implementation Map Source: Utility-Scale Smart Meter Deployments - Innovation Electricity Efficiency Institute of the Edison Foundation - 2013
  • 5. 5 ...the beginning of the Internet of Things The Electric Grid is...
  • 6. 6 The Data Deluge A small municipal electric utility in Lakeland, Florida went from collecting 122,000 data points per month prior to their Smart Meter implementation to 90 Million data points per month following implementation… ...a 73,000% increase!
  • 7. 7 “We're entering a new world in which data may be more important than software.” Tim O’Reilly
  • 8. 8 But we are constrained.
  • 10. 10 “I think frugality drives innovation, just like other constraints do. One of the only ways to get out of a tight box is to invent your way out.” Jeff Bezos
  • 13. 13 Embrace the constraints Many tools have multiple purposes
  • 14. 14 “Data is not information, information is not knowledge, knowledge is not understanding, understanding is not wisdom.” Clifford Stoll
  • 15. 15 Turn Data Into Information
  • 16. 16 Case Study HP technology is currently used to run a Security Operations Center (SOC) for a very large smart meter implementation. Correlating and tracking events around: • Power outage event correlation • Meter failures and tampering Allowing event-driven integration with internal systems to reduce technician dispatch
  • 17. 17 Using the tools effectively All of this is accomplished with ArcSight: • HP ArcSight Connector Appliance • HP ArcSight Logger • HP ArcSight Enterprise Security Management (ESM)
  • 18. 18 Summary HP’s event correlation capabilities enable utilities to create customized Smart Meter event responses, increasing network visibility and reducing cost.
  • 19. 19

Notes de l'éditeur

  1. Hello, I’m XX of Enterprise Security Services—    Like most people who work in security, my role has changed a lot over the last few years. Not too long ago, it was all about firewalls and passwords—keeping everyone out. But you and I both know it’s not that simple anymore. Security is now a complex and expanding challenge at your enterprise. In fact, it’s a challenge at every enterprise worldwide. My message today is that you must evolve your approach to information security if you want to keep pace with a changing market and constantly growing technology. And, really, it’s not optional.  
  2. So what are the big concerns? If you’re like most of our clients, the challenges fall into three major areas, all of which are hitting the enterprise at once.   First, the criminals are better than us. They’re smart. And they’re a step ahead. Security threats can be external or internal in nature or they can represent malicious or unintentional actions. But more and more, they are a result of cybercriminals that have created an adversary market place that has become more specialized, more efficient, and more lucrative.   Second, regulatory pressures are intense. Conflicting regulatory drivers, sovereignty challenges and industry specific issues add up to increasingly complex regulatory issues. You have to deal with compliance regulations, privacy rules and data protection. And you must find ways to implement governance, risk and compliance frameworks across their extended enterprise of partners, suppliers and customers.   Third, The New Style of IT means new models to protect. Innovations like cloud, bring-your-own-device, and mobility are part of an enterprise’s infrastructure transformation and can drive innovation and growth. But these new models make it harder for your security team to proactively manage an information security and risk strategy because you’re constantly changing the internal security AND reacting to new threats that an open and interactive enterprise can bring.
  3. Let’s start with disrupting your adversaries.   In our business, you hear a lot of about internal processes and policies. And, in fact, the standardization of security policies has done a great deal to raise the bar for our industry. But it will continue to fail to make us secure because it lacks the focus on the adversary—the cyber-criminals creating new threats every day No framework discussed in committee will be able to evolve as fast as the market, especially the black market. We need to build our response in a way that disrupts the adversary at every step of their process.   The adversary’s ecosystem is very sophisticated.  It starts with building profiles on executives like you—your LinkedIn bio, Facebook posts, the places you’ve been, and things you like to do. It makes the victim an easy “phishing” target because the profiler know things about him or her that not many people should know. They sell the profiles to hackers.   These hackers then breach the company. They might have used a phishing attack and installed malware to break into the network and use your credentials. They may build their own toolkits. They can sell these access points to the highest bidder, who then spends days or weeks figuring out where your sensitive data is, being able to map your environment, figure out your configurations. They create a map and sell it to the next person.   Eventually the criminals are able to access critical databases and change the account profile, including withdrawal limits and account codes. This information was taken out of the company and provided to their colleagues or sold to a third party.  And from there the cards were made and the teams hit the streets to withdraw cash from the ATMs.  
  4. My point is that cyber security too often focuses on the specific state-sponsored group, “hacktivist” or cyber criminal. We need to focus on the full black market in which these actors participate. There are market processes for breach, enabling disparate parties to collaborate. As actors specialize in this marketplace, based on skill sets, innovation is extraordinary. This criminal ecosystem is much more efficient at creating, sharing and acting on the security intelligence than the ecosystem that exists to defend our clients.  Instead, we need to build capabilities and think about solutions that disrupt that chain at multiple points. In the discovery and capture stages, you need the ability to process large data sets in real time and at scale. You have to monitor the data that you have in your organization and be able to know when something unusual is happening. For instance, if it looks like a verified employee starts doing something uncharacteristic like accessing file shares they haven’t before or changing database records, you should know about it. If data flows don’t match predicted processes, alerts should be set off. Now, what these criminals are looking for is your critical data like intellectual property and customer information. You should know when it is being moved, accessed inappropriately, or sent outside the organization in an email, posted on a Facebook account, or stored on cloud storage. Information can be correlated from all over the enterprise and from data outside the enterprise as well. Cybercriminals are monitoring the black markets for your enterprise’s sensitive data and including data from the cloud infrastructures in your security operations environment. We are working with companies to combine employee sentiment with abnormal access behavior to find malicious insiders.
  5. Let’s start with disrupting your adversaries.   In our business, you hear a lot of about internal processes and policies. And, in fact, the standardization of security policies has done a great deal to raise the bar for our industry. But it will continue to fail to make us secure because it lacks the focus on the adversary—the cyber-criminals creating new threats every day No framework discussed in committee will be able to evolve as fast as the market, especially the black market. We need to build our response in a way that disrupts the adversary at every step of their process.   The adversary’s ecosystem is very sophisticated.  It starts with building profiles on executives like you—your LinkedIn bio, Facebook posts, the places you’ve been, and things you like to do. It makes the victim an easy “phishing” target because the profiler know things about him or her that not many people should know. They sell the profiles to hackers.   These hackers then breach the company. They might have used a phishing attack and installed malware to break into the network and use your credentials. They may build their own toolkits. They can sell these access points to the highest bidder, who then spends days or weeks figuring out where your sensitive data is, being able to map your environment, figure out your configurations. They create a map and sell it to the next person.   Eventually the criminals are able to access critical databases and change the account profile, including withdrawal limits and account codes. This information was taken out of the company and provided to their colleagues or sold to a third party.  And from there the cards were made and the teams hit the streets to withdraw cash from the ATMs.