SlideShare a Scribd company logo
1 of 16
w ebcast Series Volume 3 Smart Grid  (IT) Systems Security Andy Bochman Editor : The Smart Grid Security Blog July 2010
Jack   Andy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security meets Energy
[object Object],[object Object],[object Object],[object Object],[object Object],New format rules
[object Object],[object Object],[object Object],[object Object],Overview
The systems in question
What’s in an IT system? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The future is here: cloud/utility computing ,[object Object],[object Object],[object Object],[object Object],[object Object]
More new stuff: virtualization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],"I think the worst thing is that people pretend there aren't any differences [between virtual and physical] and they move right ahead and don't have any discussions at all"  Neil MacDonald, Gartner VP, 2Q2010 http://www.scmagazineus.com/gartner-virtualization-security-will-take-time/article/165932/
Best IT systems security practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://images.travelpod.com/users/cobra1899/pauls_journey.1201056060.mainframe-digital-computer.jpg
Best IT systems security practices ,[object Object],[object Object],[object Object],[object Object],[object Object],http://geniushackers.com/blog/wp-content/uploads/2009/03/client-server.png
Best IT systems security practices ,[object Object],[object Object],[object Object],[object Object],http://www.thomaslaupstad.com/bilder/red_sunset800.jpg
Best IT systems security practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://farm1.static.flickr.com/31/54067048_e407035935.jpg
For official guidance on securing IT systems ,[object Object],[object Object],[object Object],[object Object],http:// www.flickr.com/photos/kevcole /
That’s a wrap http://www.flickr.com/photos/ajturner/3362409021/   Systems security 101 = risk management
Where we’ve been and what’s next ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks ! … and keep an eye open for SGSB Webcast 4 on  Smart Grid standards & compliance  in August The Smart Grid Security Blog smartgridsecurity.blogspot.com [email_address] Twitter.com/sgsblog

More Related Content

What's hot

information security technology
information security technologyinformation security technology
information security technology
garimasagar
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
Gyan Research And Analytics
 
Data Driven Security in SSAS
Data Driven Security in SSASData Driven Security in SSAS
Data Driven Security in SSAS
Mike Duffy
 

What's hot (18)

Cybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
 
Cybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework CimetricsCybersecurity Summit AHR20 NIST framework Cimetrics
Cybersecurity Summit AHR20 NIST framework Cimetrics
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
Cybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causesCybersecurity 3 cybersecurity costs and causes
Cybersecurity 3 cybersecurity costs and causes
 
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...
 
Im 111 lecture 1
Im 111   lecture 1Im 111   lecture 1
Im 111 lecture 1
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
 
Security in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than everSecurity in the Cognitive Era: Why it matters more than ever
Security in the Cognitive Era: Why it matters more than ever
 
information security technology
information security technologyinformation security technology
information security technology
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
Data Driven Security in SSAS
Data Driven Security in SSASData Driven Security in SSAS
Data Driven Security in SSAS
 

Viewers also liked

Brady & morris engg. co. ltd. marketing report
Brady &  morris  engg. co. ltd.  marketing reportBrady &  morris  engg. co. ltd.  marketing report
Brady & morris engg. co. ltd. marketing report
patelhardikbabubhai
 
Article Detail 4 - Domestic Preparedness
Article Detail 4 - Domestic PreparednessArticle Detail 4 - Domestic Preparedness
Article Detail 4 - Domestic Preparedness
Diana Hopkins
 
LINKEDIN Magnatech Saves Energy Presentation 2016
LINKEDIN Magnatech Saves Energy Presentation 2016LINKEDIN Magnatech Saves Energy Presentation 2016
LINKEDIN Magnatech Saves Energy Presentation 2016
Lindsay Franklin
 
Tateiju España Guía del Inmigrante 6to numero
Tateiju España Guía del Inmigrante 6to numero Tateiju España Guía del Inmigrante 6to numero
Tateiju España Guía del Inmigrante 6to numero
Gabriel B. Venegas
 
How to lead when you're not the boss
How to lead when you're not the bossHow to lead when you're not the boss
How to lead when you're not the boss
Daniel Remondegui
 
20081117 HAK Marienanstalt Global Entrepreneurship Week
20081117 HAK Marienanstalt Global Entrepreneurship Week20081117 HAK Marienanstalt Global Entrepreneurship Week
20081117 HAK Marienanstalt Global Entrepreneurship Week
Webdesign Studio7
 

Viewers also liked (20)

J ripoll clase filmin-elisava-CINE
J ripoll clase filmin-elisava-CINEJ ripoll clase filmin-elisava-CINE
J ripoll clase filmin-elisava-CINE
 
Nordic Cleantech Strongholds - Santtu Hulkkonen - Cleantech Finland - April 2010
Nordic Cleantech Strongholds - Santtu Hulkkonen - Cleantech Finland - April 2010Nordic Cleantech Strongholds - Santtu Hulkkonen - Cleantech Finland - April 2010
Nordic Cleantech Strongholds - Santtu Hulkkonen - Cleantech Finland - April 2010
 
zAgile for OpenStack Summit - v2-3.ppt
zAgile for OpenStack Summit - v2-3.pptzAgile for OpenStack Summit - v2-3.ppt
zAgile for OpenStack Summit - v2-3.ppt
 
Roman Rehak: 24/7 Database Administration + Database Mail Unleashed
Roman Rehak: 24/7 Database Administration + Database Mail UnleashedRoman Rehak: 24/7 Database Administration + Database Mail Unleashed
Roman Rehak: 24/7 Database Administration + Database Mail Unleashed
 
Brady & morris engg. co. ltd. marketing report
Brady &  morris  engg. co. ltd.  marketing reportBrady &  morris  engg. co. ltd.  marketing report
Brady & morris engg. co. ltd. marketing report
 
Clase 2: El Periodismo Desde La Aparición De Internet
Clase 2: El Periodismo Desde La Aparición De InternetClase 2: El Periodismo Desde La Aparición De Internet
Clase 2: El Periodismo Desde La Aparición De Internet
 
Article Detail 4 - Domestic Preparedness
Article Detail 4 - Domestic PreparednessArticle Detail 4 - Domestic Preparedness
Article Detail 4 - Domestic Preparedness
 
Delta Galil Under Cover
Delta  Galil  Under  CoverDelta  Galil  Under  Cover
Delta Galil Under Cover
 
LINKEDIN Magnatech Saves Energy Presentation 2016
LINKEDIN Magnatech Saves Energy Presentation 2016LINKEDIN Magnatech Saves Energy Presentation 2016
LINKEDIN Magnatech Saves Energy Presentation 2016
 
Tateiju España Guía del Inmigrante 6to numero
Tateiju España Guía del Inmigrante 6to numero Tateiju España Guía del Inmigrante 6to numero
Tateiju España Guía del Inmigrante 6to numero
 
How to lead when you're not the boss
How to lead when you're not the bossHow to lead when you're not the boss
How to lead when you're not the boss
 
A improvisación teatral
A improvisación teatralA improvisación teatral
A improvisación teatral
 
ProVari manual
ProVari manualProVari manual
ProVari manual
 
20081117 HAK Marienanstalt Global Entrepreneurship Week
20081117 HAK Marienanstalt Global Entrepreneurship Week20081117 HAK Marienanstalt Global Entrepreneurship Week
20081117 HAK Marienanstalt Global Entrepreneurship Week
 
Iniciativa de código fiscal del distrito federal
Iniciativa de código fiscal del distrito federalIniciativa de código fiscal del distrito federal
Iniciativa de código fiscal del distrito federal
 
MaRaViLLaS DeL MuNdO
MaRaViLLaS DeL MuNdOMaRaViLLaS DeL MuNdO
MaRaViLLaS DeL MuNdO
 
PKI-In-A-Box
PKI-In-A-BoxPKI-In-A-Box
PKI-In-A-Box
 
Taller "Creación y edición de música con dispositivos móviles" SIMO Educación...
Taller "Creación y edición de música con dispositivos móviles" SIMO Educación...Taller "Creación y edición de música con dispositivos móviles" SIMO Educación...
Taller "Creación y edición de música con dispositivos móviles" SIMO Educación...
 
Centro Niemeyer: programación enero / febrero / marzo 2015
Centro Niemeyer: programación enero / febrero / marzo 2015Centro Niemeyer: programación enero / febrero / marzo 2015
Centro Niemeyer: programación enero / febrero / marzo 2015
 
Himba
Himba Himba
Himba
 

Similar to SGSB Webcast 3: Smart Grid IT Systems Security

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
Patty Buckley
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
Madison Oliver
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
Matthew Moldvan
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
Fahd Khan
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 

Similar to SGSB Webcast 3: Smart Grid IT Systems Security (20)

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart building
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security Update
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Isa Chapters Cyber is Hard presentation v1.0
Isa Chapters Cyber  is Hard presentation v1.0Isa Chapters Cyber  is Hard presentation v1.0
Isa Chapters Cyber is Hard presentation v1.0
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
Trusted computing: an overview
Trusted computing: an overviewTrusted computing: an overview
Trusted computing: an overview
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

SGSB Webcast 3: Smart Grid IT Systems Security

  • 1. w ebcast Series Volume 3 Smart Grid (IT) Systems Security Andy Bochman Editor : The Smart Grid Security Blog July 2010
  • 2.
  • 3.
  • 4.
  • 5. The systems in question
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. That’s a wrap http://www.flickr.com/photos/ajturner/3362409021/ Systems security 101 = risk management
  • 15.
  • 16. Thanks ! … and keep an eye open for SGSB Webcast 4 on Smart Grid standards & compliance in August The Smart Grid Security Blog smartgridsecurity.blogspot.com [email_address] Twitter.com/sgsblog

Editor's Notes

  1. Starts with current grid Smart Meters and Advanced Metering Infrastructure (AMI) are just the beginning More C words: connected, complex, computerized More R words: responsive, resilient, reliable Bi-directional comms and power Enabler of industry scale wind, solar and V2G, not to mention new business models Solution to DOD’s “brittle grid” challenge