SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
Electricity	
  Subsector	
  Cybersecurity	
  	
  
     Capability	
  Maturity	
  Model	
  (ES-­‐C2M2)	
  




Case	
  Study:	
                                  Benjamin	
  Beberness	
  	
  
	
  	
  Snohomish	
  County	
  PUD	
              	
  	
  Snohomish	
  County	
  PUD	
  
	
  	
  Ini?al	
  Facilitated	
  Assessment	
     John	
  Fry	
  
	
  	
  August	
  2012	
                          	
  	
  ICF	
  Interna?onal	
  
ES-­‐C2M2	
  Background	
  &	
  Overview	
  

•  Challenge:	
  Develop	
  capabili?es	
  to	
           ES-­‐C2M2	
  ObjecCves	
  
   manage	
  dynamic	
  threats	
  and	
  
   understand	
  cybersecurity	
  posture	
             •  Strengthen	
  cybersecurity	
  
   of	
  the	
  grid	
                                     capabiliCes	
  
                                                        •  Enable	
  consistent	
  
•  Approach:	
  Develop	
  a	
  maturity	
                 evalua?on	
  and	
  
   model	
  and	
  self-­‐evalua?on	
  survey	
  to	
      benchmarking	
  of	
  	
  
   develop	
  and	
  measure	
  cybersecurity	
            cybersecurity	
  capabili?es	
  
   capabili?es	
                                        •  Share	
  knowledge	
  and	
  
                                                           best	
  prac?ces	
  
•  Results:	
  A	
  scalable,	
  sector-­‐specific	
     •  Enable	
  prioriCzed	
  ac?ons	
  
   model	
  created	
  in	
  partnership	
  with	
         and	
  cybersecurity	
  
   industry	
                                              investments	
  
                                                                                 2	
  
ES-­‐C2M2	
  Case	
  Study	
  
Why	
  Create	
  a	
  Maturity	
  Model?	
  

If you want to build a ship, don’t herd people together
to collect wood and don’t assign tasks and work, but
rather, teach them to long for the endless immensity of
the sea.
          –  Antoine de Saint-Exupery




                                                    3	
  
ES-­‐C2M2	
  Case	
  Study	
  
Why	
  Create	
  a	
  Maturity	
  Model?	
  

• 	
  Tool	
  for	
  u?li?es	
  (opposed	
  to	
  regula?on	
  from	
  Government)	
  
• 	
  Helps	
  answer	
  ques?ons	
  
          –  Where are we?

          –  Where do we go?

          –  How do we get there?




                                                                                  4	
  
ES-­‐C2M2	
  Case	
  Study	
  
ES-­‐C2M2	
  Domains	
  

                                                   Asset, Change,
                                                                               Identity and                             Threat and




                                                                    ACCESS




                                                                                                        THREAT
                                         ASSET
                  Risk                                  and
RISK




                                                                                 Access                                Vulnerability
               Management                           Configuration
                                                                               Management                              Management
                                                    Management




                                                                                                        DEPENDENCIES
                                                                                Event and
                                                                                                                       Supply Chain




                                                                    RESPONSE
SITUATION




                                         SHARING



                                                     Information                 Incident
                 Situational                                                                                            and External
                                                     Sharing and                Response,
                 Awareness                                                                                             Dependencies
                                                   Communications              Continuity of
                                                                                                                       Management
                                                                               Operations

                                                                    •  Domains	
  are	
  logical	
  groupings	
  of	
  
WORKFORCE




                                                    Cybersecurity      cybersecurity	
  pracCces	
  
                                         CYBER




                Workforce
                                                      Program
               Management                                           •  Each	
  domain	
  has	
  a	
  short	
  name	
  for	
  easy	
  
                                                    Management
                                                                       reference	
  

                                                                                                                          5	
  
        ES-­‐C2M2	
  Case	
  Study	
  
Model	
  Architecture	
  

              Domain	
                                                     Domain	
  



                                                              ObjecCve	
                   ObjecCve	
  
            ObjecCve	
                                            1	
                          2	
  


       Maturity	
  
                                                    MIL	
                        MIL	
  
    Indicator	
  Level	
                             1	
                          2	
  
         (MIL)	
  

              PracCce	
          PracCce	
  1	
               PracCce	
  2	
  

                                                                                                    6	
  
ES-­‐C2M2	
  Case	
  Study	
  
Example:	
  Objec?ves	
  

SituaConal	
  Awareness:	
  4	
  ObjecCves	
  
     1. Perform	
  Logging	
  
                        –  MIL1, MIL2, MIL3

     2. Monitor	
  the	
  FuncCon	
  
                        –  MIL1, MIL2, MIL3

     3. Establish	
  and	
  Maintain	
  a	
  Common	
  OperaCng	
  Picture	
  
                        –  MIL1, MIL2, MIL3

     4. Manage	
  SITUATION	
  AcCviCes	
  (common	
  objecCve)	
  
                        –  MIL1, MIL2, MIL3
                

     	
  	
  
                                                                                 7	
  
ES-­‐C2M2	
  Case	
  Study	
  
Example:	
  Prac?ce	
  Maturity	
  
     Progression	
  




                                           8	
  
ES-­‐C2M2	
  Case	
  Study	
  
Example:	
  Prac?ce	
  Maturity	
  
     Progression	
  




                                           9	
  
ES-­‐C2M2	
  Case	
  Study	
  
Example:	
  Prac?ce	
  Maturity	
  
     Progression	
  
SituaConal	
  Awareness	
  “Monitor	
  the	
  FuncCon”	
  

                                                        	
  
•  MIL1	
  –	
  Cybersecurity	
  monitoring	
  ac?vi?es	
  are	
  performed	
  
   (e.g.,	
  periodic	
  reviews	
  of	
  log	
  data)

                                                               	
  
•  MIL2	
  –	
  Alarms	
  and	
  alerts	
  are	
  configured	
  to	
  aid	
  the	
  
   iden?fica?on	
  of	
  cybersecurity	
  events
•  MIL3	
  –	
  Con?nuous	
  monitoring	
  is	
  performed	
  across	
  the	
  
   opera?onal	
  environment	
  to	
  iden?fy	
  anomalous	
  ac?vity	
  	
  




                                                                                      10	
  
ES-­‐C2M2	
  Case	
  Study	
  
The	
  Model	
  at	
  a	
  Glance	
  

                                      X	
  Reserved	
                     1	
  Maturity	
  Indicator	
  Level	
  that	
  is	
  reserved	
  for	
  future	
  use	
  
Maturity	
  Indicator	
  Levels	
  




                                      3	
  Managed	
  
                                      2	
  Performed	
                    4	
  Maturity	
  Indicator	
  Levels:	
  Defined	
  progressions	
  of	
  prac?ces	
  

                                                                                                  Each	
  cell	
  contains	
  the	
  defining	
  prac?ces	
  for	
  
                                      1	
  Ini?ated	
                                             the	
  domain	
  at	
  that	
  maturity	
  indicator	
  level	
  

                                      0	
  Not	
  Performed	
  




                                                                                                                                                        DEPENDENCIES


                                                                                                                                                                           WORKFORCE
                                                                                                                                             RESPONSE
                                                                                                                      SITUATION


                                                                                                                                  SHARING
                                                                                               ACCESS


                                                                                                           THREAT




                                                                                                                                                                                       CYBER
                                                                                   ASSET
                                                                        RISK




                                                                       10	
  Model	
  Domains:	
  Logical	
  groupings	
  of	
  cybersecurity	
  prac?ces	
  
                                                                                                                                                                       11	
  
                                      ES-­‐C2M2	
  Case	
  Study	
  
Using	
  the	
  Evalua?on	
  Results	
  	
  




                                                    12	
  
ES-­‐C2M2	
  Case	
  Study	
  
Using	
  the	
  Evalua?on	
  Results	
  	
  




                                               13	
  
Assessed	
  Domains	
  

•  Enterprise	
  versus	
  func?onal	
  area	
  
•  Assessed	
  Domains	
  
     –  Risk Management (RISK)
     –  Asset, Change, and Configuration Management (ASSET)
     –  Identity and Access Management (ACCESS)
     –  Threat and Vulnerability Management (THREAT)
     –  Situational Awareness (SITUATION)
     –  Information Sharing and Communications (SHARING)
     –  Event and Incident Response, Continuity of Operations (RESPONSE)
     –  Supply Chain and External Dependencies Management
        (DEPENDENCIES)
     –  Workforce Management (WORKFORCE)
     –  Cybersecurity Program Management (CYBER)
                  14	
  
SNOPUD	
  Rela?ve	
  Scoring	
  

                                         1 3                  3        3                                    5                         6                                         5                   2              5                             7                    2
             5           5                                                                 8                                                  5                 6    13                                                         9                                          3
MIL3                             9                                                                              5    13                                                                                                                                   13
                 24                      26               7       25                               33                     31                      22                      52              15
                                                                                                                                                                                               13   30                               38                            31
                                                                                                                                                                                                                       10                            10
             7           7                           13                        12                                                     12                                                                                        12                                         13
                                                                                                   15                                             11                     19


                     1                   1                    2            2                            1                             3                     2                 1                     2 1                                                                2
                                                                                                                                              3                                                                                                  4
         5                                                                                                                                                                            7                                     7
                                                                                       8                                                                            11
MIL2             13          5
                                 7
                                         15           7   4       16                               19                8    16                      11                      28                        19                  8            19                   11       21          8
                                                                                                                10                        5                                                    8                                                     4
                                                                               8
                 2                                                                                                                                     6                          9                                                  4


                                     1                                                                      1                                                                         3                                                                                    1
                                                          2
MIL1     1           2       1           6                        6                3               6                       3                      2                       12                   2    4                   2            6                             4
                                                 5            1                                5                                                                     9                                                                                         3
                                                                                                                            3                      2                                                                                     6




                                                                                                                          Situation




                                                                                                                                                                                                    Dependencies
                                                                                                                                                  Sharing
                                         Asset




                                                                                                                                                                          Response




                                                                                                                                                                                                                                                                   Cyber
                 Risk




                                                                  Access




                                                                                                   Threat




                                                                                                                                                                                                                                     Workforce
 Fully	
  implemented                Partially	
  implemented
 Largely	
  implemented              Not	
  implemented



Maturity	
  Indicator	
  Level	
  (MIL)	
  1	
  through	
  3	
  indicate	
  the	
  stage	
  of	
  implementa?on	
  of	
  
the	
  domain	
  with	
  1	
  indica?ng	
  there	
  is	
  room	
  for	
  improvement	
  and	
  3	
  indica?ng	
  it	
  is	
  
fully	
  implemented	
  with	
  very	
  lidle	
  room	
  for	
  improvement.	
  Not	
  all	
  domains	
  for	
  every	
  
organiza?on	
  need	
  to	
  be	
  at	
  MIL	
  3.	
  Many	
  organiza?ons,	
  based	
  on	
  the	
  risk	
  profile,	
  may	
  
have	
  an	
  adequate	
  program	
  at	
  MIL	
  1.	
                                                          15	
  
Assessment	
  Results	
  

•  No	
  surprises	
  –	
  areas	
  needing	
  improvement	
  were	
  known	
  
•  Facilitators	
  were	
  very	
  objec?ve	
  
•  Areas	
  for	
  improvement	
  include	
  risk	
  management	
  and	
  log	
  management,	
  
   and	
  areas	
  of	
  asset	
  management	
  
•  Areas	
  where	
  program	
  elements	
  are	
  in	
  place	
  include	
  areas	
  of	
  asset	
  
   management,	
  access	
  control	
  (policy),	
  threat/vulnerability	
  management,	
  
   sharing	
  and	
  managing	
  informa?on,	
  threat	
  response,	
  dependencies,	
  
   workforce	
  management,	
  and	
  cyber	
  program	
  management	
  
•  The	
  assessment	
  provided	
  quan?ta?ve	
  guidance	
  for	
  program	
  improvement	
  
          –  Review individual function areas (Generation, Water, T&D)
          –  Determine the individual as well as the functional domain target maturity
             goals
          –  Prioritize objectives in overall cyber security program

                                                                                             16	
  
ES-­‐C2M2	
  Case	
  Study	
  
No?onal	
  Sample	
  Report	
  
     Actual	
  vs.	
  Desired	
  Score	
  




                                             17	
  
ES-­‐C2M2	
  Case	
  Study	
  
ES-­‐C2M2	
  -­‐	
  Next	
  Steps	
  

•  Share	
          Best	
  PracCces	
  within	
  the	
  sector	
  
•  Identify approaches for                Capability Development
•         Discussion Opportunities created

•  Develop	
  anonymous	
  aggregated	
          Benchmarking	
  Data	
  
•  	
     R&D	
  Investment	
  needs	
  iden?fied	
  by	
  result	
  data	
  
•  Access	
  to	
  Online	
      Training	
  Tools	
  	
  
                                                                               18	
  
ES-­‐C2M2	
  Case	
  Study	
  
Next	
  Steps	
  

•  Data	
  collec?on	
  
          –  ES-C2M2 compartment within US-CERT Portal
          –  PCII protections
          –  Projected timeline

•  Data	
  Analy?cs	
  
•  Benchmark	
  Data	
  




                                                          19	
  
ES-­‐C2M2	
  Case	
  Study	
  
No?onal	
  Sample	
  Comparison	
  Report	
  




                                                       20	
  
ES-­‐C2M2	
  Case	
  Study	
  
Links	
  
          
          ES-C2M2 Model
          http://energy.gov/oe/downloads/electricity-subsector-
          cybersecurity-capability-maturity-model-may-2012
          
          ES-C2M2 Self-Evaluation Tool Requests, Questions,
          or Requests for Facilitation
          ES-C2M2@doe.gov
          
          

                                                          21	
  
ES-­‐C2M2	
  Case	
  Study	
  
For	
  ques?ons	
  or	
  feedback	
  please	
  contact	
  ES-­‐C2M2@HQ.DOE.GOV	
  

      THANK	
  YOU	
  

                                                                                           22	
  
ES-­‐C2M2	
  Case	
  Study	
  
Background	
  Slides	
  
ES-­‐C2M2	
  Domain	
  Descrip?ons	
  

Domain	
                         DescripCon	
  
Risk	
  Management	
             Establish,	
  operate,	
  and	
  maintain	
  an	
  enterprise	
  cybersecurity	
  risk	
  
(RISK)	
                         management	
  program	
  to	
  iden?fy,	
  analyze,	
  and	
  mi?gate	
  cybersecurity	
  
                                 risk	
  to	
  the	
  organiza?on,	
  including	
  its	
  business	
  units,	
  subsidiaries,	
  related	
  
                                 interconnected	
  infrastructure,	
  and	
  stakeholders.	
  RISK	
  comprises	
  three	
  
                                 objec?ves:	
  
                                       1. 	
  Establish	
  Cybersecurity	
  Risk	
  Management	
  Strategy	
  
                                       2. 	
  Manage	
  Cybersecurity	
  Risk	
  
                                       3. 	
  Manage	
  RISK	
  Ac?vi?es	
  

Asset,	
  Change,	
  and	
       Manage	
  the	
  organiza?on’s	
  opera?ons	
  technology	
  (OT)	
  and	
  informa?on	
  
ConfiguraCon	
                    technology	
  (IT)	
  assets,	
  including	
  both	
  hardware	
  and	
  somware,	
  
Management	
                     commensurate	
  with	
  the	
  risk	
  to	
  cri?cal	
  infrastructure	
  and	
  organiza?onal	
  
(ASSET)	
                        objec?ves.	
  ASSET	
  comprises	
  four	
  objec?ves:	
  
                                      1.	
  Manage	
  Asset	
  Inventory	
  	
  
                                      2.	
  Manage	
  Asset	
  Configura?on	
  	
  
                                      3.	
  Manage	
  Changes	
  to	
  Assets	
  	
  
                                      4.	
  Manage	
  ASSET	
  Ac?vi?es	
  
                                 	
  
ES-­‐C2M2	
  Case	
  Study	
  
ES-­‐C2M2	
  Domain	
  Descrip?ons	
  

Domain	
                         DescripCon	
  
IdenCty	
  and	
  Access	
       Create	
  and	
  manage	
  iden??es	
  for	
  en??es	
  that	
  may	
  be	
  granted	
  logical	
  or	
  
Management	
                     physical	
  access	
  to	
  the	
  organiza?on’s	
  assets.	
  Control	
  access	
  to	
  the	
  
(ACCESS)	
                       organiza?on’s	
  assets,	
  commensurate	
  with	
  the	
  risk	
  to	
  cri?cal	
  
	
                               infrastructure	
  and	
  organiza?onal	
  objec?ves.	
  ACCESS	
  comprises	
  three	
  
                                 objec?ves:	
  
                                      1.	
  Establish	
  and	
  Maintain	
  Iden??es	
  
                                      2.	
  Control	
  Access	
  
                                      3.	
  Manage	
  ACCESS	
  Ac?vi?es	
  
                                 	
  

Threat	
  and	
                  Establish	
  and	
  maintain	
  plans,	
  procedures,	
  and	
  technologies	
  to	
  detect,	
  
Vulnerability	
                  iden?fy,	
  analyze,	
  manage,	
  and	
  respond	
  to	
  cybersecurity	
  threats	
  and	
  
Management	
                     vulnerabili?es,	
  commensurate	
  with	
  the	
  risk	
  to	
  the	
  organiza?on’s	
  
(THREAT)	
                       infrastructure	
  (e.g.,	
  cri?cal,	
  IT,	
  opera?onal)	
  and	
  organiza?onal	
  objec?ves.	
  
                                 THREAT	
  comprises	
  three	
  objec?ves:	
  
                                      1.	
  Iden?fy	
  and	
  Respond	
  to	
  Threats	
  
                                      2.	
  Reduce	
  Cybersecurity	
  Vulnerabili?es	
  
                                      3.	
  Manage	
  THREAT	
  Ac?vi?es	
  

ES-­‐C2M2	
  Case	
  Study	
  
ES-­‐C2M2	
  Domain	
  Descrip?ons	
  

Domain	
                         DescripCon	
  
SituaConal	
                     Establish	
  and	
  maintain	
  ac?vi?es	
  and	
  technologies	
  to	
  collect,	
  analyze,	
  
Awareness	
                      alarm,	
  present,	
  and	
  use	
  power	
  system	
  and	
  cybersecurity	
  informa?on,	
  
(SITUATION)	
                    including	
  status	
  and	
  summary	
  informa?on	
  from	
  the	
  other	
  model	
  
	
                               domains,	
  to	
  form	
  a	
  common	
  opera?ng	
  picture	
  (COP),	
  commensurate	
  
                                 with	
  the	
  risk	
  to	
  cri?cal	
  infrastructure	
  and	
  organiza?onal	
  objec?ves.	
  
                                 SITUATION	
  comprises	
  four	
  objec?ves:	
  
                                      1.	
  Perform	
  Logging	
  
                                      2.	
  Monitor	
  the	
  Func?on	
  
                                      3.	
  Establish	
  and	
  Maintain	
  a	
  Common	
  Opera?ng	
  Picture	
  	
  
                                      4.	
  Manage	
  SITUATION	
  Ac?vi?es	
  
                                 	
  
InformaCon	
  Sharing	
   Establish	
  and	
  maintain	
  rela?onships	
  with	
  internal	
  and	
  external	
  en??es	
  to	
  
and	
  CommunicaCons	
   collect	
  and	
  provide	
  cybersecurity	
  informa?on,	
  including	
  threats	
  and	
  
(SHARING)	
               vulnerabili?es,	
  to	
  reduce	
  risks	
  and	
  to	
  increase	
  opera?onal	
  resilience,	
  
	
                        commensurate	
  with	
  the	
  risk	
  to	
  cri?cal	
  infrastructure	
  and	
  organiza?onal	
  
                          objec?ves.	
  SHARING	
  comprises	
  two	
  objec?ves:	
  
                              1.	
  Share	
  Cybersecurity	
  Informa?on	
  
                              2.	
  Manage	
  SHARING	
  Ac?vi?es	
  
ES-­‐C2M2	
  Case	
  Study	
  
ES-­‐C2M2	
  Domain	
  Descrip?ons	
  

Domain	
                         DescripCon	
  
Event	
  and	
  Incident	
       Establish	
  and	
  maintain	
  plans,	
  procedures,	
  and	
  technologies	
  to	
  detect,	
  
Response,	
  ConCnuity	
         analyze,	
  and	
  respond	
  to	
  cybersecurity	
  events	
  and	
  to	
  sustain	
  opera?ons	
  
of	
  OperaCons	
                throughout	
  a	
  cybersecurity	
  event,	
  commensurate	
  with	
  the	
  risk	
  to	
  cri?cal	
  
(RESPONSE)	
                     infrastructure	
  and	
  organiza?onal	
  objec?ves.	
  RESPONSE	
  comprises	
  five	
  
	
                               objec?ves:	
  
                                      1.	
  Detect	
  Cybersecurity	
  Events	
  
                                      2.	
  Escalate	
  Cybersecurity	
  Events	
  
                                      3.	
  Respond	
  to	
  Escalated	
  Cybersecurity	
  Events	
  
                                      4.	
  Plan	
  for	
  Con?nuity	
  
                                      5.	
  Manage	
  RESPONSE	
  Ac?vi?es	
  
                                 	
  

Supply	
  Chain	
  and	
         Establish	
  and	
  maintain	
  controls	
  to	
  manage	
  the	
  cybersecurity	
  risks	
  
External	
                       associated	
  with	
  services	
  and	
  assets	
  that	
  are	
  dependent	
  on	
  external	
  
Dependencies	
                   en??es,	
  commensurate	
  with	
  the	
  risk	
  to	
  cri?cal	
  infrastructure	
  and	
  
Management	
                     organiza?onal	
  objec?ves.	
  DEPENDENCIES	
  comprises	
  three	
  objec?ves:	
  
(DEPENDENCIES)	
                     1.	
  Iden?fy	
  Dependencies	
  
	
                                   2.	
  Manage	
  Dependency	
  Risk	
  
                                     3.	
  Manage	
  DEPENDENCIES	
  Ac?vi?es	
  
                                 	
  
ES-­‐C2M2	
  Case	
  Study	
  
ES-­‐C2M2	
  Domain	
  Descrip?ons	
  

Domain	
                         DescripCon	
  
	
  Workforce	
                  Establish	
  and	
  maintain	
  plans,	
  procedures,	
  technologies,	
  and	
  controls	
  to	
  create	
  
Management	
                     a	
  culture	
  of	
  cybersecurity	
  and	
  to	
  ensure	
  the	
  ongoing	
  suitability	
  and	
  
(WORKFORCE)	
                    competence	
  of	
  personnel,	
  commensurate	
  with	
  the	
  risk	
  to	
  cri?cal	
  infrastructure	
  
                                 and	
  organiza?onal	
  objec?ves.	
  WORKFORCE	
  comprises	
  five	
  objec?ves:	
  
                                        1.	
  Assign	
  Cybersecurity	
  Responsibili?es	
  
                                        2.	
  Control	
  the	
  Workforce	
  Lifecycle	
  
                                        3.	
  Develop	
  Cybersecurity	
  Workforce	
  
                                        4.	
  Increase	
  Cybersecurity	
  Awareness	
  
                                        5.	
  Manage	
  WORKFORCE	
  Ac?vi?es	
  
Cybersecurity	
                  Establish	
  and	
  maintain	
  an	
  enterprise	
  cybersecurity	
  program	
  that	
  provides	
  
Program	
                        governance,	
  strategic	
  planning,	
  and	
  sponsorship	
  for	
  the	
  organiza?on’s	
  
Management	
                     cybersecurity	
  ac?vi?es	
  in	
  a	
  manner	
  that	
  aligns	
  cybersecurity	
  objec?ves	
  with	
  
(CYBER)	
                        the	
  organiza?on’s	
  strategic	
  objec?ves	
  and	
  the	
  risk	
  to	
  cri?cal	
  infrastructure.	
  
	
                               CYBER	
  comprises	
  five	
  objec?ves:	
  
                                        1.	
  Establish	
  Cybersecurity	
  Program	
  Strategy	
  
                                        2.	
  Sponsor	
  Cybersecurity	
  Program	
  
                                        3.	
  Establish	
  and	
  Maintain	
  Cybersecurity	
  Architecture	
  
                                        4.	
  Perform	
  Secure	
  Somware	
  Development	
  
ES-­‐C2M2	
  Case	
  Study	
  
                                        5.	
  Manage	
  CYBER	
  Ac?vi?es	
  

Más contenido relacionado

Destacado

Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
WICF Grass Roots Compliance
WICF Grass Roots ComplianceWICF Grass Roots Compliance
WICF Grass Roots ComplianceEnergySec
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program AssessmentsJohn Anderson
 
RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB CybersecurityAndy Kim
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesTony Moroney
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
 
JaspersoftBI analyse les tendances du rail
JaspersoftBI analyse les tendances du rail JaspersoftBI analyse les tendances du rail
JaspersoftBI analyse les tendances du rail Audaxis
 

Destacado (7)

Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
WICF Grass Roots Compliance
WICF Grass Roots ComplianceWICF Grass Roots Compliance
WICF Grass Roots Compliance
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program Assessments
 
RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB Cybersecurity
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best Practices
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
JaspersoftBI analyse les tendances du rail
JaspersoftBI analyse les tendances du rail JaspersoftBI analyse les tendances du rail
JaspersoftBI analyse les tendances du rail
 

Similar a Electricity Subsector Cybersecurity Capability Maturity Model Case Study

Ucs overview sap-rnicola
Ucs overview sap-rnicolaUcs overview sap-rnicola
Ucs overview sap-rnicolaRobert Nicola
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierRamsés Gallego
 
Driving the Road to Platform-as-a-Service (PaaS)
Driving the Road to Platform-as-a-Service (PaaS) Driving the Road to Platform-as-a-Service (PaaS)
Driving the Road to Platform-as-a-Service (PaaS) EMC
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec
 
Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...Emulex Corporation
 
NCOIC SCOPE Executive Overview
NCOIC SCOPE Executive OverviewNCOIC SCOPE Executive Overview
NCOIC SCOPE Executive OverviewGovCloud Network
 
Riverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN MonitoringRiverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN MonitoringRiverbed Technology
 
Acknowledge 06 Competentiemanagement In Het Acknowledge Platform Luk Vervenne...
Acknowledge 06 Competentiemanagement In Het Acknowledge Platform Luk Vervenne...Acknowledge 06 Competentiemanagement In Het Acknowledge Platform Luk Vervenne...
Acknowledge 06 Competentiemanagement In Het Acknowledge Platform Luk Vervenne...imec.archive
 
VMware Forum 2012 - EMC "The Way Ahead"
VMware Forum 2012 - EMC "The Way Ahead"VMware Forum 2012 - EMC "The Way Ahead"
VMware Forum 2012 - EMC "The Way Ahead"Magnus Backman
 
Financial Services Data - Use It or Lose It
Financial Services Data - Use It or Lose ItFinancial Services Data - Use It or Lose It
Financial Services Data - Use It or Lose ItJohn Avery
 
Technology Challenges in the Networked Society
Technology Challenges in the Networked SocietyTechnology Challenges in the Networked Society
Technology Challenges in the Networked SocietyEricsson Labs
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012Cisco Public Relations
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To ConsumeJeff Johnson
 
Reed simpson
Reed simpsonReed simpson
Reed simpsonNASAPMC
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdf
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdfJDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdf
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdfInSync2011
 
Pr 005 qa_workshop
Pr 005 qa_workshopPr 005 qa_workshop
Pr 005 qa_workshopFrank Gielen
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 

Similar a Electricity Subsector Cybersecurity Capability Maturity Model Case Study (20)

Ucs overview sap-rnicola
Ucs overview sap-rnicolaUcs overview sap-rnicola
Ucs overview sap-rnicola
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
 
Driving the Road to Platform-as-a-Service (PaaS)
Driving the Road to Platform-as-a-Service (PaaS) Driving the Road to Platform-as-a-Service (PaaS)
Driving the Road to Platform-as-a-Service (PaaS)
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012
 
Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...Introducing OneCommand Vision 3.0, I/O management that gives your application...
Introducing OneCommand Vision 3.0, I/O management that gives your application...
 
NCOIC SCOPE Executive Overview
NCOIC SCOPE Executive OverviewNCOIC SCOPE Executive Overview
NCOIC SCOPE Executive Overview
 
Gem Intelligence Structure
Gem Intelligence StructureGem Intelligence Structure
Gem Intelligence Structure
 
Riverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN MonitoringRiverbed Cascade and VXLAN Monitoring
Riverbed Cascade and VXLAN Monitoring
 
Acknowledge 06 Competentiemanagement In Het Acknowledge Platform Luk Vervenne...
Acknowledge 06 Competentiemanagement In Het Acknowledge Platform Luk Vervenne...Acknowledge 06 Competentiemanagement In Het Acknowledge Platform Luk Vervenne...
Acknowledge 06 Competentiemanagement In Het Acknowledge Platform Luk Vervenne...
 
VMware Forum 2012 - EMC "The Way Ahead"
VMware Forum 2012 - EMC "The Way Ahead"VMware Forum 2012 - EMC "The Way Ahead"
VMware Forum 2012 - EMC "The Way Ahead"
 
Financial Services Data - Use It or Lose It
Financial Services Data - Use It or Lose ItFinancial Services Data - Use It or Lose It
Financial Services Data - Use It or Lose It
 
Technology Challenges in the Networked Society
Technology Challenges in the Networked SocietyTechnology Challenges in the Networked Society
Technology Challenges in the Networked Society
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
Reed simpson
Reed simpsonReed simpson
Reed simpson
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdf
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdfJDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdf
JDE & Peoplesoft 2 _ Mike Ward _ Security implications of Upgrading JDE.pdf
 
Continuous Monitoring 2.0
Continuous Monitoring 2.0Continuous Monitoring 2.0
Continuous Monitoring 2.0
 
Pr 005 qa_workshop
Pr 005 qa_workshopPr 005 qa_workshop
Pr 005 qa_workshop
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 

Más de EnergySec

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...EnergySec
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...EnergySec
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityEnergySec
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementEnergySec
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsEnergySec
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachEnergySec
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsEnergySec
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...EnergySec
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueEnergySec
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...EnergySec
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherEnergySec
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherEnergySec
 

Más de EnergySec (20)

Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
Patrick Miller - Tackling Tomorrow's Biggest Cybersecurity Problems with Real...
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
Steve Parker - The Internet of Everything: Cyber-defense in an Age of Ubiquit...
 
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber SecurityDaniel Lance - What "You've Got Mail" Taught Me About Cyber Security
Daniel Lance - What "You've Got Mail" Taught Me About Cyber Security
 
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change ManagementLessons Learned For NERC CIPv5 Compliance & Configuration Change Management
Lessons Learned For NERC CIPv5 Compliance & Configuration Change Management
 
Explore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWsExplore the Implicit Requirements of the NERC CIP RSAWs
Explore the Implicit Requirements of the NERC CIP RSAWs
 
Wireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of ReachWireless Sensor Networks: Nothing is Out of Reach
Wireless Sensor Networks: Nothing is Out of Reach
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Industrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With ScissorsIndustrial Technology Trajectory: Running With Scissors
Industrial Technology Trajectory: Running With Scissors
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
 
Where Cyber Security Meets Operational Value
Where Cyber Security Meets Operational ValueWhere Cyber Security Meets Operational Value
Where Cyber Security Meets Operational Value
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
SAP’s Utilities Roadmap Overview, The Evolution of Regulatory Compliance and ...
 
Industry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working TogetherIndustry Reliability and Security Standards Working Together
Industry Reliability and Security Standards Working Together
 
What the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each OtherWhat the Department of Defense and Energy Sector Can Learn from Each Other
What the Department of Defense and Energy Sector Can Learn from Each Other
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Electricity Subsector Cybersecurity Capability Maturity Model Case Study

  • 1. Electricity  Subsector  Cybersecurity     Capability  Maturity  Model  (ES-­‐C2M2)   Case  Study:   Benjamin  Beberness        Snohomish  County  PUD      Snohomish  County  PUD      Ini?al  Facilitated  Assessment   John  Fry      August  2012      ICF  Interna?onal  
  • 2. ES-­‐C2M2  Background  &  Overview   •  Challenge:  Develop  capabili?es  to   ES-­‐C2M2  ObjecCves   manage  dynamic  threats  and   understand  cybersecurity  posture   •  Strengthen  cybersecurity   of  the  grid   capabiliCes   •  Enable  consistent   •  Approach:  Develop  a  maturity   evalua?on  and   model  and  self-­‐evalua?on  survey  to   benchmarking  of     develop  and  measure  cybersecurity   cybersecurity  capabili?es   capabili?es   •  Share  knowledge  and   best  prac?ces   •  Results:  A  scalable,  sector-­‐specific   •  Enable  prioriCzed  ac?ons   model  created  in  partnership  with   and  cybersecurity   industry   investments   2   ES-­‐C2M2  Case  Study  
  • 3. Why  Create  a  Maturity  Model?   If you want to build a ship, don’t herd people together to collect wood and don’t assign tasks and work, but rather, teach them to long for the endless immensity of the sea. –  Antoine de Saint-Exupery 3   ES-­‐C2M2  Case  Study  
  • 4. Why  Create  a  Maturity  Model?   •   Tool  for  u?li?es  (opposed  to  regula?on  from  Government)   •   Helps  answer  ques?ons   –  Where are we? –  Where do we go? –  How do we get there? 4   ES-­‐C2M2  Case  Study  
  • 5. ES-­‐C2M2  Domains   Asset, Change, Identity and Threat and ACCESS THREAT ASSET Risk and RISK Access Vulnerability Management Configuration Management Management Management DEPENDENCIES Event and Supply Chain RESPONSE SITUATION SHARING Information Incident Situational and External Sharing and Response, Awareness Dependencies Communications Continuity of Management Operations •  Domains  are  logical  groupings  of   WORKFORCE Cybersecurity cybersecurity  pracCces   CYBER Workforce Program Management •  Each  domain  has  a  short  name  for  easy   Management reference   5   ES-­‐C2M2  Case  Study  
  • 6. Model  Architecture   Domain   Domain   ObjecCve   ObjecCve   ObjecCve   1   2   Maturity   MIL   MIL   Indicator  Level   1   2   (MIL)   PracCce   PracCce  1   PracCce  2   6   ES-­‐C2M2  Case  Study  
  • 7. Example:  Objec?ves   SituaConal  Awareness:  4  ObjecCves   1. Perform  Logging   –  MIL1, MIL2, MIL3 2. Monitor  the  FuncCon   –  MIL1, MIL2, MIL3 3. Establish  and  Maintain  a  Common  OperaCng  Picture   –  MIL1, MIL2, MIL3 4. Manage  SITUATION  AcCviCes  (common  objecCve)   –  MIL1, MIL2, MIL3     7   ES-­‐C2M2  Case  Study  
  • 8. Example:  Prac?ce  Maturity   Progression   8   ES-­‐C2M2  Case  Study  
  • 9. Example:  Prac?ce  Maturity   Progression   9   ES-­‐C2M2  Case  Study  
  • 10. Example:  Prac?ce  Maturity   Progression   SituaConal  Awareness  “Monitor  the  FuncCon”     •  MIL1  –  Cybersecurity  monitoring  ac?vi?es  are  performed   (e.g.,  periodic  reviews  of  log  data)   •  MIL2  –  Alarms  and  alerts  are  configured  to  aid  the   iden?fica?on  of  cybersecurity  events •  MIL3  –  Con?nuous  monitoring  is  performed  across  the   opera?onal  environment  to  iden?fy  anomalous  ac?vity     10   ES-­‐C2M2  Case  Study  
  • 11. The  Model  at  a  Glance   X  Reserved   1  Maturity  Indicator  Level  that  is  reserved  for  future  use   Maturity  Indicator  Levels   3  Managed   2  Performed   4  Maturity  Indicator  Levels:  Defined  progressions  of  prac?ces   Each  cell  contains  the  defining  prac?ces  for   1  Ini?ated   the  domain  at  that  maturity  indicator  level   0  Not  Performed   DEPENDENCIES WORKFORCE RESPONSE SITUATION SHARING ACCESS THREAT CYBER ASSET RISK 10  Model  Domains:  Logical  groupings  of  cybersecurity  prac?ces   11   ES-­‐C2M2  Case  Study  
  • 12. Using  the  Evalua?on  Results     12   ES-­‐C2M2  Case  Study  
  • 13. Using  the  Evalua?on  Results     13  
  • 14. Assessed  Domains   •  Enterprise  versus  func?onal  area   •  Assessed  Domains   –  Risk Management (RISK) –  Asset, Change, and Configuration Management (ASSET) –  Identity and Access Management (ACCESS) –  Threat and Vulnerability Management (THREAT) –  Situational Awareness (SITUATION) –  Information Sharing and Communications (SHARING) –  Event and Incident Response, Continuity of Operations (RESPONSE) –  Supply Chain and External Dependencies Management (DEPENDENCIES) –  Workforce Management (WORKFORCE) –  Cybersecurity Program Management (CYBER) 14  
  • 15. SNOPUD  Rela?ve  Scoring   1 3 3 3 5 6 5 2 5 7 2 5 5 8 5 6 13 9 3 MIL3 9 5 13 13 24 26 7 25 33 31 22 52 15 13 30 38 31 10 10 7 7 13 12 12 12 13 15 11 19 1 1 2 2 1 3 2 1 2 1 2 3 4 5 7 7 8 11 MIL2 13 5 7 15 7 4 16 19 8 16 11 28 19 8 19 11 21 8 10 5 8 4 8 2 6 9 4 1 1 3 1 2 MIL1 1 2 1 6 6 3 6 3 2 12 2 4 2 6 4 5 1 5 9 3 3 2 6 Situation Dependencies Sharing Asset Response Cyber Risk Access Threat Workforce Fully  implemented Partially  implemented Largely  implemented Not  implemented Maturity  Indicator  Level  (MIL)  1  through  3  indicate  the  stage  of  implementa?on  of   the  domain  with  1  indica?ng  there  is  room  for  improvement  and  3  indica?ng  it  is   fully  implemented  with  very  lidle  room  for  improvement.  Not  all  domains  for  every   organiza?on  need  to  be  at  MIL  3.  Many  organiza?ons,  based  on  the  risk  profile,  may   have  an  adequate  program  at  MIL  1.   15  
  • 16. Assessment  Results   •  No  surprises  –  areas  needing  improvement  were  known   •  Facilitators  were  very  objec?ve   •  Areas  for  improvement  include  risk  management  and  log  management,   and  areas  of  asset  management   •  Areas  where  program  elements  are  in  place  include  areas  of  asset   management,  access  control  (policy),  threat/vulnerability  management,   sharing  and  managing  informa?on,  threat  response,  dependencies,   workforce  management,  and  cyber  program  management   •  The  assessment  provided  quan?ta?ve  guidance  for  program  improvement   –  Review individual function areas (Generation, Water, T&D) –  Determine the individual as well as the functional domain target maturity goals –  Prioritize objectives in overall cyber security program 16   ES-­‐C2M2  Case  Study  
  • 17. No?onal  Sample  Report   Actual  vs.  Desired  Score   17   ES-­‐C2M2  Case  Study  
  • 18. ES-­‐C2M2  -­‐  Next  Steps   •  Share   Best  PracCces  within  the  sector   •  Identify approaches for Capability Development •  Discussion Opportunities created •  Develop  anonymous  aggregated   Benchmarking  Data   •    R&D  Investment  needs  iden?fied  by  result  data   •  Access  to  Online   Training  Tools     18   ES-­‐C2M2  Case  Study  
  • 19. Next  Steps   •  Data  collec?on   –  ES-C2M2 compartment within US-CERT Portal –  PCII protections –  Projected timeline •  Data  Analy?cs   •  Benchmark  Data   19   ES-­‐C2M2  Case  Study  
  • 20. No?onal  Sample  Comparison  Report   20   ES-­‐C2M2  Case  Study  
  • 21. Links   ES-C2M2 Model http://energy.gov/oe/downloads/electricity-subsector- cybersecurity-capability-maturity-model-may-2012 ES-C2M2 Self-Evaluation Tool Requests, Questions, or Requests for Facilitation ES-C2M2@doe.gov 21   ES-­‐C2M2  Case  Study  
  • 22. For  ques?ons  or  feedback  please  contact  ES-­‐C2M2@HQ.DOE.GOV   THANK  YOU   22   ES-­‐C2M2  Case  Study  
  • 24. ES-­‐C2M2  Domain  Descrip?ons   Domain   DescripCon   Risk  Management   Establish,  operate,  and  maintain  an  enterprise  cybersecurity  risk   (RISK)   management  program  to  iden?fy,  analyze,  and  mi?gate  cybersecurity   risk  to  the  organiza?on,  including  its  business  units,  subsidiaries,  related   interconnected  infrastructure,  and  stakeholders.  RISK  comprises  three   objec?ves:   1.  Establish  Cybersecurity  Risk  Management  Strategy   2.  Manage  Cybersecurity  Risk   3.  Manage  RISK  Ac?vi?es   Asset,  Change,  and   Manage  the  organiza?on’s  opera?ons  technology  (OT)  and  informa?on   ConfiguraCon   technology  (IT)  assets,  including  both  hardware  and  somware,   Management   commensurate  with  the  risk  to  cri?cal  infrastructure  and  organiza?onal   (ASSET)   objec?ves.  ASSET  comprises  four  objec?ves:   1.  Manage  Asset  Inventory     2.  Manage  Asset  Configura?on     3.  Manage  Changes  to  Assets     4.  Manage  ASSET  Ac?vi?es     ES-­‐C2M2  Case  Study  
  • 25. ES-­‐C2M2  Domain  Descrip?ons   Domain   DescripCon   IdenCty  and  Access   Create  and  manage  iden??es  for  en??es  that  may  be  granted  logical  or   Management   physical  access  to  the  organiza?on’s  assets.  Control  access  to  the   (ACCESS)   organiza?on’s  assets,  commensurate  with  the  risk  to  cri?cal     infrastructure  and  organiza?onal  objec?ves.  ACCESS  comprises  three   objec?ves:   1.  Establish  and  Maintain  Iden??es   2.  Control  Access   3.  Manage  ACCESS  Ac?vi?es     Threat  and   Establish  and  maintain  plans,  procedures,  and  technologies  to  detect,   Vulnerability   iden?fy,  analyze,  manage,  and  respond  to  cybersecurity  threats  and   Management   vulnerabili?es,  commensurate  with  the  risk  to  the  organiza?on’s   (THREAT)   infrastructure  (e.g.,  cri?cal,  IT,  opera?onal)  and  organiza?onal  objec?ves.   THREAT  comprises  three  objec?ves:   1.  Iden?fy  and  Respond  to  Threats   2.  Reduce  Cybersecurity  Vulnerabili?es   3.  Manage  THREAT  Ac?vi?es   ES-­‐C2M2  Case  Study  
  • 26. ES-­‐C2M2  Domain  Descrip?ons   Domain   DescripCon   SituaConal   Establish  and  maintain  ac?vi?es  and  technologies  to  collect,  analyze,   Awareness   alarm,  present,  and  use  power  system  and  cybersecurity  informa?on,   (SITUATION)   including  status  and  summary  informa?on  from  the  other  model     domains,  to  form  a  common  opera?ng  picture  (COP),  commensurate   with  the  risk  to  cri?cal  infrastructure  and  organiza?onal  objec?ves.   SITUATION  comprises  four  objec?ves:   1.  Perform  Logging   2.  Monitor  the  Func?on   3.  Establish  and  Maintain  a  Common  Opera?ng  Picture     4.  Manage  SITUATION  Ac?vi?es     InformaCon  Sharing   Establish  and  maintain  rela?onships  with  internal  and  external  en??es  to   and  CommunicaCons   collect  and  provide  cybersecurity  informa?on,  including  threats  and   (SHARING)   vulnerabili?es,  to  reduce  risks  and  to  increase  opera?onal  resilience,     commensurate  with  the  risk  to  cri?cal  infrastructure  and  organiza?onal   objec?ves.  SHARING  comprises  two  objec?ves:   1.  Share  Cybersecurity  Informa?on   2.  Manage  SHARING  Ac?vi?es   ES-­‐C2M2  Case  Study  
  • 27. ES-­‐C2M2  Domain  Descrip?ons   Domain   DescripCon   Event  and  Incident   Establish  and  maintain  plans,  procedures,  and  technologies  to  detect,   Response,  ConCnuity   analyze,  and  respond  to  cybersecurity  events  and  to  sustain  opera?ons   of  OperaCons   throughout  a  cybersecurity  event,  commensurate  with  the  risk  to  cri?cal   (RESPONSE)   infrastructure  and  organiza?onal  objec?ves.  RESPONSE  comprises  five     objec?ves:   1.  Detect  Cybersecurity  Events   2.  Escalate  Cybersecurity  Events   3.  Respond  to  Escalated  Cybersecurity  Events   4.  Plan  for  Con?nuity   5.  Manage  RESPONSE  Ac?vi?es     Supply  Chain  and   Establish  and  maintain  controls  to  manage  the  cybersecurity  risks   External   associated  with  services  and  assets  that  are  dependent  on  external   Dependencies   en??es,  commensurate  with  the  risk  to  cri?cal  infrastructure  and   Management   organiza?onal  objec?ves.  DEPENDENCIES  comprises  three  objec?ves:   (DEPENDENCIES)   1.  Iden?fy  Dependencies     2.  Manage  Dependency  Risk   3.  Manage  DEPENDENCIES  Ac?vi?es     ES-­‐C2M2  Case  Study  
  • 28. ES-­‐C2M2  Domain  Descrip?ons   Domain   DescripCon    Workforce   Establish  and  maintain  plans,  procedures,  technologies,  and  controls  to  create   Management   a  culture  of  cybersecurity  and  to  ensure  the  ongoing  suitability  and   (WORKFORCE)   competence  of  personnel,  commensurate  with  the  risk  to  cri?cal  infrastructure   and  organiza?onal  objec?ves.  WORKFORCE  comprises  five  objec?ves:   1.  Assign  Cybersecurity  Responsibili?es   2.  Control  the  Workforce  Lifecycle   3.  Develop  Cybersecurity  Workforce   4.  Increase  Cybersecurity  Awareness   5.  Manage  WORKFORCE  Ac?vi?es   Cybersecurity   Establish  and  maintain  an  enterprise  cybersecurity  program  that  provides   Program   governance,  strategic  planning,  and  sponsorship  for  the  organiza?on’s   Management   cybersecurity  ac?vi?es  in  a  manner  that  aligns  cybersecurity  objec?ves  with   (CYBER)   the  organiza?on’s  strategic  objec?ves  and  the  risk  to  cri?cal  infrastructure.     CYBER  comprises  five  objec?ves:   1.  Establish  Cybersecurity  Program  Strategy   2.  Sponsor  Cybersecurity  Program   3.  Establish  and  Maintain  Cybersecurity  Architecture   4.  Perform  Secure  Somware  Development   ES-­‐C2M2  Case  Study   5.  Manage  CYBER  Ac?vi?es  

Notas del editor

  1. We can’t regulate our way out of this.
  2. Domains serve as large groupings of practices by knowledge area (Example: Situational Awareness)Objectives are groupings of practices similar in the type of activity they describe (Example: practices having to do with Monitoring)Maturity Indicator Levels are groupings of practices similar in the level of sophistication or maturity. MILs got their name because they do not describe cybersecurity exactly, but instead provide an indication of the level of maturity of an organizations cybersecurity activitiesPractices are the activities performed in support of an organizations cybersecurity objectives
  3. You may notice the last objective has the words “common objective” next to it in parentheses. This is something you will see in each domain. The last objective describes the actions taken to manage activities within the domain. Describes how much the domain has become a part of the organization.This is referred to in the model as “institutionalization”.The more ingrained into the organization the more likely it is that it will be continued over time, when talented people leave or in times of stress. The other three objectives provide a snapshot of the maturity of practices at any single point in time.
  4. 11 practices all having to do with monitoring
  5. Each ring has a total score. Each section of the ring includes a numerical rating per color. An example would be Risk MIL 1 has a rating of 2 with a total “green” score of 1+1=2, i.e., fully implemented. Cyber MIL 3 has a rating of 31 with a “green” score of 26 and a “red score” of 5, indicating largely implemented with areas needing improvement. The ratings for each ring are weighted scores, based on the model.