Remote - Summer 2013 - (Page 6)

Feature Article Grid Modernization and Cyber Security Trends Erich Gunther, IEEE Smart Grid Expert Chairman, CTO, and Co-Founder, Enernex, Slade Griffin, Director of Energy Systems Security, Enernex Hands-On Hacking More offerings are beginning to pop up allowing the most technical staff As the electric grid is modernized through interconnections and the to learn how to attack and defend both the Information Technology (IT) ability to interact remotely, the risk of cyber attack increases. Fortunately, portions of a control system, as well as purpose-built devices like programthe growing availability of cyber security training options to combat these mable logic controllers and smart meters. These courses teach professionals attacks is also on the rise. Training now ranges from regulatory compliance how to find and exploit vulnerabilities within systems and devices, which and cyber security program development to hands-on hacking. Another ultimately provides a greater understanding of how to defend them. This favorable trend is the coming together of utilities, vendors, government and type of training offers a hands-on look at how to understand security from private contractors for the purpose of collaboration in organized user group the bottom up within an organization. and projects. These are proactive trends to take on cyber security risks, however, there are ongoing challenges that must be overcome. Although the Protocol and Architecture Training proper authority and funding of security programs is starting to improve, The emergence of new standards and guidelines like IEC 61850, necessary levels of staffing, funding and training are not yet being met. OpenADE, OpenADR, ZigBee SEP2.0 and DNP3 have created the need Over the past several years control systems networks, or operations for specific training in these technology, which are critical areas. Utilities and vendors for the correct functioning of wishing to have deeper unpower generation, transmisderstanding of how to implesion, and delivery, are being ment these architectures and modernized and labeled protocols can attend and have “smart grid.” Most often this questions answered without term refers to a technological having to volunteer staff in overlay or interconnection the various working groups. that provides remote access, With respect to traincontrol, visualization or ing, there has also been an communication to a system increase in management that may not have previously attendance in the classes. had this type of capability. As Having managers present interconnections and the abilin these classes indicates a ity to interact remotely are greater level of interest in added there is a potential to the subject matter. Many of increase the risk level of that the mangers also seem to be system. Additionally, many working towards establishing systems are now using public budgets and more robust sechannels, such as the cellular Security should be built-in, and continually monitored and assessed curity programs within their network and the Internet to organizations. This type of communicate and that also effort is sorely needed to reverse a trend of underfunding, understaffing and contributes to the level of risk applied to that system. undertraining that has remained fairly steady over the past several years. As a result, cyber security training has been become a priority and is steadily gaining attention. There are now several training options for personnel or companies needing to improve their understanding of the various Reassessing Cyber Security’s Role, Funding and Training layers of security that must be applied to any interconnected system. There has been a consistent lack of establishing a dedicated staff for security in both traditional IT and in smart grid. Some organizations are actually moving their technical teams into more administrative roles, and Cyber Security Training Options relying solely on compliance for their security programs. There are few NERC-CIP – North American Electric Reliability Corporation cases where organizations adequately fund and pursue solid security proCritical Infrastructure Protection grams. More often individuals or organizations are experiencing some or all This is compliance-based training to deepen understanding of regulatory of the following issues: guidelines that have been established. Courses are offered that provide both • Understaffing – It is worth it to look closely at the security team and general overviews on designing and implementing a Critical Infrastructure seek input from the “boots on the ground” about staffing levels. Too freProtection (CIP) compliance program, as well as deeper dives that focus quently large organizations dedicate only a single person to cyber security. on one or two specific CIP regulations and deal with the technical details This can be a symptom of underfunding. needed to improve and maintain compliance. • Underfunding – It is said that IT should be 15 to 20 percent of an overall organization’s budget and cyber security should be 15 to 20 percent Cyber Security Program Development of that amount. This would mean for every one million dollars of budget, These courses are designed to implement an overarching program to $200,000 would be allocated to IT, and $40,000 would be allocated to cyber establish a secure foundation to build out smart grid systems and programs security. While power systems and IT are not the same thing, this metric in a secure manner. The National Rural Electrical Cooperative Association may still work to plan out future projects. (NRECA) developed a comprehensive set of documents two years ago to • Undertraining – This is perhaps the toughest issue to overcome. How address the need for secure programs. As a follow-on offering the NRECA does someone who isn’t a cyber security expert identify someone to lead regularly offers one-day classes that discuss how and why to build these a team? The National Board of Information Security Examiners (NBISE ) programs into daily operations. Most importantly it drives home the idea is attempting to solve this by putting forth a set of metrics to help identify that security should be built in to a system or product and that it is a concompetent practitioners at different levels and applications. The ability to tinual process, as shown in the figure above. 6 www.RemoteMagazine.com http://www.RemoteMagazine.com

Table of Contents for the Digital Edition of Remote - Summer 2013

Editor's Choice
Grid Modernization and Cyber Security Trends
Navigating the Big Data Jungle - How Utilities Can Rise To the Challenge with Analytics
Remote Monitoring: Is it a Global Trend?
Critical Infrastructure, Crital Need
Solutions for Transformer Monitoring
Securing Remote Networks Against Cyber Security – NetFlow to the Rescue
ZigBee Resource Guide
SCADA
Networking
Remote Conference Update
Security
Onsite Power
Industry News
Application Feature

Remote - Summer 2013

https://www.nxtbook.com/nxtbooks/webcom/remote_2016winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2016fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2016
https://www.nxtbook.com/nxtbooks/webcom/remote_2016spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2015fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2015m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2015spring
https://www.nxtbook.com/nxtbooks/webcom/remote_industrialnetworking2014
https://www.nxtbook.com/nxtbooks/webcom/remote_2014fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2014m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2014spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2013winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2013m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2013fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2013summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2013spring
https://www.nxtbook.com/nxtbooks/webcom/remote_2012winter
https://www.nxtbook.com/nxtbooks/webcom/remote_2012m2m
https://www.nxtbook.com/nxtbooks/webcom/remote_2012fall
https://www.nxtbook.com/nxtbooks/webcom/remote_2012summer
https://www.nxtbook.com/nxtbooks/webcom/remote_2012scada
https://www.nxtbook.com/nxtbooks/webcom/remote_2012spring
https://www.nxtbook.com/nxtbooks/webcom/remote_201112
https://www.nxtbook.com/nxtbooks/webcom/remote_201110
https://www.nxtbook.com/nxtbooks/webcom/remote_201108
https://www.nxtbookmedia.com