This Cybersecurity webinar addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids. Cyber threats and vulnerabilities, including cyber attacks, will be addressed; as well as Smart Grid trends, and privacy and data integrity issues. United States, European, and International organizations and initiatives to address cybersecurity for utilities will be discussed. The webinar will conclude with strategies to improve cybersecurity. A second cybersecurity webinar (programmed in September 2017) will address best practices, case studies, and legal and regulatory constraints for architecting smart grids in a secure way.
Wireless Networked Control Systems (WNCSs) are spatially distributed systems in which sensors, actuators, and controllers connect through a wireless network instead of traditional point-to-point links. WNCSs have a tremendous potential to improve the efficiency of many large-scale distributed systems in industrial automation, building automation, automated highway, air transportation, and smart grid. Transmitting sensor measurements and control commands over wireless links provide many benefits such as the ease of installation and maintenance, low complexity and cost, and large flexibility to accommodate the modification and upgrade of the components in many control applications. Several industrial organizations, such as International Society of Automation (ISA), Highway Addressable Remote Transducer (HART), and Wireless In- dustrial Networking Alliance (WINA), have been actively pushing the application of wireless technologies in the control applications. Building a WNCS is very challenging since control systems often have stringent requirements on timing and reliability, which are difficult to attain by wireless sensor networks due to the adverse properties of the wireless communication and limited battery resources of the nodes. We provide a framework for the joint optimization of controller and communication systems encompassing efficient abstractions of both systems.
The document discusses smart grids and their challenges. It defines a smart grid as a modernized electrical grid that uses communications technology to improve efficiency. Key aspects of smart grids include reliability, efficiency, load balancing, sustainability, and two-way power and data flows. However, challenges include inadequate existing infrastructure, intermittent renewable resources, and regulatory policies around pricing. Overall, smart grids aim to enable active consumer participation, accommodate diverse energy sources, and operate resiliently.
The document discusses smart grid technology, including its key features and components. A smart grid uses two-way digital communication to deliver power more efficiently by integrating renewable energy, automated demand response, and distributed generation. It allows for better management of supply and demand through technologies like smart meters, power line communication, and advanced distribution automation. The smart grid aims to address issues with existing power grids like high outage costs and inefficient peak load management through real-time monitoring and control enabled by communication networks and technologies. Future work is still needed in areas like security, standardization, and reducing upfront consumer expenses.
This document discusses communications technologies for smart grids, including Zigbee, wireless mesh networks, cellular networks, powerline communication, and digital subscriber lines. It analyzes the advantages and disadvantages of each technology and describes smart grid communication requirements like security, reliability, scalability, and quality of service. Key smart grid standards are also outlined covering various areas such as revenue metering, building automation, powerline networking, device communication, cybersecurity, and electric vehicles.
Protection against overvoltage
overvoltage
causes of overvoltage
lightning
types of lightning strokes
harmful effect of lightning
protection against lightning
This document provides an overview of advanced metering infrastructure (AMI) for smart grids. It begins with outlining the challenges faced by today's electric grids, such as peak demand, power theft, lack of visibility, and aging infrastructure. It then presents the conceptual model of a smart grid, including bidirectional power and information flows. Key components of AMI are described, including smart meters, smart appliances, and various communication technologies. The role of AMI in enabling applications like bulk meter reading, demand response, and outage notification is explained. Finally, the document discusses a smart grid pilot project in Puducherry, India and lists relevant resources and companies in the field.
The document discusses power system security and smart grids. It defines power system security as the probability of the system operating within acceptable ranges given potential changes or contingencies. Contingency analysis is a major component of security assessment and involves defining possible contingencies, selecting important ones to evaluate, and ranking them by risk level. Voltage stability refers to the ability of a system to maintain steady voltages during disturbances and can be analyzed statically or dynamically. Smart grids use digital technology to monitor, control, and analyze the power system for more efficient transmission and integration of renewable energy.
Smart meters are advanced electric meters that allow two-way communication between the utility and customers. They provide benefits like more accurate billing, outage detection, and potential cost savings through time-based pricing programs. However, some are concerned about the health effects of the radiofrequency radiation emitted by smart meters and their mesh networks. Opponents argue that smart meters increase overall radiation exposure and fossil fuel usage compared to traditional analog meters. The World Health Organization has classified radiofrequency electromagnetic fields as possibly carcinogenic to humans based on some evidence of increased cancer risk from cell phone use.
This document discusses cyber security concerns regarding smart grid technology integration. It outlines how increased data sharing and connectivity between new and legacy systems introduces new cyber vulnerabilities. It then summarizes existing cyber security standards from organizations like ISO, NERC, and IEC that can provide frameworks for addressing these vulnerabilities. Finally, it notes challenges integrating new technologies with legacy systems and the need for a strategic roadmap to help guide secure technology adoption.
The document discusses smart meters and the smart grid. It defines the electric grid and how smart grids modernize it using communication technologies. Smart meters are two-way communicating electric meters that provide more detailed energy usage data to utilities in real-time. They are different than conventional meters by being bi-directional and able to connect to home networks and the smart grid. The benefits of smart meters include more accurate billing, outage detection, load management capabilities, and energy savings.
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
SUMMARY - Current power grids increasingly emerging into smart networked grids and are more accessible from the public internet which poses new cyber threats in the grid. More computer based systems are introduced into power networks in order to monitor and control the network. Future model smart grid and micro grid systems will be based on data flows for communication of system status, usage and control throughout the network infrastructure in addition to the power flow. This creates new security threats on the power grid. Instead of relying mainly on power plants for power generation, there will be a combination of multiple generation sources and at the same time wider use of electrical computer based equipment by consumers. Both increase the amount of data flows in the network as well as introduce additional vulnerable spots. Vulnerability of the power grid to cyber-attacks increases even more because of the wide use of SCADA networks. SCADA networks are more accessible to the internet and lack authentication and authorization mechanisms therefore expose the grid to threats such as DDOS, Data interception, Data alteration and additional hacking threats.
The transition from present to future model has already begun and rapidly growing while it already poses new security challenges which must be attended immediately. It is essential to introduce immediately a single comprehensive security solution which will provide fast detection and prevention tools to cope with a variety of threats with different nature and from multiple sources. The solution should not be tightly coupled with each device in the network so it won’t require upgrade of the devices inside the grid.
The Cyber defense solution should be versatile using variety of cyber technologies such as Firewalls, anomaly detection, Big Data analytics, machine learning and more in a network wise combination.
This document discusses cyber security challenges for the smart grid and outlines NIST's efforts to address them. It provides background on the electric grid and goals of the smart grid. The smart grid will be more complex and interconnected, introducing new security risks. NIST published guidelines for smart grid cyber security to help integrate security during modernization. The guidelines provide a risk assessment framework and recommended security requirements but do not mandate specific solutions.
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...
This document discusses the development of an edge-deployed cyber security hardware architecture to protect critical energy delivery systems from cyber threats. The system uses sensors and machine learning to monitor programmable logic controllers (PLCs) that control infrastructure like pipelines and the electric grid. If a PLC is compromised, the system can take control of the PLC to maintain operations and prevent disruptions to critical sites like hospitals. The hardware solution is designed to integrate with existing infrastructure and provide real-time protection, restoration of control, and resilience against cyberattacks or other incidents affecting energy systems.
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
1) Thales provides data encryption and security solutions for critical infrastructure sectors like utilities and energy. It has the number 1 market share for payment hardware security modules, general purpose HSMs, and cloud HSMs.
2) Cyber attacks on critical infrastructure are increasing, with ransomware attacks hitting 649 entities in 2021. Operational technology systems are also vulnerable, suffering 83% of breaches.
3) Thales provides end-to-end encryption solutions for critical infrastructure clients to securely transmit sensitive data. Case studies outline deployments for a global energy company and major UK energy operator to encrypt data across hybrid IT and protect critical communications.
The document provides an introduction to smart grid technologies. It defines a smart grid as an electricity network that uses digital computing and communication technologies to intelligently integrate generators, consumers, and prosumers. The key components of a smart grid include smart meters, home energy management systems, renewable generation integration, and technologies like sensing and advanced control methods. While smart grids provide benefits like improved reliability and sustainability, challenges remain around costs, policy and regulation, and ensuring interoperability between new and old equipment. Overall, smart grids are seen as revolutionizing the electrical network for more efficient, reliable and green energy in the future.
Smart Grid: Definition
• Need of smart grid
• Smart grid functions
• How Smart Grid Works
• Smart Grid: Benefits
• Smart grid components and its Benefits
• Issues and Challenges
• Opportunities in future
• Smart Grid Projects in India and Gujarat
• Question-Answer
• References
This document discusses advanced metering infrastructure (AMI). It defines AMI as a system that allows for two-way communication between utilities and smart meters, enabling near real-time collection and transfer of energy usage data. The key components of an AMI system include smart meters, communications infrastructure, home area networks, a meter data management system, and operational gateways. While costly to implement, AMI provides benefits like improved reliability, lower energy costs, and reduced electricity theft. The document also examines AMI in the context of India's power grid and estimates costs associated with deployment.
Wireless Networked Control Systems (WNCSs) are spatially distributed systems in which sensors, actuators, and controllers connect through a wireless network instead of traditional point-to-point links. WNCSs have a tremendous potential to improve the efficiency of many large-scale distributed systems in industrial automation, building automation, automated highway, air transportation, and smart grid. Transmitting sensor measurements and control commands over wireless links provide many benefits such as the ease of installation and maintenance, low complexity and cost, and large flexibility to accommodate the modification and upgrade of the components in many control applications. Several industrial organizations, such as International Society of Automation (ISA), Highway Addressable Remote Transducer (HART), and Wireless In- dustrial Networking Alliance (WINA), have been actively pushing the application of wireless technologies in the control applications. Building a WNCS is very challenging since control systems often have stringent requirements on timing and reliability, which are difficult to attain by wireless sensor networks due to the adverse properties of the wireless communication and limited battery resources of the nodes. We provide a framework for the joint optimization of controller and communication systems encompassing efficient abstractions of both systems.
The document discusses smart grids and their challenges. It defines a smart grid as a modernized electrical grid that uses communications technology to improve efficiency. Key aspects of smart grids include reliability, efficiency, load balancing, sustainability, and two-way power and data flows. However, challenges include inadequate existing infrastructure, intermittent renewable resources, and regulatory policies around pricing. Overall, smart grids aim to enable active consumer participation, accommodate diverse energy sources, and operate resiliently.
The document discusses smart grid technology, including its key features and components. A smart grid uses two-way digital communication to deliver power more efficiently by integrating renewable energy, automated demand response, and distributed generation. It allows for better management of supply and demand through technologies like smart meters, power line communication, and advanced distribution automation. The smart grid aims to address issues with existing power grids like high outage costs and inefficient peak load management through real-time monitoring and control enabled by communication networks and technologies. Future work is still needed in areas like security, standardization, and reducing upfront consumer expenses.
This document discusses communications technologies for smart grids, including Zigbee, wireless mesh networks, cellular networks, powerline communication, and digital subscriber lines. It analyzes the advantages and disadvantages of each technology and describes smart grid communication requirements like security, reliability, scalability, and quality of service. Key smart grid standards are also outlined covering various areas such as revenue metering, building automation, powerline networking, device communication, cybersecurity, and electric vehicles.
Protection against overvoltage
overvoltage
causes of overvoltage
lightning
types of lightning strokes
harmful effect of lightning
protection against lightning
This document provides an overview of advanced metering infrastructure (AMI) for smart grids. It begins with outlining the challenges faced by today's electric grids, such as peak demand, power theft, lack of visibility, and aging infrastructure. It then presents the conceptual model of a smart grid, including bidirectional power and information flows. Key components of AMI are described, including smart meters, smart appliances, and various communication technologies. The role of AMI in enabling applications like bulk meter reading, demand response, and outage notification is explained. Finally, the document discusses a smart grid pilot project in Puducherry, India and lists relevant resources and companies in the field.
The document discusses power system security and smart grids. It defines power system security as the probability of the system operating within acceptable ranges given potential changes or contingencies. Contingency analysis is a major component of security assessment and involves defining possible contingencies, selecting important ones to evaluate, and ranking them by risk level. Voltage stability refers to the ability of a system to maintain steady voltages during disturbances and can be analyzed statically or dynamically. Smart grids use digital technology to monitor, control, and analyze the power system for more efficient transmission and integration of renewable energy.
Smart meters are advanced electric meters that allow two-way communication between the utility and customers. They provide benefits like more accurate billing, outage detection, and potential cost savings through time-based pricing programs. However, some are concerned about the health effects of the radiofrequency radiation emitted by smart meters and their mesh networks. Opponents argue that smart meters increase overall radiation exposure and fossil fuel usage compared to traditional analog meters. The World Health Organization has classified radiofrequency electromagnetic fields as possibly carcinogenic to humans based on some evidence of increased cancer risk from cell phone use.
This document discusses cyber security concerns regarding smart grid technology integration. It outlines how increased data sharing and connectivity between new and legacy systems introduces new cyber vulnerabilities. It then summarizes existing cyber security standards from organizations like ISO, NERC, and IEC that can provide frameworks for addressing these vulnerabilities. Finally, it notes challenges integrating new technologies with legacy systems and the need for a strategic roadmap to help guide secure technology adoption.
The document discusses smart meters and the smart grid. It defines the electric grid and how smart grids modernize it using communication technologies. Smart meters are two-way communicating electric meters that provide more detailed energy usage data to utilities in real-time. They are different than conventional meters by being bi-directional and able to connect to home networks and the smart grid. The benefits of smart meters include more accurate billing, outage detection, load management capabilities, and energy savings.
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
SUMMARY - Current power grids increasingly emerging into smart networked grids and are more accessible from the public internet which poses new cyber threats in the grid. More computer based systems are introduced into power networks in order to monitor and control the network. Future model smart grid and micro grid systems will be based on data flows for communication of system status, usage and control throughout the network infrastructure in addition to the power flow. This creates new security threats on the power grid. Instead of relying mainly on power plants for power generation, there will be a combination of multiple generation sources and at the same time wider use of electrical computer based equipment by consumers. Both increase the amount of data flows in the network as well as introduce additional vulnerable spots. Vulnerability of the power grid to cyber-attacks increases even more because of the wide use of SCADA networks. SCADA networks are more accessible to the internet and lack authentication and authorization mechanisms therefore expose the grid to threats such as DDOS, Data interception, Data alteration and additional hacking threats.
The transition from present to future model has already begun and rapidly growing while it already poses new security challenges which must be attended immediately. It is essential to introduce immediately a single comprehensive security solution which will provide fast detection and prevention tools to cope with a variety of threats with different nature and from multiple sources. The solution should not be tightly coupled with each device in the network so it won’t require upgrade of the devices inside the grid.
The Cyber defense solution should be versatile using variety of cyber technologies such as Firewalls, anomaly detection, Big Data analytics, machine learning and more in a network wise combination.
This document discusses cyber security challenges for the smart grid and outlines NIST's efforts to address them. It provides background on the electric grid and goals of the smart grid. The smart grid will be more complex and interconnected, introducing new security risks. NIST published guidelines for smart grid cyber security to help integrate security during modernization. The guidelines provide a risk assessment framework and recommended security requirements but do not mandate specific solutions.
IRJET- Edge Deployed Cyber Security Hardware Architecture for Energy Delivery...IRJET Journal
This document discusses the development of an edge-deployed cyber security hardware architecture to protect critical energy delivery systems from cyber threats. The system uses sensors and machine learning to monitor programmable logic controllers (PLCs) that control infrastructure like pipelines and the electric grid. If a PLC is compromised, the system can take control of the PLC to maintain operations and prevent disruptions to critical sites like hospitals. The hardware solution is designed to integrate with existing infrastructure and provide real-time protection, restoration of control, and resilience against cyberattacks or other incidents affecting energy systems.
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...TI Safe
1) Thales provides data encryption and security solutions for critical infrastructure sectors like utilities and energy. It has the number 1 market share for payment hardware security modules, general purpose HSMs, and cloud HSMs.
2) Cyber attacks on critical infrastructure are increasing, with ransomware attacks hitting 649 entities in 2021. Operational technology systems are also vulnerable, suffering 83% of breaches.
3) Thales provides end-to-end encryption solutions for critical infrastructure clients to securely transmit sensitive data. Case studies outline deployments for a global energy company and major UK energy operator to encrypt data across hybrid IT and protect critical communications.
The document discusses security concerns for smart grids and outlines IBM's approach to addressing these concerns. It notes that smart grids require security at multiple points due to their use of IP protocols and open standards. It then lists IBM's portfolio of cybersecurity solutions for smart grids, which take a full lifecycle approach from defining security strategies to conducting security testing. The solutions are designed to help utilities meet NERC-CIP and other grid security standards.
Securing Critical Infrastructures with a cybersecurity digital twin Massimiliano Masi
Critical Infrastructures are common targets for cyber-and-physical attacks. Smart Grids, Water Transport Systems, Railway, or Motorway witness an increase of malware and attacks partially due to the IT/OT convergence. Usually, critical infrastructures are composed by legacy software or hardware that cannot be easily patched or upgraded, facilitating the work of the attackers by exposing vulnerabilities solved in IT decades ago. Moreover, it is usually impossible to have a test system for such infrastructures, where a security countermeasure is evaluated for its impact. In fact, in OT systems, availability is of its utmost importance, thus adding a security countermeasure has to be carefully evaluated to not hinder such property. To overcome such shortcomings, digital twins are used. In this talk, it will be presented how digital twins specifically devised for cybersecurity are used for the evaluation of threats in cyber-and-physical systems in an industrial environment. In particular, it will be shown how a digital twin will be systematically derived from the Architectural representation of a real-world industrial system (the "collaborative intelligent transport system") and how the security measures are evaluated with an specific architectural view.
Yugo Neumorni - prezentare - Cyber Security Trends 2020Business Days
President CIO Council, is Board member and Chairman of the Cybersecurity Council of the pan European association EuroCIO. He is also the president of CIO Council Romania, member of BCS Elite, former IT&C Director for Hidroelectrica, the Romanian power generation leader and the major supplier of ancillary services required in the Romanian National Energy System. Actually Yugo is CISO of Urgent Cargus.
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
The document discusses trends and challenges related to critical infrastructure and cyber security. It summarizes GCSEC's involvement in several national and international initiatives in 2013 related to critical infrastructure protection. These initiatives include projects co-funded by the EU on topics like online fraud information sharing, smart grid security, and energy sector cyber threat information sharing. The document also discusses emerging threats to critical infrastructure from trends like greater internet usage and connectivity of devices. Critical infrastructure is defined as those facilities necessary for essential service delivery. The new trend in critical infrastructure protection is to have proper knowledge of perimeter and critical services, prioritize patch management, and conduct regular risk assessments.
The document summarizes an agenda for a meeting of the NRECA Agile Fractal Grid Kickoff Meeting. The agenda includes introductions, discussions on various topics such as the managed services store and applications, distributed systems elements, and the industrial internet. It also lists participants from various organizations that will be involved in discussions and the Security Fabric Alliance.
The document summarizes an agenda for a meeting of the NRECA Agile Fractal Grid Kickoff Meeting. The agenda includes welcome and opening remarks, introductions, discussions on various topics related to achieving grid security, reliability and resiliency through advanced analytics and control. It also includes lunch and breaks, and concludes with a wrap up and closing. Government agencies, universities and private sector participants are invited to discuss topics like the managed services store, distributed systems elements, and applying security fabrics to protect industrial internet communications.
Capstone Team Report -The Vicious Circle of Smart Grid Securityreuben_mathew
The document summarizes challenges facing different stakeholders in securing the smart grid:
- Utilities face rapid deployment, funding shortfalls, technical challenges explaining security, and sophisticated attacks exploiting systems.
- Regulators have inconsistent standards and gaps between policies, creating confusion.
- Equipment manufacturers consider security important but frameworks are not always implemented, leaving systems vulnerable.
Coordinated efforts are needed between utilities, regulators, and manufacturers to address gaps and build a secure smart grid.
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings' facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
Cyber security white paper final PMD 12_28_16Dave Darnell
The document discusses cyber security concerns in the energy industry based on surveys and reports. A 2015 survey of over 150 IT professionals in the energy sector found that 75% saw successful cyber attacks increase over the last 12 years, over 75% of attacks came from external sources, and over 80% believed a cyber attack could cause physical infrastructure damage within a year. The document also outlines cyber security standards and frameworks established by organizations like FERC, NERC, and DOE for the energy industry. It provides an overview of the company Systrends and their cyber security credentials and services available to help organizations improve their cyber security profile and preparedness.
Presentation introduces Chief Security Officers (CSO's) and others with responsibility for protecting companies and their customers to what they need to know about the coming Smart Grid
Certrec’s Fas Mosleh presents some of the biggest cyber threats currently targeting utilities. This webinar includes examples of attacks on utilities that have happened in recent years and action steps to prevent future breaches.
As cyber-attacks from nation-state and domestic threats increase, it is important that power plants meet these threats to avoid costly reputational and equipment damage.
For more, visit: https://www.certrec.com/
This document is a report on managing cybersecurity threats to the smart grid. It was prepared by four Master of Public Administration students for Iberdrola USA as part of their capstone project. The report provides an overview of smart grid technology, cybersecurity threats to electric utilities, and efforts by utilities and government to prevent and mitigate those threats. It is based on a literature review and interviews with smart grid cybersecurity experts. Appendices include proposed training materials on cybersecurity for electric utility lineworkers.
Practical analysis of the cybersecurity of European smart gridsSergey Gordeychik
This paper summarizes the experience gained during a series of
practical cybersecurity assessments of various components of Europe’s
smart electrical grids.
The document discusses NIST's role in coordinating smart grid interoperability standards to accelerate the development of a nationwide smart grid. It outlines NIST's three phase plan: 1) Identify initial standards and develop a roadmap, 2) Establish the Smart Grid Interoperability Panel, and 3) Develop a conformity framework. The panel brings together over 550 organizations to support NIST's efforts through open collaboration. International coordination is also vital as standards will facilitate global smart grid development and technology sharing.
The document discusses the emerging threat of cyber weapons targeting industrial control systems and why data centers should care. It notes that the Stuxnet attack on Iran's nuclear program in 2010 was a "game changer" that crossed the barrier between cyber and physical infrastructure. Most data centers use similar industrial control systems for electrical and mechanical functions, leaving them vulnerable. The document outlines various potential attackers including nation states seeking to disrupt infrastructure, cybercriminals, corporate spies, hacktivists, and others. It discusses challenges in securing these systems and provides recommendations around physical security, dedicated networks, training, and testing.
Similar to Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybersecurity (20)
A new generation of instruments and tools to monitor buildings performanceLeonardo ENERGY
What is the added value of monitoring the flexibility, comfort, and well-being of a building? How can occupants be better informed about the performance of their building? And how to optimize a building's maintenance?
The slides were presented during a webinar and roundtable with a focus on a new generation of instruments and tools to monitor buildings' performance, and their link with the Smart Readiness Indicator (SRI) for buildings as introduced in the EU's Energy Performance of Buildings Directive (EPBD).
Link to the recordings: https://youtu.be/ZCFhmldvRA0
Addressing the Energy Efficiency First Principle in a National Energy and Cli...Leonardo ENERGY
When designing energy and climate policies, EU Member States have to apply the Energy Efficiency First Principle: priority should be given to measures reducing energy consumption before other decarbonization interventions are adopted. This webinar summarizes elements of the energy and climate policy of Cyprus illustrating how national authorities have addressed this principle so far, and outline challenges towards its much more rigorous implementation that is required in the coming years.
Auctions for energy efficiency and the experience of renewablesLeonardo ENERGY
Auctions are an emerging market-based policy instrument to promote energy efficiency that has started to gain traction in the EU and worldwide. This presentation provides an overview and comparison of several energy efficiency auctions and derives conclusions on the effects of design elements based on auction theory and on experiences of renewable energy auctions. We include examples from energy efficiency auctions in Brazil, Canada, Germany, Portugal, Switzerland, Taiwan, UK, and US.
A recording of this presentation can be viewed at:
https://youtu.be/aC0h4cXI9Ug
Energy efficiency first – retrofitting the building stock finalLeonardo ENERGY
Retrofitting the building stock is a challenging undertaking in many respects - including costs. Can it nevertheless qualify as a measure under the Energy Efficiency First principle? Which methods can be applied for the assessment and what are the results in terms of the cost-effectiveness of retrofitting the entire residential building stock? How do the results differ for minimization of energy use, CO2 emissions and costs? And which policy conclusions can be drawn?
This presentation was used during the 18th webinar in the Odyssee-Mure on Energy Efficiency Academy on February 3, 2022.
A link to the recording: https://youtu.be/4pw_9hpA_64
How auction design affects the financing of renewable energy projects Leonardo ENERGY
Recording available at https://youtu.be/lPT1o735kOk
Renewable energy auctions might affect the financing of renewable energy (RE) projects. This webinar presents the results of the AURES II project exploring this topic. It discusses how auction designs ranging from bid bonds to penalties and remuneration schemes impact financing and discusses creating a low-risk auction support framework.
This presentation discusses the contribution of Energy Efficiency Funds to the financing of energy efficiency in Europe. The analysis is based on the MURE database on energy efficiency policies. As an example, the German Energy Efficiency Fund is described in more detail.
This is the 17th webinar in the Odyssee-Mure on Energy Efficiency Academy.
Recordings are available on: https://youtu.be/KIewOQCgQWQ
(see updated version of this presentation:
https://www.slideshare.net/sustenergy/energy-efficiency-funds-in-europe-updated)
The Energy Efficiency First Principle is a key pillar of the European Green Deal. A prerequisite for its widespread application is to secure financing for energy efficiency investments.
This presentation discusses the contribution of Energy Efficiency Funds to the financing of energy efficiency in Europe. The analysis is based on the MURE database on energy efficiency policies. As an example, the German Energy Efficiency Fund is described in more detail.
This is the 17th webinar in the Odyssee-Mure on Energy Efficiency Academy.
Recordings are available on: https://youtu.be/KIewOQCgQWQ
Five actions fit for 55: streamlining energy savings calculationsLeonardo ENERGY
During the first year of the H2020 project streamSAVE, multiple activities were organized to support countries in developing savings estimations under Art.3 and Art.7 of the Energy Efficiency Directive (EED).
A fascinating output of the project so far is the “Guidance on Standardized saving methodologies (energy, CO2 and costs)” for a first round of five so-called Priority Actions. This Guidance will assist EU member states in more accurately calculating savings for a set of new energy efficiency actions.
This webinar presents this Guidance and other project findings to the broader community, including industry and markets.
AGENDA
14:00 Introduction to streamSAVE
(Nele Renders, Project Coordinator)
14:10 Views from the EU Commission and the link with Fit-for-55 (Anne-Katherina Weidenbach, DG ENER)
14:20 The streamSAVE guidance and its platform illustrated (Elisabeth Böck, AEA)
14:55 A view from industry: What is the added value of streamSAVE (standardized) methods in frame of the EED (Conor Molloy, AEMS ECOfleet)
14:55 Country experiences: the added value of standardized methods (Elena Allegrini, ENEA, Italy)
The recordings of the webinar can be found on https://youtu.be/eUht10cUK1o
This webinar analyses energy efficiency trends in the EU for the period 2014-2019 and the impact of COVID-19 in 2020 (based on estimates from Enerdata).
The speakers present the overall trend in total energy supply and in final energy consumption, as well as details by sector, alongside macro-economic data. They will explain the main drivers of the variation in energy consumption since 2014 and determine the impact of energy savings.
Speakers:
Laura Sudries, Senior Energy Efficiency Analyst, Enerdata
Bruno Lapillonne, Scientific Director, Enerdata
The recordings of the presentation (webinar) can be viewed at:
https://youtu.be/8RuK5MroTxk
Energy and mobility poverty: Will the Social Climate Fund be enough to delive...Leonardo ENERGY
Prior to the current soaring energy prices across Europe, the European Commission proposed, as part of the FitFor55 climate and energy package, the EU Social Climate Fund to mitigate the expected social impact of extending the EU ETS to transport and heating.
The report presented in this webinar provides an update of the European Energy Poverty Index, published for the first time in 2019, which shows the combined effect of energy and mobility poverty across Member States. Beyond the regular update of the index, the report provides analysis of the existing EU policy framework related to energy and transport poverty. France is used as a case study given the “yellow vest” movement, which was triggered by the proposed carbon tax on fuels.
Watch the recordings of the webinar:
https://youtu.be/i1Jdd3H05t0
Does the EU Emission Trading Scheme ETS Promote Energy Efficiency?Leonardo ENERGY
This policy brief analyzes the main interacting mechanisms between the Energy Efficiency Directive (EED) and the EU Emission Trading Scheme (ETS). It presents a detailed top-down approach, based on the ODYSSEE energy indicators, to identify energy savings from the EU ETS.
The main task consists in isolating those factors that contribute to the change in energy consumption of industrial branches covered by the EU ETS, and the energy transformation sector (mainly the electricity sector).
Speaker:
Wolfgang Eichhammer (Head of the Competence Center Energy Policy and Energy Markets @Fraunhofer Institute for Systems and Innovation Research ISI)
The recordings of this webinar can be watched via:
https://youtu.be/TS6PxIvtaKY
Energy efficiency, structural change and energy savings in the manufacturing ...Leonardo ENERGY
- Structural changes in manufacturing have significantly reduced energy consumption in Denmark since 1990 through growth in lower intensity sectors like food production.
- Energy efficiency improvements also contributed, especially from 2010-2014, lowering consumption alongside structural changes.
- A decomposition analysis found that decreases in consumption from 2006-2014 were mainly from structural effects in the first half, and efficiency gains in the latter half.
- Reported energy savings from Denmark's energy efficiency obligation scheme align with estimated efficiency improvements, though some autonomous gains likely occurred too.
Energy Sufficiency Indicators and Policies (Lea Gynther, Motiva)Leonardo ENERGY
This policy brief looks at questions ‘how to measure energy sufficiency’, ‘which policies and measures can be used to address energy sufficiency’ and ‘how they are used in Europe today’.
Energy sufficiency refers to a situation where everyone has access to the energy services they need, whilst the impacts of the energy system do not exceed environmental limits. The level of ambition needed to address energy sufficiency is higher than in the case of energy efficiency.
This is the 13th edition of the Odyssee-Mure on Energy Efficiency Academy, and number 519 in the Leonardo ENERGY series. The recording of the live presentation can be found on https://www.youtube.com/watch?v=jEAdYbI0wDI&list=PLUFRNkTrB5O_V155aGXfZ4b3R0fvT7sKz
The Super-efficient Equipment and Appliance Deployment (SEAD) Initiative Prod...Leonardo ENERGY
The Super-efficient Equipment and Appliance Deployment (SEAD) Initiative Product Efficiency Call to Action, by Melanie Slade - IEA and Nicholas Jeffrey - UK BEIS
Breuckmann eMobility GmbH develops innovative rotor casting technology called Zero Porosity Rotor (ZPR) for electric vehicle induction motors. ZPR uses laminar squeeze casting to produce rotors with zero porosity, allowing for superior mechanical properties, higher electrical conductivity, and maximum process stability compared to industry standard rotors. Key advantages of ZPR rotors include up to 12.5% higher maximum rotational speed, 35% higher electrical conductivity, and ability to withstand 25% higher circumferential bursting speeds. Breuckmann has partnerships for motor testing, slot geometry design, and received EU funding to develop high-speed motor concepts using its ZPR technology.
dynamic E flow GmbH provides high-tech electric machines and solutions for extreme applications. Their capcooltech® motor features direct winding cooling that enables current densities up to 100A/mm2 and overload capacities. Testing shows the capcooltech® design maintains temperatures 40°C lower and heats 10 times faster than conventional cooling. The direct cooling test bench demonstrates capcooltech® motors can achieve maximum power density, temperature resistance, precision, and dynamics even in harsh conditions like vacuum or high temperatures.
The need for an updated European Motor Study - key findings from the 2021 US...Leonardo ENERGY
The document calls for an updated assessment of the electric motor system market in Europe, as the existing data is over 20 years old. It notes several changes in the market since then, including new efficient motor technologies, lower costs for power electronics, and increased digitization. The document highlights findings from a recent 2021 US motor study, which found motors to be older than previously estimated and significant improvements in load factors and variable speed drive penetration compared to past studies. It concludes that a new comprehensive assessment is needed to identify large potential electricity savings and inform policies to accelerate market transformation.
Efficient motor systems for a Net Zero world, by Conrad U. Brunner - Impact E...Leonardo ENERGY
1) The document discusses the need for efficient electric motor systems to achieve net-zero emissions by 2050, as electricity will be the main energy supplier without fossil fuels or nuclear.
2) It provides examples of how industry can achieve efficiency savings of 50-70% through measures like downsizing components, direct drive systems, and load control.
3) A case study shows how converting an oversized 10kW system to a smaller, variable speed, direct drive setup with efficient components achieves 82% energy savings and a payback period of just one year.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
Mitigating the Impact of State Management in Cloud Stream Processing SystemsScyllaDB
Stream processing is a crucial component of modern data infrastructure, but constructing an efficient and scalable stream processing system can be challenging. Decoupling compute and storage architecture has emerged as an effective solution to these challenges, but it can introduce high latency issues, especially when dealing with complex continuous queries that necessitate managing extra-large internal states.
In this talk, we focus on addressing the high latency issues associated with S3 storage in stream processing systems that employ a decoupled compute and storage architecture. We delve into the root causes of latency in this context and explore various techniques to minimize the impact of S3 latency on stream processing performance. Our proposed approach is to implement a tiered storage mechanism that leverages a blend of high-performance and low-cost storage tiers to reduce data movement between the compute and storage layers while maintaining efficient processing.
Throughout the talk, we will present experimental results that demonstrate the effectiveness of our approach in mitigating the impact of S3 latency on stream processing. By the end of the talk, attendees will have gained insights into how to optimize their stream processing systems for reduced latency and improved cost-efficiency.
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
YOUR RELIABLE WEB DESIGN & DEVELOPMENT TEAM — FOR LASTING SUCCESS
WPRiders is a web development company specialized in WordPress and WooCommerce websites and plugins for customers around the world. The company is headquartered in Bucharest, Romania, but our team members are located all over the world. Our customers are primarily from the US and Western Europe, but we have clients from Australia, Canada and other areas as well.
Some facts about WPRiders and why we are one of the best firms around:
More than 700 five-star reviews! You can check them here.
1500 WordPress projects delivered.
We respond 80% faster than other firms! Data provided by Freshdesk.
We’ve been in business since 2015.
We are located in 7 countries and have 22 team members.
With so many projects delivered, our team knows what works and what doesn’t when it comes to WordPress and WooCommerce.
Our team members are:
- highly experienced developers (employees & contractors with 5 -10+ years of experience),
- great designers with an eye for UX/UI with 10+ years of experience
- project managers with development background who speak both tech and non-tech
- QA specialists
- Conversion Rate Optimisation - CRO experts
They are all working together to provide you with the best possible service. We are passionate about WordPress, and we love creating custom solutions that help our clients achieve their goals.
At WPRiders, we are committed to building long-term relationships with our clients. We believe in accountability, in doing the right thing, as well as in transparency and open communication. You can read more about WPRiders on the About us page.
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsMydbops
This presentation, delivered at the Postgres Bangalore (PGBLR) Meetup-2 on June 29th, 2024, dives deep into connection pooling for PostgreSQL databases. Aakash M, a PostgreSQL Tech Lead at Mydbops, explores the challenges of managing numerous connections and explains how connection pooling optimizes performance and resource utilization.
Key Takeaways:
* Understand why connection pooling is essential for high-traffic applications
* Explore various connection poolers available for PostgreSQL, including pgbouncer
* Learn the configuration options and functionalities of pgbouncer
* Discover best practices for monitoring and troubleshooting connection pooling setups
* Gain insights into real-world use cases and considerations for production environments
This presentation is ideal for:
* Database administrators (DBAs)
* Developers working with PostgreSQL
* DevOps engineers
* Anyone interested in optimizing PostgreSQL performance
Contact info@mydbops.com for PostgreSQL Managed, Consulting and Remote DBA Services
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfjackson110191
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
Blockchain technology is transforming industries and reshaping the way we conduct business, manage data, and secure transactions. Whether you're new to blockchain or looking to deepen your knowledge, our guidebook, "Blockchain for Dummies", is your ultimate resource.
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Chris Swan
Have you noticed the OpenSSF Scorecard badges on the official Dart and Flutter repos? It's Google's way of showing that they care about security. Practices such as pinning dependencies, branch protection, required reviews, continuous integration tests etc. are measured to provide a score and accompanying badge.
You can do the same for your projects, and this presentation will show you how, with an emphasis on the unique challenges that come up when working with Dart and Flutter.
The session will provide a walkthrough of the steps involved in securing a first repository, and then what it takes to repeat that process across an organization with multiple repos. It will also look at the ongoing maintenance involved once scorecards have been implemented, and how aspects of that maintenance can be better automated to minimize toil.
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybersecurity
1. Cybersecurity for Smart Grids:
Vulnerabilities, and Strategies to
Provide Cybersecurity
Cyril W. Draffin, Jr.
Project Advisor, Massachusetts Institute of
Technology Energy Initiative
Scott Aaronson
Executive Director, Security and Business
Continuity, Edison Electric Institute
International Energy Agency’s International Smart Grid Action
Network (ISGAN) Academy – 1st Cybersecurity Webinar
28 June 2017
1
2. Topics for
Cybersecurity for Smart Grids Webinar #1:
Vulnerabilities, and Strategies to Provide
Cybersecurity
1. Objectives
2. Cyber Threats and Vulnerabilities (and Cyber Attacks)
3. Smart Grid Trends
4. Privacy and Data Issues
5. US/European/International Organizations Addressing
Cybersecurity
6. Cybersecurity Strategies
7. Conclusions
2
3. Cybersecurity Attacks can Come in Many Ways
• Loss of grid control from errors or deliberate tampering with data,
complex algorithms, or communications
– Cascading Failure Modes
– Extended problems with electric grids crossing national borders
– Attack via dispersed Distributed Energy Resources (e.g. solar, wind, storage)
with insufficient cybersecurity
• False data injection into pricing and demand systems
– Market manipulation
• Possible attack on electric utility systems from sophisticated
nation states
– Requiring attribution
3
Cyber Threats
5. Cybersecurity of the Electric Grid: Context
• Cyber incidents are growing in number and sophistication--
and pose serious risks to the electricity grid
• Some integration of the grid with information and
communications technology reduces risks associated with
electricity blackouts-- but as country’s grids become more
automated and utilize more digital technology, the attack
surface grows and the grid becomes increasingly vulnerable to
disruption
• Deepening interdependencies between electricity and other
critical infrastructures (telecommunications, internet, natural
gas supply)
• Society’s increasing dependence on electricity raises the
economic and social consequences of long duration power
outages
• Protecting the grid and mitigating consequences of an attack is
public order issue, and national security imperative
Cyber Vulnerabilities
5
6. Smart Grid Cybersecurity: Potential
Vulnerabilities in Digital Technologies
Location of Cybersecurity Vulnerabilities Smart Grid
(more complex digitally
interconnected grid & active
management)
Electricity Generators
• More external monitoring and dispatching, and Distributed
Energy Resources (e.g. Solar and Wind)
X
Electrical/Grid Control Systems (transmission & distribution)
• More digital interfaces, sophisticated SCADA, load balancing,
voltage frequency control, monitoring
X
Smart Meters
• More digital connections and customer interfaces X
Pricing, Bidding, and Billing Systems
• More active generator and customer interfaces & customer
privacy issues (including complexity with time of day pricing,
and Software as a Service)
X
Cyber Vulnerabilities
6
7. Cost of Cyber Attacks Can Be Large
• Economic impact to the economy
– Lloyd’s estimates widespread cyber attack on US grid would have $243 billion
economic impact (July 2015 Business Blackout report)
• Insurance liability
– Lloyd’s estimates widespread cyber attack on US grid would have $21 billion in
insurance claims under 30 lines of business (July 2015 Business Blackout report)
• Loss of reputation and diminished credit of electric utility
• Loss of revenue of the electric utility
• Lawsuits against the electric utility and its suppliers
7
Cyber Vulnerabilities
8. Source: SANS ICS - ICS.SANS.ORG
225.000
7 x 110 KV
SubStations
23 x 35 KV
SubStations
(up to 50)
100s
Damaged
3.5 to 7 hours
Outage
Duration
3 DSOs
affected
135 MW
Impact
10s Field
Devices
Affected
103 Cities
and Towns
Affected
Outside Temp.
Between 4
and
-8° Cent.
Case Study: Ukraine Attack
Cyber Attacks
8
• Details on December 2016 Ukraine Attack presented in WIRED magazine, July 2017, “How to Switch a Country Off”.
• Details on December 2015 attack presented in Electricity-ISAC and SANS Industrial Control Systems. 2016. “Analysis of
the Cyber Attack on the Ukrainian Power Grid.” Electricity-Information Sharing and Analysis Center.
ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf.
9. Multi-hour
Distruption of
multiple major
websites
Case Study: Internet of Things (IOT) Attack
Cyber Attacks
Against Dyn, a
company that
services many
popular web sites
9
The attack surpassed 1.2
Tbps (terabits per second)
Over 100,000 malicious endpoints
launched attacks
Thousands of businesses affected including:
CNN, Twitter, Netflix, Github, Paypal, Yelp
10. WannaCry
• Ransomware
• Automated Worm Functionality
• Over 230,000 computers in over 150
countries impacted
• Parts of Britain's National Health
Service (NHS)
• Spain's Telefónica
• FedEx and Deutsche Bahn
• Impact on Renault manufacturing
facilities
Cyber Attacks
10
Note: In June 2017 NotPetya attack made on Ukrainian and
global organizations
11. CRASHOVERRIDE
• Virus developed to disrupt industrial control
systems
• Could attack electricity substations and circuit
breakers, using industrial communication protocols
which are standardized across a number of critical
infrastructures
11
Cyber Attacks
12. Many Visions of the “Smart Grid”
12
Source: United States National Institute of Standards and Technology Source: Electric Power Research Institute
Source: Nature Source: United States Department of Energy
Smart Grid Trends
13. Data Exchange Is Increasingly Complex
13
• More data exchange and
communications more
vulnerability
• Different types and
generations of
components must be
interoperable.
• Decisions to standardize
on protocols are
complex, require input
from a wide range of
stakeholders.
Smart Grid Trends
14. 14
Active Management can Increase Cyber Risk
Source: Covrig et al. (2014), Elberg & Lockhart (2014), Kellison (2012), Ritch (2013), and SCE (2011)
New Technologies & Systems
SynchroPhasers
Supervisory Control And Data Acquisition
Energy Management System / Distribution Management System /
Outage Management System / Asset Management System
Examples
for
Discussion
Smart Grid Trends
15. Considerations in addressing Smart Grid Trends
• Utilities need to be prepared to operate in a more
complex environment where they have less control
– Highly automated demand and control systems with distributed
decisions and reliance on “always available” communications
– Effective monitoring and understanding of baseline “within
band” operations is important to detect anomalous activity
– Vulnerabilities at interfaces when new technologies are added
(especially if done with insufficient security design and testing)
– Need to use cyber “best practices” and prepare for future
innovation
– Possible reliance on monitoring and control information in the
cloud (as players and grid interfaces increase)
15
Smart Grid Trends
16. Privacy and Data Issues
• Customer Privacy, Data Integrity, and Data Protection are
important concerns
– Grid operational data
– Consumer electric usage data
• Systems to protect privacy must satisfy customers and their
governments
– Many laws protect the privacy of personal information
– European law fully protects customers from usage of
personal information
– Need for coordination, because company and customer
data frequently cross state and country lines
16
Privacy and Data
Note two documents that deal with privacy and data issues are:
• Center for Internet Security (CIS) Privacy Implications Guide issued January 12, 2017 with CIS Controls
(Version 6)
• The European General Data Protection Regulation (GDPR) that will become effective on 25 May 2018.
17. 17
Approach to Grid Security
Standards
Physical
Cyber
Industry-
Government
Partnership
Electricity Subsector
Coordinating Council
(ESCC)
Electricity
Information Sharing &
Analysis Center
(E-ISAC)
Partnerships with
federal, state, & local
governments
Incident
Response
Grid Resiliency
Mutual
Assistance
Spare
Equipment
Programs
Strategies
18. Regulatory and Coordination Organizations
and Standards
Federal Energy Regulatory
Commission (FERC) and North
American Electric Reliability
Corporation (NERC)
Cyber Security of the
Smart Grids
Expert Group on the Security and
Resilience of Communication
Networks and Information Systems
for Smart Grids
Europe
Electricity Information Sharing
and Analysis Center
security services to owner and operator organizations of
Bulk Power System across North America
US Department of Homeland Security (DHS)
Industrial Control Systems Cyber Emergency
Response Team (ICS-CERT)
Electricity Sector
Cybersecurity Capability
Maturity Model (DOE/DHS)
European Commission
Joint Research Centre
cybersecurity research
European Network and
Information Security
Agency
18
NIST Framework and
Roadmap for Smart Grid
Interoperability
Standards, Release 3.0
National Association of
Regulatory Utility Commissioners
CIGRE, the International Council on
Large Electric Systems
International Electrotechnical Commission
IEC 62443 Standard
Organizations
United States
Electricity Subsector Coordinating
Council
International
19. Ongoing United States Federal Efforts: Examples
• Standards: In July 2016, FERC directed NERC to develop a new or modified CIP
Reliability Standard to address supply chain cybersecurity risks in bulk electric
system operations
• Information sharing: In 2016, DHS launched the Automated Indicator Sharing
(AIS) program to enhance information sharing practices across government and
private sectors-- This capability facilitates the exchange of cyber threat indicators
between the Federal government and parties that opt in to the program through
machine to machine sharing
• Exercises: In 2011, 2014, 2016 (GridEx IV planned for 2017), NERC has conducted
sector-wide grid security exercises, called GridEx, to execute the electricity
sector’s crisis response to simulated coordinated cybersecurity and physical
security incidents
• Tools: DOE developed the Electricity Subsector Cybersecurity Capability Maturity
Model (C2M2) to help energy sector owners and operators evaluate, prioritize,
and improve their cybersecurity capabilities and allow for a better overall
assessment of the cybersecurity posture of the energy sector.
• Research & Development: DOE designed the Cybersecurity for Energy Delivery
Systems (CEDS) program to assist the energy sector asset owners by developing
cybersecurity solutions for energy delivery systems through integrated planning
and a focused R&D effort
19
Organizations
20. European Reports: Recent Examples
• European Union – Cyber Security in the Energy Sector
(February 2017)
– https://ec.europa.eu/energy/sites/ener/files/documents/eecsp_report_final.pdf
• European Commission's Energy Expert Cyber Security
Platform (EECSP) Expert Group Report (February 2017)
– Protection concepts reflecting current threats and risks
– Effects of cyber attacks not fully considered in the design rules of an
existing power grid
– Handling of cyber attacks within the European Union
– Constraints imposed by cybersecurity measures in contrast to real-
time/availability requirements
• European Directive on security of network and
information systems (NIS Directive) (adopted July 2016)
20
Organizations
21. Strategies to address Cyber Vulnerabilities
• Risk management, include risk analysis and prioritization, to
understand vulnerabilities within and across critical
infrastructure systems (and to select proper standards and
strategies)
• Information sharing to enhance situational awareness and
mitigation practices across government and industry.
• Standards to set a minimum level of security practices
across the electricity infrastructure.
• Cost-recovery for security investments to ensure adequate
resources are available to address threats and
vulnerabilities.
• Workforce education and training to increase the talent
pool of security experts that can address the complexities of
electric grid systems and the evolving cyber risk landscape.
Strategies
21
22. Risk Management: Types of Cyber Activities Required
22
• Complexity, continuous
evolution preclude
perfect protection from
cyberattacks.
• More emphasis is
needed on developing
and deploying response
and recovery strategies
and procedures
Assess
vulnerabilities,
threats, impacts
Reduce
vulnerabilities,
threats, impacts
Prevent attacks,
incidents, other
outages
Respond during
attack
Recover and
restored
Strategies
Note: Center for Internet Security CIS Controls (Version 6) provides prioritized set of
actions to protect organizations and data from known cyber attack vectors.
23. Address Cyber Penetrations and prepare for
Cyber Incidents (including Information Sharing)
• Unfortunately there is not a "magic bullet" that stops all
cybersecurity attacks, or stops Smart Grids or Distributed Energy
Resources from introducing cyber vulnerabilities
• Electric utilities and governments need to share current cyber
threat information
– Confidential sharing valuable for risk mitigation and responding quickly to changing
threats
– North American Electric Reliability Council (NERC) 2015 GridEx III emergency
response exercise with utilities, law enforcement and government; 4400 people
involved (March 2016 report)
– United States - Computer Emergency Readiness Team; Electricity – Information
Sharing & Analysis Center
– Europe Computer Security Incident Response Teams; CERT-EU; European Energy-
ISAC; ENSIA product security certification
23
Strategies
24. Cyber Security and Resilience
(including Standards)
• Follow and Improve Cyber Security Regulations and Best Practices
– Provide regulatory standards for distribution systems and DERs as generation
becomes more widespread – national cyber standards may become role of US
Department of Energy
– Support European efforts to quickly share detailed electric utility cyber attack,
mitigation, and recovery information
– Develop cost allocation methods for cyber security and resiliency among multiple
parts (transmission, distribution) of the electric utility system
• Develop utility specific, regional and national detailed plans for
recovering from cyber attack
– Conduct emergency response exercises such as GridEx and Cyber Europe (2014 and
2016)
23
Strategies
25. How much Cybersecurity effort and expenditures are
sufficient to assure smart grids are secure enough?
• Challenge: Need to understanding of range of costs for cyber
security and resiliency, who pays costs, and value received
– Bulk Energy System regulated in United States by Federal Energy Regulatory Commission
and NERC with defined cyber security standards– but limited in scope
• US Critical Infrastructure Protection (CIP) Standards (9 subject to current
enforcement: 8 cyber, 1 physical; and 17 subject to future enforcement)
• European Commission Network and Information Security Directive
• Cost recovery for cybersecurity operating costs is issue
– Distribution Systems usually do not have required cyber security standards, so harder to
determine amount of cyber protection to provide and how to pay for it
• Some general cyber security guidelines exist (e.g. US NIST cybersecurity framework)
• US States (e.g. California, New York, Hawaii) may address issue
• US National Association of Regulatory Utility Commissioners (NARUC) provided cyber
security questions regulatory bodies should ask (2016/2017)
• Suppliers more interested in producing power and meeting safety regulations
– Corporate Business Systems for more diverse utilities over the next decade
– Cyber Recovery Costs responsibility is unclear (utility, vendors, insurance, government) 25
Strategies
26. Conclusions
• Cybersecurity Threats and Grid Vulnerabilities will
continue to evolve for many decades
• Because of importance of the Grid to industrial economies,
cyber risks must be addressed by entire worldwide electric
power industry
• Although Smart Grids may be able to detect anomalies
sooner, increased digitization and interfaces increase
cyber risks
• Data integrity and protection are needed
• United States and European organizations have
established some cybersecurity standards and working
groups-- including information sharing organizations
• Cyber Risk Management strategies are needed
throughout the world-- and many have been adopted by
utilities in the US and Europe
26
Conclusions
27. Questions & Comments
Contacts:
Cyril Draffin
Email: draffin@alum.mit.edu
Scott Aronson
Email: saaronson@eei.org
Cyril W. Draffin
MIT Energy Initiative, E19-307
77 Massachusetts Avenue
Cambridge, Massachusetts, 02139-4307
USA
Scott Aaronson
Edison Electric Institute
701 Pennsylvania Avenue, NW
Washington, DC , 20004-2696
USA
ISGAN Academy coordination:
Institute for Research in Technology
Comillas Pontifical University
Santa Cruz de Marcenado 26
28015 Madrid, Spain
International Energy Agency’s (IEA) International Smart Grid Action
Network (ISGAN) Academy – 1st Cybersecurity Webinar
Cybersecurity for Smart Grids: Vulnerabilities, and
Strategies to Provide Cybersecurity
26
28. Topics for Cybersecurity Smart Grids Webinar #2:
Technical Approaches to Provide Cybersecurity
2nd Cybersecurity Webinar Planned for
September 2017
1. Objectives
2. Cybersecurity Approach and Best Practices
3. Case Studies
4. Regulatory and legal constraints of architecting smart
grids in a secure way
5. Questions and Comments
28
Additional Information
29. ISGAN Academy series
29
Additional Information
This recorded cybersecurity webinar and previous webinars are available at ISGAN Academy platform:
http://www.leonardo-energy.org/resources/1070/isgan-academy-58ec8d2e7b9b0