Académique Documents
Professionnel Documents
Culture Documents
Privacy Program
2014 Annual Review
Welcome to the 2014 Cyber Security and Privacy Program Annual Review. This brochure summarizes
the research results produced by the program in 2014 and presents our research plans for 2015.
Cyber security has become a critical priority for electric utilities. The evolving electricity sector is
increasingly dependent on information technology and telecommunications infrastructures to
ensure the reliability and security of the electric grid. Cyber security measures must be designed and
implemented to protect the electrical grid from attacks by nation-states and hackers. Strong cyber
security measures can also support the grids resiliency against inadvertent threats such as equipment
failures and user errors.
As utilities continue to deploy advanced monitoring and communications systems to support widearea situational awareness applications, distributed energy resources, distribution automation, and
advanced metering infrastructures, they face several cyber security challenges:
Combination of legacy and next-generation equipment in operational environments
Convergence of information technology and operational technology for power control systems
Separate security architectures and incident management systems for operational domains
Insufficient security management tools for the networks, systems, and end devices that are in the
field
Uncertain regulatory and legislative environment for cyber security.
The Electric Power Research Institutes (EPRIs) Cyber Security and Privacy Program addresses the
emerging threats to an interconnected electric system through collaborative research on cyber security
technology, standards, and business processes to protect the electric grid.
Ongoing program activities include:
Security solutions and implementation guidance for legacy systems
Security management and protection technology for power delivery systems
Incident management for power delivery systems
Methodologies for assessing and monitoring risk
Metrics to support the risk assessment activities
Improving procurement methodologies and language to support cyber security.
In 2015, the program will develop lab-based implementations for several of these activities, including
advanced incident correlation techniques and security management technology for intelligent
electronic devices (IEDs). The program will continue to refine and pilot approaches to assessing and
monitoring risk.
Galen Rasche, Senior Program Manager
Information Assurance
Success Story:
183A Working Group
Overview
oration (183A)
Strong cooperation
between OT and IT
is the key to articulate
a business case
that mitigates the
consequences of
a cyber-induced
failure or disruption
of mission-critical
operations.
Dennis K. Holstein, OPUS Consulting
Group
Cyber Security and Privacy Technology Transfer and Industry Collaboration (183A)
Cyber Security and Privacy Industry Tracking Newsletters
Value to Members:
www.epri.com
Members: Log in
at either link
Member Login:
Program Cockpits
Choose Program
Status of Projects
Research Results
Meetings
Success Story:
Cyber Security Technologies
DNP3 Secure Authentication
Overview
Background
We were all
extremely pleased
about how well the
Plug-Fest went.
Grant Gilchrist, EnerNex
Benefits to Utilities
The severity and sophistication of security threats against the electric power grid continues
to increase, requiring protective measures for the various systems and devices that
comprise the operational network. The operators of power delivery systems face significant
challenges as they work to deter, prevent, or mitigate these threats. These challenges
include protecting legacy equipment, improving the ability to monitor the health of
operational equipment, and effectively managing security incidents.
This project set addresses these challenges by developing protective measures through
a focus on procedures, emerging standards, and innovative security tools that provide
end-to-end security and support defense-in-breadth strategies. In addition, this project set
investigates managing cyber incidents through advanced security operational intelligence,
detection, response, and recovery to increase security operational awareness that can
improve the resiliency of the grid. This includes correlating cyber events with physical
access control and monitoring systems.
Value to Members:
12
Success Story:
Risk Management in Practice
Overview
Background
By examining,
comparing, and
indexing cyber
security documents
from across the
utility space, EPRI
helped utility
employees answer
a critical question:
Which documents do
I need for my cyber
security efforts, and
where do I start?
Maurice Martin, CRN Program
Manager, NRECA
Financial Risk
Strategy
DOE Risk
Management
Process
Cyber Security
Risk Strategy
Executive
Order
13636
NIST
Cybersecurity
Framework
Mission Risk
Strategy
Benefits to Utilities
NESCOR Risk
Assessment
Methodology
ES-C2M2
Maturity Model
Methodology
NISTIR 7628
Control-Based
Methodology
NERC CIPs
Compliance
Methodology
NEI 08-09/
NRC RG 5.71
Organizations
IT and OT
Systems
NRECA
Guidance
ES-C2M2
Application
Guidance
Bulk Electric
Systems
14
Value to Members:
(E1) End
Device
Master
PBCONF
(1)
Control
Center
(E2) End
Device
Slave
PBCONF
(2)
Operations
Center
Substation
Slave
PBCONF
(3)
(E3a) End
Device
(E3b) End
Device
Slave
PBCONF
(4)
Substation
(E4) End
Device
17
Jeff Stevenson is a
Research Portfolio Manager for
Information and Communication
Technology (ICT). Jeff joined
EPRI in June of 2013. Prior to
joining EPRI, Jeff was the Research
and Development Officer for
a regional bank in Tennessee,
Marketing Specialist and Budget
Coordinator for Knoxville Utilities
Board, and Regional Director of
Marketing for Boeing Commercial
Airplane Group. Jeff holds a
B.S. in Civil Engineering from the
University of Arizona and an MBA
in Management/Marketing from
Seattle Pacific University.
jstevenson@epri.com
Ashley Eldredge is a
18
Summary of Deliverables
Cyber Landscape, Collaboration,
and Technology Transfer (183A)
For more information: grasche@epri.com
2014
The Cyber Security and Privacy Industry Tracking Newsletter
October 2014, Product ID 3002003327
July 2014, Product ID 3002003325
April 2014, Product ID 3002003319
December 2014, Product ID 3002003328
2014
2014
2013
2013
2012
2012
Cyber Security and Privacy Landscape of the Electric Sector
April 2012, Product ID 1024410
July 2012, Product ID 1024411
October 2012, Product ID 1024412
December 2012, Product ID 1024413
The Cyber Security and Privacy Industry Tracking Newsletter
April 2012, Product ID 1024414
July 2012, Product ID 1024415
October 2012, Product ID 1024416
December 2012, Product ID 1024417
2013
Framework for Grading Procurement Requirements
Product ID 3002001041
Glossary of Abbreviations
APPA
BES
CCS
CEDS
CIGRE
DER
DNP3 SAv5
DOE
DR
EEI
EMS
ENISA
EPRI
ES-C2M2
ESP
FERC
IED
IEC
IEEE
ISOC
NERC CIP
2014 Electric Power Research Institute (EPRI), Inc. All rights reserved. Electric
Power Research Institute, EPRI, and Together...Shaping the future of
electricity are registered service marks of the Electric Power Research Institute.
3002004939