Home
European Smart Grid Cyber and SCADA Security
10 March - 11 March 2014
European Smart Grid Cyber and SCADA Security

Positions now strictly limited, act now to get involved. Countries represented already include the UK, Netherlands, Qatar, USA, Germany, Belgium and Switzerland

Present and future SCADA and Smart Grid technologies have the capability of increasing reliability and optimising efficiency for Utilities, as they move from pilot projects to large scale implementations.

Technical advancements, interconnections, and the proliferation of access points increase complexity, and heighten security risks surrounding our most critical infrastructures – Electricity and Water.
 

Cyber criminals with very little systems knowledge are able to infiltrate industrial control operations, and help is freely available on the internet with a variety of hacker tools, videos and operational manuals accessible.

Inadequate protection of network-enabled assets carries far-reaching implications for public infrastructure, with the number of control-system cyber-security incidents industry escalating daily.

This year we will dive deeper into both enterprise strategy and engineering superiority to identify potential weaknesses, what countermeasure we take to strengthen those areas, and how we share information collectively to raise our defences against an ever evolving stealth threat.

 

FEATURED SPEAKERS

Daniela Pestonesi

Daniela Pestonesi

Automation and Diagnostics , Enel Engineering & Research SpA
Frans Campfens

Frans Campfens

Senior Innovation Manager, Alliander N.V.
Galen Rasche

Galen Rasche

Technical Executive, Electric Power Research Institute
Henrik Magnusson

Henrik Magnusson

Technical Strategy Manager for the Future Networks team , SSE
Johan  Rambi

Johan Rambi

Privacy & Security Officer , Alliander N.V.
Konstantinos Moulinos

Konstantinos Moulinos

Expert in Network & Information Security, ENISA - European Network and Information Security Agency
Rick Welsh

Rick Welsh

Head of Cyber Insurance at Aegis at Lloyds, Aegis London
Robin Massink

Robin Massink

Engineer, DNV KEMA
Rudolf Baumann

Rudolf Baumann

Chairman of the Transmission Security Cooperation, Senior Advisor Operations , Swissgrid AG
Steve Brunasso

Steve Brunasso

Manager of Security and Networking, California Water and Power company

Aaron Goater

Energy Adviser, Parliamentary Office of Science and Technology
Aaron Goater

Bob Lockhart

Research Director, Navigant Research
Bob Lockhart

Brett Luedde

Director Critical Infrastructure Security, Secure Network Systems, Via Sat Inc
Brett Luedde

Damiano Bolzoni

COO, Security Matters
Damiano  Bolzoni

Daniela Pestonesi

Automation and Diagnostics , Enel Engineering & Research SpA
Daniela Pestonesi

Dieter Sarrazyn

Senior Manager, PwC / PricewaterhouseCoopers
Dieter Sarrazyn

Frans Campfens

Senior Innovation Manager, Alliander N.V.
Frans Campfens

Fred Streefland

Director Education Training & Knowledge Center, ENCS
Fred Streefland

Galen Rasche

Technical Executive, Electric Power Research Institute
Galen Rasche

Henrik Magnusson

Technical Strategy Manager for the Future Networks team , SSE
Henrik Magnusson

Howard Porter

International Alliances Director, E S M I G
Howard Porter

Isabelle Dumont

Director, Vertical Solutions, Palo Alto Networks
Isabelle  Dumont

Johan Rambi

Privacy & Security Officer , Alliander N.V.
Johan  Rambi

Konstantinos Moulinos

Expert in Network & Information Security, ENISA - European Network and Information Security Agency
Konstantinos Moulinos

Mark Ossel

Board Member ESNA OSGP VP Echelon Energy & Utility, ESNA
Mark  Ossel

Martin Visser

Security Officer Process Automation, Waternet
Martin Visser

Mauriche Kroos

Security Officer, Enexis
Mauriche Kroos

Oded Gonda

Vice President of Network Security Products, Check Point Software Technologies Ltd
Oded  Gonda

Patricia Robison

Professor , New York University
Patricia  Robison

Philip Westbroek

Telecommunications and security advisor, Enexis
Philip Westbroek

Rick Welsh

Head of Cyber Insurance at Aegis at Lloyds, Aegis London
Rick Welsh

Robin Massink

Engineer, DNV KEMA
Robin Massink

Rudolf Baumann

Chairman of the Transmission Security Cooperation, Senior Advisor Operations , Swissgrid AG
Rudolf Baumann

Steve Brunasso

Manager of Security and Networking, California Water and Power company
Steve Brunasso

Conference agenda

clock

8:30

Registration & Coffee

clock

9:00

Chairman's Opening Remarks

clock

9:15

Why data analytics in ICS/SCADA for cyber security:

- What could be detected

clock

9:45

Information sources:

- Which information should be analysed
- Which are the problems related with the analysis

 

clock

10:45

Morning Coffee

clock

11:00

Modeling information and extracting relevant insights:

- Predictive models
- Dealing with missing data

clock

11:45

Visual analytics

clock

12:15

Demo's and hands on

clock

12:45

Q&A and end of workshop

clock

8:30

Registration & Coffee

clock

9:00

Chairman's Opening Remarks

Dieter Sarrazyn

Dieter Sarrazyn, Senior Manager, PwC / PricewaterhouseCoopers

clock

9:05

Address From Parliamentary Office of Science and Technology

Aaron Goater

Aaron Goater, Energy Adviser, Parliamentary Office of Science and Technology

clock

9:10

Minimum security measures for smart grids

Konstantinos Moulinos

Konstantinos Moulinos, Expert in Network & Information Security, ENISA - European Network and Information Security Agency

  • Study methodology and working methods
  • Minimum security measures
  • EG2 consultations on minimum security measures
  • Recommendation to European Commission
  • Next steps

     

  • clock

    9:50

    Cyber Security risk based assessment approach

    Henrik Magnusson

    Henrik Magnusson, Technical Strategy Manager for the Future Networks team , SSE

  • Internal and External Challenges to Cyber Security approaches 
  • Using formal methods and modelling to assess risk and model controls 
  • The need for a holistic view in developing projects 
  • Verification methods used
  • clock

    10:30

    Morning Coffee

    clock

    11:00

    Cybersecurity for Smart Grid and Control Systems Assets and Networks

    Brett Luedde

    Brett Luedde, Director Critical Infrastructure Security, Secure Network Systems, Via Sat Inc

    ·        Challenges in securing critical infrastructure control system assets while maintaining real-time control and minimizing system downtime.
    ·        Automation of the distribution system increases the need for comprehensive security and cybersecurity capabilities.
    ·        Cyber-intrusions are certain to increase as infrastructure transitions to more distributed common platforms
    ·        Case study of how a major utility company addressed these issues and is executing a plan to incorporate new compliance standards in their systems.

    clock

    11:30

    Situational Awareness; 2.0 Monitoring incidents, behaviour, rational response

    Johan  Rambi

    Johan Rambi , Privacy & Security Officer , Alliander N.V.

  • Detect hostile behavior aimed at the smart grid
  • Monitoring the physical and cyber infrastructures 
  • Once hostile behavior is detected 
  • Protective countermeasures 
  • How Alliander will build and operate
  • clock

    12:00

    How to effectively modernize security in ICS/SCADA Networks to stay ahead of cyber criminals

    Isabelle  Dumont

    Isabelle Dumont , Director, Vertical Solutions, Palo Alto Networks

    •      Best practices to deploy next-generation security concepts to strengthen security in SCADA Networks
    •      Why it’s become critical to apply a consistent security model from the core of your network to the edge
    •      Network segmentation: the benefit of a zero trust model applied to critical infrastructure
     

    clock

    12:40

    Networking Lunch

    clock

    13:50

    Cyber security white box testing

    Robin Massink

    Robin Massink, Engineer, DNV KEMA

  • Security guiding principles
  • Relevant cyber security standards for the smart grid
  • Smart grid security requirements
  • Security by validation
  • Cyber security testing methodologies
  •  In depth security testing of smart grid devices; challenges and solutions
  • clock

    14:30

    The Topsectoren project: Monitoring, Privacy technologies, Testing and Standards

     

    Monitoring:
    ·         IDS optimal sensor placement
    ·         Sensors for encrypted and un-encrypted data
    ·         Monitoring Solution for ICS SCADA

    Privacy enhancing technologies:
    ·         Development and test of a  privacy preserving protocol for smart metering

    Testing:
    ·         Framework for End-to-End security testing of Smart Grid systems

    Standards:
    ·         Which standards are applicable to ICS SCADA?
    ·         Risk and security assessments
     

    Frans Campfens

    Frans Campfens, Senior Innovation Manager, Alliander N.V.

     

    Monitoring:
    ·         IDS optimal sensor placement
    ·         Sensors for encrypted and un-encrypted data
    ·         Monitoring Solution for ICS SCADA

    Privacy enhancing technologies:
    ·         Development and test of a  privacy preserving protocol for smart metering

    Testing:
    ·         Framework for End-to-End security testing of Smart Grid systems

    Standards:
    ·         Which standards are applicable to ICS SCADA?
    ·         Risk and security assessments
     

    Fred Streefland

    Fred Streefland, Director Education Training & Knowledge Center, ENCS

    clock

    15:10

    Afternoon Tea

    clock

    15:40

    Cybersecurity as a mean to gain control and achieve operational excellence

    Damiano  Bolzoni

    Damiano Bolzoni, COO, Security Matters

  • New approaches to identify potential security issues
  • Monitoring and Prediction through data analytics
  • Getting quantifiable value out of the data sets and mapping
  • Value for situational awareness
  • clock

    16:20

    Secure Power Supply, Market, Renewables and Smart Grids, all depending on Cyber Security

    Rudolf Baumann

    Rudolf Baumann , Chairman of the Transmission Security Cooperation, Senior Advisor Operations , Swissgrid AG

  • Evolution of the TSC Security Initiative in Central Europe
  • Importance of international Standards
  • Impact of European Network Codes
  • Seamless Communication as a condition
  • clock

    17:00

    Smart grid SCADA security

    Patricia  Robison

    Patricia Robison, Professor , New York University

  • Smart Grid Cyber Security SCADA systems and DERs
  • Industrial Control Systems Security from other industries
  • Securely integrating Distributed Energy Resources – into the grid
  • Incenting vendors IEC ISO ISA
  • Business case for securing smart grid SCADA systems
  •  

    clock

    17:30

    Chairman’s Closing Remarks and Close of Day One

    clock

    8:30

    Registration & Coffee

    clock

    9:00

    Chairman's Opening Remarks

    Dieter Sarrazyn

    Dieter Sarrazyn, Senior Manager, PwC / PricewaterhouseCoopers

    clock

    9:10

    Modern SCADA and Control systems Security

    Steve Brunasso

    Steve Brunasso , Manager of Security and Networking, California Water and Power company

  • Legacy and New Control in a secure model
  • VMWare SCADA and invisible networks in virtual environments
  • Secure remote access by Vendors into development and production systems. Lifecycle controls to ensure security and reliability.
  • Instrumenting network with packet brokers for operations and secuirty
  • Secure design to improve operations reliability and avoid user errors.
  • Complete isolation of ICS systems with data diodes.
  • Network whitelisting for control systems to
  • Secure, reliable deterministic networks for protection
  • clock

    9:50

    ICS Cyber Security in Power Generation and Electric Grids

    Daniela Pestonesi

    Daniela Pestonesi, Automation and Diagnostics , Enel Engineering & Research SpA

               CI owner requirements for ICS protection
               The electric grid protection: new frontiers
               Enel Cyber Security Laboratory and main results
               EU FP7 - CRISALIS project: advanced tools development

    clock

    10:30

    Morning Coffee

    clock

    11:00

    Security governance within Enexis; bringing security domains together

  • Experiences in bringing fragmented security domains within Enexis together
  • The information security related domains (IT, outsourced operations, SCADA/DMS, Assets, Smartmeters etc.) - Challenges of integration
  • Ongoing work, barriers, challenges
  • Philip Westbroek

    Philip Westbroek, Telecommunications and security advisor, Enexis

    Mauriche Kroos

    Mauriche Kroos, Security Officer, Enexis

    clock

    11:40

    Waternet perspective to Cyber threats, Challenges and Countermeasures(C3)

    Martin Visser

    Martin Visser, Security Officer Process Automation, Waternet

  • Keep track on data integrity
  • The added value of information sharing working groups
  • Application code review, reality or a bridge to far
  • IDS in SCADA, nice to have or must
  • Security by design
  • Security awareness, top-down approach
  • IACS exercising program
  • clock

    12:20

    Securing Power and Industrial Control Systems - From Theory to Practice

    Oded  Gonda

    Oded Gonda, Vice President of Network Security Products, Check Point Software Technologies Ltd

  • Attack vectors you may have not considered (live demo)
  • First measures to take to make it difficult for the bad guys
  • How to apply granular SCADA Protocols controls to deal with the Unknown
  • How to provide Remote Access bases on roles
  • Situational Visibility as key for identifying suspicious behaviours
  • clock

    13:00

    Networking Lunch

    clock

    14:00

    Privacy and security by design

    Howard Porter

    Howard Porter, International Alliances Director, E S M I G

  • Cost of security
  • Delivering Innovation, with security as architecture
  • The sign for Privacy and Security
  • Case studies
  • clock

    14:40

    Smart Grid Communications Security

    Bob Lockhart

    Bob Lockhart, Research Director, Navigant Research

    ·         Securing Smart Grid comms is not like securing enterprise IT comms
    ·         IP will be the dominant protocol, replacing proprietary protocols.  Is that good or bad?
    ·         Legacy devices are not going away anytime soon.  So where does that leave us?
    ·         Security spending is still driven by compliance. 
    ·         Utilities are deploying mobile technologies to their field forces – ToughPads, etc.
    ·         AMI and DA are being integrated at the hardware layer – who should worry more, IT or OT?
    ·         Public comms infrastructures are here to stay in Smart Grids – as the Telefónica UK awards by DECC demonstrate

    clock

    15:20

    Afternoon Tea

    clock

    15:50

    How can cyber security insurance mitigate the effect of attacks and encourage best practice in operational security

    Rick Welsh

    Rick Welsh, Head of Cyber Insurance at Aegis at Lloyds, Aegis London

    • What are insurable and uninsurable risks?
    • What is cyber insurance and how is it tailored for SMART Grid and SCADA coverage?
    • Insurance is not just about Risk Transfer: Vetting Incident Response and Operational Risk Management practices
    • AEGIS BAE White Paper on Operational Technology; an Overview on Breach and Vulnerability Analysis
     

    clock

    16:30

    Building an Integrated Security Operations Center (ISOC): Challenges, Pitfalls, and Lessons Learned

    Galen Rasche

    Galen Rasche, Technical Executive, Electric Power Research Institute

    • Correlating logs, alarms, and attack information from corporate systems, operational technology (OT) systems, physical security, and external sources remains a difficult challenge for many utilities
    • An ISOC is designed to collect, integrate, and analyze alarms and logs from these traditionally siloed domains
    • This approach can provide much greater situational awareness to a utility’s security team
    • This presentation will describe the planning process for an ISOC, discuss challenges and trade-offs with various design choices, and provide guidelines for utilities seeking to develop an ISOC
    • The results are based on current research and an examination of existing ISOC implementations in the electric sector
     

    clock

    17:10

    Chairman’s Closing Remarks and Close of Day Two


    Engineer
    DNV KEMA
    Chairman of the Transmission Security Cooperation, Senior Advisor Operations
    Swissgrid AG
    Expert in Network & Information Security
    ENISA - European Network and Information Security Agency
    Manager of Security and Networking
    California Water and Power company
    Technical Strategy Manager for the Future Networks team
    SSE
    Security Officer Process Automation
    Waternet
    Head of Cyber Insurance at Aegis at Lloyds
    Aegis London
    Board Member ESNA OSGP VP Echelon Energy & Utility
    ESNA
    Professor
    New York University
    International Alliances Director
    E S M I G
    Energy Adviser
    Parliamentary Office of Science and Technology
    Director Critical Infrastructure Security, Secure Network Systems
    Via Sat Inc
    Technical Executive
    Electric Power Research Institute
    Automation and Diagnostics
    Enel Engineering & Research SpA
    Director Education Training & Knowledge Center
    ENCS
    Senior Manager
    PwC / PricewaterhouseCoopers
    Director, Vertical Solutions
    Palo Alto Networks
    Security Officer
    Enexis
    Vice President of Network Security Products
    Check Point Software Technologies Ltd
    Senior Innovation Manager
    Alliander N.V.
    Research Director
    Navigant Research
    Telecommunications and security advisor
    Enexis
    COO
    Security Matters
    Privacy & Security Officer
    Alliander N.V.

    Workshops

    Marriott Regents Park

    128 King Henry's Road
    London NW3 3ST
    United Kingdom

    Marriott Regents Park

    This 4 star north London hotel in zone 2 is the perfect destination for the astute business traveler as well as the leisure guest that knows how convenient north London hotels are, as a base from which to explore the city .Bond Street is just 3 stops from Swiss Cottage underground station on the Jubilee Line, so you can be shopping, exploring the sights and taking in one of London’s world-renowned West End shows in less than 15 minutes when you stay at this hotel near central London. At the same time, the hive of activity that is Camden Town, the chic shops, cafes and restaurants of Primrose Hill and ZSL’s London Zoo in Regents Park are all just a short walk from this hotel in north London.

    HOTEL BOOKING FORM

    Title

    SubTitle
    speaker image

    Content


    Title


    Description

    Download

    Title


    Description

    Download

    Title


    Description


    Download


    WHAT IS CPD?

    CPD stands for Continuing Professional Development’. It is essentially a philosophy, which maintains that in order to be effective, learning should be organised and structured. The most common definition is:

    ‘A commitment to structured skills and knowledge enhancement for Personal or Professional competence’

    CPD is a common requirement of individual membership with professional bodies and Institutes. Increasingly, employers also expect their staff to undertake regular CPD activities.

    Undertaken over a period of time, CPD ensures that educational qualifications do not become obsolete, and allows for best practice and professional standards to be upheld.

    CPD can be undertaken through a variety of learning activities including instructor led training courses, seminars and conferences, e:learning modules or structured reading.

    CPD AND PROFESSIONAL INSTITUTES

    There are approximately 470 institutes in the UK across all industry sectors, with a collective membership of circa 4 million professionals, and they all expect their members to undertake CPD.

    For some institutes undertaking CPD is mandatory e.g. accountancy and law, and linked to a licence to practice, for others it’s obligatory. By ensuring that their members undertake CPD, the professional bodies seek to ensure that professional standards, legislative awareness and ethical practices are maintained.

    CPD Schemes often run over the period of a year and the institutes generally provide online tools for their members to record and reflect on their CPD activities.

    TYPICAL CPD SCHEMES AND RECORDING OF CPD (CPD points and hours)

    Professional bodies and Institutes CPD schemes are either structured as ‘Input’ or ‘Output’ based.

    ‘Input’ based schemes list a precise number of CPD hours that individuals must achieve within a given time period. These schemes can also use different ‘currencies’ such as points, merits, units or credits, where an individual must accumulate the number required. These currencies are usually based on time i.e. 1 CPD point = 1 hour of learning.

    ‘Output’ based schemes are learner centred. They require individuals to set learning goals that align to professional competencies, or personal development objectives. These schemes also list different ways to achieve the learning goals e.g. training courses, seminars or e:learning, which enables an individual to complete their CPD through their preferred mode of learning.

    The majority of Input and Output based schemes actively encourage individuals to seek appropriate CPD activities independently.

    As a formal provider of CPD certified activities, SAE Media Group can provide an indication of the learning benefit gained and the typical completion. However, it is ultimately the responsibility of the delegate to evaluate their learning, and record it correctly in line with their professional body’s or employers requirements.

    GLOBAL CPD

    Increasingly, international and emerging markets are ‘professionalising’ their workforces and looking to the UK to benchmark educational standards. The undertaking of CPD is now increasingly expected of any individual employed within today’s global marketplace.

    CPD Certificates

    We can provide a certificate for all our accredited events. To request a CPD certificate for a conference , workshop, master classes you have attended please email events@saemediagroup.com

    Event Title

    Headline

    Text
    Read More

    I would like to speak at an event

    I would like to attend an event

    Group Booking

    Please complete the below form and a member of SAE Media Group’s booking team will be in contact within 24 hours

    I would like to sponsor/exhibit at an event

    SIGN UP OR LOGIN

    Sign up
    Forgotten Password?

    Contact SAE Media Group

    UK Office
    Opening Hours: 9.00 - 17.30 (local time)
    SAE Media Group , Ground Floor, India House, 45 Curlew Street, London, SE1 2ND, United Kingdom
    Tel: +44 (0) 20 7827 6000 Fax: +44 (0) 20 7827 6001
    Website: http://www.smgconferences.com Email: events@saemediagroup.com
    Registered in England - SMi Group Ltd trading as SAE Media Group




    Forgotten Password

    Please enter the email address you registered with. We will email you a new password.

    Thank you for visiting our event

    If you would like to receive further information about our events, please fill out the information below.

    By ticking above you are consenting to receive information by email from SAE Media Group.
    Full details of our privacy policy can be found here https://www.smgconferences.com/privacy-legals/privacy-policy/.
    Should you wish to update your contact preferences at any time you can contact us at data.privacy@smgconferences.com.
    Should you wish to be removed from any future mailing lists please click on the following link http://www.smgconferences.com/opt-out

    Fill in your details to download the brochure

    By submitting this form you agree to our privacy policy and consent to receiving communications, you may opt out at any time.