1 / 11

MRO Cyber Security

MRO Cyber Security. May 31, 2007 Compliance Workshop. MRO CIP Working Group. Participants David Batz Alliant Energy Marc Child GRE Greg Frasor Manitoba Hydro James Phillips WAPA Active in CIP Work Identifying Resources for the Region. MRO CIP Contact. Clark Liu Alternate NERC CIPC

maisie
Download Presentation

MRO Cyber Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MRO Cyber Security May 31, 2007 Compliance Workshop

  2. MRO CIP Working Group • Participants • David Batz Alliant Energy • Marc Child GRE • Greg Frasor Manitoba Hydro • James Phillips WAPA • Active in CIP Work • Identifying Resources for the Region

  3. MRO CIP Contact • Clark Liu • Alternate NERC CIPC • Cyber Security • What but not How. • If it sounds like I’m saying “if you do this, you’ll be compliant.” I’m not even if I do say that. I cannot evaluate your efforts prior to an audit.

  4. Content • Motivation towards AW for 2010 • Key Elements • Useful Links on the NERC Website • David Batz • Q&A with Dave and Marc Child

  5. Motivation • Penalties • CIP002-009 AW by 2010, SC by 2008. • NERC Implementation Plan • Additional Work • Mitigation Plans • Timelines • Driving the number of Violations to 0.

  6. Key Elements • Senior Management Support • Defend the work • Assures that cross departmental work is accepted. • Identifies key individuals that can be help accountable.

  7. Key Elements • Understanding the Standards • Divide the requirements by department or function of your organization. • Assess your current state. • Determine what areas need clarification. Understand the language used in the Standard.

  8. Key Elements • Gap Analysis • Identify the gaps. • Plan and coordinate efforts to be in compliance. • AW 2010 means C in 2009. • Policies/Procedures need to be in affect for 12 months.

  9. Useful Links • http://www.nerc.com/~filez/standards/Reliability_Standards.html#Critical_Infrastructure_Protection - Implantation Plan • http://www.nerc.com/~filez/standards/Cyber-Security-Permanent.html - NERC CIP FAQ

  10. Alliant Energy • Dave Batz,  • Cyber Security Risk Manager   • CISSP, GSEC, GSNA • Alliant Energy Security & Facility Services

  11. Questions • David Batz (CISSP, GSEC, GSNA) and Marc Child (CISSP)

More Related