SlideShare a Scribd company logo
1 of 19
Page 1
Integration of
Technology &
Compliance
August 02, 2012
2012 Technologies for Security &
Compliance Summit
Austin, Texas
Page 2
John Heintz, CISSP, CISM,
CRISC
Senior Manager,
Enterprise IT Security
Page 3
• The city of San Antonio out bid
other entities to purchase the
SAPs Co for $34 million.
• The city sold off the street car
business and retained the power
generation, distribution and gas
network.
• Changed the name to City
Public Service and changed
through out the years to CPS
Energy.
• Oldest utility in Texas. Gas light system started in 1860’s.
• In 1917, San Antonio Public Service Company (SAPs CO), under the
ownership of American Light and Traction company ran the city’s power
plants, gas network and street car lines.
• In 1942, Anti-trust laws required American Light and Traction company to
sell some of it’s assets.
CPS Energy History (The early days)
Page 4
CPS Energy (Current)
• Based in San Antonio (7th largest city in the nation)
• Largest Municipally owned energy utility that provides both natural gas
and electric service
• Serve over 717,000 electric customers
• Over 325,000 gas customers
• 1,514 square mile service area.
• Over 3,600 employees
• $2 Billion in annual revenues
• $9.7 Billion in assets
• Provide roughly $250 - $280 million annual revenue to the City of San
Antonio.
Page 5
Generation
• Generation Assets
 Own and operate 4 major generation facilities in the San Antonio
area (Gas and Coal).
 Generates approximately 7000 Megawatts of power
 Own 40% of South Texas Project (STP) units 1 and 2.
 Provides 1088 megawatts of power for CPS Energy customers
 Has invested additional 7.625 % into additional units at STP.
 Would generate additional 200 megawatts of power for our customers.
• Fuel Mix
 Coal - 32%
 Nuclear - 16%
 Natural gas and purchased power -
39%
 Renewable (Wind, solar and landfill
methane gas) - 13%
 To increase to 20% by 2020.
Page 6
Transmission & Distribution
• Transmission & Distribution Assets
 Own and maintain 1400 Miles of transmission lines.
 Own and maintain 7600 miles of overhead distribution lines.
Over 408,000 poles
 Own and maintain additional 4300 miles of underground distribution lines.
Page 7
Enterprise IT Security Organization
• Enterprise IT Security Organization (EITS)
 Formed in May of 2007
 John Heintz began with CPS Energy almost 2 years ago
• EITS moved to Legal Department under General Council in 2009
 Provides true segregation of duties
 Reports to Senior Council and Director of Compliance.
• Baseline the EITS security program utilizing the Forrester
Information Security Maturity Model.
 Benchmarking tool to access the information security program.
 Provides framework that describes all of the required functions and
components of a comprehensive information security program.
 Forrester model is objective, prescriptive, process oriented, modular and
uncomplicated.
Page 8
Forrester Information Security Maturity Model
Oversight
• Strategy
• Governance
• Risk Management
• Compliance
Management
• Audit and Assurance
People
• Security Services
• Communication
• Security Organization
• Business Relationship
• Roles/Responsibilities
Technology
• Network
• Databases
• Systems
• Endpoints
• Application
Infrastructure
• Messaging and content
• Data
Process
• Identity and Access
Management
• Threat and vulnerability
management
• Investigations and
records management
• Incident management
• Sourcing and vendor
management
• Information Asset
Management
• Application/systems
development
• Business Continuity
and Disaster Recovery
Page 9
Maturity Model Self Assessment
0-
Nonexistent
•Not understood
•Not formalized
•Need is not
recognized
1-Ad Hoc
•Occasional
•Not Consistent
•Not Planned
•Disorganized
2-
Repeatable
•Intuitive
•Not
documented
•Occurs only
when necessary
3-Defined
•Documented
•Predictable
•Evaluated
occasionally
•Understood
4-Measured
•Well managed
•Formal
•Often
Automated
•Evaluated
Frequently
5-Optimized
•Continuous and
effective
•Integrated
•Proactive
•Usually
Automated
Most mature
companies are at
this stage.
Our corporate
network results
Page 10
Doing Well and What has already improved
• EITS - What are we doing well
– Endpoint Anti-Malware
– Network Intrusion Detection
– Anti-spam
– Policy Creation
– Security Event Management
• Other improvements already made
– Security Metrics
– Endpoint Protection
– Network Vulnerability
– Application Developer Security Awareness
– Vulnerability Management
– Security Testing
– Forensics and e-Discovery
– Threat Modeling
– Threat Research
– Client Encryption
– Project Integration
Page 11
Key Security / Compliance Challenges
• Technology
– Databases
• Encryption is ad hoc
– Systems
• Host based Firewalls and IPS
– Application Infrastructure
• XML gateway
• Application Firewall
– Messaging and Content
• Message Encryption
• Instant Message Filtering
• Anti-Malware
– Data
• Digital Rights Management
• Process
– Identity and Access
Management
• Web SSO
• Access Control
• Enterprise SSO
• People
– Security Organization
• Staffing
Page 12
Corporate Information Security Goal
0-
Nonexistent
•Not understood
•Not formalized
•Need is not
recognized
1-Ad Hoc
•Occasional
•Not Consistent
•Not Planned
•Disorganized
2-
Repeatable
•Intuitive
•Not
documented
•Occurs only
when necessary
3-Defined
•Documented
•Predictable
•Evaluated
occasionally
•Understood
4-Measured
•Well managed
•Formal
•Often
Automated
•Evaluated
Frequently
5-Optimized
•Continuous and
effective
•Integrated
•Proactive
•Usually
Automated
Key Security issues
are addressed, could
move here…
Page 13
James Grimshaw
Critical Cyber Infrastructure Manager,
Transmission Compliance
Page 14
Control Systems Cyber Security (or Compliance?)
• NERC Compliance Events
 January 2009 – One year to be fully compliant
 January 2010 - Fully compliant date
 October 2010 – TOP CFR Certification
 November 2011 – 1st Full TO/TOP/LSE CIP Audit
 2012 – Documented lessons learned (LL) and begin to implement LL during
annual updates
1. Manage and Communicate Compliance Activities
2. CIP-004 -3, R4 – Access Program
3. Management Dashboard
Page 15
Manage and Communicate Compliance Activities
• Annual reviews (Policies, Programs, Procedures etc…)
• Create compliance periodic reports
• Where to file (sensitive) associated reports and evidence
• Complete Reliability Standards Audit Worksheets (RSAWs)
• Create workflows for accountability, accuracy, & oversight
• Risk management – Escalation of non-completed workflows,
security trends
• Manage Technical Feasibility Exceptions, Mitigation Plans etc.
• Decrease interruption to Subject Matter Expert daily work
schedule
Page 16
Physical & Cyber Access Program
• Automate performance reviews and system generated reports
• Integrate systems to decrease risk & increase efficiency
• Physical Security Perimeter & Electronic Security Perimeter
• PSP Area Owners & Cyber System Owners
• Corporate Enterprise Resource Planning program for PRAs
• Corporate learning management system for NERC training records
• Weekly access report fed into management dashboard
• Automate position organizational changes, terminations and new
hires
• CIP Version 5 – Role based access (and other changes)
Page 17
Management Compliance Dashboard
• One of top ranked challenges is getting management support
 NERC Committee (Steering Group)
 Provide senior management with high level insight (drill down)
• Properly prioritize projects vs. compliance
• Properly prioritize funding
• Corporate level risk mitigation
Page 18
The Future for Control Systems Environments
• Working together with other Utilities
 CIP Working Group
• Continuous Process Improvement
 Invest to automate processes
 Integrate systems to decrease risk
• Stay informed and utilize resources
 NERC and ICSJWG Workshops
 Keep up with NERC & TxRE communications
 DOE/DHS
Page 19
Questions

More Related Content

What's hot

From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air ControlEnergySec
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...EnergySec
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...EnergySec
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationJoe Reddix
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyNandita Nityanandam
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case StudyDigital Bond
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIvanti
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsIgnyte Assurance Platform
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Global Business Events
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeePlus
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is RealePlus
 
Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your NetworkePlus
 
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with IgnyteMidway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with IgnyteIgnyte Assurance Platform
 

What's hot (20)

From Air Gap to Air Control
From Air Gap to Air ControlFrom Air Gap to Air Control
From Air Gap to Air Control
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
An Approach to Closing the Gaps between Physical, Process Control, and Cybers...
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - Presentation
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Addressing the Cyber-Security Landscape
Addressing the Cyber-Security LandscapeAddressing the Cyber-Security Landscape
Addressing the Cyber-Security Landscape
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
 
Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your Network
 
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with IgnyteMidway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
Midway Swiss Case Study: Journey towards CMMC Compliance with Ignyte
 

Viewers also liked

Game Development in the Cloud - Live Q&A
Game Development in the Cloud - Live Q&AGame Development in the Cloud - Live Q&A
Game Development in the Cloud - Live Q&ARightScale
 
Insight SaaS Overview - Cloud Computing
Insight SaaS Overview - Cloud ComputingInsight SaaS Overview - Cloud Computing
Insight SaaS Overview - Cloud Computingjgasior
 
Docker Container As A Service - Mix-IT 2016
Docker Container As A Service - Mix-IT 2016Docker Container As A Service - Mix-IT 2016
Docker Container As A Service - Mix-IT 2016Patrick Chanezon
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesPing Identity
 
Data Governance for End-User Computing
Data Governance for  End-User ComputingData Governance for  End-User Computing
Data Governance for End-User ComputingDATAVERSITY
 
Martin Börjesson - Hvad er Bimodal IT?
Martin Börjesson - Hvad er Bimodal IT?Martin Börjesson - Hvad er Bimodal IT?
Martin Börjesson - Hvad er Bimodal IT?Aarhus BSS
 
Web Game Development
Web Game DevelopmentWeb Game Development
Web Game DevelopmentSabin Buraga
 
Technology Transformation Maturity Model
Technology Transformation Maturity ModelTechnology Transformation Maturity Model
Technology Transformation Maturity ModelEliot Arnold
 
Red Hat OpenShift Container Platform Overview
Red Hat OpenShift Container Platform OverviewRed Hat OpenShift Container Platform Overview
Red Hat OpenShift Container Platform OverviewJames Falkner
 
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015Martin Thompson
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextDavid Sweigert
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 

Viewers also liked (14)

Game Development in the Cloud - Live Q&A
Game Development in the Cloud - Live Q&AGame Development in the Cloud - Live Q&A
Game Development in the Cloud - Live Q&A
 
Obsidian Agile DevOps
Obsidian Agile DevOpsObsidian Agile DevOps
Obsidian Agile DevOps
 
Insight SaaS Overview - Cloud Computing
Insight SaaS Overview - Cloud ComputingInsight SaaS Overview - Cloud Computing
Insight SaaS Overview - Cloud Computing
 
Docker Container As A Service - Mix-IT 2016
Docker Container As A Service - Mix-IT 2016Docker Container As A Service - Mix-IT 2016
Docker Container As A Service - Mix-IT 2016
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
 
Data Governance for End-User Computing
Data Governance for  End-User ComputingData Governance for  End-User Computing
Data Governance for End-User Computing
 
Martin Börjesson - Hvad er Bimodal IT?
Martin Börjesson - Hvad er Bimodal IT?Martin Börjesson - Hvad er Bimodal IT?
Martin Börjesson - Hvad er Bimodal IT?
 
Web Game Development
Web Game DevelopmentWeb Game Development
Web Game Development
 
Technology Transformation Maturity Model
Technology Transformation Maturity ModelTechnology Transformation Maturity Model
Technology Transformation Maturity Model
 
Red Hat OpenShift Container Platform Overview
Red Hat OpenShift Container Platform OverviewRed Hat OpenShift Container Platform Overview
Red Hat OpenShift Container Platform Overview
 
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
SIAM Skills Workshop, BCS, ITSM Review 17th Nov 2015
 
SABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 contextSABSA vs. TOGAF in a RMF NIST 800-30 context
SABSA vs. TOGAF in a RMF NIST 800-30 context
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 

Similar to Integration of Technology & Compliance Presented by John Heintz, CPS Energy

EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPScott Baron
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessDan Yarmoluk
 
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility EnergyTech2015
 
Simplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachSimplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachp6academy
 
PiT 29 October 2014 Presentation - Seqwater
PiT 29 October 2014 Presentation - SeqwaterPiT 29 October 2014 Presentation - Seqwater
PiT 29 October 2014 Presentation - SeqwaterDigital Queensland
 
2014 06-06 open data summit deck v1
2014 06-06 open data summit deck v12014 06-06 open data summit deck v1
2014 06-06 open data summit deck v1Samuel Wong
 
module_1_chapter_1.pptx
module_1_chapter_1.pptxmodule_1_chapter_1.pptx
module_1_chapter_1.pptxArsalanT2
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?Denodo
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliancesAhmadi Madi
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...元 黄
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsBarcoding, Inc.
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...Formulatedby
 
Tata steel ideation contest
Tata steel ideation contestTata steel ideation contest
Tata steel ideation contestashwinikumar1424
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0Valdez Ladd MBA, CISSP, CISA,
 

Similar to Integration of Technology & Compliance Presented by John Heintz, CPS Energy (20)

EUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIPEUCI Mapping Cybersecurity to CIP
EUCI Mapping Cybersecurity to CIP
 
APM
APMAPM
APM
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT Process
 
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility Branndon Kelley Keynote on Cybersecurity and the Smart Utility
Branndon Kelley Keynote on Cybersecurity and the Smart Utility
 
Demystifying internet of things
Demystifying internet of thingsDemystifying internet of things
Demystifying internet of things
 
Simplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approachSimplifying it using a disciplined portfolio governance approach
Simplifying it using a disciplined portfolio governance approach
 
PiT 29 October 2014 Presentation - Seqwater
PiT 29 October 2014 Presentation - SeqwaterPiT 29 October 2014 Presentation - Seqwater
PiT 29 October 2014 Presentation - Seqwater
 
2014 06-06 open data summit deck v1
2014 06-06 open data summit deck v12014 06-06 open data summit deck v1
2014 06-06 open data summit deck v1
 
module_1_chapter_1.pptx
module_1_chapter_1.pptxmodule_1_chapter_1.pptx
module_1_chapter_1.pptx
 
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019 PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT Latvia, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
 
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?¿En qué se parece el Gobierno del Dato a un parque de atracciones?
¿En qué se parece el Gobierno del Dato a un parque de atracciones?
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
 
The Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management SystemsThe Key Challenges in Implementing Enterprise Asset Management Systems
The Key Challenges in Implementing Enterprise Asset Management Systems
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...
Data Science Salon: Quit Wasting Time – Case Studies in Production Machine Le...
 
Tata steel ideation contest
Tata steel ideation contestTata steel ideation contest
Tata steel ideation contest
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
 
Tata steel ideation contest
Tata steel ideation contestTata steel ideation contest
Tata steel ideation contest
 

Recently uploaded

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Integration of Technology & Compliance Presented by John Heintz, CPS Energy

  • 1. Page 1 Integration of Technology & Compliance August 02, 2012 2012 Technologies for Security & Compliance Summit Austin, Texas
  • 2. Page 2 John Heintz, CISSP, CISM, CRISC Senior Manager, Enterprise IT Security
  • 3. Page 3 • The city of San Antonio out bid other entities to purchase the SAPs Co for $34 million. • The city sold off the street car business and retained the power generation, distribution and gas network. • Changed the name to City Public Service and changed through out the years to CPS Energy. • Oldest utility in Texas. Gas light system started in 1860’s. • In 1917, San Antonio Public Service Company (SAPs CO), under the ownership of American Light and Traction company ran the city’s power plants, gas network and street car lines. • In 1942, Anti-trust laws required American Light and Traction company to sell some of it’s assets. CPS Energy History (The early days)
  • 4. Page 4 CPS Energy (Current) • Based in San Antonio (7th largest city in the nation) • Largest Municipally owned energy utility that provides both natural gas and electric service • Serve over 717,000 electric customers • Over 325,000 gas customers • 1,514 square mile service area. • Over 3,600 employees • $2 Billion in annual revenues • $9.7 Billion in assets • Provide roughly $250 - $280 million annual revenue to the City of San Antonio.
  • 5. Page 5 Generation • Generation Assets  Own and operate 4 major generation facilities in the San Antonio area (Gas and Coal).  Generates approximately 7000 Megawatts of power  Own 40% of South Texas Project (STP) units 1 and 2.  Provides 1088 megawatts of power for CPS Energy customers  Has invested additional 7.625 % into additional units at STP.  Would generate additional 200 megawatts of power for our customers. • Fuel Mix  Coal - 32%  Nuclear - 16%  Natural gas and purchased power - 39%  Renewable (Wind, solar and landfill methane gas) - 13%  To increase to 20% by 2020.
  • 6. Page 6 Transmission & Distribution • Transmission & Distribution Assets  Own and maintain 1400 Miles of transmission lines.  Own and maintain 7600 miles of overhead distribution lines. Over 408,000 poles  Own and maintain additional 4300 miles of underground distribution lines.
  • 7. Page 7 Enterprise IT Security Organization • Enterprise IT Security Organization (EITS)  Formed in May of 2007  John Heintz began with CPS Energy almost 2 years ago • EITS moved to Legal Department under General Council in 2009  Provides true segregation of duties  Reports to Senior Council and Director of Compliance. • Baseline the EITS security program utilizing the Forrester Information Security Maturity Model.  Benchmarking tool to access the information security program.  Provides framework that describes all of the required functions and components of a comprehensive information security program.  Forrester model is objective, prescriptive, process oriented, modular and uncomplicated.
  • 8. Page 8 Forrester Information Security Maturity Model Oversight • Strategy • Governance • Risk Management • Compliance Management • Audit and Assurance People • Security Services • Communication • Security Organization • Business Relationship • Roles/Responsibilities Technology • Network • Databases • Systems • Endpoints • Application Infrastructure • Messaging and content • Data Process • Identity and Access Management • Threat and vulnerability management • Investigations and records management • Incident management • Sourcing and vendor management • Information Asset Management • Application/systems development • Business Continuity and Disaster Recovery
  • 9. Page 9 Maturity Model Self Assessment 0- Nonexistent •Not understood •Not formalized •Need is not recognized 1-Ad Hoc •Occasional •Not Consistent •Not Planned •Disorganized 2- Repeatable •Intuitive •Not documented •Occurs only when necessary 3-Defined •Documented •Predictable •Evaluated occasionally •Understood 4-Measured •Well managed •Formal •Often Automated •Evaluated Frequently 5-Optimized •Continuous and effective •Integrated •Proactive •Usually Automated Most mature companies are at this stage. Our corporate network results
  • 10. Page 10 Doing Well and What has already improved • EITS - What are we doing well – Endpoint Anti-Malware – Network Intrusion Detection – Anti-spam – Policy Creation – Security Event Management • Other improvements already made – Security Metrics – Endpoint Protection – Network Vulnerability – Application Developer Security Awareness – Vulnerability Management – Security Testing – Forensics and e-Discovery – Threat Modeling – Threat Research – Client Encryption – Project Integration
  • 11. Page 11 Key Security / Compliance Challenges • Technology – Databases • Encryption is ad hoc – Systems • Host based Firewalls and IPS – Application Infrastructure • XML gateway • Application Firewall – Messaging and Content • Message Encryption • Instant Message Filtering • Anti-Malware – Data • Digital Rights Management • Process – Identity and Access Management • Web SSO • Access Control • Enterprise SSO • People – Security Organization • Staffing
  • 12. Page 12 Corporate Information Security Goal 0- Nonexistent •Not understood •Not formalized •Need is not recognized 1-Ad Hoc •Occasional •Not Consistent •Not Planned •Disorganized 2- Repeatable •Intuitive •Not documented •Occurs only when necessary 3-Defined •Documented •Predictable •Evaluated occasionally •Understood 4-Measured •Well managed •Formal •Often Automated •Evaluated Frequently 5-Optimized •Continuous and effective •Integrated •Proactive •Usually Automated Key Security issues are addressed, could move here…
  • 13. Page 13 James Grimshaw Critical Cyber Infrastructure Manager, Transmission Compliance
  • 14. Page 14 Control Systems Cyber Security (or Compliance?) • NERC Compliance Events  January 2009 – One year to be fully compliant  January 2010 - Fully compliant date  October 2010 – TOP CFR Certification  November 2011 – 1st Full TO/TOP/LSE CIP Audit  2012 – Documented lessons learned (LL) and begin to implement LL during annual updates 1. Manage and Communicate Compliance Activities 2. CIP-004 -3, R4 – Access Program 3. Management Dashboard
  • 15. Page 15 Manage and Communicate Compliance Activities • Annual reviews (Policies, Programs, Procedures etc…) • Create compliance periodic reports • Where to file (sensitive) associated reports and evidence • Complete Reliability Standards Audit Worksheets (RSAWs) • Create workflows for accountability, accuracy, & oversight • Risk management – Escalation of non-completed workflows, security trends • Manage Technical Feasibility Exceptions, Mitigation Plans etc. • Decrease interruption to Subject Matter Expert daily work schedule
  • 16. Page 16 Physical & Cyber Access Program • Automate performance reviews and system generated reports • Integrate systems to decrease risk & increase efficiency • Physical Security Perimeter & Electronic Security Perimeter • PSP Area Owners & Cyber System Owners • Corporate Enterprise Resource Planning program for PRAs • Corporate learning management system for NERC training records • Weekly access report fed into management dashboard • Automate position organizational changes, terminations and new hires • CIP Version 5 – Role based access (and other changes)
  • 17. Page 17 Management Compliance Dashboard • One of top ranked challenges is getting management support  NERC Committee (Steering Group)  Provide senior management with high level insight (drill down) • Properly prioritize projects vs. compliance • Properly prioritize funding • Corporate level risk mitigation
  • 18. Page 18 The Future for Control Systems Environments • Working together with other Utilities  CIP Working Group • Continuous Process Improvement  Invest to automate processes  Integrate systems to decrease risk • Stay informed and utilize resources  NERC and ICSJWG Workshops  Keep up with NERC & TxRE communications  DOE/DHS

Editor's Notes

  1. For everyone from Texas please be patient while I take a few slides to describe CPS Energy. This is a brief Mr. Heintz uses a various forums.
  2. Tag-line for our Customers!
  3. The Forrester Information Security Maturity Model details 123 components that comprise a successful security organization, grouped in 25 functions, and 4 high level domains (sometimes referred to as categories): Oversight, People, Technology and Process, with subcategories under each.
  4. The Forrester Information Security Maturity Model
  5. We need to ensure our security system integration is where we want it to ensure CPS Energy reduces our security risk.
  6. Coordinated Functional Registration Agreement for the Transmission Operator Function - Electric Reliability Council of Texas, Inc. (ERCOT ISO), which is the independent system operator for the ERCOT Interconnection, and below-signed Local Control Center (LCC), which operates a control center for a discrete portion of the bulk-power system within the ERCOT Interconnection
  7. Looking for cyber solutions to assist us with these compliance activities