1 / 12

The Digital Utility Transformation Souheil Sabbagh P.Eng , M.B.A.

The Digital Utility Transformation Souheil Sabbagh P.Eng , M.B.A. Director Strategy & Consulting Services Intelligent Networks & Cybersecurity UTC Telecom & Technology Fort Worth Texas June 17-21 2019. Who is SNC-Lavalin?. Global design, engineering & project management firm

kinderj
Download Presentation

The Digital Utility Transformation Souheil Sabbagh P.Eng , M.B.A.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Digital Utility Transformation Souheil Sabbagh P.Eng, M.B.A. Director Strategy & Consulting Services Intelligent Networks & Cybersecurity UTC Telecom & Technology Fort Worth Texas June 17-21 2019

  2. Who is SNC-Lavalin? Global design, engineering & project management firm Focused on 5 critical infrastructure sectors: • Engineering Design & Project Management • Infrastructure • Nuclear • Resources • Technology Ventures Intelligent Networks & Cybersecurity • Cybersecurity • Physical and Site Security • Telecom Networks Transition • P&C / OT / AMI FOUNDED IN 1911 50,000+ EMPLOYEES WORLDWIDE 100+ YEARS SOLVING ENGINEERING CHALLENGES

  3. Digital Utility Transformation: The Main Drivers • Reliability : “Keep the lights on!” • Protect Critical Infrastructure/Cybersecurity • Changing regulatory framework • IT / OT Convergence for OPEX reduction • Aging Infrastructure/Systems obsolescence • Aging work force (lost of expertise, historical events) • Intermittent technology (renewable energy, solar and wind energy) • Changing consumer market (ex. prosumers, EV, micro-grid, etc.) • 9. New technology (predictive maintenance, data analytics, IIOT, etc.)

  4. ConventionalGrid Information flow Energy flow SCADA/EMS Billing Transmission Substation Power plant 4 Analog meter

  5. Smart Grid Information Flow Internet Energy Flow Online billing Blockchain Data analytics Energy storage SCADA/EMS Data center Billing Renewables AMI Prosumers Transmission Substation Power plant Microgrid Analog meter

  6. Modern Power Plant OT Network Plant Historian HMI SOC Control Room SCADA Controller & I/O Operator Field Transmitters & Valves Turbine Powerhouse Switchyard Penstock control gate Dam

  7. New Cyber Threats Main threat actors • State-sponsored hackers ( attack) • Organised crime (ransomware) • Terrorism groups Main attack vectors • Spear phishing • Watering hole • Ransomware • Remote access Troja • Virus • Network System Intrusion • Canular Attacks “More than 30 countries are developing offensive cyber attack capabilities” James Clapper, US director of national intelligence, June 2017

  8. A Holistic and Integrated Approach to Security is Needed • Governance optimization • Security policies • Security awareness • Media protection • Security metrics • Compliance management • Disaster recovery planning • Incident management • OT/IT security architecture • Identity and access control • Network security • Host protection • Asset management • Change management • Security event monitoring • Security patches • Backups • External penetration testing • Internal vulnerability scans • Physical access control • Perimeter protection • Intrusion detection • Security monitoring

  9. Modern Grid Cyber-threat Vectors Phishing Traffic interception Information Flow Ransomware Energy Flow Internet Online billing Blockchain Data Analytics Energy storage AMI hacking SCADA/EMS Renewables Data center Malware infiltration AMI Prosumers Substation Transmission Power plant Microgrid Unauthorized remote access

  10. Infected USB key Within the Power Plant OT Network Plant Historian SOC Unauthorized access HMI Replay attack Control Room Controller & I/O SCADA Spoofing Operator Field Rogue employee Transmitters & Valves Wi-Fi jamming Turbine Penstock control gate Powerhouse Switchyard Dam

  11. Top 10 best practices for a secure IT/OT environment Layered security strategy • ISO 27001, IEC 62351, NIST 802, NERC CIP 005 • Two-factor authentication for privileged accounts • Virtual infrastructure to prevent malware infiltration • Rigorous patch and change management • Advanced malware protection • Role-based access control with behavior analysis • IT security training and awareness • Hardening of operating systems • Converged security information and event monitoring • Isolation between OT and corporate networks 11

  12. Thank you for your attention ! Souheil Sabbagh, P.Eng, M.B.A. Director Strategy & Consulting Services SNC-Lavalin - Intelligent Networks & Cybersecurity E-mail: souheil.sabbagh@snclavalin.com Cell: +1 416-738-2470

More Related