BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
DTSTART:20120311T030000
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:MDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20121104T010000
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:MST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20120516T192926Z
UID:D7B118C0-B838-102F-97F7-0050568D3657
DTSTART;TZID=America/Denver:20120517T180000
DTEND;TZID=America/Denver:20120517T193000
DESCRIPTION:May 17th Presentation on Power Grid Security: How do we keep th
 e lights on when everyone has access to the switch? The North American ene
 rgy infrastructure comprised of electricity\, natural gas\, coal and oil u
 tilities fuels the economy of the 21st century. Without a consistent\, rel
 iable and resilient energy supply the health and welfare of the population
  and economies of North America are threatened. More than 90 percent of No
 rth America&#39;s energy infrastructure is owned by the private sector. The en
 ergy infrastructure is highly automated and controlled by utilities using 
 complex energy management systems. These systems fall under the broad term
  of Industrial Control Systems (ICS)\, which include Supervisory Control a
 nd Data Acquisition (SCADA) systems that are used to keep the energy infra
 structure up and running. Newly implemented low-cost Internet Protocol (IP
 ) and wireless devices increase the possibility of cyber security vulnerab
 ilities and incidents. ICS are adopting IT solutions to promote corporate 
 business systems connectivity and remote access capabilities. ICS are bein
 g designed and implemented using IT industry standard computers\, operatin
 g systems (OS)\, applications and network protocols. Multiple threat eleme
 nts are combining to significantly increase the ICS threat landscape. Hack
 tivists\, script kiddies and bad actors as well as nation states are acqui
 ring and using specialized search engines to identify Internet facing cont
 rol systems\, taking advantage of the growing arsenal of exploitation tool
 s such as MetasploitÂ® modules developed specifically for control system
 s. How do we keep the lights on when everyone has access to the switch? Th
 is presentation will give a general overview of SCADA and ICS\, threat vec
 tors\, possible consequences\, threat scenarios and actions energy infrast
 ructure asset owners can take to protect themselves and their customers. H
 as the grid ever been compromised by cyber threats in the past? The attend
 ees are challenged to answer this question prior to the presentation. Bonu
 s points will be given for the correct answer. Attendance to the meeting i
 s FREE to IEEE members as well as non-members. Pizza and sodas will be ava
 ilable: Free to IEEE members\; $5 for non-members. The location is Agilent
  Technologies\, 1900 Garden of the Gods\, Lobby &quot;C&quot;.\n\nCo-sponsored by: L
 ocal Chapter of the Power and Energy Society\n\nSpeaker(s): Wally Magda\, 
 \, Wally Magda\, \n\nBldg: Agilent Technologies\, Lobby &quot;C&quot; Entrance\, 190
 0 Garden of the Gods\, Colorado Springs\, Colorado\, United States\, 80907
LOCATION:Bldg: Agilent Technologies\, Lobby &quot;C&quot; Entrance\, 1900 Garden of t
 he Gods\, Colorado Springs\, Colorado\, United States\, 80907
ORGANIZER:russbogardus@comcast.net
SEQUENCE:11
SUMMARY:How do we keep the lights on when everyone has access to the switch
 ?
URL;VALUE=URI:https://events.vtools.ieee.org/m/11259
X-ALT-DESC:Description: &lt;br /&gt;May 17th Presentation on Power Grid Security:
  How do we keep the lights on when everyone has access to the switch?\n\nT
 he North American energy infrastructure comprised of electricity\, natural
  gas\, coal and oil utilities fuels the economy of the 21st century. Witho
 ut a consistent\, reliable and resilient energy supply the health and welf
 are of the population and economies of North America are threatened. More 
 than 90 percent of North America&#39;s energy infrastructure is owned by the p
 rivate sector. The energy infrastructure is highly automated and controlle
 d by utilities using complex energy management systems. These systems fall
  under the broad term of Industrial Control Systems (ICS)\, which include 
 Supervisory Control and Data Acquisition (SCADA) systems that are used to 
 keep the energy infrastructure up and running. Newly implemented low-cost 
 Internet Protocol (IP) and wireless devices increase the possibility of cy
 ber security vulnerabilities and incidents. ICS are adopting IT solutions 
 to promote corporate business systems connectivity and remote access capab
 ilities. ICS are being designed and implemented using IT industry standard
  computers\, operating systems (OS)\, applications and network protocols. 
 Multiple threat elements are combining to significantly increase the ICS t
 hreat landscape. Hacktivists\, script kiddies and bad actors as well as na
 tion states are acquiring and using specialized search engines to identify
  Internet facing control systems\, taking advantage of the growing arsenal
  of exploitation tools such as MetasploitÂ® modules developed specifical
 ly for control systems. How do we keep the lights on when everyone has acc
 ess to the switch? This presentation will give a general overview of SCADA
  and ICS\, threat vectors\, possible consequences\, threat scenarios and a
 ctions energy infrastructure asset owners can take to protect themselves a
 nd their customers. \n\nHas the grid ever been compromised by cyber threat
 s in the past? The attendees are challenged to answer this question prior 
 to the presentation. Bonus points will be given for the correct answer.\n\
 nAttendance to the meeting is FREE to IEEE members as well as non-members.
   Pizza and sodas will be available: Free to IEEE members\; $5 for non-mem
 bers. The location is Agilent Technologies\, 1900 Garden of the Gods\, Lob
 by &quot;C&quot;.
END:VEVENT
END:VCALENDAR

