BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:US/Eastern
BEGIN:DAYLIGHT
DTSTART:20220313T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20211107T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20220204T211540Z
UID:6E1C3F45-F81F-4FF9-9747-BE07F724FF77
DTSTART;TZID=US/Eastern:20220111T113000
DTEND;TZID=US/Eastern:20220111T130000
DESCRIPTION:Program:\n\nThe Department of Energy’s Cybersecurity for Oper
 ational Technology Environments (CyOTE™) program provides a methodology 
 for energy sector asset owner-operators to combine network-based sensor da
 ta with local context to recognize faint signals of malicious cyber activi
 ty before an adversary can cause higher-impact effects. CyOTE began as a p
 ilot sponsored by DOE’s Office of Cybersecurity\, Energy Security\, and 
 Emergency Response (CESER) in 2016\, transitioned to a program in 2019\, a
 nd in July 2021 publicly released the “Methodology for Cybersecurity in 
 Operational Technology Environments” report.\n\nBy leveraging the CyOTE 
 methodology with existing commercial monitoring capabilities and manual da
 ta collection from broader but informative sources in operations and even 
 in the business domain\, asset owners can better understand relationships 
 between multiple observables which could represent a faint signal of an at
 tack requiring investigation. Visibility is necessary\, but the importance
  of visibility is in the understanding and decisions it drives – complic
 ated by infrastructure changes\, new technologies\, and determined and sop
 histicated adversaries. CyOTE’s vision is to allow an entity to independ
 ently get to the point of making a risk informed business decision on whet
 her to respond to an incident or fix a reliability failure\, sooner and wi
 th more confidence.\n\n11:30 - 12:00 Attandance and Lunch\n\n12:00 - 12:50
  Presentation\n\n12:50 - 1:00 Q&amp;A\n\n1:00 Adjourn\n\nSpeaker(s): Mr. Sam C
 hanoski\, \n\nGTRI Conference Center\, 250 14th St. NW\, Atlanta\, Georgia
 \, United States\, 30318\, Virtual: https://events.vtools.ieee.org/m/29606
 2
LOCATION:GTRI Conference Center\, 250 14th St. NW\, Atlanta\, Georgia\, Uni
 ted States\, 30318\, Virtual: https://events.vtools.ieee.org/m/296062
ORGANIZER:atlantapes31@gmail.com
SEQUENCE:1
SUMMARY:IEEE Atlanta PES Lunch Meeting: &quot;DOE&#39;s Cyber (CyOTE™) program&quot;
URL;VALUE=URI:https://events.vtools.ieee.org/m/296062
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;strong&gt;Program:&lt;/strong&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;T
 he Department of Energy&amp;rsquo\;s Cybersecurity for Operational Technology 
 Environments (CyOTE&amp;trade\;) program provides a methodology for energy sec
 tor asset owner-operators to combine network-based sensor data with local 
 context to recognize faint signals of malicious cyber activity before an a
 dversary can cause higher-impact effects. CyOTE began as a pilot sponsored
  by DOE&amp;rsquo\;s Office of Cybersecurity\, Energy Security\, and Emergency
  Response (CESER) in 2016\, transitioned to a program in 2019\, and in Jul
 y 2021 publicly released the &amp;ldquo\;Methodology for Cybersecurity in Oper
 ational Technology Environments&amp;rdquo\; report.&lt;/p&gt;\n&lt;p&gt;&amp;nbsp\;&lt;/p&gt;\n&lt;p&gt;By
  leveraging the CyOTE methodology with existing commercial monitoring capa
 bilities and manual data collection from broader but informative sources i
 n operations and even in the business domain\, asset owners can better und
 erstand relationships between multiple observables which could represent a
  faint signal of an attack requiring investigation. Visibility is necessar
 y\, but the importance of visibility is in the understanding and decisions
  it drives &amp;ndash\; complicated by infrastructure changes\, new technologi
 es\, and determined and sophisticated adversaries. CyOTE&amp;rsquo\;s vision i
 s to allow an entity to independently get to the point of making a risk in
 formed business decision on whether to respond to an incident or fix a rel
 iability failure\, sooner and with more confidence.&lt;/p&gt;\n&lt;p&gt;11:30 - 12:00&amp;
 nbsp\; Attandance and Lunch&lt;/p&gt;\n&lt;p&gt;12:00 - 12:50&amp;nbsp\; Presentation&lt;/p&gt;\
 n&lt;p&gt;12:50 - 1:00&amp;nbsp\; &amp;nbsp\; Q&amp;amp\;A&lt;/p&gt;\n&lt;p&gt;1:00&amp;nbsp\; &amp;nbsp\; &amp;nbsp
 \; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; &amp;nbsp\; Adjourn&lt;/p&gt;
END:VEVENT
END:VCALENDAR

