BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20240310T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20241103T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240616T003849Z
UID:23FB4602-6B5D-4C8D-86D4-012DA485BFC0
DTSTART;TZID=America/New_York:20240528T110000
DTEND;TZID=America/New_York:20240528T130000
DESCRIPTION:Cyber-Informed Engineering (CIE) is an emerging method to integ
 rate cybersecurity considerations into the conception\, design\, developme
 nt\, and operation of any physical system that has digital connectivity\, 
 monitoring\, or control. CIE complements — but does not replace — the 
 application of cybersecurity standards or practices currently in place wit
 hin an organization. Rather\, it expands cybersecurity decisions into the 
 engineering space\, not by asking engineers to become cyber experts\, but 
 by calling on engineers to apply engineering tools and make engineering de
 cisions that improve cybersecurity outcomes. CIE examines the engineering 
 consequences that a sophisticated cyber attacker could achieve\, and drive
 s engineering changes that may provide deterministic mitigations to limit 
 or eliminate those consequences.\n\nEngineers and technicians that design 
 critical energy infrastructure installations can integrate the 12 principl
 es of CIE into each phase of the engineering lifecycle\, from concept to r
 etirement. These principles are aimed at system or design engineers\, oper
 ators\, and technicians\, rather than software engineers or operational cy
 bersecurity practitioners\, because the engineers who design\, build\, ope
 rate\, and maintain the physical infrastructure are best positioned to lev
 erage a system’s engineering design to diminish the severity of cyber at
 tacks or digital technology failures. This approach creates new opportunit
 ies for engineering teams — and not just cybersecurity teams — to secu
 re the system using the physics and mechanics of engineering controls — 
 not just digital monitoring and controls.\n\nSpeaker(s): Sam Chanoski\n\nA
 genda: \n11:15am - Lunch\n\n11:30am - 12:30pm - Presentation\n\n12:30pm - 
 1:00pm - Networking\n\nRoom: Auditorium\, Bldg: Building 1\, 2100 East Exc
 hange Place\, Tucker\, Georgia\, United States\, 30084
LOCATION:Room: Auditorium\, Bldg: Building 1\, 2100 East Exchange Place\, T
 ucker\, Georgia\, United States\, 30084
ORGANIZER:larhonda.julien@gatransmission.com
SEQUENCE:34
SUMMARY:IEEE PES Atlanta Technical Talk - Cyber-Informed Engineering
URL;VALUE=URI:https://events.vtools.ieee.org/m/419308
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family
 : &#39;Aptos&#39;\,sans-serif\;&quot;&gt;Cyber-Informed Engineering (CIE) is an emerging m
 ethod to integrate cybersecurity considerations into the conception\, desi
 gn\, development\, and operation of any physical system that has digital c
 onnectivity\, monitoring\, or control. CIE complements &amp;mdash\; but does n
 ot replace &amp;mdash\; the application of cybersecurity standards or practice
 s currently in place within an organization. Rather\, it expands cybersecu
 rity decisions into the engineering space\, not by asking engineers to bec
 ome cyber experts\, but by calling on engineers to apply engineering tools
  and make engineering decisions that improve cybersecurity outcomes. CIE e
 xamines the engineering consequences that a sophisticated cyber attacker c
 ould achieve\, and drives engineering changes that may provide determinist
 ic mitigations to limit or eliminate those consequences.&lt;/span&gt;&lt;/p&gt;\n&lt;p cl
 ass=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &#39;Aptos&#39;\,sans-serif\;&quot;&gt;Engineers
  and technicians that design critical energy infrastructure installations 
 can integrate the 12 principles of CIE into each phase of the engineering 
 lifecycle\, from concept to retirement. These principles are aimed at syst
 em or design engineers\, operators\, and technicians\, rather than softwar
 e engineers or operational cybersecurity practitioners\, because the engin
 eers who design\, build\, operate\, and maintain the physical infrastructu
 re are best positioned to leverage a system&amp;rsquo\;s engineering design to
  diminish the severity of cyber attacks or digital technology failures. Th
 is approach creates new opportunities for engineering teams &amp;mdash\; and n
 ot just cybersecurity teams &amp;mdash\; to secure the system using the physic
 s and mechanics of engineering controls &amp;mdash\; not just digital monitori
 ng and controls.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;Agenda: &lt;br /&gt;&lt;p&gt;11:15am - Lunch&lt;/p
 &gt;\n&lt;p&gt;11:30am - 12:30pm - Presentation&lt;/p&gt;\n&lt;p&gt;12:30pm - 1:00pm - Networki
 ng&lt;/p&gt;
END:VEVENT
END:VCALENDAR

