Loading…
This event has ended. Visit the official site or create your own event on Sched.
Welcome to the Interactive Agenda for SecurityWeek’s 2018 ICS Cyber Security Conference! (View the full conference website here)  (You can Register for ICS Cyber Security Conference Here)
Tuesday, October 23 • 11:00am - 11:45am
Case Study – Mapping and Protecting Application Flows in a G&T Utility

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

WFEC is a G&T utility that operates tens of sub-stations transmitting the power to its regional utilities.
As part of the preparations for the NERC CIP v6, WFEC had to map all its low-impact assets in the sub-stations and their application flows. After the mapping of the assets and their application flows WFEC continued with the deployment of security gateways at each sub-station achieving security posture well beyond the NERC CIP requirements. In this session we will present how WFEC used an Industrial IDS to perform the mapping. We will then present the requirements for the security gateways for compliance and beyond, and conclude with lessons learned from the deployment process.

Speakers
avatar for Michael Meason

Michael Meason

Senior Manager, Information and Security, Western Farmers Electric Cooperative


Tuesday October 23, 2018 11:00am - 11:45am EDT
Solutions Theatre