Education

              


Tuesday April 25, 2017 

1:30 PM - 2:30 PM 

Efficient Cyber Security for Radio Field Area Networks

Speaker: John Yaldwyn, Chief Technology Officer, 4RF USA, Inc

Category: Cyber Security/Physical Security

Room: 310 A

With low production margins the risk of targeted cyber intelligence collection for competitive advantage increases along with the value of potential disruptions.  Protection of valuable data, particularly of metering, and protection against interruption of production must be key goals.  Off-the-shelf information technology security solutions such as IPsec can be cumbersome in the field area network.  Can we retain the IT building blocks of encryption and authentication in a narrowband nature of FAN based radio networks?

Session Objectives:

This session will review basic security pillars, look at effective and efficient security techniques, and see how these are being used in real networks today. 

Understand the key security pillars of confidentiality, integrity, and availability to which we need to add accountability and non-repudiation for a complete cyber security context.

See how traditional IT tools deliver these pillars and review the strength and weaknesses, particularly in a capacity constrained radio-base field area network. Hear about techniques that minimize overheads.

Learn skills that allow evaluation of vendor solutions in the SCADA radio communications space.

 

Technology to Consider While Improving PHMSA Compliance Efforts

Speaker: Pete Rullman, Global SCADA Product Manager, Honeywell

Co Speaker: Bob Ell, Oil & Gas SCADA Marketing Manager, Honeywell

Category: SCADA and Business Data

Room: 310 B

Discussion around the use of current and newer technologies in hardware and software and where those will begin to improve the automation, accuracy and upkeep of compliance tracking systems associated with a regulated oil & gas control room.

Within the regulated oil & gas industry, failure to comply with the many governmental guidelines and regulations could lead to large fines, suspension of operations, environmental disasters, injury or death to people and animals. In particular, making sure all of the Pipeline & Hazardous Materials Safety Administration (PHMSA) regulations are complied with on an ongoing basis and in an organized manner is a daunting task for small to large oil & gas companies, and encompasses numerous data sources and avenues of data flow. Reviewing the number and scope of PHMSA regulations should be a sustained effort.

 While there are companies that do a better job than others in keeping up with the required documentation, many struggle to keep on top of the daily, weekly, monthly data requirements that go into the compliance aspects of the system. Even the better organized organizations could capitalize on improved automation.

Session Objectives:

We will discuss, along with a potential co-presenter from the pipeline control room angle, what this improved compliance solution may begin to look like with the addition of smarter tools and devices.

Highlighting challenges around the maintenance in keeping up with PHMSA regulations

Highlight how some of the current IIOT tech can be used for other systems beyond simple process control...i.e. compliance tracking and upkeep.

Get others thinking about additional solutions that may be on the horizon outside of this conversation.

 

IT/OT Convergence - Is SDN Ready?

Speaker: Hansen Chan, IT/OT Convergence - Is SDN Ready, Nokia

Category: System Architecture for Industrial Control Systems, Networks/Communications Infrastructures

Room: 310 C

Traditionally, operational technology (OT) groups control and monitor mission-critical infrastructures while information technology (IT) maintains business-critical information and communications systems.  With convergence, critical network operators have the potential to bring many benefits to their organizations, including better long-term business planning, closer monitoring of infrastructure conditions, improved performance and higher reliability. This session will discuss the challenges of deploying and operating a converged network supporting the IT/OT convergence initiative.

Session Objectives:

What are the challenges that keep IT & OT network operators up at night and ideas how to overcome these challenges through convergence.

How to maintain autonomy for the critical infrastructure network during and after the IT/OT Convergence

Concepts on how to maintain security and resilience with a converged network


Rupture Detection

Speaker: Peter Han, Business Development Manager, Atmos International

Category: Off Shore Communications

Room: 320 A

The presentation will cover the origins of rupture detection, how rupture detection differs from leak detection, the challenges of rupture detection, and how to resolve these challenges.

Pipeline ruptures have been known to cause catastrophic harm to the environment and can endanger the lives of people.  Many times, pipeline ruptures are gone unnoticed for long periods of times and/or the pipeline is restarted by operators after it trips.  The rapid nature of ruptures can prove to be challenging to detect with conventional leak detection systems should the pumps trip due to low pressure.  It will also cover the challenges of rupture detection, such as pump trips, and the need for absolutely no false alarms, in order to maintain the reliability of a high confidence rupture detection system.  Solutions of what is available on the market today to overcome the challenges of missing a rupture will be described along what a pipeline operator can do to detect and mitigate such rupture events.

Session Objectives:

Educating the audience of rupture detection.

Distinguish the difference between rupture and leak detection.

Identifying the challenges and providing a solution to ruptures.


2:30 PM - 3:30 PM

 

Cyber Security & Physical Security Threats and Today's Security Solutions

Speaker: Robin McDaniel, Project Specialist, Navigant, Modular Connections

Co Speaker: Brian Harrell, CPP Director, Navigant, Modular Connections

Category: Cyber Security/Physical Security

Room: 310 A

Listen to experts in Cyber and Physical Security about convergence solutions to bridge the gaps and strengthen security across the enterprise. Hear the most up to date information on today's threats and the latest technologies to mitigate those threats.   Corporate and Critical infrastructure protection is crucial for your company or government organization.

Session Objectives:

Learn the most up to date information on cyber and physical security threats from a Security Expert.

Learn methods and procedures to address the cyber and physical security threats most prevalent at your sites.

Be better prepared to handle the cyber and physical security guidelines and regulations that will trickle down through our critical infrastructure system over the next 5-10 years.

 

In-House Development Vs Industry Standard to Follow

Speaker: Rene Varon, President, Tory Technologies Inc.

Co Speaker: Juan Torres, Business Development Project Manager, Tory Technologies Inc.

Category: SCADA and Business Data, FCC and Regulatory, Professional Development, 49 CFR 102 & 195; PHMSA Compliance

Room: 310 B

Leading Pipeline Operators have started to develop and implement software applications to help their Control Room Operators and field personnel comply with PHMSA regulations, while following Recommended Practices for the industry. However, this bigger effort to develop internal solutions, may turned into bigger investments in IT Personnel (Developers), IT Infrastructure, IT Security, IT Training, etc.  In-House Development Vs Industry Standard to Follow Federal regulations have always been part of the oil and gas industry in the united states, and that is why every year government proposes new regulatory policies to oversee the integrity of the nation’s pipeline structure as national security infrastructure. Leading Pipeline Operators have started to develop and implement software applications to help their Control Room Operators and field personnel comply with PHMSA regulations, while following Recommended Practices for the industry. However, this bigger effort to develop internal solutions, may turned into bigger investments in IT Personnel (Developers), IT Infrastructure, IT Security, IT Training, etc.  Efforts to comply with PHMSA audits are happening all over the U.S, Canada. These Pipeline Operators are investing time and resources developing in house applications to comply with Federal Regulations; instead of focusing in their core business and find commercial proven solutions that can standardize processes for them and help them ace any PHMSA Audit.

Session Objectives:

The main objective of the paper is to present the pros and cons of in-house development vs. commercially proven applications, as well as to address some trends in the market for now commercial solutions that were initially developed by and with the perspective of a pipeline operator.

 

Tower Compliance & the “New” Regulations: What Does it Mean for You and Your Operations?

Speaker: Cory Crenshaw, Owner, Crenshaw Communications Consulting, LLC

Category: FCC and Regulatory

Room: 310 C

Over the last few years there have been numerous changes to the regulations for tower construction compliance.  In the last 2 years alone, the FAA has released a new Lighting and Marking circular and Congress has passed a new legislation requiring towers 50’ to 200’ to comply with lighting and marking requirements that were not in place previously.  The Collocation National Programmatic Agreement has been amended to streamline the process for new construction to support deployment of Small Cell/ DAS structures and other Utility applications to include additional exemptions for cultural review.  With active deployments at every corner and crossroad, RF safety is more important than ever.

Session Objectives:

Join us to learn about the newest changes that impact your services and what you can do to stay compliant, ahead of the game and minimize liability.

 

Advanced Software Defined Radios and the Trend to Move Back to Licensed RF Spectrum for SCADA Applications

Speaker: Al King, Regional Sales Manager, Xetawave LLC

Category: Networks/Communications Infrastructures

Room: 320 A

This presentation will educate the audience on the latest SDR radio technology and its benefits in difficult RF environments. Case studies will be discussed to provide clear examples of the benefits of Software Defined Radios.  Advance Software Defined Radios (SDRs) allow the manufacturer to take advantage of not being tied to the limitations of chipset base radios.  This allow the manufacturer to offer custom designed solutions in traditional licensed spectrum and spectrum available on the commercial market from spectrum holders.  Licensed SDR radios can have the flexibility to offer multiple modulation techniques and dynamic link adaptation providing the highest bandwidth possible.  Advanced “Over the Air” protocols insure packet delivery and reduced system latency. Master radio synchronization allow for efficient use of limited spectrum eliminating self-interference.

Session Objectives:

High level understanding of SDR products.

Reasoning for moving back to Licensed Spectrum.

Discussion on alternative available Licensed Spectrum.

 

3:30 PM - 4:30 PM

Enhancing Safety Through Enhanced Cybersecurity Solutions

Speaker: Graham Speake, CISO, Berkana Resources

Category: Cyber Security/Physical Security

Room: 310 A

Safety of people, processes and the environment are always at the forefront of everybody's mind. Cyber security is now entering the same paradigm and garnering multiple pieces of regulation. How cyber security processes and solutions can improve safety are presented.

Cyber security initiatives are now becoming part of every company's license to operate due to the multitude of regulation and guidelines. Within the safety world, these have been around for years and are now accepted without question. Understanding what cyber security regulations and guidelines are currently in existence and those that are in the planning stages is important for all operators of critical infrastructure. Cyber security initiatives need to be looked at across the organization, ensuring regulations are met but also that underlying processes are put in place, especially training. All of this needs to done not just with security in mind, but also demonstrating how these can improve the safety of the people, processes and the environment by reducing outages or loss of view of critical systems due to a security breach.

Session Objectives:

The session will look at security, standards/regulation/guidelines and safety and how these all interact.

Understand cyber security regulations,  standards and guidelines that affect the industry.

How cyber security issues can affect the overall safety of a system, with real examples.

Understanding cyber security risk and how this can be applied to industrial systems.


Why the “Edge” Is Important for the IIoT in the Energy Industry

Speaker: Steve Sponseller, Director- Business Development, Kepware Technologies

Category: SCADA and Business Data

Room: 310 B

Conceptually, the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) have been discussed at great lengths over the past couple of years. “Why IoT?” has been asked, use cases have been explored, and implementations are underway. The shift from concept to implementation is now sparking new discussions as users and system integrators explore what technology is best and how integration will work between applications.

There are two concerns that must be addressed for the IIoT in the Energy Industry. The first is network bandwidth: 35 to 50 billion connected devices are estimated by 2020. The second is security: sending data across networks and into the Cloud could open vulnerabilities. How can companies accommodate the increase of connected devices and ensure their communications are secure? This presentation will describe the IIoT, share applications and use cases, and explain how collecting and analyzing data at the “Edge” will alleviate network bandwidth and security concerns.

Session Objectives:

This presentation will describe the IIoT, the types of Things in the Energy Industry, and the types of applications that want the data in those Things. It will also explore data collection at the “Edge” and describe how it can improve connectivity in low-bandwidth networks while enhancing communications’ security. Finally, it will share a use case for edge analytics and detail how they can alleviate data collection and transfer challenges.

Provide background information on the IIoT and explore its benefits to the industry.

Understand why collecting data at the edge will improve data collection and security while decreasing network bandwidth.

Understand why performing some analytics at the edge is necessary for the IIoT in the Energy Industry.


Grounding System Design for Critical Facilities

Speaker: Roy Whitten, Senior Applications Engineer, Lyncole XIT Grounding

Category: System Architecture for Industrial Control Systems

Room: 310 C

Electrical grounding is critical to the protection and operation of sensitive electronic suites.  This presentation will cover why we ground, its importance and its relationship to surge suppression and lightning protection.  Proper ground testing is also critical, although 95% is invalid.  We will cover how to properly test and achieve valid results. Recognizing the importance of the grounding system, this presentation will cover the basics of two common methods of test, present a oneline electrical diagram explanation of test theory and discuss the common mistakes. Regardless of your role in construction and / or maintenance you will learn ground testing concepts and how to evaluate testing results.

Session Objectives:

Why to Ground and how it provides tower protection and equipment protection.

Different types of Ground Testing Methods.

Understand the different electrode choices, the pros and the cons.


Wireless Connectivity From the Node to NOC

Speaker: Kent Brown, Director of Sales – National & Strategic Accounts, Cambium Networks

Category: SCADA and Business Data, Networks/Communications Infrastructures

Room: 320 A

As network devices become more intelligent, SCADA systems are becoming more important, not only for control and monitoring, but for end-to-end analytics applications. Low capacity traditional SCADA systems are being supplemented by higher capacity wireless solutions that offer proven, secure, and cost-effective connectivity. Wireless solutions can be configured to connect at the element level, aggregate SCADA data, and pass it over long distances with low latency back to network operations centers. Learn about specific architecture options and detailed field results.

Session Objectives:

Demonstrate the efficiency of wireless connectivity from the field network to the NOC

Share field experiences where wireless connectivity from the node to the operations center has increased efficiency.

Demonstrate the speed of deployment and reliable connectivity provided by wireless communications infrastructure.


Wednesday, April 26, 2017

2:00 PM - 3:00 PM

Pipelines & Terminals as National Security Assets - Discover, Classify, Monitor & Protect Sensitive Information

Speaker: Rene Varon, President, Tory Technologies Inc.

Co Speaker: Dr. Jo Webber, CEO, Tory Technologies Inc.

Category: Cyber Security/Physical Security

Room: 310 A

The main objective of this paper is to consolidate most of the critical information that can be considered as SSI for pipelines and terminals. The pipeline network is critical to the United States energy supply by its bond to power plants, refineries, airports, and other crucial infrastructure.  During the last decade, pipeline systems have drawn attention as possible targets for terrorism or other malicious activity. From this perspective there are two main aspects related to IT security; first to ensure that operators protect their IT networks from external hackers and second to ensure that SSI is protected and maintained secured from being accessed by a non-authorized party within the same organization.

Session Objectives:

Introduce to the industry what are the best practices to Discover, Classify, Monitor & Protect Sensitive Information, and your role to safeguard this Sensitive information.

 Introduce to the industry how today a possible attacks from IT point of view is now being seriously considered.  From this perspective there are two main aspects related to IT security; first to ensure that operators protect their IT networks from external hackers and second to ensure that SSI is protected and maintained secured from being accessed by a non-authorized party within the same organization. (We will focus in the second main aspect).


Connected Cloud Platform with SCADA Operations

Speaker: Pete Rullman, Global SCADA Product Manager, Honeywell

Co Speaker: Bob Ell, Global Oil & Gas Marketing Manager, Honeywell

Category: SCADA and Business Data

Room: 310 B

This will cover how current technology in the web is advancing the development and the deployment of complex systems for process data gathering and analysis. More requirements are being put forth to bring increased connectivity, visibility and usability to the large amounts of data associated with Supervisory Control and Data Acquisition (SCADA) systems within companies and from governmental entities. This can often begin to strain the traditional implementation of SCADA and other field-connected systems.

Those business demands highlight the challenge of how future SCADA systems will allow businesses to more efficiently and cost effectively deal with real-time data connections, data gathering, storage and improved analysis of the data across numerous levels and functions of the business.  If we harness the increased power of a common web platform along with always improving Industrial Internet of Things (IIoT) devices and connectivity, there are huge benefits to be gained when it comes to delivering web-connected solutions more quickly, effectively, efficiently and securely to allow businesses to do more with their data.  We will discuss how industrial SCADA systems will leverage this latest cloud-based movement to better integrate systems and data through the use of a unified foundation in the cloud giving increased ability to monitor, predict and control the process system.

Session Objectives:

Highlighting web technologies as the future of SCADA...both private and public.

Start discussion around tech on the horizon that could play into the future SCADA systems.

Make aware many of the business demands being brought forth to SCADA systems and support.


Enabling the Transition to Next Generation IIoT Networking

Speaker: John Geiger, VP Business Development, Machfu

Category: System Architecture for Industrial Control Systems

Room: 310 C

Emerging IIoT architectures enables moving from monolithic single use systems to highly scalable distributed networked solutions. These architectures foster cross-layer collaboration with existing field devices, enterprise applications and the emerging IIoT ecosystem that will lead to a new generation of highly saleable solutions. While these new IIoT initiatives have great promise, it will take time to displace the deeply entrenched legacy technologies used throughout the oil and gas fields today. System require Gateways that support IIoT architectures and simultaneously provide connectivity to the existing oil field infrastructure enabling a graceful and cost effective transition. Key areas that will be discussed include: Adapting polled infrastructure to coexist RESTful infrastructure, integrating  IIoT capillary sensors, Distributing processing closer to the edge, Security, and field trail results.

Session Objectives:

Given modern broadband network like LTE, WiMax and WiFi, show how polling based architectures limit scaling and how moving to restful architectures reduces cost, increases system bandwidth and reduces latency by orders of magnitude.

Propose strategies to Show how a new ecosystem of industrial low power sensors dramatically expand the number of end point creating the need for new restful architectures and edge compute.

Demonstrate how as networks grow exponentially in the IIoT world making  security a multidimensional problem requiring system level strategies built into new IIoT architectures.

  

RF Fundamentals  for IIoT

Speaker: Brent McAdams, VP of Sales, OEM and Strategic Accounts, OleumTech Corporation

Category: Networks/Communications Infrastructures

Room: 320 A

The Industrial Internet of Things (IoT) is beyond a buzz phrase. While there are many places where IIoT can make a real impact, Oil & Gas is at the top of the list. The market downturn, with a significant reduction of oil prices from the highs of 2014, have forced companies to make difficult decisions in terms of resources (both capital and human). Improving business efficiency through usage of data driven analytics is a must and IIoT provides the means to that end. This presentation will provide attendees with actionable information, covering RF101 topics in order to evaluate IIoT wireless technologies and make informed decisions. This session covers the following concept in a way that is accessible to all audiences, “To have connected systems, you must first have connected devices.”  While  accessible, the session also opens the conversation for how to leverage existing tools to realize a  truly useful IIoT environment for the audiences’ organizations.  The concepts are simple though the execution from the end node to the cloud has to be elegant to be reliable and successful. The market downturn, with a significant reduction of oil prices from the highs of 2014, have forced companies to make difficult decisions in terms of resources (both capital and human). Improving business efficiency through usage of data driven analytics is a must and IIoT provides the means to that end. The ENTELEC attendees will be provided with actionable information, covering RF101 topics in order to evaluate IIoT wireless technologies and make informed decisions.

Session Objectives:

Define IIoT

Review RF101 Performance Characteristics

Provide attendees with evaluation criteria


2:00 PM - 4:00 PM

Configuring KEPServerEX® to Provide Data to IIoT Applications Via REST and MQTT and Securely Tunneling Data Via the OPC UA Standard

Speaker: Sam Elsner, Senior Applications Engineer, Kepware Technologies

Category: SCADA and Business Data

Room: 330 A

The IoT Gateway for KEPServerEX advanced plug-in was developed in response to market need for bringing industrial control system data into IIoT applications that often reside in the IT space of an enterprise. This training session will demonstrate how to configure KEPServerEX and the IoT Gateway to provide tag data to applications on-premise and in the Cloud using the REST and MQTT interfaces. It will also show how to configure KEPServerEX to tunnel data securely across the network using the OPC Unified Architecture (UA) open standard.

Session Objectives:

Configuring the OPC UA Client driver for the client computer

Understand the use cases of industrial data for Big Data and IIoT applications.

Understand how KEPServerEX works.

Learn how to configure KEPServerEX and the IoT Gateway advanced plug-in to provide data via the REST and MQTT interfaces.

 

3:00 PM - 4:00 PM

Creating Realistic Cyber Security Policies for Industrial Control Systems

Speaker: David Blanco, Application Security Engineer, AutoSol

Category: Cyber Security/Physical Security, System Architecture for Industrial Control Systems

Room: 310 A

Crafting a cyber security strategy that is simple enough to actually be implemented, yet nuanced enough to be effective is no easy task. By reconciling IT security solutions’ prioritization of confidentiality against ICS’s prioritization of availability, this session will present the principles that a successful cyber security policy can be built around.  This requires an understanding of the threats ICS will face in terms of probability, not possibility, which includes an explanation of how current ICS strategies fail. Policy foundations will then be presented that allow proven IT security strategies to be successfully applied to ICS legacy networks.  These recommendations include 1) prioritizing the field equipment 2) extending proven IP security strategies and techniques to the field 3) following accredited guidelines as a way to standardize and therefore successfully implement a strategy. Success being measured here by a policy’s likelihood of successful implementation and its actual ability to provide security.

Session Objectives:

Attendees will be shown relevant examples of ICS security breaches as a context for understanding the probability of an attacks vs. the possibility of an attack as well as highlighting the failures of ad hoc security.

Attendees will gain a better understanding of how the IOT and IIOT differ in their approaches to cyber security and therefore also differ in their implementation of cyber security. Specifically, they will be shown the difference between technology that

Attendees will leave the presentation with an understanding of how accredited standards guide decision making for successful cyber security policies. Success being measured here by a policy’s likelihood of effective implementation and its actual ability to provide security.


Sensor-2-Server: Execute Locally, Communicate Globally

Speaker: Scott Allen, Chief Marketing Officer, FreeWave Technologies

Category: SCADA and Business Data, Networks/Communications Infrastructures

Room: 310 B

The idea of comparing data in motion (at the sensor level) to data at rest (in a big data server warehouse) with predictive analytics in the cloud is very appealing to the industrial sector. The problem big data vendors have, however, is access to that data in motion at the sensor location. Legacy SCADA systems are inadequate and there are very few options for the local execution of predictive analytics applications to apply changes actively in the field. This presentation covers Sensor-to-Server intelligent communications for the IT access layer in regards to collecting and transporting data that supports higher-level analytics.

Session Objectives:

To educate and inform the audience about a Sensor-2-Server communications strategy and illuminate the key benefits, challenges and opportunities for architecting a next-generation communications network at the edge of an IT network.

Discuss best practices and highlight key considerations for what operators should know before implementing a Sensor-2-Server networks, such as:

•           What sensor data do I want to collect?

•           What does the architecture look like?

•           Where does the data need to come from and where does it need to go? For example, is it just going to SCADA or is it going to other data sources?

To present ideas of how IT/OT convergence is transforming critical data communications and provide application examples of IT/OT convergence in relevant industries such as energy and electric power.


The Finer Points of Spectrum for CII

Speaker: Cory Crenshaw, Owner, Crenshaw Communications Consulting, LLC

Category: FCC and Regulatory

Room: 310 C

As the spectrum availability continues to decrease and the consumer demands increase, industry at large must navigate a complex myriad of regulations in order to deliver products to the population.  Evaluation of the various spectrum bands requires an understanding of the regulatory structure of the band, the mechanics of actually getting authorization to operate a system and the engineering parameters of the band that must match the applications the spectrum is intended to support. Take an unbiased look at spectrum bands for different types of operations, including mobile voice/ data, and SCADA used to support automation. Considerations for deployment in these bands and the option of leasing or buying spectrum for deploying new systems and upgrading legacy systems are major decisions that should not be treated lightly.  

Session Objectives:

This session will review common bands, both licensed and unlicensed, the regulations governing each band and how to navigate the federal regulations to maximize your systems in your favor.

This session will review common bands, both licensed and unlicensed, the regulations governing each band and how to navigate the federal regulations to maximize your systems in your favor.


The Case for Intelligent Infrastructure: Intelligence That's Built In, Not Bolted On!

Speaker: Michael Marullo, InfoNetrix LLC

Category: Networks/Communications Infrastructures

Room: 320 A

Historically, infrastructure intelligence has been mostly an afterthought. Even in cases where intelligence has been considered early on, it has been routinely treated as a parallel effort, often long after construction commences and regularly after the infrastructure has already been deployed. This presentation explores the underlying problems, articulates key challenges and illustrates potential solutions based on planning, designing, developing, and deploying infrastructure that is Intelligent by Design.  Because infrastructure reinvestment has fallen far short of actual need for decades, we are now facing an unprecedented combination of Aging Workforce and Declining Infrastructure challenges. With each passing day it becomes ever clearer that there are neither sufficient human resources nor adequate capital resources available to repair/replace the massive portions of infrastructure that are approaching – or that have already reached – the end of their 35- to 50-year useful life. After decades of enjoying reliable infrastructure for economic stability and growth as well as our personal and professional wellbeing, the unfolding situation has been largely swept under the rug by government and commercial institutions alike – but the time of reckoning has arrived.

Session Objectives:

Highlight the shortcomings of waiting to apply intelligence to infrastructure until after development -- and especially construction/deployment has already commenced

Identify the underlying challenges, drivers, issues and trends related to the need for advancing the concept of infrastructure that is 'Intelligent By Design' rather than waiting until 'after the fact' to consider adding intelligence to infrastructure.

Offer guidance on how to modify the infrastructure planning and procedures in a way that opens the door to better and more cost-effective infrastructure planning, design and development.


Thursday April 27, 2017

11:00 AM - 12:00 PM

 Independently Validated Cyber Security Solutions: Real World Case Studies Show How Critical Infrastructure Can Benefit

Speaker: Matthew Cowell, Director of Industrial Markets, Ultra Electronics, 3eTI

Category: Cyber Security/Physical Security

Room: 310 A

The government facilities require resilient networks that assure availability of critical assets to support armed forces. Many of these industrial control and automation systems include legacy components that cannot be equipped individually with modern or advanced security. This presentation will focus on a case study of the Navy’s Enterprise Industrial Controls System deployment for military-grade cyber protection, as well as analysis, modeling and prediction capabilities for building systems. In this session we will outline how similar approaches and architectures can be directly applied for industrial critical infrastructure applications. It will show that comprehensive and fully validated security systems can improve performance and extend security beyond the firewall without negatively impacting operations, schedules, workflows or budget.

Session Objectives:

Review in detail the Navy's EICS foundational system solution and take always through which the Navy complies with congressional mandates to securely reduce energy consumption.

Outline how similar approaches and architectures can be directly applied for industrial critical infrastructure applications.

Show that comprehensive and fully validated security systems can improve performance and extend security beyond the firewall without negatively impacting operations, schedules, workflows or budget.


Using An Enterprise Approach To Current and Future SCADA Challenges

Speaker: Frank Horden, Global SCADA/MES Business Development & Marketing Manager, Yokogawa Electric Corporation

Category: SCADA and Business Data

Room: 310 B

In today’s energy supply-chain environment, Enterprise SCADA systems must handle larger and larger amounts of data due to new technologies, smart devices and blurring boundaries between OT&IT. Whether through new construction or consolidation after mergers and acquisitions, systems are being pushed to the limit. In the upstream space for instance producers, in some cases, are adding thousands of wells per year to their systems. Complexity is also further increasing with international, grassroots mega projects that often require a single system for production, transmission and plant assets with the need to addressing Safety, Security, Costs and continues Operations. Three case studies will examine how a pipeline company, an upstream producer, and a global operator of mega projects met the requirements for enterprise wide SCADA.

Session Objectives:

How Platform Independence can be used to protect application investments (Life Cycle), overall security and Total Cost of Ownership.

Using Remote Operations as a mean of improving operational efficiency.

How newer technologies support the IT/OT integration without tag replication and vertical integration of Asset Management and Documentation Management systems.

 

FCC Compliance and Frequency Recommendations/Selection for SCADA and MAS systems

Speaker: Elizabeth Buckley, FCC-FAA Licensing Expert, FCC-FAA Licensing, LLC

Co Speaker: Mona Lee, President, Mona Lee and Associates, FCC-FAA Licensing, LLC

Category: FCC and Regulatory

Room: 310 C

Purchasing radio equipment may seem as easy as buying a new laptop, yet there is more involved.  Just like purchasing a license for a computer operating system, like Windows, a company has a responsibility to apply and secure an authorization from the Federal Communications Commission (FCC).  The license process involves a formal application, frequency recommendation from an FCC recognized Frequency Coordinator and user compliance.  Let us discuss the nuances of this requirement and how to avoid potential hefty fines from the FCC’s Enforcement Bureau for operating a SCADA out of compliance.


It’s All About the Network: Stories From the Onshore Field

Speaker: Renner Vaughn, Global Program Lead, OG&P, ABB Wireless

Category: Networks/Communications Infrastructures

Room: 320 A

This session will focus on the stories of three companies in three different North American shale plays: the Bakken, the Permian, and Eagle Ford.  By optimizing the communications setup at their well pads and employing a modern network architecture throughout their fields, these three producers have found even more ways to maximize ROI while increasing the productivity of their highly skilled but shrinking workforce.

The days of the single purpose field radio system are over, and this is actually great news for upstream companies.  As producers begin to realize the economic advantages of integrated operating models and remote visibility to every asset, they are demanding more from their field networks:  more bandwidth, more reliability and more flexibility.   These demands have driven the emergence of a modern network architecture that combines radio technologies and maximizes the strengths of multiple frequency bands to strike the elusive balance between cost and performance.  A network built according to this architecture allows companies to operate by exception and reduce costs through continuous, data-driven production optimization.  With SCADA, HMI, video, work order processing and other mobile applications available throughout the field, the network infrastructure becomes a vital utility for achieving the company’s daily production targets.  Companies face significant losses when field communications systems fail, and the focus on reliability has never been greater.  Specific communications strategies usually depend on differing factors like field size, asset maturity and existing infrastructure.   Still, despite their differences, producers face the same challenge:  as more equipment comes online and more data is generated by computers at the well pad, the network must deliver robust connectivity for today with ample capacity built-in for tomorrow. 

Session Objectives:

GO SLOW AND LOW AT THE EDGE: In the Eagle Ford, a producer moved narrowband, unlicensed frequencies to the edge of the field and significantly lowered the RF noise floor, clearing the way for broadband while boosting overall network performance.

CATEGORIZE ALL FACILITIES:  Categorize sites based on data needs.  Higher producing, higher risk facilities require highest network availability.  Network architecture should be adaptable to business priorities, drilling plans, location of warehouses, etc

RENT OR OWN: Communications networks perform a basic service, connecting the business to assets local and remote.  One company has shifted its mindset and asked vendors to deliver the field network as a service.   With the right agreements in place, this can be a very reliable, successful model.

 

2:00 PM - 3:00 PM

Check List of Key IIoT Security Elements

Speaker: Tim Winter, Chief Technology Officer, Machfu

Co Speaker: John Geiger, VP Business Development, Machfu

Category: Cyber Security/Physical Security

Room: 310 A

IIoT solutions require a multi-layer security strategy that uses proven standards built on vetted open source components enabling secure distributed applications and services that fosters best practices across the IIoT ecosystem. In this session we will review a multi-dimensional check list of security elements and policies required for securing emerging IIoT networks, devices and edge applications.

Session Objectives:

Understanding key elements of securing an edge devices and automating security policy

Understand key elements of securing Data in motion

Understand the issues of securing the emerging edge applications


IT/OT Convergence: The Impact from the Industrial Internet of Things

Speaker: Brad Gilbert, Director of Product Management, Licensed and Ethernet, FreeWave Technologies

Category: SCADA and Business Data,

Room: 310 B

The integration of IT & OT promotes process management tools help ensure that every stakeholder in an organization has accurate information. As OT products such as PLCs and RTUs become more aligned with commercial software infrastructures, integrating OT information with IT systems at a process level is difficult. Getting these systems to work together to maximize business efficiency is more challenging. IoT networking technology enables large quantities of information to be readily available – these high-speed data transport technologies are the true enabler in IT/OT convergence. Critical industries like utilities need high-speed connectivity, but also want to maintain security standards and protocols. With high data capacity OT networks, the overhead of Internet and security protocols is no longer critical to network latency and SCADA applications for communications. OT/IT networks now use the same Network and Transport layers, clearing one of the fundamental barriers to convergence.

Session Objectives:

Attendees will gain a greater understanding of how IT/OT convergence is transforming critical data communications

Attendees will learn about application examples of IT/OT convergence in energy, electric power and utility environments

Attendees will be able to gain resources and considerations for implementing convergence practices in their respective industry.

 

Federal Agency Environmental Compliance Regulations Update

Speaker: Jodi Jacobson, TRC's FCC Tower Environmental Compliance Program Manager and Office Practice Leader/Senior Archeologist in the Planning, Permitting, and Licensing, TRC Environmental Corporation

Co Speaker: Todd Schnakenberg, Staff Biologist, TRC Environmental Corporation

Category: FCC and Regulatory

Room: 310 C

The presentation will provide an update regarding new regulation and proposed changes to the communication industry and discuss potential consequences of the theses changes to projects requiring communication towers and collocated licensed antennas.  Topics covered include an overview of changes to the FCC’s environmental compliance process, Tribal requests and consultation fee trends, changes in the FAA tower marking regulations for non-FCC licensed towers, interagency agreements with the FCC concerning Section 106 of the National Historic Preservation Act compliance, and potential impacts or benefits to industry.

Over the past year, new guidance and potential changes from FAA, Advisory Council on Historic Preservation (ACHP), and USFWS regarding communications tower regulations have developed.  It is crucial that all industries that use communication technologies understand the federal, state, and local regulations related to their projects in order to avoid costly fines or delays.  New FAA marking and lighting regulations changes are in progress and could have repercussions to review by the FCC of adherence to environmental compliance for licensed towers under 200 feet depending on the “database” information that is collected for towers requiring marking.   Program comments by the ACHP on Section 106 for wireless communication facilities would ease some of the Section 106 compliance burdens for facilities associated with projects also under review by the USDA Rural Utility Service, the U.S. Department of Commerce National Telecommunications and Information Administration, and the Federal Emergency Management Agency, as well as, the Department of Homeland Security, Federal Transit Authority, or FirstNet.  Updates to the USFWS migratory bird treaty act and other changes in environmental regulations not just specific to towers could have additional effects on proposed communication projects.  A review of the above and general trends and changes will be presented.

Session Objectives:

Understanding of changes to federal regulations regarding environmental compliance policy (NEPA)

Understanding of potential impacts of new and developing changes to communication projects associated with power and oil and gas industry projects

Understanding of how to be conform with the FAA's regulations compliance policies.

 

The Enabler of IT/OT Convergence –  A Converged Network

Speaker: Ivan Schonwald, Nokia

Category: Networks/Communications Infrastructures

Room: 320 A

This session will cover the must-have network attributes in a converged network that enables IT/OT convergence.

Traditionally, operational technology (OT) group controls and monitors mission-critical infrastructures while information technology (IT) group maintains business-critical information and communications systems. Due to their different objectives, these two groups usually operate in segregated realms, living separate lives. These silos could hamper effective flow of information and knowledge sharing in the organization, leading to suboptimal business decision, lower efficiency and reliability.  With IT/OT convergence, also known as IT/OT integration,  critical infrastructure operators have the potential to bring many benefits to their organizations, including better long-term business planning, closer monitoring of infrastructure conditions, improved performance and higher reliability. As OT communications networks are transitioning to IP, the fundamental common component between OT and IT is an IP network. Consequently, network convergence is the natural starting point of an IT/OT convergence journey. This session will discuss the challenges of deploying and operating a converged network supporting the IT/OT convergence initiative.

Session Objectives:

To learn the differences in network requirements for an IT and OT networks.

To learn the key role of a converged network in IT/OT convergence.

To learn what are the must-have attributes in the converged network for a smooth IT/OT convergence journey.


2:00 PM - 4:00 PM

Configuring KEPServerEX® to Poll EFM and Real-Time Data using the Scheduler for KEPServerEX

Speaker: Sam Elsner, Senior Applications Engineer, Kepware Technologies

Category: SCADA and Business Data

Room: 330 A

This training class will describe how to configure KEPServerEX drivers that have Electronic Flow Measurement (EFM) support, such as ABB Totalflow, Fisher ROC/ROC+, OMNI Flow Computer, and Enron Modbus. It will show how to use the EFM Exporter to define poll groups, specify their schedules, and export collected data (including CFX or Transaction Queue for FLOWCAL, PGAS, user-defined CSV files, and SQL databases). This class will also demonstrate how to schedule real-time tag reads using the Scheduler advanced plug-in and how to configure the server without the KEPServerEX Configuration Client using the new RESTful-based API.

Objectives:

Understand how to configure KEPServerEX to collect and export EFM data.

Understand how to configure KEPServerEX for optimal communications using the Scheduler advanced plug-in and telemetry settings.

Learn how to configure KEPServerEX using the RESTful API.


3:00 PM - 4:00 PM

Musings of a SCADA Engineer Turned ICS Security Architect:   A How to Guide for the Security Newbie

Speaker: Sanford Rice, SCADA System Developer, Atmos Energy

Category: Cyber Security/Physical Security

Room: 310 A

I've been in your shoes - and I still am. As a control system engineer working for a smaller company or department with limited resources, we have to keep up with the times to continuously find ways to improve safety, reliability and efficiency across countless disciplines.  On top of our “normal” jobs we’re called on to be system admins, network engineers, desktop support and janitorial specialists.  Now add a new one from the top headlines – cybersecurity engineer.  Perhaps the looming specter of cyber regulation brings you here or someone realized it's time to get moving.  Maybe you are the "OT" guy who has been brought in to represent your team as hordes of cybersecurity specialists pick your life’s work apart.  Nonetheless, you're a security newbie in a world of never-ending pitfalls, traps and rabbit trails. In this session I’ll chronicle my development in ICS cybersecurity as I worked to advance our system from a neglected segment of IT’s network to a comprehensive program focused on continuous improvement.  The emphasis of this information sharing session will center mostly on the soft skills required to build the relationships, partnerships and culture needed to develop a successful program.  I will share with you lessons learned from the challenges, successes and failures I’ve endured, and I’ll include advice on training and other resources I found helpful along the way.   I hope this insight will help you on your way from security newbie to cyber superhero.

Session Objectives:

The emphasis of this information sharing session will center mostly on the soft skills required to build the relationships, partnerships and culture needed to develop a successful cybersecurity program.

I will share lessons learned from the challenges, successes and failures of building a cybersecurity program in a SCADA environment.

Share advice on training opportunities I found valuable, technical resources and best practices.


New Technology: Power Generating Combustors

Speaker: Mothusi Pahl, Vice President, Alphabet Energy

Category: System Architecture for Industrial Control Systems

Room: 310 C

Upstream & midstream Oil & Gas field operations are often constrained by the lack of readily available power and production is limited by the emissions released by traditional onsite power generation and waste destruction equipment like flares & incinerators.

A new integrated combustor and solid-state power generator technology can now deliver reliable power and comply with US EPA Quad O. By utilizing waste gases and tank vapors, this "Power Generating Combustor" maximizes stakeholder value by reducing venting and open flaring and eliminating the need for both traditional on-site power generation and electrical grid connections.

A new integrated combustor and solid-state power generator technology can now replace traditional flares, combustors, vapor destruction units, incinerators and traditional power generation while simultaneously complying with US EPA Quad O and delivering electricity for SCADA, sensors, instrument air, and oilfield IoT.

Session Objectives:

Participants will gain an appreciation of value lost to flaring.

Participants will gain an understanding of how tank vapors can be used to power IoT in the oilfield.

Participants will gain an understanding of how a reliable power supply can be brought online for SCADA and IoT with no new emissions permits or electrical utility infrastructure.

 

Private LTE Networks

Speaker: Christopher Porto, Persistent Telecom

Category: Networks/Communications Infrastructures

Room: 320 A

Session will cover opportunities for petroleum, mineral and precious metal explorations to easily establish on site voice, text and data networks. General description of private communications bubbles.  Technologies that can be employed to create secure communications bubbles.  Back haul options for connectivity to network operations centers.  Use of high speed data transfer for efficient analysis.   Potential for streaming HD video for efficient safety programs, operations and maintenance.  Potential use for closed loop, secure SCADA systems.  Using private LTE networks for remote sites to provide broadband data access and cached media content without having to back haul all signaling and user data to a centralized commercial carrier.  

Session Objectives:

Educate the audience on technology available for creating private networks for remote operations.

Educate the audience on use cases for private remote site networks.

Regulatory issues pertinent to deploying private networks.


ICS Cybersecurity – Are We Doing Enough?

Speaker: Camilo Gomez, Director Consulting Process Control Domain, CGI

Category: SCADA and Business Data, Cyber Security/Physical Security

Room: 310 B

The topic of the session is an examination of the existing state of affairs of Cybersecurity for Industrial Controls Systems (ICS) and the effectiveness of the collective current response. The examination will start with a review of indicators to determine how well industry sectors, automation vendors, service providers and governments are responding today to this cyber threat and manage the risk. It will next proceed to a review of the level of threat, characteristics of the threat, and efficacy of the attacks and current response. The examination will then move to a review of the basics including characteristics of the Operational Technology (OT) environment and what differentiates it from a traditional Information Technology (IT) environment concentrating specifically on technical and more importantly on operational differences and similarities. It will continue with a review of the effectiveness of current approach including an analysis of the efficacy of IT security controls in the OT space and issues to operationalize those including examples. The examination will conclude with an indication of the opportunities of improvement and the building blocks towards true predictable and preventive OT Cybersecurity.

Session Objectives:

Understand the current state of affairs of cyber security for industrial control systems and the effectiveness of current approach.

Despite the commonalities understand that there are key Operational and technical differences  between OT and IT Cybersecurity, and appreciate  the importance of addressing operational differences for the effectiveness of ICS/OT Cybersecurity program.

Understand the benefits of Cybersecurity capability, services and technology built for OT purpose as building blocks to move towards a true predictable and preventive ICS/OT Cybersecurity.