Wednesday Sessions

Wednesday, April 26, 2017                                         

    Sponsored by:

2:00 PM - 3:00 PM

Pipelines & Terminals as National Security Assets - Discover, Classify, Monitor & Protect Sensitive Information

Speaker: Rene Varon, President, Tory Technologies Inc.

Co Speaker: Dr. Jo Webber, CEO, Tory Technologies Inc.

Category: Cyber Security/Physical Security

Room: 310 A

The main objective of this paper is to consolidate most of the critical information that can be considered as SSI for pipelines and terminals. The pipeline network is critical to the United States energy supply by its bond to power plants, refineries, airports, and other crucial infrastructure.  During the last decade, pipeline systems have drawn attention as possible targets for terrorism or other malicious activity. From this perspective there are two main aspects related to IT security; first to ensure that operators protect their IT networks from external hackers and second to ensure that SSI is protected and maintained secured from being accessed by a non-authorized party within the same organization.

Session Objectives:

Introduce to the industry what are the best practices to Discover, Classify, Monitor & Protect Sensitive Information, and your role to safeguard this Sensitive information.

 Introduce to the industry how today a possible attacks from IT point of view is now being seriously considered.  From this perspective there are two main aspects related to IT security; first to ensure that operators protect their IT networks from external hackers and second to ensure that SSI is protected and maintained secured from being accessed by a non-authorized party within the same organization. (We will focus in the second main aspect).


Connected Cloud Platform with SCADA Operations

Speaker: Pete Rullman, Global SCADA Product Manager, Honeywell

Co Speaker: Bob Ell, Global Oil & Gas Marketing Manager, Honeywell

Category: SCADA and Business Data

Room: 310 B

This will cover how current technology in the web is advancing the development and the deployment of complex systems for process data gathering and analysis. More requirements are being put forth to bring increased connectivity, visibility and usability to the large amounts of data associated with Supervisory Control and Data Acquisition (SCADA) systems within companies and from governmental entities. This can often begin to strain the traditional implementation of SCADA and other field-connected systems.

Those business demands highlight the challenge of how future SCADA systems will allow businesses to more efficiently and cost effectively deal with real-time data connections, data gathering, storage and improved analysis of the data across numerous levels and functions of the business.  If we harness the increased power of a common web platform along with always improving Industrial Internet of Things (IIoT) devices and connectivity, there are huge benefits to be gained when it comes to delivering web-connected solutions more quickly, effectively, efficiently and securely to allow businesses to do more with their data.  We will discuss how industrial SCADA systems will leverage this latest cloud-based movement to better integrate systems and data through the use of a unified foundation in the cloud giving increased ability to monitor, predict and control the process system.

Session Objectives:

Highlighting web technologies as the future of SCADA...both private and public.

Start discussion around tech on the horizon that could play into the future SCADA systems.

Make aware many of the business demands being brought forth to SCADA systems and support.


Enabling the Transition to Next Generation IIoT Networking

Speaker: John Geiger, VP Business Development, Machfu

Category: System Architecture for Industrial Control Systems

Room: 310 C

Emerging IIoT architectures enables moving from monolithic single use systems to highly scalable distributed networked solutions. These architectures foster cross-layer collaboration with existing field devices, enterprise applications and the emerging IIoT ecosystem that will lead to a new generation of highly saleable solutions. While these new IIoT initiatives have great promise, it will take time to displace the deeply entrenched legacy technologies used throughout the oil and gas fields today. System require Gateways that support IIoT architectures and simultaneously provide connectivity to the existing oil field infrastructure enabling a graceful and cost effective transition. Key areas that will be discussed include: Adapting polled infrastructure to coexist RESTful infrastructure, integrating  IIoT capillary sensors, Distributing processing closer to the edge, Security, and field trail results.

Session Objectives:

Given modern broadband network like LTE, WiMax and WiFi, show how polling based architectures limit scaling and how moving to restful architectures reduces cost, increases system bandwidth and reduces latency by orders of magnitude.

Propose strategies to Show how a new ecosystem of industrial low power sensors dramatically expand the number of end point creating the need for new restful architectures and edge compute.

Demonstrate how as networks grow exponentially in the IIoT world making  security a multidimensional problem requiring system level strategies built into new IIoT architectures.


RF Fundamentals  for IIoT (Silver Scribe 1st Place Winner)

Speaker: Brent McAdams, VP of Sales, OEM and Strategic Accounts, OleumTech Corporation

Category: Networks/Communications Infrastructures

Room: 320 A

The Industrial Internet of Things (IoT) is beyond a buzz phrase. While there are many places where IIoT can make a real impact, Oil & Gas is at the top of the list. The market downturn, with a significant reduction of oil prices from the highs of 2014, have forced companies to make difficult decisions in terms of resources (both capital and human). Improving business efficiency through usage of data driven analytics is a must and IIoT provides the means to that end. This presentation will provide attendees with actionable information, covering RF101 topics in order to evaluate IIoT wireless technologies and make informed decisions. This session covers the following concept in a way that is accessible to all audiences, “To have connected systems, you must first have connected devices.”  While  accessible, the session also opens the conversation for how to leverage existing tools to realize a  truly useful IIoT environment for the audiences’ organizations.  The concepts are simple though the execution from the end node to the cloud has to be elegant to be reliable and successful. 

Session Objectives:

Define IIoT

Review RF101 Performance Characteristics

Provide attendees with evaluation criteria


2:00 PM - 4:00 PM

Configuring KEPServerEX® to Provide Data to IIoT Applications Via REST and MQTT and Securely Tunneling Data Via the OPC UA Standard

Speaker: Sam Elsner, Senior Applications Engineer, Kepware Technologies

Category: SCADA and Business Data

Room: 330 A

The IoT Gateway for KEPServerEX advanced plug-in was developed in response to market need for bringing industrial control system data into IIoT applications that often reside in the IT space of an enterprise. This training session will demonstrate how to configure KEPServerEX and the IoT Gateway to provide tag data to applications on-premise and in the Cloud using the REST and MQTT interfaces. It will also show how to configure KEPServerEX to tunnel data securely across the network using the OPC Unified Architecture (UA) open standard.

Session Objectives:

Configuring the OPC UA Client driver for the client computer

Understand the use cases of industrial data for Big Data and IIoT applications.

Understand how KEPServerEX works.

Learn how to configure KEPServerEX and the IoT Gateway advanced plug-in to provide data via the REST and MQTT interfaces.


3:00 PM - 4:00 PM

Creating Realistic Cyber Security Policies for Industrial Control Systems (Silver Scribe 2nd Place Winner) 

Speaker: David Blanco, Application Security Engineer, AutoSol

Category: Cyber Security/Physical Security, System Architecture for Industrial Control Systems

Room: 310 A

Crafting a cyber security strategy that is simple enough to actually be implemented, yet nuanced enough to be effective is no easy task. By reconciling IT security solutions’ prioritization of confidentiality against ICS’s prioritization of availability, this session will present the principles that a successful cyber security policy can be built around.  This requires an understanding of the threats ICS will face in terms of probability, not possibility, which includes an explanation of how current ICS strategies fail. Policy foundations will then be presented that allow proven IT security strategies to be successfully applied to ICS legacy networks.  These recommendations include 1) prioritizing the field equipment 2) extending proven IP security strategies and techniques to the field 3) following accredited guidelines as a way to standardize and therefore successfully implement a strategy. Success being measured here by a policy’s likelihood of successful implementation and its actual ability to provide security.

Session Objectives:

Attendees will be shown relevant examples of ICS security breaches as a context for understanding the probability of an attacks vs. the possibility of an attack as well as highlighting the failures of ad hoc security.

Attendees will gain a better understanding of how the IOT and IIOT differ in their approaches to cyber security and therefore also differ in their implementation of cyber security. Specifically, they will be shown the difference between technology that

Attendees will leave the presentation with an understanding of how accredited standards guide decision making for successful cyber security policies. Success being measured here by a policy’s likelihood of effective implementation and its actual ability to provide security.


Sensor-2-Server: Execute Locally, Communicate Globally

Speaker: Scott Allen, Chief Marketing Officer, FreeWave Technologies

Category: SCADA and Business Data, Networks/Communications Infrastructures

Room: 310 B

The idea of comparing data in motion (at the sensor level) to data at rest (in a big data server warehouse) with predictive analytics in the cloud is very appealing to the industrial sector. The problem big data vendors have, however, is access to that data in motion at the sensor location. Legacy SCADA systems are inadequate and there are very few options for the local execution of predictive analytics applications to apply changes actively in the field. This presentation covers Sensor-to-Server intelligent communications for the IT access layer in regards to collecting and transporting data that supports higher-level analytics.

Session Objectives:

To educate and inform the audience about a Sensor-2-Server communications strategy and illuminate the key benefits, challenges and opportunities for architecting a next-generation communications network at the edge of an IT network.

Discuss best practices and highlight key considerations for what operators should know before implementing a Sensor-2-Server networks, such as:

•           What sensor data do I want to collect?

•           What does the architecture look like?

•           Where does the data need to come from and where does it need to go? For example, is it just going to SCADA or is it going to other data sources?

To present ideas of how IT/OT convergence is transforming critical data communications and provide application examples of IT/OT convergence in relevant industries such as energy and electric power.


The Finer Points of Spectrum for CII

Speaker: Cory Crenshaw, Owner, Crenshaw Communications Consulting, LLC

Category: FCC and Regulatory

Room: 310 C

As the spectrum availability continues to decrease and the consumer demands increase, industry at large must navigate a complex myriad of regulations in order to deliver products to the population.  Evaluation of the various spectrum bands requires an understanding of the regulatory structure of the band, the mechanics of actually getting authorization to operate a system and the engineering parameters of the band that must match the applications the spectrum is intended to support. Take an unbiased look at spectrum bands for different types of operations, including mobile voice/ data, and SCADA used to support automation. Considerations for deployment in these bands and the option of leasing or buying spectrum for deploying new systems and upgrading legacy systems are major decisions that should not be treated lightly.  

Session Objectives:

This session will review common bands, both licensed and unlicensed, the regulations governing each band and how to navigate the federal regulations to maximize your systems in your favor.

This session will review common bands, both licensed and unlicensed, the regulations governing each band and how to navigate the federal regulations to maximize your systems in your favor.


The Case for Intelligent Infrastructure: Intelligence That's Built In, Not Bolted On!

Speaker: Michael Marullo, InfoNetrix LLC

Category: Networks/Communications Infrastructures

Room: 320 A

Historically, infrastructure intelligence has been mostly an afterthought. Even in cases where intelligence has been considered early on, it has been routinely treated as a parallel effort, often long after construction commences and regularly after the infrastructure has already been deployed. This presentation explores the underlying problems, articulates key challenges and illustrates potential solutions based on planning, designing, developing, and deploying infrastructure that is Intelligent by Design.  Because infrastructure reinvestment has fallen far short of actual need for decades, we are now facing an unprecedented combination of Aging Workforce and Declining Infrastructure challenges. With each passing day it becomes ever clearer that there are neither sufficient human resources nor adequate capital resources available to repair/replace the massive portions of infrastructure that are approaching – or that have already reached – the end of their 35- to 50-year useful life. After decades of enjoying reliable infrastructure for economic stability and growth as well as our personal and professional wellbeing, the unfolding situation has been largely swept under the rug by government and commercial institutions alike – but the time of reckoning has arrived.

Session Objectives:

Highlight the shortcomings of waiting to apply intelligence to infrastructure until after development -- and especially construction/deployment has already commenced

Identify the underlying challenges, drivers, issues and trends related to the need for advancing the concept of infrastructure that is 'Intelligent By Design' rather than waiting until 'after the fact' to consider adding intelligence to infrastructure.

Offer guidance on how to modify the infrastructure planning and procedures in a way that opens the door to better and more cost-effective infrastructure planning, design and development.