Skip to main content

Call to Actions

Loading
10:15 AM
  1. W308AB
    30 mins
    • Cyber and Physical Security
    The increasing penetration of distributed renewables creates new threats to the electric grid's effective planning, management, and operation. In addition, new standards that mandate real-time visibil ...
11:05 AM
  1. W308AB
    30 mins
    • Cyber and Physical Security
    In response to a growing tide of ransomware threats, Exelon - America's largest utility serving over 10 million customers, took a decisive step in 2022 to bolster its operational resilience. With an a ...
1:00 PM
  1. W308AB
    30 mins
    • Cyber and Physical Security
    The Electric Energy OT Security Profile Working Group (WG) hosted by the International Society of Automation ISA99 standards committee commenced in June 2022 the standardization effort of electric ene ...
1:50 PM
  1. W308AB
    30 mins
    • Cyber and Physical Security
      Discover practical ways to boost the security of transmission and distribution systems. Learn how to secure assets and communications by implementing detailed controls aligned with Zero Trust, NERC ...
2:40 PM
  1. W308AB
    30 mins
    • Cyber and Physical Security
    With a rise in sophisticated cyber attacks targeting critical infrastructure and the introduction of new cybersecurity regulations, electric asset owners and operators are facing the challenge of how ...
3:30 PM
  1. W308AB
    60 mins
    • Cyber and Physical Security
    How to comply to NERC CIP ever-evolving standards is a growing concern for distribution utilities. In this panel discussion, Xcel Energy and OUC will share business drivers, technical considerations, ...
9:15 AM
  1. W308AB
    30 mins
    • Cyber and Physical Security
    A Synesthesia+Steganography–Based Encryption scheme developed at Oak Ridge National Laboratory (ORNL)  enables message security based on a combination of synesthesia and steganographic principles. The ...
10:05 AM
  1. W308AB
    30 mins
    • Cyber and Physical Security
     The energy transition is driving exponential complexity in the operation of a safe, reliable, and affordable power grid. Quantum computing is ideally suited for tackling aspects of this complexity th ...
10:55 AM
  1. W308AB
    30 mins
    • Cyber and Physical Security
    Evolving security landscape and changing regulatory obligations make it challenging for utilities to maintain and govern compliance programs effectively. Many utilities adopt a compliance-based approa ...
1:00 PM
  1. W308AB
    30 mins
    • Cyber and Physical Security
      In today's era of connectivity, bad actors continue to up their game, recycling tactics and taking advantage of vulnerabilities across IT and OT systems. According to data from the latest Fortinet 2 ...
1:50 PM
  1. W308AB
    60 mins
    • Cyber and Physical Security
    As of 2022, the US is the most active region in power digitalization based on data compiled by BloombergNEF. However, as utilities digitalize, and information and operational technologies (IT/OT) inte ...
3:30 PM
  1. W308AB
    30 mins
    • Cyber and Physical Security
    Learn about the soon-to-be-published communications protocols that can solve your Operations Technology (OT) security problems.  This presentation explains how newly defined Distributed Network Protoc ...
4:20 PM
  1. W308AB
    30 mins
    • Cyber and Physical Security
    This session will explore the transformative potential of Generative AI for cybersecurity in the utility sector, focusing on three key areas: threat modeling, anomaly detection, and mitigation strateg ...
10:30 AM
  1. W308AB
    30 mins
    • Cyber and Physical Security
    This presentation introduces the audience to a new IEEE Standard being developed by the IEEE-PES Technical Committee on Power System Communications and Cybersecurity. IEEE Std P2808 creates a mechanis ...
11:20 AM
  1. W308AB
    30 mins
    • Cyber and Physical Security
    Join Ericsson, OneLayer, and an IOU as we delve into the details of building a unified security ecosystem for a private LTE utility network, exploring the security features provided by the cellular ne ...