Conference Program

October 4, 2017 – Day 1

7:30 am -Registration and Breakfast

8:30 am – Keynote
North American Market Trends and Technology Advances in SCADA Systems, Substation Automation and Protection and Control
The presentation will describe the findings and implications from three new studies on electric utility energy management, SCADA and Distribution Management Systems, protection and control advances, and progress on substation automation. The advances occurring in related SCADA-using energy industry segments will also be discussed.

Topics will include IP/MPLS networks for wide area communications, relay-centric protection and control systems, substation automation, and distribution automation.

Charles W. Newton, President – Newton-Evans Research Company

9:15 am
Data Base Tool Kit for SCADA
The quality of SCADA data is very important for power grid operation safety and reliability. The SCADA points are used to build common EMS applications and to allow analytical auditing. The Data Base Tool Kit (DBTK) has been developed using web service technology that helps to support our maintenance work such as Point list collection, update, validation and dynamic map of the SCADA, calculations, and system layout.

We use existing IT assets such as web servers to extract EMS information. DBTK is a typical three tier application which consists of Oracle database, Tomcat web server and IE browser. The information is in compliance with the NERC standard and displayed within the company DMZ environment. No additional software license is required. DBTK application is developed using open system architecture based on specific requirements.

DBTK provides easily accessible, transparent and mapping of the Southern California Edison EMS system for troubleshooting, research, and optimization of EMS assets. DBTK improves the productivity and reduces the human errors significantly.

Jian Kong, IT Specialist and Grid Control Center Engineer – Southern California Edison

10:00 am – Networking Break in Exhibit Hall

10:45 am
smartSCADA’s Role in the Digital Enterprise
Digitalization, it’s everywhere. The PC and wireless are so yesterday; now were all talking about the Internet of Things (IoT), Cyber Physical Systems (CPS), Virtualization, Cloud Computing, Ubiquitous Networking, Digital Twining and Augmented Reality (AR). Over the past 10 to 15 years, Internet-driven disruption and innovation have been about the internet of people, changing the way industries and businesses operate, particularly within media and Business-to-Consumer (B2C) relationships.

The megatrend of digitalization is fueling that development, as it already has changed our daily life. In the next decade, the Internet of Things (IoT) revolution is expected to have a significant impact on SCADA, manufacturing, energy, agriculture and other industry sectors. The main driver here is the ever improving information and communication technology and the standardization supporting the connectivity and networking of different systems from different suppliers.

Carl Hoffman, SCADA Business Developer – Siemens Industry, Inc.

11:30 am -Networking Luncheon

12:30 pm
SCADA on the Blockchain
The Blockchain is already taking business by storm.Those in the know predict Blockchain will have a bigger impact in the next 10 years on business and industry than the Internet has had in the last 20.

Blockchain has tremendous potential for SCADA in several ways. Those include identifying devices, their nomenclature, configurations and firmware versions. This insures theveracity and integrity of SCADA data streams among various collection devices and eliminates the need for centralized and managed SCADA databases. Blockchain also helps project management, design, purchasing, installation and configuration of the SCADA Systems.

Attend this session to better understand the Blockchain, learn about SCADA project management on the Blockchain as well asSCADA component, configuration and location register on the Blockchain.

Charles Drobny, President and CEO – GlobaLogix

1:15 pm
The SCADA Host Migration to the Data Center
Today, systems are more under the protection and management of IT and its practices. This is particularly true for cybersecurity and virtualization, which are becoming widely adopted. This leads to the question of whether the SCADA host computer should be removed from the control room or the shop floor and moved into the data center. The acceptance of SCADA and HMI in the data center is growing. As virtualization becomes the standard deployment of computing in an enterprise setting, we will see continued growth of the percentage of customers choosing this approach. For most SCADA and many HMI applications of the future, this likely will be the standard deployment strategy.

Ed Nugent, COO – PcVue, Inc.

1:55 pm
Utilizing Light-Weight OT-Centric Middleware in Place of Traditional SCADA
Utilities are employing a SCADA-less OT centric middleware layer within their OT architecture that allows for bi-directional communication between SCADA systems, assets utilizing MODBUS/AMQP/MQTT/DNP3 (and more) protocols, ICCP based reporting requirements, and write to database capabilities. More utilities are taking a SCADA-less approach as a means to minimize operational complexity and reduce costs. By employing middleware capable of in-memory data extraction, transformation, and loading, utilities are able to unify distributed assets, diverse or unrelated SCADA systems, and multiple protocol languages through a single architectural layer.

This presentation will share experience and information derived from upgrading SCADA systems to headless, SCADA-less control systems at numerous utilities including KCP&L, Central Minnesota Power Authority Services and many more. We will examine the lessons and best practices for establishing bi-directional communication and interoperability between independent and unique smart grid data networks and SCADA systems or SCADA-less systems. This hybridized approach to managing control systems will become commonplace as power markets evolve.

Brad Harkavy, General Manager – LiveData Utilities

2:30 pm
Safeguarding the Industrial Control-Plane
Securing industrial networks poses unique challenges resulting from the dichotomy between control-plane and data-plane communications. While many are familiar with the data-plane (a.k.a. user-plane) communications, less are familiar with the industrial control-plane. A critical part of the industrial network activity, the control-plane is invariably overlooked.

In ICS/SCADA environments, the most critical assets are the industrial controllers (e.g. PLCs, RTUs and DCS controllers). Controllers are the “brains” responsible for continuous execution of the entire industrial process lifecycle. Since most devices were designed decades ago, they typically don’t include any security controls, like authentication or encryption mechanisms. As a result, there is no way to restrict those operating in ICS networks: anyone with network access, whether a trusted employee or malicious attacker, has unfettered access to these devices. Since most threats to ICS systems materialize in the industrial control-plane, it is essential to monitor it. However, monitoring the industrial control-plane is not a trivial task.

In this session we will review:

  • What is the industrial control-plane?
  • Why is it important to secure it?
  • What challenges do we face when we look to monitor control-plane activities?
  • What steps and measures should you take to safeguard the control-plane?’

Barak Perelman, CEO and Co-Founder – Indegy

3:10 pm – Networking Break in Exhibit Hall

3:30 pm
The Programmable Edge
As the next generation of wireless communication devices make their way into industrial markets, companies catch glimpses of some of the tangible benefits of programmable edge platforms. These networking solutions are equipped with the ability to introduce custom, third party applications at the edge, which ultimately reduces costs and increases automation capabilities, while enabling reliable data transmission directly to the private or public cloud. Big data has become ubiquitous in our society, but programmability at the edge controls the quality of data.

The Industrial IoT is expanding in breadth and application possibilities as communication technology has matured. Companies on their IoT journey are looking for communication platforms that can perform Sensor-to-Server (S2S) functions that streamline operational and cost efficiencies. Companies in industries such as oil and gas could use the ability to program edge applications to simplify operational processes, cut costs and future-proof their networks for the next generation of data transport needs with changes to the process control logic as needed. Future nodes could also be added with programmable wireless radios and reduced capital.

Michelle Marceny, Senior Product Line Manager – FreeWave Technologies

4:10 pm
Examples of Building Secure, Scalable and Managed Networks for Critical Infrastructure Automation
Critical Infrastructure depends on secure and reliable transport of data from remote nodes spread over large geographic areas back to network operations center. Thus Cyber-security threats and the migration from serial to IP networks has increased the importance of management for SCADA and process automation networks.

This presentation discusses latest techniques in cloud and NOC-based management for securing these networks, planning and optimization of wireless communications, maximizing the ROI on private network assets while minimizing on-going operational expenses. Aggregation and normalization of this data and the operational processes behind the data are critical for growth and productivity. Attendees will see real-world examples of network deployments in applications such as digital oilfield, water/wastewater treatment, rail transportation, municipal owned utilities and electric utilities.

Bruce Collins, Director of Product Management – Cambium Networks

4:45 pm
How the 3rd Wave of the Internet Evolution Will Affect Manufacturing Automation Systems and Create New Opportunities
The first Internet wave constructed the infrastructure that forms the Internet we enjoy today. Hubs, switches and routers were linked together to form the Internet plumbing we now take for granted. Websites, once new and novel, became mandatory. In the second Internet wave, apps and cloud computing became integral to our work and home lives. Other apps were created to serve employees, suppliers, and customers. And now we are on the cusp of a third Internet wave pervasive, integrated, seamless and secure connectivity that will again change how we work and how we live.

This presentation will examine how that third Internet wave, the industrial Internet of Things (IIoT), will transform manufacturing automation. It will examine the changing requirements of manufacturing systems, the third wave technologies that can meet these requirements and how automation integrators can profit from this evolution.

John Rinaldi, Chief Strategist and CEO – Real Time Automation (RTA)

5:15 pm – Cocktail Reception

October 5, 2017 – Day 2

7:30 am – Registration and Continental Breakfast

8:15 am – Keynote
New or Upgrading a SCADA System? You’re in Control!
You have been tasked with either developing a new or upgrading a SCADA system. We are going to provide guidance on how to achieve the task successfully. The undertaking takes planning on the needs of the system, researching equipment, radio spectrum availability from the Federal Communications Commission (FCC) and identifying deliverables to help one reach this goal.

Marie Hawkins – Utilities Technology Counsel
Elizabeth Buckley – FCC-FAA Licensing, LLC
Darryl Parker – Alligator Communications, Inc.
Jodi Jacobson, Austin PPL Practice Leader/Archeologist – TRC Environmental

Mona Lee, President – Mona Lee and Associates

9:15 am
Wireless vs. Wired: Why Cellular is Displacing Wired Communications
Over the last several years, cellular communications have become increasingly less expensive to purchase, and easier to install and maintain.Meanwhile, wired communications infrastructure is rapidly aging and in generally poor condition, so the time has come for communications companies to move on to greener pastures.

In the old days, a smart phone had slow Internet access with only public/dynamic IP SIM cards and addresses. Today, we have cellular routers with built-in I/O and serial communications, as well as SIM cards providing IP communications that are public/dynamic, public/static and completely private. So, what are the use cases for each?

This presentation will examine each use case, along with sensor and smart device integration and general communications from field devices. It will also examine how a wireless solution can pay for itself by improving productivity and solution uptime, while reducing maintenance costs for increased ROI.

Randall Kerr, Engineering Manager – Digi International

10:00 am – Networking Break in Exhibit Hall

10:30 am
Enhancing Electrical Power Distribution Quality with Satellite Telemetry
The key objectives of electrical distribution system integrations are for utilities to ensure greater reliability, availability and timely responses to system faults. Through the efficient dispatch of informed and prepared maintenance crews, it is possible to reduce SAIDI, SAIFI and MAIFI rates, thereby improving the quality of the supply of electricity. However, this must be done while maintaining costs in line with local market demands.

Satellite M2M telemetry, with the use of the highly reliable and resilient L-band frequency, offers a solution for monitoring and controlling protective devices installed in the electrical grid, such as reclosers, voltage regulators, capacitor banks, as well as other devices, such as smart meters. In addition to being easily integrated into the Smart Grid as a contingency measure against outages and/or lack of local cell and radio coverage, it can also be relied upon as the primary means of communication in both rural and urban areas. This stand-alone, easily deployed solution provides clear technical and financial advantages to large utilities or energy cooperatives.

Reinaldo Burian, Application Engineer, Satellite Terminal of Telemetry Solutions to Smart Grid – ORBCOMM

11:10 am
Smart Cybersecurity Strategies for Smart SCADA
Smart cities. Smart networks. Smart businesses. At every level, people, communities and the (critical) infrastructure that supports them are turning to an endless web of interconnected devices to streamline and improve the way things work.While the same is true for smart SCADA, whats different is the exponentially higher risk that comes with expansive interconnectivity.If a hacker targets a SCADA system, oftentimes public health and safety is at risk.

This session will outline key considerations for an effective SCADA security plan; and show how new technologies are answering the call for better SCADA security by enabling:

  • Real time visibility with passive network modeling
  • Immediate process anomaly detection with process anomaly monitoring
  • Accelerated incident response with AI-enabled correlation
  • Rapid remediation, with integrations into SIEM

Tom Nuth, Product Marketing Director- Nozomi Networks

11:45 am – Networking Lunch

1:00 pm
Migration to New Narrowband Technologies
Recent transformations in narrowband technology is breathing new life into the licensed sub-1 GHz space. Greenfield deployment are simple but how to leverage this technology advancement for existing deployments? Wholesale or forklift digital transformations of legacy SCADA radio systems are disruptive. So what are the options for joining the twenty first century and how can migration be managed within constrained budgets?

Modern licensed narrowband private radio systems deliver advanced IP capability and enjoy all the advantages of coverage and NLOS of these sub-1 GHz frequencies. This technology addresses network needs that until recently only short range unlicensed or carrier 4G systems were able to solve. Understanding these digital radio characteristics is important when considering upgrades so that range, latency, and ease-of-use are not lost and legacy protocols can still be supported. Finally, as the influence of the IT domain expands to control systems, management and security have also become important. With the changes in world perspectives security can no longer take second place to connectivity.The presentation will also include field case study deployments.

Tisha Hayes, Senior Engineer- 4RF USA

1:40 pm
Strong but Practical Security for SCADA and ICS
While best-in-class automation has been put in place in industrial plants during the past few years, the industry has become vulnerable to new types of Cyber-attacks. Embedded systems in ICS such as PLC, RTU, IED, smart meters are currently built with general purpose micro, RTOS, having capability to connect to a closed private network remotely using TCP/IP and other open standard industry defined protocols, thus needing secure communication. This calls for a strong security implementation from design phase of these critical systems.

Although crypto based security functions have been implemented to run on the general purpose micro system to boot securely, identify and authenticate the network and make secure communication, they are missing security assurance, strong root of trust, tamper proof secure storage for keys/credentials used by the crypto algorithms. These additional features will increase the systems availability, integrity and confidentiality levels. This can be achieved by using a Hardware Security Module (HSM) as trust anchor token sitting next to the main processor of the system. Hardware security Module (HSM) are high end security micro controllers acts as a root of trust for End-to-End authentication with secure Storage capability.

Shrinath Eswarahally, Senior Staff Engineer-Security – Infineon Technologies

2:20 pm
Proven Methods of Protection
There are a growing number of organized cyber-attacks with specific purposes in mind. The value of a well-organized attack is the street value of your data or access to your network. Attackers want to gain access to important data, plant zero day attacks or interrupt daily operations for specific reasons. Even though common practices like virus scanning, network monitoring and access controls protect against most threats, cyber-attacks are becoming increasingly targeted.

Considering common attack vectors are being closed, attackers are moving to other entry points. Data, SCADA networks and unprotected systems must be isolated and known. Three uncommon approaches can provide layers of protection and isolation. Deep content inspection, controlled interfaces and Trusted Operating systems can find unknown attacks, isolate attacks and ensure operations while under attack. These simple implementations with common protections can provide a layered approach to protecting your SCADA operations, data and enterprise networks. Implementation today is more affordable that a cleanup activity tomorrow.

Ken Lewis, CISSP, Director, DoD Business Development -Tresys Technology

3:00 pm
IP Video at the Edge
We are continuing to see video surveillance being integrated into SCADA systems as a means of verification and validation. Moving intelligence to the edge will make it easier for SCADA systems to adopt network video. The openness and server-like nature of IP cameras provide a platform for growth and flexibility in which various applications can be flashed to the device depending on the environment and what is trying to be achieved.  In addition, these devices by their pure nature, make it easy to integrate into multiple systems, such as SCADA.

Additional benefits of intelligence at the edge includes:

  • Lower storage requirement – only content-rich video is being streamed to the video storage array rather than every frame that was captured by the camera.
  • Lower operating costs – in-camera processing is less expensive than monopolizing CPU cycles on the server.

Anthony Incorvati, Business Development Manager of Critical Infrastructure and Transportation – Axis Communications

3:45 pm – Conference Conclusion