Archive for September, 2012

What hath the NERC CIPs wrought?

A peaking plant may see little use until it is REALLY needed, and at that point it must run in a prescribed period of time. Depending on whether the peaker is on Automatic Generator Control (AGC) or other form of dispatch, it will be required to be ava…

What hath the NERC CIPs wrought?

A peaking plant may see little use until it is REALLY needed and at that point it must run in a prescribed period of time. Depending on whether the peaker is on Automatic Generator Control (AGC) or other form of dispatch, it will be required to be avai…

Unintentional ICS cyber incidents can have a real cost

A number of years ago I had a discussion about ICS cyber security with a colleague from a market-based generation company. His concern was that his plants had to respond to the dispatcher within a prescribed period of time (say 15-30 minutes) or the di…

Stanford CISAC Seminar – ICS Cybersecurity and National Security

I have been invited to give a presentation on control system cybersecurity at Stanford’s Center for International Security and Cooperation (CISAC) as part of their CISAC seminar series on October 8 at Stanford (http://cisac.stanford.edu/research/2956/)…