Cyber security standards

Results: 368



#Item
31Guidance for Enforcement of CIP Standards In Order No. 706, the Federal Energy Regulatory Commission approved the CIP-002 through CIP-009 Reliability Standards and NERC’s proposed implementation plan. This document pro

Guidance for Enforcement of CIP Standards In Order No. 706, the Federal Energy Regulatory Commission approved the CIP-002 through CIP-009 Reliability Standards and NERC’s proposed implementation plan. This document pro

Add to Reading List

Source URL: force5solutions.com

Language: English - Date: 2014-11-10 14:30:49
32NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL Princeton Forrestal Village, Village Boulevard, Princeton, New JerseyRevised) Implementation Plan for Cyber Security Standards CIPthrough CIP-009-1

NORTH AMERICAN ELECTRIC RELIABILITY COUNCIL Princeton Forrestal Village, Village Boulevard, Princeton, New JerseyRevised) Implementation Plan for Cyber Security Standards CIPthrough CIP-009-1

Add to Reading List

Source URL: force5solutions.com

Language: English - Date: 2014-11-10 14:30:53
33Achilles Practices Certification  Achilles® Practices Certification ensures device manufacturers include cyber security best practices in the processes and procedures used to develop their products.  Background

Achilles Practices Certification Achilles® Practices Certification ensures device manufacturers include cyber security best practices in the processes and procedures used to develop their products. Background

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:12
34Sensus First AMI Vendor to Recieve Achilles Practices Certification February 14, 2011 Sensus is the first Advanced Metering Infrastructure (AMI) company to achieve overall cyber security certification after an eight-mont

Sensus First AMI Vendor to Recieve Achilles Practices Certification February 14, 2011 Sensus is the first Advanced Metering Infrastructure (AMI) company to achieve overall cyber security certification after an eight-mont

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
35Can Security Certification Control Cyber Risk? November 12, 2010 Industrial devices comply with many standards, but Security certification is a relatively new area that is quickly rising in importance as devices are incr

Can Security Certification Control Cyber Risk? November 12, 2010 Industrial devices comply with many standards, but Security certification is a relatively new area that is quickly rising in importance as devices are incr

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
36TECHNICAL STUDIES  Cyber Security of Industrial Control Systems: How to get started? An overview of existing documents, standards,

TECHNICAL STUDIES Cyber Security of Industrial Control Systems: How to get started? An overview of existing documents, standards,

Add to Reading List

Source URL: www.clusif.fr

Language: English - Date: 2014-09-16 09:37:13
37Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology

Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology

Add to Reading List

Source URL: sites.nationalacademies.org

Language: English - Date: 2015-03-25 14:03:24
38COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, U.S. DEPARTMENT OF COMMERCE “Request for Information: Developing a Framework To Improve Critical Infrastructu

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, U.S. DEPARTMENT OF COMMERCE “Request for Information: Developing a Framework To Improve Critical Infrastructu

Add to Reading List

Source URL: epic.org

Language: English - Date: 2013-04-08 17:28:33
39Securing The Human for Utilities (STH.Utility): Version 5 Coming Soon!  Securing The Human is currently in the process of finalizing STH.Utility Version 5 training. We plan to have Version 5 available this summer but wan

Securing The Human for Utilities (STH.Utility): Version 5 Coming Soon! Securing The Human is currently in the process of finalizing STH.Utility Version 5 training. We plan to have Version 5 available this summer but wan

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-04-17 12:03:23
40The RIPE Crosswalk Comparing the RIPE cyber security program to ICS security standards and frameworks Perry Pederson  November 2014

The RIPE Crosswalk Comparing the RIPE cyber security program to ICS security standards and frameworks Perry Pederson November 2014

Add to Reading List

Source URL: www.langner.com

Language: English - Date: 2014-11-06 03:38:57