Error message

  • Notice: Undefined offset: 223 in user_node_load() (line 3697 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Trying to get property 'name' of non-object in user_node_load() (line 3697 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Undefined offset: 223 in user_node_load() (line 3698 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Trying to get property 'picture' of non-object in user_node_load() (line 3698 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Undefined offset: 223 in user_node_load() (line 3699 of /home/tcipgpro/public_html/modules/user/user.module).
  • Notice: Trying to get property 'data' of non-object in user_node_load() (line 3699 of /home/tcipgpro/public_html/modules/user/user.module).

2012 TCIPG Industry Workshop Panels

Workshop Panels

NOTE: Panel topics are subject to change.
Workshop Announcement Page
Workshop Agenda

Secure Integration and Interoperability

The smart grid involves utilities, system operators, third party providers of electricity and market services, and consumers in a complex, administratively heterogeneous environment.  Equipment and devices required for the smart grid range from powerful computational assets at major ISO control centers, to bulk generation assets digitally instrumented for self-monitoring and control, to embedded systems at customer premises. The intermittency of renewable generation presents challenges in terms of stability, which can be addressed by distributed voltage support using, for example, localized storage or V2G models. Secure integration and interoperability of this diverse market and system model will require monitoring capabilities to enable optimal and reliable operation, ensure transaction integrity, and detect intrusions or adverse events. Topics include:

  • Security and stability in mixed utility-third party generation, transmission, and market environments
  • Scalable PKI and transaction integrity for meters, including bidirectional meters.
  • Secure grid-to-vehicle (G2V) and vehicle-to-grid (V2G) operation
  • Microgrids and secure islanding

Lessons Learned in SG Cybersecurity

The Smart Grid Investment Grant and Smart Grid Demonstration Project Programs funded under the ARRA explicitly recognized that cybersecurity was going to be an important issue for the emerging smart grid and that all projects funded by the programs explicitly address cybersecurity as part of the project plans. The purpose of this panel is to inform the audience about cybersecurity lessons learned in planning, implementing, and operating recent smart grid projects (whether funded by ARRA or otherwise). Topics of interest include:

  • Developing cybersecurity plans and specifications and working with vendors
  • Relationship to NERC CIPS compliance
  • Scaling and scalability
  • Operational challenges
  • Cybersecurity monitoring and situational awareness
  • Cybersecurity-related incidents and responses

Consumer Acceptance of the Smart Grid

For ordinary consumers, the term "smart grid" refers exclusively to the distribution side, and it triggers concerns. Are consumers paying for devices (and the power to run them) that only benefit the utilities? Will the presence of a new family of wireless devices in the household create new health risks? Will the existence of a home smart grid enable utilities (or other entities, such as rogue law enforcement) to spy on consumer activity that had previously been private? If so, can the field of privacy-preserving computation assuage any of these concerns? What can regulators do to help? This panel will bring together stakeholders for discussion to help identify obstacles – and potential paths to mitigate them.

Best Practices in Cybersecurity

This panel will provide summaries of fundamental cybersecurity efforts that are known to provide reliable results for intrusion detection, response, and mitigation. Commercial off-the-shelf techniques will be presented as basic services which are currently available for monitoring and control of cyber assets. Practices that are unique to electric power system operation and control will be identified.