Topics: Cyber Risk and Resilience Management, Risk and Opportunity Management, Smart Grid Maturity Model
Watch James Stevens discuss the Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain
Topics: Smart Grid Maturity Model, Cyber Risk and Resilience Management
The smart grid is the use of digital technology to modernize the power grid, which comes with some new privacy and security challenges.
Topics: Cyber Risk and Resilience Management
In this podcast, James Stevens explains how using the smart grid comes with some new privacy and security challenges.
Topics: Cybersecurity Engineering
In this presentation, Sam Merrell and James Stevens describe an integrate view of security that includes both physical security and cybersecurity.
Topics: Cyber Risk and Resilience Management
In this 2007 report, the authors explore the transformation of security and business continuity into processes to support and sustain operational resiliency.
Topics: Cyber Risk and Resilience Management
In this 2007 report, the authors highlight the design considerations and requirements for OCTAVE Allegro based on field experience.
Topics: Cyber Risk and Resilience Management
In this presentation, the authors describe a process-oriented approach to security.
Topics: Cyber Risk and Resilience Management
In this 2005 report, the authors describe IAP, a documented and repeatable process for developing consistent asset profiles.
Topics: Cyber Risk and Resilience Management
In this 2005 handbook, the authors provide detailed guidelines for conducting an OCTAVE-S evaluation.
Topics: Cyber Risk and Resilience Management
In this 2004 report, the authors itemize characteristics of common approaches to security that limit effectiveness and success.
Topics: Cyber Risk and Resilience Management
In this report, the authors describe the critical success factor method and present theories and experience in applying it to enterprise security management.
Topics: Cyber Risk and Resilience Management
In this 2003 report, the authors describe the OCTAVE method, an approach for managing information security risks.