december 4, 2014 - national conference of state legislaturesdec 04, 2014  · visible vs. not...

30
Protecting the Grid: Increasing the Resiliency of the Nation’s Energy Network December 4, 2014

Upload: others

Post on 27-Jun-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

Protecting the Grid: Increasing the Resiliency of the Nation’s Energy Network December 4, 2014

Page 2: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+ 2

Energy Infrastructure Risk Analysis and Decision Support for States Sponsored by: Energy Infrastructure Modeling and Analysis Division (EIMA) within the U.S. Department of Energy’s (DOE) Office of Electricity Delivery and Energy Reliability (OE)In partnership with:

Page 3: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+ National Infrastructure Protection Plan (NIPP) 2013: Partnering for Critical Infrastructure Security and Resilience

3

Page 4: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+ Risk – The potential for an unwanted outcome resulting from an incident, event, or occurrence, as determined by its likelihood and the associated consequences. 

Threats/Hazards:What can happen?  What is the frequency/probability?

Vulnerabilities: Are there weak links in the energy supply chain and infrastructure? Are components antiquated/old and failure prone? Are there infrastructure co‐locations or bottlenecks? Includes consideration of energy infrastructure attributes and interdependencies

Consequences: If something happens, what are the human and economic impacts to society? Must also consider how impacts will affect interdependent infrastructures and behavior of impacted populations

4

Source: NIPP 2013Partnering for Critical Infrastructure Security and Resilience

Page 5: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+ Threats and HazardsState Level Date Sources 

State Hazards Analysis prepared by a number of state emergency management agencies document historical events and damages such as hurricanes, earthquakes, floods, storms, wildfires, infrastructure failures, etc.

Energy Supply Disruption Tracking Process developed as part of the State Energy Assurance planning efforts document events and recovery timelines

Many, but not all, State Energy Assurance Plans contain to some assessments of the risks of an energy disruption due to all hazards. Some of these plans are not public and are considered For Official Use Only (FOUO).

Some State Fusion Centers have a critical infrastructure protection desk that track incidents involving infrastructure sectors including energy and some prepare and issue monthly Suspicious Activity Reports.

The Department of Energy collected data from utilities on a mandatory repost called the Electric Disturbance Events (OE‐417) and the customer outage numbers are available by utility and areas affected by month and year on the DOE website.

FEMA’s website has a listing of major disaster and emergency deceleration by state by year   

5

Page 6: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Vulnerabilities and Criticality  Vulnerabilities

Visible vs. not visible  Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent redundancy & resiliency Security measures / standards adopted Public vs. restricted access Speed of response Insider vulnerability Cybersecurity

Criticality What’s really important Levels of independencies Relative importance High consequences and impacts Potential threat to public safety

Fermi nuclear power plantMonroe, Michigan

6

Page 7: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Consequence Consequence analysis should address both direct and indirect effects of any hazards including: natural disaster, infrastructure failure, pandemic, cyber or terrorist attack, or other disruptive events

Under the NIPP, the U.S. Department of Homeland Security works with sector specific agencies and security partners to examine the inherent characteristics of assets, systems, or networks to identify “worst‐case” consequences

Consequences for the national‐level comparative risk assessment can be divided into four main categories: Human impact, fatalities, and injuries Economic impacts, primary/secondary Impact on public confidence Impact on government capability

Coffeyville Refinery Kansas, July 2007

7

Page 8: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+ Example of Risk Management for Cybersecurity

Risk is a function of: [Consequence x  Vulnerability x Threat]

Modification of data in transit

Zero day vulnerability exploits

Denial of service attacks

Theft of information

Spoofing Sniffing Human engineering

Loss of revenue Economic losses Public safety Physical damage Loss of confidence Decline in stock value

Operational interdependencies

Interdependencies cascading, etc.  (customers/suppliers)

User Errors Equipment Failure Malicious Actors Viruses/worms Natural hazards

Hurricanes  Floods Sever Storms Earthquakes Solar Flairs  Pandemics

Page 9: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

9

Source: Energy Assurance and Interdependency Workshop, December 2 – 3, 2013  Washington, D.C.

Page 10: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Why Invest in Reliability and Resilience?To reduce human and economic consequences Weather‐related power outages are estimated to have cost the U.S. economy an inflation‐adjusted annual average of $18 ‐ $33 billion

Since 1980, the United States has sustained 144 weather disasters whose damage costs reached, or exceeded, $1 billion

Seven of the ten costliest storms in U.S. history occurred between 2004 and 2012

Annual costs fluctuate significantly and are greatest in the years of major storms such as Hurricane Ike in 2008 (cost estimates range from $40 ‐ $75 billion) and Superstorm Sandy in 2012 (cost estimates range from $27 ‐$52 billion). 

Direct damages from Hurricane Katrina were about $75 billion, and 1,200 people died.  The cost of rebuilding the levees in New Orleans alone has been $14 billion

EPRI has estimated the cost of power outages across all business sectors in the U.S. at between $104 billion and $164 billion a yearSource: The Economic Benefits of Increasing Electric Grid Resilience to Weather Outages, The White House Council of Economic Advisers and the U.S. Department of Energy, August 12, 2013 http://energy.gov/articles/white-house-council-economic-advisers-and-energy-department-release-new-report-resiliency

Electric Power Research Institute (EPRI) 2011 Technical Report (EPRI 1006274).

10

Page 11: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+ The Energy Infrastructure Risk Analysis and Decision Support for States Project

NASEO and the project partners will work with states and DOE to help define their needs and risk analysis approached that will best provide policymakers with the information they need to make informed decisions.

The approach will be analytical in nature and focus on quantification methods that can objectively define economic and human consequences and energy infrastructures vulnerabilities and interdependencies. Threats and hazard will draw from the considerable work that has been done to date and records of past events.

The end product will be a tool box with a collection of risk analysis methods suitable for states with examples of how they can be used and employed to make decisions.  Training and outreach will be used to share the project results.

11

Page 12: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Planned Near‐term Activities Convene Risk Analysis State Working Group to: Summarize states’ risk‐focused activities and identify needs Determine current risk analysis methods used, tools applied, and levels of effort required

Define constraints (e.g. legal, regulatory, cultural, and  organizational policies)

Identify established partners that are critical to success and identify partnership gaps

Develop state‐level energy risk management strategy with enumerated goals and objectives

Identify jurisdictional priorities

Workshop planned for April 2015 to review interim results and identify actions needed to achieve final objectives

12

Page 13: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Utility Investment and Resiliency Simulation

Created and hosted by the National Association of Regulatory Utility Commissioners for working group members and state energy officials

An exercise designed to look for patterns in what issues decision‐makers consider when making energy investments Round 1: Groups decide on what investments to make given an initial set of circumstances

Subsequent rounds: New energy events are introduced and impacts are determined based on decisions made in previous rounds.

13

Page 14: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+National Critical Infrastructure Prioritization Program (NCIPP) 

14

Page 15: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+NCIPP Supplemental Lists in the national asset database

15

Page 16: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+ Threat and Hazard Identification and Risk Assessment (THIRA)

16

Developed by the Federal Emergency Management Agency (FEMA) to helps communities identify capability targets and resource requirements necessary to address anticipated and unanticipated risks.

Page 17: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Components of the National Preparedness System

The THIRA process supports the first two components of the National Preparedness System:  Identifying and Assessing Risk  Estimating Capability Requirements 

The THIRA process helps communities answer the following questions:  What does the community need to 

prepare for?  What resources are required in order to 

be prepared?  That actions (e.g., mitigation activities) 

could be employed to lessen or eliminate the threat or hazard? 

What impacts need to be incorporated into the community’s recovery preparedness planning? 

17

Source: FEMA Threat and Hazard Identification and Risk Assessment Guide Comprehensive Preparedness Guide (CPG) 201 Second Edition August 2013

Page 18: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Risk in State Energy Assurance Plans (EAPs) Broad range across state EAPs regarding if/how to address risk: No mention of risk Recognition of need for risk assessment Qualitative risk assessment Quantitative risk assessment

Combination of quantitative and qualitative risk assessment is ideal and needs to be: A simple, repeatable process with a schedule and framework for regular 

maintenance and updates Documented, Reproducible and Defensible

Examples of quantitative risk assessment California: Energy Supply Disruption Risk and Vulnerability Assessment Matrix Oregon's Earthquake Risk Study New York State Risk and Vulnerability Assessment 2100 Commission   Colorado: Risk Composite Score Michigan’s Criticality and Vulnerability Scoring 

18

Page 19: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+California Quantitative Risk Assessment Tool

Types of Risks Identified Risk Assessment Tool

1. Natural2. Technological3. Human‐Induced4. Terrorism

Energy Supply Disruption Risk and Vulnerability Assessment Matrix1. Severity Impacts (based on average of 5 factors, rated 0 ‐ 4)

‐ Probability‐ Level of Physical Damage‐ Cost to respond and repair‐ Level of interruption period‐ Level of negative impact on public 

perception

2. Relative Risk = Severity Impacts * Probability

19

Page 20: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+

California Energy Supply Disruption Risk and Vulnerability Assessment Matrix (Example)

20

Source: State of California Energy Assurance Plan, 2014

Page 21: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

Oregon's Earthquake Risk Study for Critical Energy Infrastructure Hub

Source: Oregon's Earthquake Risk Study for Critical Energy Infrastructure Hub, August 2012

Page 22: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

NYS2100 Commission Preliminary Report on Improving the Strength and Resilience of New York State’s Infrastructure – January 2013

Risk, Vulnerability and Resiliency Assessments

Source: NYS 2100 COMMISSION Recommendations to Improve the Strength and Resilience of the Empire State’s  infrastructure

Page 23: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Colorado Risk Composite Score and Rankings (Example)

23

Source: Colorado Energy Assurance Emergency Plan, 2012

Page 24: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Michigan’s Criticality and VulnerabilityScoring for prioritization 

Criticality Evaluation

Deaths and injuries Property Damage Revenue Loss Collateral Damage/Human Health Collateral Damage/Property Damage Collateral Damage/Revenue Loss and Economic 

Impact Interdependency Losses/Suppliers

Interpedently Losses/Customers Public Health Loss/Human HealthPriority Evaluation

Visibility Score Attractiveness Score Infrastructure Countermeasures Emergency response Plans Drills and Exercises Disaster Mitigation

24

1. At‐Site Lost/Human Health for onsite employees/visitors Rating  Weight R*WLess than 5 deaths or serious medical injury 0 0At least 5, but no more than 50 deaths or serious injuries  1 0At least 50, but no more than 500 deaths or serious injuries.  2 0At least 500, but no more than 5,000 deaths or serious injuries. 3 0At least 5,000 but no more than 50,000 deaths or serious injuries t 4 20 80Greater than 50,000 deaths or serious injuries 5 02. At‐Site Loss/Property Damage0   Infrastructure Repair/Replacement costs less than $100,000 0 01   Infrastructure Repair/Replacement costs between $100,000 and $1,000,000 1 02   Infrastructure Repair/Replacement costs between $1 million, and $10 million. 2 03   Infrastructure Repair/Replacement costs between$10 million, and $100 million. 3 10 304   Infrastructure Repair/Replacement costs between$100 million and $1 billion 4 05   Infrastructure Repair/Replacement over $1 billion or irreplaceable Historical Site, Monument, Landmark 5 0

Page 25: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+ Cybersecurity Capability Maturity Model (C2M2) programElectric and Oil and Gas Subsector Models

The model is a common set of industry‐vetted cybersecurity practices, grouped into ten domains and arranged according to maturity level. The C2M2 evaluation tool allows organizations to evaluate their cybersecurity practices against C2M2 cybersecurity practices. Based on this comparison, a score is assigned for each domain. 

25

Page 26: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Energy Market Monitoring

26

EIA.gov

Residential Propane Prices New England and the Midwest 1991 to 2014

Descriptive statistics can also be used to gauge the degree of risks and the consequences of disruptive events  

Page 27: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Project Key Outcomes  Support states’ energy infrastructure analysis and decision making capabilities when responding to energy disruptions

Provide technical assistance to states in the development of the data and risk analysis tools they can use

Provide technical assistance to states in data collection processes  that can inform and improve decision making by states across all energy resources

Coordinate efforts of NARUC, NGA, NCSL, and other appropriate organizations to share best practices and approaches as well as exchange ideas across states and regions and improved coordination with the private sector

27

Page 28: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+Project Key Deliverables

Review existing analysis and modeling capabilities to determine how states can use and/or adapt these tools

Coordinate with federal agencies to identify sources of data needed to support development of states’ risk assessment capabilities

Develop guidance for states on how to effectively utilize available public and private sector resources

Conduct outreach (webinars, workshops, technical guidance) to help states establish and improve baseline capabilities for risk analysis

28

Page 29: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+

On the microscale, making an up‐front investment in safeguards that mitigate risk and consequences is far more cost‐effective than paying for response and recovery after a foreseeable hazard. On the macro scale, a society’s level of resilience contributes to its global competitiveness.” 

—Dr. Stephen Flynn 

Founding co‐director of the George J. Kostas Research Institute for Homeland Security at Northeastern University  (Flynn and Burke 2011)

Page 30: December 4, 2014 - National Conference of State LegislaturesDec 04, 2014  · Visible vs. not visible Widely know about vs. unknown Easy vs. difficult to protect perimeter Inherent

+

Questions and Answers

Jeff Pillon, Director, Energy Assurance [email protected] ; Phone 517‐580‐7626