Call Our Firm:   605.385.0330

Commercial Transactions & Litigation, Environmental Law, Natural Resources Law, & Energy Law

Posts Tagged ‘Water Systems Security’

Midwest Water Technology Conference

Posted on: May 29th, 2014
by David Ganje

 Midwest Water & Wastewater Technology Conference

 

                       

 

6/5/2014

When: Thursday,   June 5, 2014
Visit Exhibitors from 7:30 to 8:30 AM
Where: Map this event »
College of Lake County, C-Building
19351 West Washington Street
Grayslake, Illinois  60030
United States
Contact: Lisa   Hoffhines
lisa@isawwa.org
Phone:      866-521-3595 ext. 2

 

 

 

Details

 

T-CON:   Midwest Water & Wastewater Technology ConferenceABOUT   THE CONFERENCE:The   Midwest Water & Wastewater Technology Conference is the new and improved   technology conference for industry professionals sponsored by the Illinois   Section AWWA, Central States Water Environment Association, Illinois Water   Environment Association and the College of Lake County. The Technology   Conference incorporates multiple learning tracks related to the planning,   design, implementation, and operation of water and wastewater-based   technologies. The multi-track approach makes the conference ideal for utility   managers, IT professionals, as well as operations and field staff. If you can   only attend one technology conference this year, this is the one to attend!

T-CON   GENERAL SCHEDULE

TIME ROOM AGENDA    
7:00-7:30am C006 Exhibitor     Set-up
7:30-8:15am C006 Breakfast     | Registration | Visit Exhibit Booths
8:15-8:30am C005 T-CON     Welcome and Opening Remarks
8:30-9:30am C002,     C003, C005 Technical     Sessions
9:30-10:00am C006 Morning     Break | Visit Exhibit Booths
10:00-12:00pm C002,     C003, C005 Technical     Sessions
12:00-1:00pm C002,     C003, C006 Lunch     | Visit Exhibit Booths
1:00-2:00pm C002,     C003, C005 Technical     Sessions
2:00-2:30pm C006 Afternoon     Break | Visit Exhibit Booths
2:30-3:15pm C005 Keynote     Speaker
3:15-3:30pm C005 Raffle     for iPad Air and MORE! | Closing Remarks

 

Presentation Title
Can You Recover After A Disaster With     Your Control System?
Comparison of Ammonia And DO Aeration     Control Strategies To Optimize Energy And Process At Low Capital Cost: A     Case Study
Drawing The Curtains On Windows XP –     What Does The End Of Win XP Mean For SCADA Systems?
Geocentric Web Mapping Solutions In     GIS
Going Beyond The Meter: Expanding     Traditional Data Collection Methodology To Increase Revenues
How GIS Has Helped The City Of     Chicago And The Department Of Water Management (DWM) Embark On A Very     Aggressive Plan To Replace 880 Mile Of Water Main In 10 Years!
How To Select An Economical And     Secure Remote Terminal Unit (RTU) Delivery System For WWTPs And Pump     Stations
Identifying And Locating Existing     Backflow Prevention Devices Inside A Building Using Bluetooth Smart     Technology
Increasing The Resiliency: Standby     Power Generation
Integrating SCADA with Other Plant     Systems
Internet of Things – Enabling A New     Level Of Control, Reporting And Efficiency
Making Your Water Department     Paperless With Laserfiche ECM
Master Metering Using A SCADA System
Mobile Data Collection, Visualization     And Execution
Mobile Interfacing Within     Water/Wastewater
Quick Tour Of ArcGIS Online And     Practical Uses For Water / Wastewater
SharePoint 2013 – Technical Overview
Speaking Their Language: Public     Engagement Through Social Media For Public Works
Understanding Pressure, Temperature,     And Flow Instrumentation
Using SCADA To Reduce Energy     Consumption And Operate More Efficiently
Water Systems: A Twofold Look Into     Physical Security And Cyber Security
Water/Wastewater Tablet Success For     Less Than $1000

 

 

 

Water Systems Security

by David Ganje

WATER SYSTEMS SECURITY

INTRODUCTION……………………………………………………………………………………………………….. 1

BRIEF HISTORICAL OVERVIEW……………………………………………………………………………… 1

WATER SECURITY……………………………………………………………………………………………………. 2

  1. Physical Security …………………………………………………………………………………………..      3
    1. i.              Milwaukee & Cryptosporidium…………………………………………………………….. 4
    2. ii.            WaterWorks: Physcial Security…………………………………………………………….. 6
  2. Cyber-Security……………………………………………………………………………………………….      9
    1. i.              WaterWorks: Cyber-Security………………………………………………………………… 11

RECOMMENDATIONS FOR ENHANCED SECURITY………………………………………………. 12

VIRTUAL ATTACHMENT:

Ass’n of State Water Admins., Security Vulnerability Self-Assessment Guide for Small Drinking Water Systems, Nat’l Rural Water Ass’n (May 30, 2002), available at http://www.epa.gov/ogwdw/dwa/pdfs/vulnerability.pdf.

 

 

Presentation to the Illinois Chapter of the American Water Works Association.

 

© 2014. All Rights Reserved. David L. Ganje.

 

I. Introduction

This article discusses current security issues surrounding water treatment and waste facilities. The sources of attack are myriad, but manifest via physical attacks and cyber-attacks. A physical attack on a water treatment and waste facility occurs when an individual or group causes physical damage to the facilities, structures infrastructure, systems, or the water itself on site. A cyber-attack occurs remotely and disrupts the computer systems that control the treatment and waste facility. Whether the attack be physical, cyber, or some combination, the goal is the same: to harm, even kill, the local population and cause panic. This article will give a brief historical overview of American water systems, discuss the current water security concerns of both physical and cyber-security, and make some practical recommendations for enhanced security.

 

Water Systems Security

Posted on: April 28th, 2014
by David Ganje

WATER SYSTEMS SECURITY

INTRODUCTION……………………………………………………………………………………………………….. 1

BRIEF HISTORICAL OVERVIEW……………………………………………………………………………… 1

WATER SECURITY……………………………………………………………………………………………………. 2

  1. Physical Security ………………………………………………………………………………………….. 3
    1. i.        Milwaukee & Cryptosporidium…………………………………………………………….. 4
    2. ii.      WaterWorks: Physcial Security…………………………………………………………….. 6
  2. Cyber-Security………………………………………………………………………………………………. 9
    1. i.        WaterWorks: Cyber-Security………………………………………………………………… 11

RECOMMENDATIONS FOR ENHANCED SECURITY………………………………………………. 12

VIRTUAL ATTACHMENT:

Ass’n of State Water Admins., Security Vulnerability Self-Assessment Guide for Small Drinking Water Systems, Nat’l Rural Water Ass’n (May 30, 2002), available at http://www.epa.gov/ogwdw/dwa/pdfs/vulnerability.pdf.

 

 

Presentation to the Illinois Chapter of the American Water Works Association.

 

 

© 2014. All Rights Reserved. David L. Ganje.

 

I. Introduction

This article discusses current security issues surrounding water treatment and waste facilities. The sources of attack are myriad, but manifest via physical attacks and cyber-attacks. A physical attack on a water treatment and waste facility occurs when an individual or group causes physical damage to the facilities, structures infrastructure, systems, or the water itself on site. A cyber-attack occurs remotely and disrupts the computer systems that control the treatment and waste facility. Whether the attack be physical, cyber, or some combination, the goal is the same: to harm, even kill, the local population and cause panic. This article will give a brief historical overview of American water systems, discuss the current water security concerns of both physical and cyber-security, and make some practical recommendations for enhanced security.