National Library of Energy BETA

Sample records for access training cybersecurity

  1. Cybersecurity Awareness & Training Warehouse | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Training » Cybersecurity Awareness & Training Warehouse Cybersecurity Awareness & Training Warehouse The words "New Skill," written on a chalk board. The words "New Skill," written on a chalk board. Cybersecurity Awareness & Training The Office of the Chief Information officer (OCIO) has developed an online repository to provide the public with free and direct access to cyber training and awareness resources. The Cybersecurity Awareness & Training Warehouse

  2. DOE Cybersecurity Training and Education | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training and Education DOE Cybersecurity Training and Education road-sign-798175960720.jpg The DOE Cybersecurity Awareness and Training (CSAT) program provides Departmental ...

  3. DOE Cybersecurity Training and Education | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Training and Education DOE Cybersecurity Training and Education road-sign-798175_960_720.jpg The DOE Cybersecurity Awareness and Training (CSAT) program provides Departmental personnel with the the knowlege and skills necessary to protect DOE information and information systems. In this section of the warehouse, you will find: information on DOE-developed role-based/core competency courses federal training programs foundational documents reference materials Contact Us Please direct in any

  4. Cybersecurity Expert Jim Mellander Retiring from NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training » Cybersecurity Awareness & Training Warehouse Cybersecurity Awareness & Training Warehouse The words "New Skill," written on a chalk board. The words "New Skill," written on a chalk board. Cybersecurity Awareness & Training The Office of the Chief Information officer (OCIO) has developed an online repository to provide the public with free and direct access to cyber training and awareness resources. The Cybersecurity Awareness & Training Warehouse

  5. cybersecurity

    National Nuclear Security Administration (NNSA)

    9%2A en NNSA Hosts Cybersecurity Consortium Members Following White House Announcement of 25 Million in Grants to 13 HBCUs http:nnsa.energy.govmediaroompressreleases...

  6. DOE Cybersecurity Awareness Program | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Awareness Program DOE Cybersecurity Awareness Program security-265130960720.jpg The Cybersecurity Awareness and Training (CSAT) Program team coordinates cybersecurity awareness ...

  7. Accessing Online COR Training

    Office of Energy Efficiency and Renewable Energy (EERE)

    Contracting Officer’s Representative (COR) training is now be available in an online format. "Accessing Online COR Training" provides a step-by-step guide to access the online COR course. 

  8. Cybersecurity Front Burner | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Services » Training » Cybersecurity Training Warehouse » DOE Cybersecurity Awareness Program » Cybersecurity Front Burner Cybersecurity Front Burner Documents Available for Download January 15, 2015 FRONT BURNER - Issue 20 The Cybersecurity Front Burner Issue No. 20 examines Phishing to include defining Phishing and related terms and how to protect yourself from this very common and clever security threat. The newsletter also addresses wireless networks, supply chains, training events, and

  9. Cybersecurity Tutorial

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cybersecurity Tutorial Show All | 1 2 3 4 5 ... 11 | Next Cybersecurity Tutorial What You Need to Know What You Need to Know About Cybersecurity at NERSC Welcome to the...

  10. Addressing Cybersecurity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    with the private sector to develop better cybersecurity tools, introducing quantum mechanics. March 17, 2016 locks Los Alamos National Lab partners with the private sector to ...

  11. Cybersecurity Capability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity Capability Maturity Model (C2M2) Office of Electricity Delivery and Energy Reliability Cybersecurity Capability Maturity Model (C2M2) Frequently Asked Questions 1) What is the C2M2 model? The C2M2 is a voluntary evaluation process utilizing industry-accepted cybersecurity practices that can be used to measure the maturity of an organization's cybersecurity capabilities. The C2M2 is designed to measure both the sophistication and sustainment of a cyber security program. The model

  12. Electricity Subsector Cybersecurity Capability Maturity Model...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sector Cybersecurity Framework Implementation Guidance (January 2015) The Electricity Journal: Cybersecurity and the Smarter Grid CEDS Fact Sheets Cybersecurity Procurement...

  13. July 2014 Cybersecurity Awareness Campaign - Internet Safety...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    July 2014 Cybersecurity Awareness Campaign - Internet Safety July 2014 Cybersecurity Awareness Campaign - Internet Safety More Documents & Publications January 2015 Cybersecurity ...

  14. Quarterly Cybersecurity Awareness Campaigns and Toolkits | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Quarterly Cybersecurity Awareness Campaigns and Toolkits Quarterly Cybersecurity Awareness Campaigns and Toolkits The OCIO coordinates quarterly cybersecurity awareness campaigns ...

  15. January 2015 Cybersecurity Awareness Campaign - Phishing | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5 Cybersecurity Awareness Campaign - Phishing January 2015 Cybersecurity Awareness Campaign - Phishing More Documents & Publications July 2014 Cybersecurity Awareness Campaign - ...

  16. DOE Cybersecurity Awareness Program

    Broader source: Energy.gov [DOE]

    The OCIO supports a variety of cybersecurity awareness activities that impress upon DOE employees the importance of cybersecurity and the adverse consequences of its failure. The primary purpose of awareness activities is to enhance the 'general awareness and understanding' of current cyber threats and recommended mitigations as well as to cultivate a computing environment where cybersecurity behaviors and responses are automatic and consistent.

  17. Demythifying Cybersecurity

    SciTech Connect (OSTI)

    Talbot, Ed; Frincke, Deborah A.; Bishop, Matt

    2010-06-01

    Consider a face-to-face meeting of exactly five people in a closed and shielded room, hidden from view, with no other communications equipment present. With proper screening, participants can be reasonably sure that the conversation will only be available in real time to those in the room, that the words they hear are the ones spoken by their companions, and that everyone receives them at the same time. Now suppose this same meeting were held as an Internet video conference with the participants scattered over the globe. The attendees may have similar expectations, but meeting those expectations is considerably more difficult. For instance, the administrators of the systems that the participants are using could manipulate the flow of data to rebroadcast, or even change, what individual participants see and hear. In many cases, ISPs and other intermediate providers can do the same; at the least, they can interfere with the transmission. An external attacker who can break into the participants systems can do the same. And there may be no proof, or even indications, that the meeting was compromised. As cybersecurity professionals, we understand this - but does the population at large know what happens to their tweets once they leave their smart phones?

  18. Cybersecurity | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity Cybersecurity Addressing cybersecurity is critical to enhancing the security and reliability of the nation's electric grid. Ensuring a resilient electric grid is particularly important since it is arguably the most complex and critical infrastructure that other sectors depend upon to deliver essential services. Over the past two decades, the roles of electricity sector stakeholders have shifted: generation, transmission, and delivery functions have been separated into distinct

  19. Cybersecurity | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Addressing cybersecurity is critical to enhancing the security and reliability of the nation's electric grid. Ensuring a resilient electric grid is particularly important since it...

  20. Contacts for Cybersecurity | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity Contacts for Cybersecurity Office of the Associate CIO for Cybersecurity Office of the Chief Information Officer US Department of Energy 202-586-0166

  1. National Cybersecurity Awareness Month (NCSAM) Campaigns | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    National Cybersecurity Awareness Month (NCSAM) Campaigns National Cybersecurity Awareness Month (NCSAM) Campaigns HEISCFaceBookBanner2.jpg October is National Cybersecurity ...

  2. National Cybersecurity Awareness Month

    Office of Energy Efficiency and Renewable Energy (EERE)

    Every October, the Department of Energy joins the Department of Homeland Security (DHS) and others across the country in support of National Cybersecurity Awareness Month and the “Stop. Think. Connect.” campaign. This year marks the tenth year of the cybersecurity awareness campaign.

  3. Energy Sector Cybersecurity Framework Implementation Guidance

    Broader source: Energy.gov (indexed) [DOE]

    FOR PUBLIC COMMENT SEPTEMBER, 2014 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE Energy Sector Cybersecurity Framework Implementation Guidance Table of Contents...

  4. DOE Releases Electricity Subsector Cybersecurity Risk Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Releases Electricity Subsector Cybersecurity Risk Management Process (RMP) Guideline DOE Releases Electricity Subsector Cybersecurity Risk Management Process (RMP) Guideline May ...

  5. Sandia National Laboratories: Cybersecurity Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Facebook Twitter YouTube Flickr RSS Top Defense Systems About Defense Systems & Assessments Program Areas Accomplishments Cybersecurity Programs Cybersecurity Research Sandia is focused on building science and engineering foundations for cybersecurity. Research and development is focused on making today's systems more secure while planning for tomorrow's technology. Because of Sandia's unique set of capabilities, we focus our cybersecurity research in three areas: 1. Trusted hardware,

  6. Core Competency Worksheets for Significant Cybersecurity Roles | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Core Competency Worksheets for Significant Cybersecurity Roles Core Competency Worksheets for Significant Cybersecurity Roles shutterstock_1703802_jpg.jpg The OCIO has developed core competency worksheets that describe the minimum core competencies for each functional cyber role as documented in the DOE Essential Body of Knowledge (EBK). These worksheets can be used by any agency or private entity to assist in developing site or organization-specific, role-based training for cyber

  7. Cybersecurity Expert Jim Mellander Retiring from NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cybersecurity Expert Jim Mellander Retiring from NERSC From Detecting Sniffers to Protecting Credentials, He's Left His Mark in Cybersecurity October 22, 2014 Contact: Kathy ...

  8. Electricity Subsector Cybersecurity Capability Maturity Model...

    Office of Environmental Management (EM)

    and prioritize their actions and investments to improve cybersecurity, combines ... 2013 - Wednesday, June 5, 2013 Oil and Natural Gas Subsector Cybersecurity Capability ...

  9. Core Competency Worksheets for Significant Cybersecurity Roles...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Core Competency Worksheets for Significant Cybersecurity Roles Core Competency Worksheets for Significant Cybersecurity Roles shutterstock1703802jpg.jpg The OCIO has developed ...

  10. Energy Sector Cybersecurity Framework Implementation Guidance...

    Broader source: Energy.gov (indexed) [DOE]

    Department released guidance to help the energy sector establish or align existing cybersecurity risk management programs to meet the objectives of the Cybersecurity Framework...

  11. Electricity Subsector Cybersecurity Capability Maturity Model...

    Broader source: Energy.gov (indexed) [DOE]

    The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Version 1.1, which allows electric utilities and grid operators to assess their cybersecurity...

  12. Sandia Energy - Cybersecurity Technologies Research Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cybersecurity Technologies Research Laboratory Home Cyber Permalink Gallery Sandia Builds Android-Based Network to Study Cyber Disruptions Cyber, Cybersecurity Technologies...

  13. Cybersecurity Capability Maturity Model - Frequently Asked Questions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Cybersecurity Capability Maturity Model (C2M2) program is intended to aid organizations of all types evaluate and make improvements to their cybersecurity programs. The model ...

  14. Cybersecurity Capability Maturity Model - Facilitator Guide ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Cybersecurity Capability Maturity Model (C2M2) program is intended to aid organizations of all types evaluate and make improvements to their cybersecurity programs. The model ...

  15. Cybersecurity Awareness Materials | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity Awareness Materials Cybersecurity Awareness Materials Open book on top of an open computer. Open book on top of an open computer. The OCIO develops and distributes a ...

  16. National Cybersecurity Awareness Month | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    October 1, 2014 - 8:44am Addthis National Cybersecurity Awareness Month The White House has designated October as National Cybersecurity Awareness Month (NCSAM) in which the ...

  17. Cybersecurity and the Smarter Grid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity and the Smarter Grid Reliability remains a fundamental principle of grid modernization efforts, but in today's world, reliability requires cybersecurity. This article discusses energy sector partnerships that are designing cybersecurity into the smart grid with the vision of surviving a cyber-incident while sustaining critical energy delivery functions. Carol Hawk and Akhlesh Kaushiva I. The Power Grid: Beyond Smart The power grid is already smart, if ''smart'' can describe an

  18. Energy Delivery Systems Cybersecurity | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity » Energy Delivery Systems Cybersecurity Energy Delivery Systems Cybersecurity About the Cybersecurity for Energy Delivery Systems Program A key mission of the Department of Energy's (DOE) Office of Electricity Delivery and Energy Reliability (OE) is to enhance the reliability and resilience of the nation's energy infrastructure. Cybersecurity of energy delivery systems is critical for protecting the energy infrastructure and the integral function that it serves in our lives. OE

  19. Energy Sector Cybersecurity Framework Implementation Guidance | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Cybersecurity Framework Implementation Guidance Energy Sector Cybersecurity Framework Implementation Guidance On January 8, 2015, the Energy Department released guidance to help the energy sector establish or align existing cybersecurity risk management programs to meet the objectives of the Cybersecurity Framework released by the National Institutes of Standards and Technology (NIST) in February 2014. The voluntary Cybersecurity Framework consists of standards, guidelines, and

  20. Presentation: Cybersecurity @ the National Laboratories

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Secretary of Energy Advisory Board received an briefing on Cybersecurity @ the National Laboratories. The presentation was given by Wayne Austad, Director of Idaho National Laboratory's CYBERCORE Integration Center, on June 14, 2016.

  1. Sandia National Laboratories: Careers: Cybersecurity

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cybersecurity Linux computer photo Sandia provides technical leadership in threat-informed cybersecurity solutions that are required for the nation's most critical systems. Protecting the cyber realm has become a critical part of national security. Our government, military, and economic systems all depend on a secure electronic information infrastructure. Sandia is developing new technologies to counter cyber threats. We focus on securing hardware, software, and systems; analyzing networks and

  2. CSAT Role-Based/Core Competency Training Program | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CSAT Role-Based/Core Competency Training Program CSAT Role-Based/Core Competency Training Program empty-314554_960_720.jpg The DOE OCIO has developed role-based/core competency training modules to support DOE Cybersecurity staff and other employees charged with protecting DOE information assets. The courses listed below are available at the OnlineTraining Center (OLC) and are free of charge for all DOE Federal employees and contractors with current DOE OLC accounts. For OLC access questions,

  3. OPM Cybersecurity Breach Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OPM Cybersecurity Breach Information OPM Cybersecurity Breach Information The U.S. Office of Personnel Management (OPM) recently became aware of cybersecurity incidents affecting its systems and data that may have exposed the personal information of current and former Federal employees, contractors and others. OPM has specifically identified two separate, but related cybersecurity incidents. The first incident, announced June 4, 2015, involved the compromise of personnel records of 4.2 million

  4. Energy Delivery Systems Cybersecurity | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Delivery Systems Cybersecurity About the Cybersecurity for Energy Delivery Systems Program A key mission of the Department of Energy's (DOE) Office of Electricity Delivery and Energy Reliability (OE) is to enhance the reliability and resilience of the nation's energy infrastructure. Cybersecurity of energy delivery systems is critical for protecting the energy infrastructure and the integral function that it serves in our lives. OE designed the Cybersecurity for Energy Delivery Systems

  5. Cybersecurity Capability Maturity Model - Frequently Asked Questions

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (February 2014) | Department of Energy - Frequently Asked Questions (February 2014) Cybersecurity Capability Maturity Model - Frequently Asked Questions (February 2014) The Cybersecurity Capability Maturity Model (C2M2) program is intended to aid organizations of all types evaluate and make improvements to their cybersecurity programs. The model focuses on the implementation and management of cybersecurity practices associated with the information technology (IT) and operational technology

  6. Cybersecurity Related News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    News Cybersecurity Related News October 6, 2014 New Article on Cybersecurity Discusses DOE's Partnership with the Energy Sector to Keep the Grid Reliable and Secure An article by OE's Carol Hawk and Akhlesh Kaushiva in The Electricity Journal discusses cybersecurity for the power grid and how DOE and the energy sector are partnering to keep the smart grid reliable and secure. April 28, 2014 Energy Department Releases New Guidance for Strengthening Cybersecurity of the Grid's Supply Chain

  7. Newly Developed IT Asset Tools Enhance Cybersecurity Innovation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Newly Developed IT Asset Tools Enhance Cybersecurity Innovation Newly Developed IT Asset Tools Enhance Cybersecurity Innovation November 25, 2014 - 3:00pm Addthis The Office of the...

  8. EY and LANL make new cybersecurity tools available to private...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    EY, LANL make new cybersecurity tools available to private sector EY, LANL make new cybersecurity tools available to private sector Ernst & Young LLP and Los Alamos National ...

  9. New Draft of Cybersecurity Risk Management Process (RMP) Guideline...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Draft of Cybersecurity Risk Management Process (RMP) Guideline Now Available for Public Comment (March 2012) New Draft of Cybersecurity Risk Management Process (RMP) Guideline Now ...

  10. Santa Fe New Mexican: For cybersecurity, in quantum encryption...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    For cybersecurity, in quantum encryption we trust Santa Fe New Mexican: For cybersecurity, in quantum encryption we trust Los Alamos physicists developed a quantum random number...

  11. Cybersecurity Program Manager (CSPM) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program Manager (CSPM) Cybersecurity Program Manager (CSPM) keyboard-70506__180.jpg The CSPM is either a Senior DOE Manager or a Federal employee appointed by the Senior Manager to serve as his/her representative on all cybersecurity issues. The CSPM is responsible for overseeing the implementation of the cybersecurity program within the Senior Manager's organization to include developing, disseminating, and maintaining the organizational Risk Management Implementation Plan (RMIP). CSPM Core

  12. Cybersecurity and Resilience | Energy Systems Integration | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cybersecurity and Resilience Securing the grid from cyberattacks is more complex than ... That's why NREL established the Cyber-Physical Systems Security and Resilience R&D Center. ...

  13. Energy Delivery Systems Cybersecurity | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The CEDS program emphasizes collaboration among the government, industry, universities, national laboratories, and end users to advance research and development in cybersecurity...

  14. Roadmap to Achieve Energy Delivery Systems Cybersecurity

    Broader source: Energy.gov (indexed) [DOE]

    Roadmap to Achieve Energy Delivery Systems Cybersecurity ii Acknowledgements The Energy Sector Control Systems Working Group (ESCSWG) developed this roadmap in support of the ...

  15. Energy Sector Cybersecurity Framework Implementation Guidance

    Broader source: Energy.gov (indexed) [DOE]

    JANUARY 2015 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector ...

  16. Draft Energy Sector Cybersecurity Framework Implementation Guidance...

    Broader source: Energy.gov (indexed) [DOE]

    in the Federal Register, inviting the public to comment on DOE's Energy Sector Cybersecurity Framework Implementation Guidance. Comments must be received on or before October...

  17. Energy Sector Cybersecurity Framework Implementation Guidance...

    Broader source: Energy.gov (indexed) [DOE]

    invites public comment on a draft of the Energy Sector Cybersecurity Framework Implementation Guidance. Comments must be received on or before October 14, 2014. The draft document...

  18. Notice of Publication of Electricity Subsector Cybersecurity...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Publication of Electricity Subsector Cybersecurity Risk Management Process: Federal Register Notice Volume 77, No. 100 - May 23, 2012 Notice of Publication of Electricity Subsector...

  19. Energy Sector Cybersecurity Framework Implementation Guidance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    In February 2014, the National Institute of Standards and Technology (NIST) released a Cybersecurity Framework. DOE has collaborated with private sector stakeholders through the ...

  20. Cybersecurity Flyers/Pamphlets | Department of Energy

    Office of Environmental Management (EM)

    These materials are available for download to DOE organizations, and public and private institutions. Cybersecurity Awareness Resource Listing (152.9 KB) Password Security - Think ...

  1. Cybersecurity Awareness Electronic Messaging | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Electronic Messaging Cybersecurity Awareness Electronic Messaging The OCIO CSAT team ... or public and private institutions to enhance site-specific awareness programs. ...

  2. cybersecurity | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    cybersecurity NNSA's Defense Nuclear Nonproliferation leaders gather in nation's capital Recently, the NNSA held the fourth meeting of the Office of Defense Nuclear Nonproliferation Science Council in Washington, DC. The Science Council provides a way for senior-level leadership from NNSA headquarters and the labs, plants, and sites to share information and discuss strategies to... NNSA lab stops bad guys from weaseling into critical infrastructure Weasels are adaptable, active predators known

  3. Energy Sector Cybersecurity Framework Implementation Guidance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    JANUARY 2015 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector Cybersecurity Framework Implementation Guidance │ Table of Contents TABLE OF CONTENTS 1. Introduction .............................................................................................................................................. 1 2. Preparing for Framework Implementation

  4. Sandia National Laboratories: Careers: Cybersecurity Research Careers

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Careers Cybersecurity Research Careers Cybersecurity Research Addressing sophisticated cyber threats demands a multidisciplinary team with a unique mindset. Sandia provides challenging career opportunities for those with a passion to tackle the complexities of protecting critical systems Critical infrastructure, military systems, and other strategically important national security systems are becoming increasingly dependent on vulnerable networked computer systems. Protecting these systems

  5. Quarterly Cybersecurity Awareness Campaigns and Toolkits

    Broader source: Energy.gov [DOE]

    The OCIO coordinates a variety of internal cybersecurity awareness campaigns to provide DOE employees with timely information on current cyber threats, recommended mitigations, and sound practices. The OCIO also develops and distributes cyber awareness information and resources to enhance employees' general knowledge of cybersecurity practices, policies, and terms.

  6. National Electric Sector Cybersecurity Organization Resource (NESCOR)

    SciTech Connect (OSTI)

    None, None

    2014-06-30

    The goal of the National Electric Sector Cybersecurity Organization Resource (NESCOR) project was to address cyber security issues for the electric sector, particularly in the near and mid-term. The following table identifies the strategies from the DOE Roadmap to Achieve Energy Delivery Systems Cybersecurity published in September 2011 that are applicable to the NESCOR project.

  7. Electricity Subsector Cybersecurity Capability Maturity Model v. 1.1.

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (February 2014) | Department of Energy Subsector Cybersecurity Capability Maturity Model v. 1.1. (February 2014) Electricity Subsector Cybersecurity Capability Maturity Model v. 1.1. (February 2014) The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Version 1.1, which allows electric utilities and grid operators to assess their cybersecurity capabilities and prioritize their actions and investments to improve cybersecurity, combines elements from existing

  8. Electricity Subsector Cybersecurity Capability Maturity Model v. 1.1.

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (February 2014) | Department of Energy Subsector Cybersecurity Capability Maturity Model v. 1.1. (February 2014) Electricity Subsector Cybersecurity Capability Maturity Model v. 1.1. (February 2014) The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Version 1.1, which allows electric utilities and grid operators to assess their cybersecurity capabilities and prioritize their actions and investments to improve cybersecurity, combines elements from existing

  9. NARUC Releases Cybersecurity Primer for Utility Regulators (June 2012) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy NARUC Releases Cybersecurity Primer for Utility Regulators (June 2012) NARUC Releases Cybersecurity Primer for Utility Regulators (June 2012) June 14, 2012 - 4:50pm Addthis The National Association of Regulatory Utility Commissioners (NARUC) has released "Cybersecurity for State Regulators," a primer that explains conceptual cybersecurity basics and points to additional resources that can help regulators develop internal cybersecurity expertise, ask questions

  10. Cybersecurity Is Every Citizen's Responsibility | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity Is Every Citizen's Responsibility Cybersecurity Is Every Citizen's Responsibility October 30, 2013 - 3:06pm Addthis Cybersecurity Is Every Citizen's Responsibility Daniel B. Poneman Daniel B. Poneman Former Deputy Secretary of Energy What are the key facts? October is National Cybersecurity Awareness Month. Learn simple steps you can take to increase your cybersecurity at work and at home. To learn more, join the Cyber Innovation Technology Summit, livestreaming on energy.gov/live

  11. CYBERSECURITY AND USER ACCOUNTABILITY IN THE C-AD CONTROL SYSTEM

    SciTech Connect (OSTI)

    MORRIS,J.T.; BINELLO, S.; D OTTAVIO, T.; KATZ, R.A.

    2007-10-15

    A heightened awareness of cybersecurity has led to a review of the procedures that ensure user accountability for actions performed on the computers of the Collider-Accelerator Department (C-AD) Control System. Control system consoles are shared by multiple users in control rooms throughout the C-AD complex. A significant challenge has been the establishment of procedures that securely control and monitor access to these shared consoles without impeding accelerator operations. This paper provides an overview of C-AD cybersecurity strategies with an emphasis on recent enhancements in user authentication and tracking methods.

  12. National Electric Sector Cybersecurity Organization Resource...

    Office of Scientific and Technical Information (OSTI)

    in the near and mid-term. The following table identifies the strategies from the DOE Roadmap to Achieve Energy Delivery Systems Cybersecurity published in September 2011 that are...

  13. Cybersecurity: What you need to know

    SciTech Connect (OSTI)

    Mark Graff

    2009-10-14

    In the first part of a three part video series with Mark Graff, LLNL's Chief Cybersecurity Strategist, he describes how your computer is threatened whenever you receive email, or use your browser to log onto the Internet.

  14. Cybersecurity: What you need to know

    ScienceCinema (OSTI)

    Mark Graff

    2010-09-01

    In the first part of a three part video series with Mark Graff, LLNL's Chief Cybersecurity Strategist, he describes how your computer is threatened whenever you receive email, or use your browser to log onto the Internet.

  15. ELECTRICITY SUBSECTOR CYBERSECURITY RISK MANAGEMENT PROCESS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CYBERSECURITY RISK MANAGEMENT PROCESS U.S. Department of Energy May 2012 DOE/OE-0003 Acknowledgments This electricity subsector cybersecurity Risk Management Process (RMP) guideline was developed by the Department of Energy (DOE), in collaboration with the National Institute of Standards and Technology (NIST) and the North American Electric Reliability Corporation (NERC). Members of industry and utility-specific trade groups were included in authoring this guidance designed to be meaningful and

  16. Cybersecurity Procurement Language for Energy Delivery Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity Procurement Language for Energy Delivery Systems April 2014 Energy Sector Control Systems Working Group (ESCSWG) i For Questions or Comments Energy sector asset owners, operators, and suppliers are encouraged to provide feedback on this document to enhance the cybersecurity procurement language for future versions. Please send questions or comments to es-pl@energetics.com. Acknowledgements This document was prepared by the Energy Sector Control Systems Working Group (ESCSWG),

  17. Cybersecurity Related Blogs | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Blogs Cybersecurity Related Blogs June 7, 2016 As the electric grid becomes smarter, it also becomes more vulnerable to hackers. | Creative Commons. To Protect the Grid from Hackers, You Need to Break It With a growing risk of cyber attacks from hackers, researchers at the National Renewable Energy Laboratory built a test bed to experiment with cybersecurity tools for the nation's electric grid. November 3, 2015 Power lines like these make up our nation's power grid -- a critical component of

  18. National Cybersecurity Awareness Month (NCSAM) Campaigns

    Broader source: Energy.gov [DOE]

    Each year the OCIO recognizes October as National Cybersecurity Awareness Month or NCSAM. This awareness event is a collaborative effort with the Department of Homeland Security and other federal, state, and local government agencies to raise awareness about current cybersecurity threats and mitigation strategies, as well as Departmental cyber initiatives. The primary goal of NCSAM is to provide the general user with the knowledge and resources needed to stay safer and more secure online.

  19. CYBERSECURITY CAPABILITY MATURITY MODEL (C2M2)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CYBERSECURITY CAPABILITY MATURITY MODEL (C2M2) Version 1.1 February 2014 Cybersecurity Capability Maturity Model Version 1.1 i TABLE OF CONTENTS Acknowledgments ........................................................................................................................................ iii 1. Introduction .............................................................................................................................................. 1 1.1 Intended Audience

  20. Oil and Natural Gas Subsector Cybersecurity Capability Maturity...

    Office of Environmental Management (EM)

    Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) Oil and Natural ...

  1. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Software Engineering Institute Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Software Engineering Institute National lab researchers, industry ...

  2. January 2014 Cybersecurity Awareness Campaign - Secure Online Shopping |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 4 Cybersecurity Awareness Campaign - Secure Online Shopping January 2014 Cybersecurity Awareness Campaign - Secure Online Shopping The January 2014 Cybersecurity Awareness Campaign featured issues surrounding secure online shopping. For more information on privacy issues, contact Jerry Hanley at Jerry.Hanley@hq.doe.gov. For information on Supply Chain Risk Management, contact Sue Farrand at Susan.Farrand@hq.doe.gov. Cybersecurity Front Burner Issue 15 (275.24 KB) 2014

  3. Cybersecurity and the Smarter Grid (October 2014) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cybersecurity and the Smarter Grid (October 2014) Cybersecurity and the Smarter Grid (October 2014) An article by OE's Carol Hawk and Akhlesh Kaushiva in The Electricity Journal discusses cybersecurity for the power grid and how DOE and the energy sector are partnering to keep the smart grid reliable and secure. The article also presents insights of four Smart Grid Investment Grant (SGIG) recipients that are advancing state of the art of power grid security by designing cybersecurity into the

  4. Cybersecurity Capability Maturity Model - Facilitator Guide (February 2014)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy - Facilitator Guide (February 2014) Cybersecurity Capability Maturity Model - Facilitator Guide (February 2014) The Cybersecurity Capability Maturity Model (C2M2) program is intended to aid organizations of all types evaluate and make improvements to their cybersecurity programs. The model focuses on the implementation and management of cybersecurity practices associated with the information technology (IT) and operational technology (OT) assets and the environments in

  5. Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (ONG-C2M2) | Department of Energy Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) The Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) was established as a result of the Administration's efforts to improve electricity subsector cybersecurity capabilities, and to

  6. Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) was established as a result of the Administration's efforts to improve electricity subsector cybersecurity capabilities, and to understand the cybersecurity posture of the energy

  7. Smart Grid Cybersecurity: Job Performance Model Report

    SciTech Connect (OSTI)

    O'Neil, Lori Ross; Assante, Michael; Tobey, David

    2012-08-01

    This is the project report to DOE OE-30 for the completion of Phase 1 of a 3 phase report. This report outlines the work done to develop a smart grid cybersecurity certification. This work is being done with the subcontractor NBISE.

  8. Energy Department Releases Guidance for Implementation of Cybersecurity Framework

    Broader source: Energy.gov [DOE]

    The Energy Department today released guidance to help the energy sector establish or align existing cybersecurity risk management programs to meet the objectives of the Cybersecurity Framework released by the National Institutes of Standards and Technology (NIST) in February 2014. The voluntary Cybersecurity Framework consists of standards, guidelines, and practices to promote the protection of critical infrastructure and was developed in response to Executive Order 13636 “Improving Critical Infrastructure Cybersecurity” through collaboration between industry and government.

  9. The Department of Energy Launches Cybersecurity Initiative | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Launches Cybersecurity Initiative The Department of Energy Launches Cybersecurity Initiative February 1, 2011 - 12:00pm Addthis Collaborative effort will develop a risk management process guideline WASHINGTON, DC - The Department of Energy is launching an initiative to enhance cybersecurity on the electric grid. The initiative, led by the Department's Office of Electricity Delivery and Energy Reliability (OE), the National Institute of Standards and Technology, and the North American

  10. PNNL Moves Cybersecurity Software and a Novel Disinfecting System Beyond

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Lab | Department of Energy PNNL Moves Cybersecurity Software and a Novel Disinfecting System Beyond the Lab PNNL Moves Cybersecurity Software and a Novel Disinfecting System Beyond the Lab January 28, 2016 - 11:42am Addthis Original content from Pacific Northwest National Laboratory Eric Francavilla, PNNL: (509) 372-4066 Frances White, PNNL: (509) 375-6904 RICHLAND, Wash. - Software that helps cybersecurity analysts prevent hacks and a microbial disinfecting system that kills with an

  11. Cybersecurity for Energy Delivery Systems (CEDS) Fact Sheets | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy (CEDS) Fact Sheets Cybersecurity for Energy Delivery Systems (CEDS) Fact Sheets A key mission of the Department of Energy's (DOE) Office of Electricity Delivery and Energy Reliability (OE) is to enhance the reliability and resilience of the nation's energy infrastructure. Cybersecurity of energy delivery systems is critical for protecting the energy infrastructure and the integral function that it serves in our lives. OE's Cybersecurity for Energy Delivery Systems (CEDS) program

  12. DOE Releases Electricity Subsector Cybersecurity Risk Management Process

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (RMP) Guideline | Department of Energy Electricity Subsector Cybersecurity Risk Management Process (RMP) Guideline DOE Releases Electricity Subsector Cybersecurity Risk Management Process (RMP) Guideline May 23, 2012 - 9:30am Addthis News Media Contact: (202) 586-4940 For Immediate Release: May 23, 2012 Department of Energy Releases Electricity Subsector Cybersecurity Risk Management Process (RMP) Guideline Public-Private Sector Collaboration Produces Guidance to Help Electric Utilities

  13. Working to Achieve Cybersecurity in the Energy Sector

    Broader source: Energy.gov [DOE]

    Presentation covers cybersecurity in the energy sector and is given at the Spring 2011 Federal Utility Partnership Working Group (FUPWG) meeting.

  14. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PracticesStandards Development Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Best PracticesStandards Development National lab researchers, industry ...

  15. Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (February 2014) | Department of Energy Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (February 2014) Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (February 2014) The Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) is a derivative of the Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Version 1.1. The ES-C2M2 was developed in support of a White House initiative led by the Department of

  16. Q&A: Cybersecurity Issues and Requirements, December 11, 2009

    Broader source: Energy.gov [DOE]

    Questions and Answers related to the presentation on issues and requirements for cybersecurity plans for Smart Grid Investment Grants for the American Recovery and Reinvestment Act

  17. The Department of Energy Releases Draft of Cybersecurity Risk...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Department of Energy Releases Draft of Cybersecurity Risk Management Process (RMP) Guideline for Public Comment (September 2011) The Department of Energy Releases Draft of ...

  18. AUDIT REPORT Cybersecurity Controls Over a Major National Nuclear...

    Broader source: Energy.gov (indexed) [DOE]

    FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report: "Cybersecurity Controls Over a Major National Nuclear Security Administration Information System"...

  19. Three questions with: Ames Laboratory cybersecurity manager and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    questions with: Ames Laboratory cybersecurity manager and researcher Chris Strasburg Chris Strasburg is a systems analyst at the U.S. Department of Energy's Ames Laboratory and a...

  20. Cybersecurity Information Awareness Day Survival Guide and Checklist

    Broader source: Energy.gov [DOE]

    The Cybersecurity Information Awareness Day Survival Guide and Checklist was developed as a resource to assist organizations with planning and coordinating a cyber awareness event or campaign.

  1. Newly Developed IT Asset Tools Enhance Cybersecurity Innovation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Office of the Chief Information Officer (OCIO) has leveraged its own IT Asset Management (ITAM) data to further enhance Department of Energy (DOE) cybersecurity awareness and ...

  2. Three Questions With: Ames Laboratory Cybersecurity Manager and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nutrition Marketing Cancer Dermatology U.S. Politics U.S. Elections News Earthquakes Guns and Violence Ebola Influenza Cybersecurity U.S. National Security International Law...

  3. Roadmap to Achieve Energy Delivery Systems Cybersecurity

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roadmap to Achieve Energy Delivery Systems Cybersecurity ii Acknowledgements The Energy Sector Control Systems Working Group (ESCSWG) developed this roadmap in support of the Electricity Sub-sector Coordinating Council, Oil and Natural Gas Sector Coordinating Council, and the Government Coordinating Council for Energy under the Critical Infrastructure Partnership Advisory Council (CIPAC) Framework; the roadmap has been approved for release by these councils. The ESCSWG members volunteered their

  4. Energy Department Develops Tool with Industry to Help Utilities Strengthen Their Cybersecurity Capabilities

    Broader source: Energy.gov [DOE]

    New Tool Available to Enable Electric Utilities to Better Assess their Cybersecurity Needs and Assets

  5. Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes that may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  6. Cybersecurity Capability Maturity Model (C2M2) Program | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Program Cybersecurity Capability Maturity Model (C2M2) Program Cybersecurity Capability Maturity Model (C2M2) Program The Cybersecurity Capability Maturity Model (C2M2) program is a public-private partnership effort that was established as a result of the Administration's efforts to improve electricity subsector cybersecurity capabilities, and to understand the cybersecurity posture of the grid. The C2M2 helps organizations-regardless of size, type, or industry-evaluate, prioritize,

  7. "Cybersecurity for State Regulators" - NARUC Primer (June 2012) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy "Cybersecurity for State Regulators" - NARUC Primer (June 2012) "Cybersecurity for State Regulators" - NARUC Primer (June 2012) The National Association of Regulatory Utility Commissioners (NARUC) released "Cybersecurity for State Regulators," a primer that explains conceptual cybersecurity basics and points to additional resources that can help regulators develop internal cybersecurity expertise, ask questions of their utilities, engage in

  8. Cybersecurity Capability Maturity Model (February 2014) | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy (February 2014) Cybersecurity Capability Maturity Model (February 2014) The Cybersecurity Capability Maturity Model (C2M2) was derived from the Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Version 1.1 by removing sector-specific references and terminology. The ES-C2M2 was developed in support of a White House initiative led by the Department of Energy (DOE), in partnership with the Department of Homeland Security (DHS), and in collaboration with private- and

  9. New Article on Cybersecurity Discusses DOE's Partnership with...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    October 6, 2014 - 1:57pm Addthis A new article by OE's Carol Hawk and Akhlesh Kaushiva in The Electricity Journal discusses cybersecurity for the power grid and how DOE and the ...

  10. Oil and Natural Gas Subsector Cybersecurity Capability Maturity...

    Broader source: Energy.gov (indexed) [DOE]

    The Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) is a ... Oil and Natural Gas Subsector C2M2 v1.1 (February 2014) (1.82 MB) More Documents & ...

  11. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Web Policies Accessibility Accessibility LANL places a high degree of emphasis on user ... Contact Web Team Email Reaching the broadest possible audience Los Alamos National ...

  12. Energy Department Releases New Guidance for Strengthening Cybersecurity of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Grid's Supply Chain | Department of Energy Guidance for Strengthening Cybersecurity of the Grid's Supply Chain Energy Department Releases New Guidance for Strengthening Cybersecurity of the Grid's Supply Chain April 28, 2014 - 11:51am Addthis News Media Contact (202) 586-4940 WASHINGTON - As part of the Obama Administration's commitment to a strong and secure power grid, the Energy Department today released new guidance to help U.S. industry strengthen energy delivery system

  13. NNSA Hosts Cybersecurity Consortium Members Following White House

    National Nuclear Security Administration (NNSA)

    Announcement of $25 Million in Grants to 13 HBCUs | National Nuclear Security Administration | (NNSA) Hosts Cybersecurity Consortium Members Following White House Announcement of $25 Million in Grants to 13 HBCUs Friday, January 16, 2015 - 12:42pm The Department of Energy's National Nuclear Security Administration (DOE/NNSA) hosted a roundtable today with 13 Historically Black Colleges and Universities (HBCUs) to discuss new funding that will strengthen American cybersecurity expertise. A

  14. NNSA Hosts Cybersecurity Consortium Members Following White House

    National Nuclear Security Administration (NNSA)

    Announcement of $25 Million in Grants to 13 HBCUs | National Nuclear Security Administration | (NNSA) NNSA Hosts Cybersecurity Consortium Members Following White House Announcement of $25 Million in Grants to 13 HBCUs January 16, 2015 WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) hosted a roundtable today with 13 Historically Black Colleges and Universities (HBCUs) to discuss new funding that will strengthen American cybersecurity

  15. Cybersecurity for Energy Delivery Systems (CEDS) Research Call | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Cybersecurity for Energy Delivery Systems (CEDS) Research Call Cybersecurity for Energy Delivery Systems (CEDS) Research Call April 15, 2014 - 10:15am Addthis The Department of Energy's (DOE) National Energy Technology Laboratory (NETL), on behalf of the Office of Electricity Delivery and Energy Reliability (OE), is seeking applications to conduct research, development and demonstrations leading to next generation tools and technologies that will become widely adopted to enhance

  16. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Best Practice Design/Configuration | Department of Energy Practice Design/Configuration Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Best Practice Design/Configuration National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance

  17. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Best Practices/Standards Development | Department of Energy Practices/Standards Development Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Best Practices/Standards Development National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to

  18. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Communications | Department of Energy Secure Communications Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Secure Communications National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the security and reliability of

  19. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Software Engineering Institute | Department of Energy Software Engineering Institute Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Software Engineering Institute National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the

  20. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) | Department of Energy Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to

  1. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Visualization and Modeling | Department of Energy Visualization and Modeling Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations - Visualization and Modeling National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the security and

  2. Cybersecurity Risk Management Process (RMP) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (RMP) Cybersecurity Risk Management Process (RMP) The electricity subsector cybersecurity Risk Management Process (RMP) guideline was developed by the Department of Energy (DOE), in collaboration with the National Institute of Standards and Technology (NIST) and the North American Electric Reliability Corporation (NERC). Members of industry and utility-specific trade groups were included in authoring this guidance designed to be meaningful and tailored for the electricity subsector. The NIST

  3. Cybersecurity Risk Management Process (RMP) Guideline - Final (May 2012) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Risk Management Process (RMP) Guideline - Final (May 2012) Cybersecurity Risk Management Process (RMP) Guideline - Final (May 2012) This electricity subsector cybersecurity Risk Management Process (RMP) guideline was developed by the Department of Energy, in collaboration with the National Institute of Standards and Technology (NIST) and the North American Electric Reliability Corporation (NERC). The RMP is written with the goal of enabling organizations- regardless of

  4. Cybersecurity for Energy Delivery Systems 2010 Peer Review | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 2010 Peer Review Cybersecurity for Energy Delivery Systems 2010 Peer Review National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day public peer review to examine more than 30 DOE-supported or cost-shared projects designed to enhance the security and reliability of the nation's energy delivery infrastructure. Industry experts from the Energy

  5. UVI Cyber-security Workshop Workshop Analysis.

    SciTech Connect (OSTI)

    Kuykendall, Tommie G.; Allsop, Jacob Lee; Anderson, Benjamin Robert; Boumedine, Marc; Carter, Cedric; Galvin, Seanmichael Yurko; Gonzalez, Oscar; Lee, Wellington K.; Lin, Han Wei; Morris, Tyler Jake; Nauer, Kevin S.; Potts, Beth A.; Ta, Kim Thanh; Trasti, Jennifer; White, David R.

    2015-07-08

    The cybersecurity consortium, which was established by DOE/NNSA’s Minority Serving Institutions Partnerships Program (MSIPP), allows students from any of the partner schools (13 HBCUs, two national laboratories, and a public school district) to have all consortia options available to them, to create career paths and to open doors to DOE sites and facilities to student members of the consortium. As a part of this year consortium activities, Sandia National Laboratories and the University of Virgin Islands conducted a week long cyber workshop that consisted of three courses; Digital Forensics and Malware Analysis, Python Programming, and ThunderBird Cup. These courses are designed to enhance cyber defense skills and promote learning within STEM related fields.

  6. Energy Department Broadens Public-Private Initiative to Help More Organizations Strengthen Their Cybersecurity Capabilities

    Broader source: Energy.gov [DOE]

    The Department of Energy announces new versions of the Cybersecurity Capability Maturity Model (C2M2), which help organizations assess their own cybersecurity capabilities and identify steps to help strengthen their defenses.

  7. Energy Sector Cybersecurity Framework Implementation Guidance- Draft for Public Comment & Comment Submission Form (September 2014)

    Office of Energy Efficiency and Renewable Energy (EERE)

    On September 12, 2014, the Department issued a Federal Register Notice announcing the availability of the Energy Sector Cybersecurity Framework Implementation Guidance for public comment. The draft Energy Sector Cybersecurity Framework Implementation Guidance and comment submission form are available.

  8. Department of Energy Releases New Roadmap to Guide Public-Private Cybersecurity Initiatives

    Broader source: Energy.gov [DOE]

    New Roadmap Outlines Strategy for Improving Energy Sector Cybersecurity; Latest Protective Measures Aim to Reduce Risk, Protect Consumers and Businesses

  9. The Department of Energy Releases Draft of Cybersecurity Risk Management Process (RMP) Guideline for Public Comment

    Broader source: Energy.gov [DOE]

    Public-Private Sector Collaboration Produces Guidance to Help Electric UtilitiesBetter Understand and Assess Cybersecurity Risk

  10. Science on the Hill: For cybersecurity, in quantum encryption we trust

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5 » For cybersecurity, in quantum encryption we trust For cybersecurity, in quantum encryption we trust Los Alamos physicists developed a quantum random number generator and communication system that exploits quantum physics to improve cybersecurity. September 13, 2015 Los Alamos physicists developed a quantum random number generator and a quantum communication system, both of which exploit the weird and immutable laws of quantum physics to improve cybersecurity. Los Alamos National Laboratory,

  11. Cybersecurity and Emerging Threats Research and Development (CET R&D) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Mission » Cybersecurity and Emerging Threats Research and Development (CET R&D) Cybersecurity and Emerging Threats Research and Development (CET R&D) cybersecurity r&d resize.jpg The Cybersecurity and Emerging Threats Research and Development (CET R&D) Division advances the research and development of innovative technologies, tools, and techniques to reduce risks to the Nation's critical energy infrastructure posed by cyber and other emerging

  12. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is committed to providing access to our Web pages for individuals with disabilities. To meet this commitment, this site is built to comply with the requirements of...

  13. Alliance Project: Cyber-Physical Security Unified Access Solution

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Alliance Project: Cyber-Physical Security Unified Access Solution Unified cyber-physical security to protect energy sector control systems and facilities Background The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards require utility operators to control, monitor, and record physical access to cybersecurity assets and establish physical security perimeters (PSPs). Many operators engage security contractors to provide access controls,

  14. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  15. Defining and Computing a Value Based Cyber-Security Measure

    SciTech Connect (OSTI)

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  16. Chief Information Officer Talks Savannah River Site Cybersecurity with Army

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    School | Department of Energy Chief Information Officer Talks Savannah River Site Cybersecurity with Army School Chief Information Officer Talks Savannah River Site Cybersecurity with Army School April 15, 2016 - 12:35pm Addthis Lewann Belton, left, director of the Cyber and Information Technology Division at DOE’s Savannah River Operations Office, visits the headquarters of the U.S. Army Cyber School at Fort Gordon, Ga. He was greeted by the school’s staff, from left, Todd

  17. EY and LANL make new cybersecurity tools available to private sector

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    EY, LANL make new cybersecurity tools available to private sector EY, LANL make new cybersecurity tools available to private sector Ernst & Young LLP and Los Alamos National Laboratory have formed a strategic alliance to deliver some of the most advanced behavioral cybersecurity tools available to the commercial market. August 25, 2015 Los Alamos National Laboratory, Los Alamos, NM Los Alamos National Laboratory, Los Alamos, NM Contact Los Alamos National Laboratory Nancy Ambrosiano

  18. Cybersecurity Capability Maturity Model (C2M2) | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program » Cybersecurity Capability Maturity Model (C2M2) Cybersecurity Capability Maturity Model (C2M2) Cybersecurity Capability Maturity Model (C2M2) The C2M2 model, which is designed to be used by any organization to enhance its own cybersecurity capabilities, is publicly available and can be downloaded now. More information is available in the FAQs. For those organizations performing self-assessments, please refer to the C2M2 Facilitators Guide and request a free C2M2 toolkit. The

  19. ELECTRICITY SUBSECTOR CYBERSECURITY CAPABILITY MATURITY MODEL...

    Broader source: Energy.gov (indexed) [DOE]

    ... Credentials are issued for personnel and other entities that require access to assets ... Credentials are periodically reviewed to ensure that they are associated with the correct ...

  20. Cybersecurity Awareness Marketing/Promotional Material | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Marketing/Promotional Material Cybersecurity Awareness Marketing/Promotional Material The OCIO has developed a variety of cyber awareness marketing and promotional materials available for download to DOE organizations, and public and private institutions. 2013 NCSAM Announcement (94.49 KB) Supply Chain Risk Management Awareness (50.09 KB) A Case of Mistaken Identity Communication (148.91 KB) 2012 NCSAM Postcards (152.1 KB) A Case of Mistaken Identity Word Search (182.8 KB) 2012 NCSAM

  1. Cybersecurity Procurement Language for Energy Delivery (April 2014) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Procurement Language for Energy Delivery (April 2014) Cybersecurity Procurement Language for Energy Delivery (April 2014) Energy delivery systems, which are used to monitor and control the production, transfer, and distribution of energy, are critical to the effective and reliable operation of North America's energy infrastructure. Our twenty-first-century way of life is made possible by the vast network of processes enabled by these systems, as well as the

  2. Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    have taken suspectcounterfeit items (SCI) training had actually completed the course. Status - Revised procedures to clarify training requirements and frequency of training. ...

  3. OIL AND NATURAL GAS SUBSECTOR CYBERSECURITY CAPABILITY MATURITY MODEL (ONG-C2M2)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OIL AND NATURAL GAS SUBSECTOR CYBERSECURITY CAPABILITY MATURITY MODEL (ONG-C2M2) Version 1.1 February 2014 Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model Version 1.1 iii TABLE OF CONTENTS Acknowledgments ......................................................................................................................................... v 1. Introduction

  4. NSF Cybersecurity Center of Excellence, ESnet Organize Working Group on

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Open Science Threats NSF Cybersecurity Center of Excellence, ESnet Organize Working Group on Open Science Threats News & Publications ESnet News Media & Press Publications and Presentations Galleries ESnet Awards and Honors Contact Us Media Jon Bashor, jbashor@lbl.gov, +1 510 486 5849 or Media@es.net Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide

  5. The U.S. government's $1.6M investment in cybersecurity pays dividends for

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New Mexico The U.S. government's $1.6M investment in cybersecurity pays dividends for New Mexico The U.S. government's $1.6M investment in cybersecurity pays dividends for New Mexico The grant is part of the larger national CyberCorp scholarship for service initiative, which is funded by the National Science Foundation and is a presidential directive aimed at improving the number and quality of cybersecurity professionals in civil service. The U.S government is investing more than $1.6

  6. Cyber Train Videos | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Train Videos Cyber Train Overview Cyber Train Opt-Out Process Cyber Train Complete Training Submitting Course Completion Materials Click here for information on accessing Cyber Train.

  7. ASCR Cybersecurity for Scientific Computing Integrity

    SciTech Connect (OSTI)

    Piesert, Sean

    2015-02-27

    The Department of Energy (DOE) has the responsibility to address the energy, environmental, and nuclear security challenges that face our nation. Much of DOE’s enterprise involves distributed, collaborative teams; a signi¬cant fraction involves “open science,” which depends on multi-institutional, often international collaborations that must access or share signi¬cant amounts of information between institutions and over networks around the world. The mission of the Office of Science is the delivery of scienti¬c discoveries and major scienti¬c tools to transform our understanding of nature and to advance the energy, economic, and national security of the United States. The ability of DOE to execute its responsibilities depends critically on its ability to assure the integrity and availability of scienti¬c facilities and computer systems, and of the scienti¬c, engineering, and operational software and data that support its mission.

  8. Cybersecurity through Real-Time Distributed Control Systems

    SciTech Connect (OSTI)

    Kisner, Roger A; Manges, Wayne W; MacIntyre, Lawrence Paul; Nutaro, James J; Munro Jr, John K; Ewing, Paul D; Howlader, Mostofa; Kuruganti, Phani Teja; Wallace, Richard M; Olama, Mohammed M

    2010-04-01

    Critical infrastructure sites and facilities are becoming increasingly dependent on interconnected physical and cyber-based real-time distributed control systems (RTDCSs). A mounting cybersecurity threat results from the nature of these ubiquitous and sometimes unrestrained communications interconnections. Much work is under way in numerous organizations to characterize the cyber threat, determine means to minimize risk, and develop mitigation strategies to address potential consequences. While it seems natural that a simple application of cyber-protection methods derived from corporate business information technology (IT) domain would lead to an acceptable solution, the reality is that the characteristics of RTDCSs make many of those methods inadequate and unsatisfactory or even harmful. A solution lies in developing a defense-in-depth approach that ranges from protection at communications interconnect levels ultimately to the control system s functional characteristics that are designed to maintain control in the face of malicious intrusion. This paper summarizes the nature of RTDCSs from a cybersecurity perspec tive and discusses issues, vulnerabilities, candidate mitigation approaches, and metrics.

  9. Moving Forward with the Electric Sector Cybersecurity Risk Management Maturity Initiative

    Broader source: Energy.gov [DOE]

    Since the January 5, 2012 launch of the “Electric Sector Cybersecurity Risk Management Maturity” program, a White House initiative led by the Department of Energy in partnership with the Department...

  10. Draft Energy Sector Cybersecurity Framework Implementation Guidance Available for Public Comment

    Broader source: Energy.gov [DOE]

    The Department of Energy (DOE) has issued a Notice of Public Comment in the Federal Register, inviting the public to comment on DOE's Energy Sector Cybersecurity Framework Implementation Guidance. The document is available for a 30 day comment period.

  11. New Draft of Cybersecurity Risk Management Process (RMP) Guideline Now Available for Public Comment (March 2012)

    Broader source: Energy.gov [DOE]

    The Department of Energy, in collaboration with the National Institute of Standards and Technology and the North American Electric Reliability Corporation, has released the second draft of the Electricity Subsector Cybersecurity Risk Management Process (RMP) Guideline for public comment.

  12. Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations- Vulnerability and Intrusion Detection

    Broader source: Energy.gov [DOE]

    National lab researchers, industry partners, and academia from the Cybersecurity for Energy Delivery Systems Program in the DOE's Office of Electricity Delivery and Energy Reliability held a 2-day...

  13. NREL's Cybersecurity Initiative Aims to Wall Off the Smart Grid from

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hackers - News Feature | NREL NREL's Cybersecurity Initiative Aims to Wall Off the Smart Grid from Hackers January 4, 2016 Photo of a group of people working on computers From left to right, NREL's Brian Miller works with David Cronin of DC Systems, Duane Petersen (then with Scitor Corporation), Brandon Hjella of FireEye, and NREL's Erfan Ibrahim to build the Test Bed for Secure Distributed Grid Management, a hardware system that mimics the communications, power systems, and cybersecurity

  14. DOE Issues Funding Opportunity for Innovations to Increase Cybersecurity for Energy Delivery Systems

    Broader source: Energy.gov [DOE]

    The Office of Electricity Delivery and Energy Reliability issued a new Funding Opportunity Announcement (FOA), Innovation for Increasing Cybersecurity for Energy Delivery Systems, on February 8. The announcement is seeking applications to conduct research, development and demonstrations leading to next generation tools and technologies that will become widely adopted to enhance and accelerate deployment of cybersecurity capabilities for the U.S energy infrastructure, including cyber secure integration of smart grid technologies.

  15. OE Announces New Funding to Improve the Cybersecurity of the Nation's

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Electric Grid | Department of Energy Announces New Funding to Improve the Cybersecurity of the Nation's Electric Grid OE Announces New Funding to Improve the Cybersecurity of the Nation's Electric Grid March 9, 2015 - 5:06pm Addthis Patricia A. Hoffman Patricia A. Hoffman Assistant Secretary, Office of Electricity Delivery & Energy Reliability As part of the Administration's commitment to a strong and secure power grid, the Office of Electricity Delivery and Energy Reliability today

  16. Energy Sector Cybersecurity Framework Implementation Guidance- Notice of Public Comment: Federal Register Notice, Volume 79, No. 177, September 12, 2014

    Broader source: Energy.gov [DOE]

    The Department of Energy invites public comment on a draft of the Energy Sector Cybersecurity Framework Implementation Guidance. Comments must be received on or before October 14, 2014.

  17. Notice of Publication of Electricity Subsector Cybersecurity Risk Management Process: Federal Register Notice Volume 77, No. 100- May 23, 2012

    Broader source: Energy.gov [DOE]

    This serves as public notification of the publication, by the Department of Energy (DOE) of the Electricity Subsector Cybersecurity Risk Management Process guideline. The guideline describes a risk...

  18. Deputy Secretary Sherwood-Randall's Remarks at the White House Summit on Cybersecurity and Consumer Protection-- As Prepared

    Broader source: Energy.gov [DOE]

    Deputy Secretary Elizabeth Sherwood-Randall's remarks, as prepared, at the White House Summit on Cybersecurity and Consumer Protection at Stanford University on February 13, 2015.

  19. MO-E-18C-01: Open Access Web-Based Peer-To-Peer Training and Education in Radiotherapy

    SciTech Connect (OSTI)

    Pawlicki, T; Brown, D; Dunscombe, P; Mutic, S

    2014-06-15

    Purpose: Current training and education delivery models have limitations which result in gaps in clinical proficiency with equipment, procedures, and techniques. Educational and training opportunities offered by vendors and professional societies are by their nature not available at point of need or for the life of clinical systems. The objective of this work is to leverage modern communications technology to provide peer-to-peer training and education for radiotherapy professionals, in the clinic and on demand, as they undertake their clinical duties. Methods: We have developed a free of charge web site ( https://i.treatsafely.org ) using the Google App Engine and datastore (NDB, GQL), Python with AJAX-RPC, and Javascript. The site is a radiotherapy-specific hosting service to which user-created videos illustrating clinical or physics processes and other relevant educational material can be uploaded. Efficient navigation to the material of interest is provided through several RT specific search tools and videos can be scored by users, thus providing comprehensive peer review of the site content. The site also supports multilingual narration\\translation of videos, a quiz function for competence assessment and a library function allowing groups or institutions to define their standard operating procedures based on the video content. Results: The website went live in August 2013 and currently has over 680 registered users from 55 countries; 27.2% from the United States, 9.8% from India, 8.3% from the United Kingdom, 7.3% from Brazil, and 47.5% from other countries. The users include physicists (57.4%), Oncologists (12.5%), therapists (8.2%) and dosimetrists (4.8%). There are 75 videos to date including English, Portuguese, Mandarin, and Thai. Conclusion: Based on the initial acceptance of the site, we conclude that this open access web-based peer-to-peer tool is fulfilling an important need in radiotherapy training and education. Site functionality should expand in

  20. Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Los Alamos Homemade Explosives School Los Alamos Shows Airport Security Technology at Work Scanner Discerns Threatening Liquids Scientists Train Honeybees to Detect Explosives LANL ...

  1. Home Energy Score Assessor Training Materials

    Broader source: Energy.gov [DOE]

    Download detailed instructions for logging onto the training portal and accessing the training modules.

  2. Deputy Secretary Elizabeth Sherwood-Randall Discusses Importance of Public-Private Partnerships at White House Cybersecurity Summit

    Broader source: Energy.gov [DOE]

    Today, Deputy Secretary of Energy Elizabeth Sherwood-Randall participated in a panel discussion on the “Public-Private Collaboration on Cybersecurity” as part of the White House Summit on Cybersecurity and Consumer Protection keynoted by President Obama.

  3. The Department of Energy Releases Draft of Cybersecurity Risk Management Process (RMP) Guideline for Public Comment (September 2011)

    Broader source: Energy.gov [DOE]

    The Department of Energy, in collaboration with the National Institute of Standards and Technology and the North American Electric Reliability Corporation, has released a draft of the Electricity Sector Cybersecurity Risk Management Process (RMP) Guideline for public comment.

  4. New Article on Cybersecurity Discusses DOE’s Partnership with the Energy Sector to Keep the Grid Reliable and Secure

    Broader source: Energy.gov [DOE]

    An article by OE’s Carol Hawk and Akhlesh Kaushiva in The Electricity Journal discusses cybersecurity for the power grid and how DOE and the energy sector are partnering to keep the smart grid reliable and secure.

  5. Transforming CyberSecurity R&D within the Department of Energy: Getting Ahead of The Threat

    SciTech Connect (OSTI)

    Frincke, Deborah A.; Catlett, Charlie; Siebenlist, Frank; Strelitz, Richard; Talbot, Ed; Worley, Brian

    2008-01-01

    This report outlines a preliminary response from DOE researchers to the following three questions: a) what are the key priorities w.r.t. cybersecurity R&D over the next decade? b) what would we recommend, in terms of a program, to address those priorities c) how would a DOE Office of Science program in this area complement other cybersecurity R&D initiatives such as NSF's or other agency programs?

  6. Hybrid methods for cybersecurity analysis : LDRD final report.

    SciTech Connect (OSTI)

    Davis, Warren Leon,; Dunlavy, Daniel M.

    2014-01-01

    Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling and analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and

  7. CAIRS Training Package

    Broader source: Energy.gov (indexed) [DOE]

    ... To get started, you will need a valid user ID and password to access the training ... Once you receive your user ID and password, you will be able to access the training ...

  8. WE-A-16A-01: International Medical Physics Symposium: Increasing Access to Medical Physics Education/Training and Research Excellence

    SciTech Connect (OSTI)

    Bortfeld, T; Ngoma, T; Odedina, F; Morgan, S; Wu, R; Sajo, E; Ngwa, W

    2014-06-15

    In response to a world in which cancer is a growing global health challenge, there is now a greater need for US Medical Physicists and other Radiation Oncology professionals across institutions to work together and be more globally engaged in the fight against cancer. There are currently many opportunities for Medical Physicists to contribute to alleviating this pressing need, especially in helping enhance access to Medical Physics Education/training and Research Excellence across international boundaries, particularly for low and middle-income countries (LMIC), which suffer from a drastic shortage of accessible knowledge and quality training programs in radiotherapy. Many Medical Physicists are not aware of the range of opportunities that even with small effort could have a high impact. Faculty at the two CAMPEP-accredited Medical Physics Programs in New England: the University of Massachusetts Lowell and Harvard Medical School have developed a growing alliance to increase Access to Medical Physics Education/training and Research Excellence (AMPERE), and facilitate greater active involvement of U.S. Medical Physicists in helping the global fight against cancer and cancer disparities. In this symposium, AMPERE Alliance members and partners from Europe and Africa will present and discuss the growing global cancer challenge, the dearth of knowledge, research, and other barriers to providing life-saving radiotherapy in LMIC, mechanisms for meeting these challenges, the different opportunities for participation by Medical Physicists, including students and residents, and how participation can be facilitated to increase AMPERE for global health. Learning Objectives: To learn about the growing global cancer challenge, areas of greatest need and limitations to accessing knowledge and quality radiotherapy training programs, especially in LMIC; To learn about the range of opportunities for Medical Physicists, including students and residents, to work together in global

  9. Cybersecurity for Energy Delivery Systems (CEDS) Peer Review August 5-7

    Broader source: Energy.gov [DOE]

    The Office of Electricity Delivery and Energy Reliability (OE) will hold a peer review of its Cybersecurity for Energy Delivery Systems (CEDS) Program and a Roadmap Milestone Assessment Workshop on August 5-7, 2014 at the Hilton Crystal City in Arlington, VA. This event is open to the public and will bring together leaders from industry, National Laboratories, and academia to hear first-hand about forthcoming CEDS solutions, provide feedback to CEDS program managers, and network with experts.

  10. Library Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Library Training Library Training Get Library Training... Request Training 667-5809 Email This service is limited to lab employees with active Z numbers. Scholarly Communication & Public Access Learn about the Review & Approval System for Scientific and Technical information (RASSTI) system to obtain LA-UR numbers for unclassified, unrestricted documents intended for public release; Accepted manuscripts, and Copyright. Searching Los Alamos Authors Database Improve your searching skills

  11. Access to the ALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gate Access Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register with the ALS User Services Office and take safety training (see Complete Safety Training ) before they are issued a Berkeley Lab ID badge and granted access to the facility. Note: Users arriving at the ALS outside registration business hours (Monday-Friday 8:00 a.m.-4:00 p.m.) must notify the User Office in advance and

  12. Panel Discussion: New Directions in Human Reliability Analysis for Oil & Gas, Cybersecurity, Nuclear, and Aviation

    SciTech Connect (OSTI)

    Harold S. Blackman; Ronald Boring; Julie L. Marble; Ali Mosleh; Najmedin Meshkati

    2014-10-01

    This panel will discuss what new directions are necessary to maximize the usefulness of HRA techniques across different areas of application. HRA has long been a part of Probabilistic Risk Assessment in the nuclear industry as it offers a superior standard for risk-based decision-making. These techniques are continuing to be adopted by other industries including oil & gas, cybersecurity, nuclear, and aviation. Each participant will present his or her ideas concerning industry needs followed by a discussion about what research is needed and the necessity to achieve cross industry collaboration.

  13. An inter-realm, cyber-security infrastructure for virtual supercomputing

    SciTech Connect (OSTI)

    Al-Muhtadi, J.; Feng, W. C.; Fisk, M. E.

    2001-01-01

    Virtual supercomputing, (ise ., high-performance grid computing), is poised to revolutionize the way we think about and use computing. However, the security of the links interconnecting the nodes within such an environment will be its Achilles heel, particularly when secure communication is required to tunnel through heterogeneous domains. In this paper we examine existing security mechanisms, show their inadequacy, and design a comprehensive cybersecurity infrastructure that meets the security requirements of virtual supercomputing. Keywords Security, virtual supercomputing, grid computing, high-performance computing, GSS-API, SSL, IPsec, component-based software, dynamic reconfiguration.

  14. Department of Homeland Security's Science & Technology Directorate Announces New Cybersecurity Risk Analysis Tool on the Commercial Market

    Broader source: Energy.gov [DOE]

    The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced that a fifth cybersecurity technology has been licensed for commercialization as a part of the Cyber Security Division's Transition to Practice (TTP) program, thanks to a new tool developed by researchers at the Department of Energy's Pacific Northwest National Laboratory.

  15. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    SciTech Connect (OSTI)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  16. Notice of Public Comment on Electricity Sector Cybersecurity Risk Management Process Guideline: Federal Register Notice Volume 76, No. 180- Sep. 16, 2011

    Broader source: Energy.gov [DOE]

    The Department of Energy invited public comment on DOE’s intent to publish the Electricity Sector Cybersecurity Risk Management Process Guideline. The guideline describes a risk management process...

  17. Criticality Safety Training

    Energy Science and Technology Software Center (OSTI)

    2002-12-01

    CST is a web-based training program designed to help the user to safely access and work in areas where fissionable nuclear materials may be present.

  18. Award Selections for the Development of Next Generation Cybersecurity Technologies and Tools- Fact Sheet

    Broader source: Energy.gov [DOE]

    As part of the Obama Administration’s commitment to protecting America’s energy critical infrastructure, the Department of Energy’s Office of Electricity Delivery and Energy Reliability announced awards totaling $30 million for the development of next generation technologies and tools to strengthen protection of the nation’s electric grid and oil and gas infrastructure from cyber attack. The announcement was made on August 15, 2016. The twelve projects will enhance the reliability and resilience of the nation’s energy critical infrastructure through innovative, scalable, and cost-effective research, development and demonstration of cybersecurity solutions. These technologies are expected to have broad applicability to the U.S. energy delivery sector by meeting the needs of the energy sector in a cost-effective manner with a clear path for acceptance by asset owners and operators and through commercialization by solution providers.

  19. PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

    SciTech Connect (OSTI)

    McNeil, Nikki C; Bridges, Robert A; Iannacone, Michael D; Czejdo, Bogdan; Perez, Nicolas E; Goodall, John R

    2013-01-01

    Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.

  20. Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment

    SciTech Connect (OSTI)

    Vishik, Claire; Sheldon, Frederick T; Ott, David

    2013-01-01

    Cybersecurity practice lags behind cyber technology achievements. Solutions designed to address many problems may and do exist but frequently cannot be broadly deployed due to economic constraints. Whereas security economics focuses on the cost/benefit analysis and supply/demand, we believe that more sophisticated theoretical approaches, such as economic modeling, rarely utilized, would derive greater societal benefits. Unfortunately, today technologists pursuing interesting and elegant solutions have little knowledge of the feasibility for broad deployment of their results and cannot anticipate the influences of other technologies, existing infrastructure, and technology evolution, nor bring the solutions lifecycle into the equation. Additionally, potentially viable solutions are not adopted because the risk perceptions by potential providers and users far outweighs the economic incentives to support introduction/adoption of new best practices and technologies that are not well enough defined. In some cases, there is no alignment with redominant and future business models as well as regulatory and policy requirements. This paper provides an overview of the economics of security, reviewing work that helped to define economic models for the Internet economy from the 1990s. We bring forward examples of potential use of theoretical economics in defining metrics for emerging technology areas, positioning infrastructure investment, and building real-time response capability as part of software development. These diverse examples help us understand the gaps in current research. Filling these gaps will be instrumental for defining viable economic incentives, economic policies, regulations as well as early-stage technology development approaches, that can speed up commercialization and deployment of new technologies in cybersecurity.

  1. Industry Partnerships for Cybersecurity of Energy Delivery Systems (CEDS) Research, Development and Demonstration for the Energy Sector Funding Opportunity Announcement

    Broader source: Energy.gov [DOE]

    Modernizing our electric power grid has long been a key priority for the Department of Energy, and this month the Department is moving forward on that front with a series of announcements related to our ongoing Grid Modernization Initiative. As part of that effort, the Office of Electricity Delivery and Energy Reliability announced approximately $23 million in funding for the research and development of advanced cybersecurity technologies to meet the unique requirements of the energy sector.

  2. Training | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Training Training Training on various systems/components that use energy is available to help manufacturing plants and buildings run more efficiently. Learn how to use powerful decision support software tools to help identify, analyze, and implement energy savings opportunities. Online training for steam systems, process heating, pump systems, fan systems and mechanical insulation are available on the National Training & Education Resource; new users must create an account to access these

  3. Training Worksheet Job Aid

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Resources The NNSA Office of Civil Rights maintains a robust training and awareness resource library. Available resources include DVD-based training programs, DVD videos, guides, handbooks, and textbooks regarding the following topical areas: Workplace Conflict Resolution Harassment Detection, Intervention, and Prevention Workplace Diversity Supervision and Management Federal Sector EEO Processes, Procedures, and Responsibilities If you are interested in accessing these resources,

  4. ASCR Cybersecurity for Scientific Computing Integrity - Research Pathways and Ideas Workshop

    SciTech Connect (OSTI)

    Peisert, Sean; Potok, Thomas E.; Jones, Todd

    2015-06-03

    At the request of the U.S. Department of Energy's (DOE) Office of Science (SC) Advanced Scientific Computing Research (ASCR) program office, a workshop was held June 2-3, 2015, in Gaithersburg, MD, to identify potential long term (10 to +20 year) cybersecurity fundamental basic research and development challenges, strategies and roadmap facing future high performance computing (HPC), networks, data centers, and extreme-scale scientific user facilities. This workshop was a follow-on to the workshop held January 7-9, 2015, in Rockville, MD, that examined higher level ideas about scientific computing integrity specific to the mission of the DOE Office of Science. Issues included research computation and simulation that takes place on ASCR computing facilities and networks, as well as network-connected scientific instruments, such as those run by various DOE Office of Science programs. Workshop participants included researchers and operational staff from DOE national laboratories, as well as academic researchers and industry experts. Participants were selected based on the submission of abstracts relating to the topics discussed in the previous workshop report [1] and also from other ASCR reports, including "Abstract Machine Models and Proxy Architectures for Exascale Computing" [27], the DOE "Preliminary Conceptual Design for an Exascale Computing Initiative" [28], and the January 2015 machine learning workshop [29]. The workshop was also attended by several observers from DOE and other government agencies. The workshop was divided into three topic areas: (1) Trustworthy Supercomputing, (2) Extreme-Scale Data, Knowledge, and Analytics for Understanding and Improving Cybersecurity, and (3) Trust within High-end Networking and Data Centers. Participants were divided into three corresponding teams based on the category of their abstracts. The workshop began with a series of talks from the program manager and workshop chair, followed by the leaders for each of the three

  5. Open Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    access, is a type of unrestricted access to scholarly publications that is online, free of charge to everyone and free of most copyright and licensing restrictions. Open...

  6. Training - 88-Inch Cyclotron

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training *If you are coming from outside of Berkeley Lab, make sure you let the Admin Office know (88Admin@lbl.gov). There is additional paperwork that needs to be completed. Requirements: 1.) General Employee Radiation Training (GERT): All personnel at the 88-Inch Cyclotron are required to take GERT, which only takes a few minutes and can be found here. 2.) Building 88 On-The-Job Training (OJT): All personnel are required to take Building 88's access training (NSD 439) before card-key access

  7. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Access Remote Access Laboratory employees can access Research Library databases and products from offsite using our EZproxy service. This service is limited to LANL employees with active Z numbers and cryptocards. Access Electronic Collections with EZproxy Remote Access Journals - Books - Standards - Databases (WOK, etc) How to use EZproxy: From this page: Click on the icon above. From external site: Select "OFFSITE LANL Employee". Enter your Z number and Cryptocard passcode.

  8. Training Records And Information Network UNIX Version

    Energy Science and Technology Software Center (OSTI)

    1996-12-01

    TRAIN-UNIX is used to track training requirements, qualifications, training completion and schedule training, classrooms and instructors. TRAIN-UNIX is a requirements-based system. When the identified training requirements for specific jobs are entered into the system, the employees manager or responsible training person assigns jobs to an employee. TRAIN-UNIX will then assemble an Individual Training Plan (ITP) with all courses required. ITP''s can also be modified to add any special training directed or identified by management, bestmore » business practices, procedures, etc. TRAIN-UNIX also schedules and tracks conferences, seminars, and required reading. TRAIN-UNIX is a secure database system on a server accessible via the network. Access to the user functions (scheduling, data entry, ITP modification etc.) within TRAIN-UNIX are granted by function, as needed, by the system administrator. An additional level of security allows those who access TRAIN-UNIX to only add, modify or view information for the organizations to which they belong. TRAIN-UNIX scheduling function allows network access to scheduling of students. As a function of the scheduling process, TRAIN-UNIX checks to insure that the student is a valid employee, not double booked, and the instructor and classroom are not double booked. TRAIN-UNIX will report pending lapse of courses or qualifications. This ability to know the lapse of training along with built in training requesting function allows the training deliverers to forecast training needs.« less

  9. Forklift Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Forklift Training Forklift Safety Test NOTE: All Training and Testing Material is for LSU CAMD Users ONLY Forklift Training Overview Training reduces risk. Check controls before ...

  10. Accessibility | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    making its electronic and information technologies accessible to individuals with disabilities in accordance with Section 508 of the Rehabilitation Act (29 U.S.C. 794d), as...

  11. Accessing HPSS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Accessing HPSS Accessing HPSS Once you have successfully generated an HPSS token you can access NERSC's HPSS in the different ways listed below. HSI and HTAR are usually the best ways to transfer data in and out of HPSS but other methods are also included. Access Method When to use this method Features Limitations HSI When a full-featured unix-like interface is desired high performance (parallel); unix-like user interface; firewall mode client is specific to HPSS version and might not work at

  12. Accessing PDSF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Accessing PDSF Accessing PDSF All the linux interactive nodes are known under the name of pdsf.nersc.gov and should be accessed via that name. To access them the ssh protocol should be used and you should make sure that a Keyboard Interactive method is available in your ssh client. You will probably also want to enable X11 forwarding with the -X or -Y option, i.e., ssh -Y pdsf.nersc.gov For more information see Interactive (login) Nodes. If you are in STAR your default unix group is rhstar (just

  13. PIA - Savannah River Nuclear Solutions Training Records and Information

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Network (TRAIN) | Department of Energy Nuclear Solutions Training Records and Information Network (TRAIN) PIA - Savannah River Nuclear Solutions Training Records and Information Network (TRAIN) PIA - Savannah River Nuclear Solutions Training Records and Information Network (TRAIN) PIA - Savannah River Nuclear Solutions Training Records and Information Network (TRAIN) (3.3 MB) More Documents & Publications PIA - HSPD-12 Physical and Logical Access System PIA - WEB Unclassified Business

  14. Training: Process Heating Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Process Heating Systems Training: Process Heating Systems April 16, 2014 - 6:31pm Addthis Learn about the diverse training sessions offered. The courses are taught by highly qualified instructors who have met rigorous standards. View additional process heating system resources. Process Heating Assessment and Survey Tool Training - ONLINE TRAINING AND QUALIFIED SPECIALISTS Availability: Online self-paced workshop For access to online training in this area visit the National Training &

  15. LANSCE Training Office Process Improvement Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Office Process Improvement Form You recently contacted our training service department. We want to assure that you're satisfied with our service. Please complete this short survey. Your feedback will be used to improve our service. How did you contact the TA-53 Training office for training? In Person Telephone E-Mail Response Time What was the reason for your request? Badge reader access Proctoring Training Report/Status Other______________ The Training Office handled my request

  16. Gate Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gate Access Gate Access Print When you first arrive at the ALS, gate clearance will have been arranged for you by the User Office. Berkeley Lab employees and visiting researchers (participating guests) may arrange for gate clearance for their visitors through the Lab's Site Access Office . Please notify the Site Office by submitting a Visitor Pass Request before 3:00 p.m. on the day before the expected visit. Include the name(s) of any visitors, the time you expect them, and your name and

  17. FedVTE | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    FedVTE FedVTE Train2.jpg The Federal Virtual Training Environment (FedVTE) is a multi-media, e-learning environment that provides free cybersecurity training resources to employees and contractors. To access FedVTE: https://fedvte.usalearning.gov. Course list: https://fedvte.usalearning.gov/pdf/FedVTE_Training_Catalog.pdf.

  18. Gate Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to the laboratory. Visitors from outside the U.S. should be prepared to show a valid passport. See Access to the ALS for additional information about visitor procedures at the...

  19. Cori Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Cori Training Intel OpenMP Training @ NERSC Key Actions for Optimizing KNL Performance Tuning and Functional Debugging for Xeon-Phi OpenMP and Vectorization Training IXPUG ...

  20. Solar Training | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    The SunShot Initiative addresses the critical need for high-quality, local, accessible training in solar energy system design, installation, sales, and inspection, as well as power ...

  1. Unclassified Controlled Nuclear Information Training | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unclassified Controlled Nuclear Information Training Unclassified Controlled Nuclear Information Training Training Unclassified Controlled Nuclear Information for persons with access to UCNI, June 2014 Unclassified Controlled Nuclear Information Reviewing Official's Training Resources Understanding Unclassified Controlled Nuclear Information - Brochure UCNI Marking Reference Classification's Webpage on Unclassified Controlled Nuclear Information Policy Documents Training & Reference

  2. Training Resources | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Training Resources The NNSA Office of Civil Rights maintains a robust training and awareness resource library. Available resources include DVD-based training programs, DVD videos, guides, handbooks, and textbooks regarding the following topical areas: Workplace Conflict Resolution Harassment Detection, Intervention, and Prevention Workplace Diversity Supervision and Management Federal Sector EEO Processes, Procedures, and Responsibilities If you are interested in accessing these resources,

  3. Cori Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Cori Training Intel OpenMP Training @ NERSC Key Actions for Optimizing KNL Performance Tuning and Functional Debugging for Xeon-Phi OpenMP and Vectorization Training IXPUG ISC15 Documents Last edited: 2015-04-28 00:10:29

  4. MSDS Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Radiation Safety Training Cleanroom Safety Information Test Material Forklift Training Crane Operation Training Tests Radiation Safety Test Forklift Test Crane Operation Test NOTE: All Training and Testing Material is for LSU CAMD Users ONLY! The J. Bennett Johnston, Sr. Center for Advanced Microstructures & Devices 6980 Jefferson Hwy., Baton Rouge, LA 70806 Telephone: 225-578-8887 * Fax: 225-578-6954 Copyright © 2012

  5. JLab Registration/International Services - Training Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Special Note for High School and Undergraduate Students Click Here All High School Studenta and Undergraduate students must also complete the Student Safety and Security Training prior to gaining access to work areas. This course cannot be taken online. Contact the Science Education Office (education@jlab.org) to schedule this training. Training Requirements In order to provide a safe and secure place to work, Jefferson Lab requires all individuals to complete training courses which are designed

  6. PIA - Savannah River Nuclear Solutions Training Records and Informatio...

    Energy Savers [EERE]

    Network (TRAIN) (3.3 MB) More Documents & Publications PIA - HSPD-12 Physical and Logical Access System PIA - WEB Unclassified Business Operations General Support System

  7. Customer Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Joint Operating Committee Transmission Issues Policy Steering Committee Customer Training Interconnection Small Generator Interconnection Procedures (SGIP) Balancing Authority...

  8. Cleanroom Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cleanroom Safety Information Test Material NOTE: All Training and Testing Material is for LSU CAMD Users ONLY! Cleanroom Training Overview This page has been prepared to describe those hazards which are associated with silicon wafer preparation and processing as well as other hazards connected with the cleanroom environment. It is intended as a guide only and not as a replacement for specific training in cleanroom activities. Why Safety Training? 6,000 fatal workplace injuries per year 50,000

  9. Sandia National Laboratories: Employee & Retiree Resources: Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Employee & Retiree Resources Emergency Announcements & Other Alerts Corporate Forms Technical Library Sandia Anywhere: Remote Access Sandia Anywhere: Remote Access Access Sandia's internal web-based resources You can access the following web-based resources directly with a CryptoCard from any computing device: Techweb Webmail - includes Outlook calendar and web-based IM Corporate Training (TEDS Learning Portal) Enterprise Information Management Services (EIMS) Expense Report HR Self

  10. Access to the ALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS User Services Office and take safety training (see Complete Safety Training ) before ... the User Office in advance and have all their online forms completed before their arrival. ...

  11. Training Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Learning and Workforce Development » Training Resources Training Resources Training Resources Type Training Resources

  12. CSAT Course Catalog | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Services » Training » Cybersecurity Training Warehouse » DOE Training & Education » CSAT Course Catalog CSAT Course Catalog laptop-1031224_960_720.jpg The Cyber Security Training and Awareness (CSAT) Course Catalog offers: cybersecurity awareness materials cybersecurity training for general users training for personnel with a cybersecurity functional role role-based training modules vendor courses that address core competency knowledge requirements CSAT Course Catalog (738.85 KB) More

  13. ACCESSING SUBCONTRACTOR EMPLOYMENT RECORDS

    Broader source: Energy.gov [DOE]

    Federal officials, on occasion, may seek access to contractor or subcontractor employment and personnel records. There are circumstances in which such access is appropriate and permissible. But...

  14. Education & Training

    Broader source: Energy.gov [DOE]

    Science and technology a critical sector of the U.S. economy. Learn about opportunities for education and training supported by the Energy Department.

  15. Sample Preparation Laboratory Training - Course 204 | Sample Preparation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laboratories Sample Preparation Laboratory Training - Course 204 Who Should Attend This course is mandatory for: SLAC employees and non-employees who need unescorted access to SSRL or LCLS Sample Preparation Laboratories Note: This course may be taken in lieu of Course 199, Laboratory CHP training for SLAC employees. Prerequisites 115 - General Employee Radiological Training (GERT) Take Training Please see the notes section below for information on how to take this training. Course Details

  16. Cybersecurity Awareness Materials

    Broader source: Energy.gov [DOE]

    The OCIO develops and distributes a variety of materials to enhance cyber awareness campaigns, address emerging cyber threats, and examine hot topics. These materials are available to all DOE organizations, and public and private institutions.

  17. Annual Training Plan Template

    Broader source: Energy.gov [DOE]

    The Annual Training Plan Template is used by an organization's training POC to draft their organization's annual training plan.

  18. Training | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Training Training A hand writing the word, "Training," in blue marker. A hand writing the word, "Training," in blue marker.

  19. Access to the ALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are required to register with the ALS User Services Office and take safety training (see Complete Safety Training ) before they are issued a Berkeley Lab ID badge and granted...

  20. LANL access restrictions lifted

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    lifted LANL access restrictions lifted Vehicle access points on West Jemez Road will be open to non-badge holders. August 6, 2012 Los Alamos National Laboratory sits on top of a...

  1. Training For Other Agency Personnel | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Training For Other Agency Personnel Training For Other Agency Personnel 10 CFR Part 1045, Nuclear Classification and Declassification, requires All persons with access to RD to receive training on the authorities required to classify and declassify RD and FRD information and documents and on handling procedures, and Persons who classify documents containing RD or FRD to receive training on the procedures for classifying, declassifying, marking and handling RD and FRD information and documents.

  2. Training Materials

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Materials Training Materials The following tutorials are produced by NERSC staff and are intended to provide basic instruction on NERSC systems. Sort by: Default | Name | Date (low-high) | Date (high-low) | Source | Category Introduction to Hybrid OpenMP/MPI Programming June 24, 2004 | Author(s): Helen He | Download File: hybridTalk.pdf | pdf | 1005 KB sample managed list Using OpenMP October 20, 2010 | Author(s): Helen He | Introduction to MPI January 11, 2010 | Author(s): Richard

  3. Microsoft Word - Cleanroom Access Procedures for New Users-April16-2008.docx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Microfabrication Access Document In order to become a user of CAMD microfabrication resources, including the cleanroom, successful completion of each of the following steps is required. Potential users are encouraged to begin this access and training process one (1) month before he/she is ready to begin working inside the cleanroom. These guidelines provide adequate time to complete paperwork, tests, and training. The training schedule is posted on the web page. All aspects of Cleanroom

  4. Training | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Training A hand writing the word, "Training," in blue marker. A hand writing the word, "Training," in blue marker.

    Response Training NNSA provides training to emergency managers and emergency responders through the Emergency Operations Training Academy (EOTA). EOTA provides state-of-the-art training and education for NNSA to enhance the readiness of personnel in the emergency operations community. The EOTA is recognized as a model technical training provider for

  5. NERSC Training Events

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Paraver and BSC Tools Training - Understanding Application Performance with Paraver Score-P and Scalasca Performance Tools Training Cori Phase 1 Training: Programming and Optimization Materials Science Application Training 2016 Advanced OpenMP Training, February 4, 2016 IXPUG 2015 BerkeleyGW2015 Tutorial: Getting Up to Speed on OpenMP 4.0 New User Training: 8/13/2015 Intel VTune Training Materials Science Application Training 2015 Allinea DDT and MAP Training 2015 Intel compiler performance

  6. Training | Department of Energy

    Energy Savers [EERE]

    Earned Value Management Training Training DOE Office of Project Management Oversight & Assessments offers number of training opportunities in the area of Earned Value Management ...

  7. ORISE: Health Physics Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Health Physics Training Student performs an analysis during an ORAU health physics training course Training and educating a highly skilled workforce that can meet operational ...

  8. Access to Capital Roundtable

    Broader source: Energy.gov (indexed) [DOE]

    ... State of Washington Chahalis and Great Wolf Lodge Streamlined environmental approval and process Price advantages due to tax preference Access to NMTC, USDA, DOE, ...

  9. Energy Data Access

    Broader source: Energy.gov [DOE]

    Access to energy data presents a significant opportunity for many organizations interested in energy management, benchmarking, disclosure, and energy efficiency services.

  10. Access to Capital

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IPR 2008 Capital Investment Review CIR 2012 Quarterly Business Review Focus 2028 2011 Strategic Capital Discussions Access to Capital Debt Optimization Asset Management Cost...

  11. training course

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    training course - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear

  12. Radiological Technician Training

    Broader source: Energy.gov (indexed) [DOE]

    Part 2 of 9 Radiological Control Technician Training Technician Qualification Standard ... . . . . . . . . 1 Phase I: RCT Academics Training . . . . . . . . . . . . . . . . . . . . ...

  13. Green Jobs Training Center

    Broader source: Energy.gov [DOE]

    Provides an overview of the training available through the Green Jobs Training Center including certification courses and the apprenticeship program.

  14. PRIVACY IMPACT ASSESSMENT: IDAHO NATIONAL LABORATORY-TRAIN PIA

    Broader source: Energy.gov (indexed) [DOE]

    ... Users must log into TRAIN with a provided usemame and password. The password expires every six months. Access to the servers that contain the databases and scripts that make up ...

  15. Augmented Computer Exercise for Inspection Training

    Energy Science and Technology Software Center (OSTI)

    2001-10-08

    ACE-IT is a computer-based training tool developed to simulate an on-site inspection of a facility. Inspectors and hosts practice realistic scenarios to prepare for inspections, to supplement tabletop and mock inspections, and for general training in managed access techniques. A training exercise is conducted between interconnected computer workstations. Participants at each workstation play a role, such as inspector or host, and the exercise permits team-specific actions at each stage of the inspection. Prompts and on-screenmore » menus let the participants know what responses are expected from them to continue the exercise.« less

  16. Media Training

    ScienceCinema (OSTI)

    None

    2011-10-06

    With the LHC starting up soon, the world's media are again turning their attention to CERN. We're all likely to be called upon to explain what is happening at CERN to media, friends and neighbours. The seminar will be given by BBC television news journalists Liz Pike and Nadia Marchant, and will deal with the kind of questions we're likely to be confronted with through the restart period. The training is open for everybody. Make sure you arrive early enough to get a seat - there are only 200 seats in the Globe. The session will also be webcast: http://webcast.cern.ch/

  17. Accessibility - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Energy is committed to providing access to our Web pages for individuals with disabilities. To meet this committment, this site is built to comply with the requirements of...

  18. Remote Access Options

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Applications Features Blackberry (if applicable) Outlook Web Access (OWA) Citrix Workplace WebVPN AnyConnect VPN All methods other than Blackberry require a RSA Token Email 1 ...

  19. VEHICLE ACCESS PORTALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ACCESS PORTALS Changes Effective January 11, 2010 Traffic Lane 1: No stop required. Drivers must slow down to 15 MPH while nearing and driving through the lane Traffic Lane 2:...

  20. New Fleet eTraining Available

    Broader source: Energy.gov [DOE]

    The Federal Energy Management Program has developed an eTraining course to help those with access to Federal fleet vehicles comply with the Energy Policy Act (EPAct) 2005 Section 701 requirement to use alternative fuel in dual-fuel vehicles.

  1. Cyber Train Videos | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Train Videos Cyber Train Overview Cyber Train Opt-Out Process Cyber Train Complete Training Submitting Course Completion Materials...

  2. Webinar: National Hydrogen Safety Training Resource for Emergency

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Responders | Department of Energy Safety Training Resource for Emergency Responders Webinar: National Hydrogen Safety Training Resource for Emergency Responders Note: The recording includes some interruptions in audio between 0:46:28 and 0:51:44. Below is the text version of the webinar titled "National Hydrogen Safety Training Resource for Emergency Responders," originally presented on March 24, 2015. In addition to this text version of the audio, you can access the presentation

  3. Caf Systems Express Access Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cognos Report Access checkboxes (as applicable). Access to Monthly Financials & Supply Chain folders is included with any selections below. BudgetCOA - Capital project,...

  4. ORISE: National Security Training Opportunities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training HSEEP Training Spokesperson Training Incident Command System Training Emergency Management Emergency Response Crisis and Risk Communication Forensic Science How ORISE is...

  5. Complete Safety Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    EHS 0470: General Employee Radiation Training (GERT) Special Training Required for Some Users Laser Safety Users working with a Class 3B4 laser EHS 0302 Macromolecular ...

  6. Radiological Control Technician Training

    Broader source: Energy.gov (indexed) [DOE]

    7of 9 Radiological Control Technician Training Practical Training Phase II Coordinated and Conducted for the Office of Health, Safety and Security U.S. Department of Energy ...

  7. Training | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    of line management and will ensure that training reflects the most current Departmental ... and assessments into safety and security training courses through its management of the ...

  8. Radiological Control Technician Training

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    HANDBOOK RADIOLOGICAL CONTROL TECHNICIAN TRAINING U.S. Department of Energy AREA TRNG ... an implementation process for core training as recommended in chapter 14 to ...

  9. ORISE: Mentor Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mentor Training Mentor Training Oak Ridge Institute for Science and Education (ORISE) research participation programs depend heavily upon mentoring leadership and guidance from the ...

  10. DVU Featured Training & Events ...

    Broader source: Energy.gov (indexed) [DOE]

    Featured Training & Events Form Please complete this form in its entirety and email to ... Classroom, Online) 8. Course Location: Training Facility Address, Room City & State : ...