We need to make sure the technologies we implement are secure and provide value. This track will provide attendees with a firm grounding in new technologies related to control systems and the Risk Management Framework (RMF) process required to accredit those systems for buildings. Explore the sessions below:
Cybersecurity Basics for Energy Managers
Date: Tuesday, August 15, 10:30am – 12:00pm
Description: Over the past few decades, as we have transformed the way energy is generated, moved, used, and managed, energy managers have become increasingly dependent on digital technologies and controls to reduce costs, increase efficiency, and maintain reliability. With the increase in new technologies comes an increased possibility of disruption through cyber attacks. This session discusses what energy managers need to know about cybersecurity, the challenges and risks energy managers face from cyber threats, and some of the steps they can take to secure their systems.
Understanding and Implementing the Risk Management Framework
Date: Tuesday, August 15, 2:00pm – 3:30pm
Description: The Risk Management Framework (RMF), which is based on National Institute of Standards and Technology (NIST) 800-39, creates a lot of noise, but it is not clear whether energy managers really understand what it is and why they should care. This session will explain what RMF is, what it means to energy managers, and the implementation process.
Risk Management Framework in Action
Date: Tuesday, August 15, 4:00pm – 5:30pm
Description: This session will feature the U.S. Department of Defense, civilian agencies, and commercial customers discussing their journeys along the paths to accreditations. They will share case studies of the Risk Management Framework and National Institute of Standards and Technology (NIST) 800-39 implementations, what is required, best practices, and lessons learned.
Unpacking the Internet of Things and Cloud Technologies
Date: Wednesday, August 16, 8:30am – 10:00am
Description: This session will begin by defining and describing the importance of the Internet of Things, Industrial Internet of Things, and cloud technologies. These are fantastic technologies; however, they may be limited because of accreditation and security restrictions, namely the Risk Management Framework and Federal Risk and Authorization Management Program (FedRAMP) Authorizations to Operate. These experts will teach you how to navigate through the challenges.
Advanced Software Technologies
Date: Wednesday, August 16, 10:30am – 12:00pm
Description: Software technologies are rapidly changing our world. This session features industry leaders discussing new technologies that can make the life of an energy manager more efficient and productive. The focus will be on big data, advanced fault detection and diagnostics, and software for grid integration.
FEMP Cybersecurity Program Review
Date: Wednesday, August 16, 2:00pm – 3:30pm
Description: Coming soon.
What’s New in Building Automation
Date: Wednesday, August 16, 4:00pm – 5:30pm
Description: Learn the latest trends and requirements for building automation systems (BAS) from federal leaders and industry experts. Like other technology verticals, BAS vendors are offering more and more capabilities in their products, and this session will delve into these capabilities and provide examples of how energy managers and BAS technicians can leverage BAS to decrease energy costs, increase value to the energy manager, and stay within cyber security requirements.
Date: Thursday, August 17, 8:30am – 9:30am
Description: Wireless sensor technologies are abundant and, like other technologies, advancing quickly. This session will discuss the latest wireless technologies, where they may benefit your site or agency, and the requirements and challenges in implementing these systems at your site within cyber security requirements.
Date: Thursday, August 17, 9:45am – 11:15am
Description: This session will dive into the value of integrating multiple stove-piped operational and information systems into one enterprise system where the combined data sources provide analysis opportunities previously unattainable. This includes the ability to compare similar assets across an agency while leveraging scale to provide consolidated reporting, increased situational awareness to all command levels, and increased ability to leverage newer information technologies and stay within data security classification and cyber security requirements.