Workshop Description
For energy CI security teams and infrastructure protection leads. Covers quantum-aware critical infrastructure protection integrating NIST CSF 2.0, IEC 62351, and NERC CIP frameworks. Addresses energy-specific HNDL analysis, OT/IT boundary protection, supply chain cryptographic risk, phased PQC migration strategy, and regulatory trajectory for quantum-specific CI requirements.
Energy critical infrastructure operates under multiple overlapping compliance frameworks, each with cryptographic dependencies that quantum computing will invalidate. NIST CSF 2.0 provides the overarching risk management structure. IEC 62351 specifies cryptographic protections for power system communications. NERC CIP mandates electronic security perimeters and supply chain risk management for bulk electric system cyber assets. None of these frameworks currently include quantum-specific requirements, but the regulatory trajectory is clear: FERC, NERC, and EU NIS2 are all moving towards quantum readiness mandates. The harvest-now-decrypt-later threat compounds this urgency for energy infrastructure. SCADA telemetry, grid topology data, bilateral contract terms, and generation scheduling information all have intelligence shelf lives exceeding a decade. Adversaries intercepting this data today will decrypt it when quantum computers mature. This workshop maps quantum risk across all three frameworks, identifies the highest-exposure cryptographic dependencies in a typical energy utility architecture, and builds a phased migration strategy aligned with planned outage windows and asset replacement cycles.
What participants cover
- NIST CSF 2.0 quantum integration: mapping quantum threats across Identify, Protect, Detect, Respond, Recover, and the new Govern function for energy infrastructure
- IEC 62351 compliance: PQC algorithm integration into Parts 3-14 (TLS for MMS, GOOSE/SV authentication, key management) with gap analysis methodology
- NERC CIP alignment: CIP-002 through CIP-013 obligations for BES Cyber System identification, electronic security perimeters, and supply chain PQC procurement
- HNDL threat analysis: prioritising energy data types by intelligence shelf life (SCADA telemetry, grid topology, market data, bilateral contracts) and adversary capability timelines
- OT/IT boundary protection: DMZ architecture, data diode deployment, and PQC requirements for cross-boundary protocols between corporate IT and operational networks
- Supply chain and regulatory trajectory: NIST FIPS 203/204/205 procurement requirements, NERC CIP-013 vendor management, and anticipated quantum-specific CI mandates from FERC, EU NIS2, and national regulators