logo
  • Home
  • About
    • Nevermore Security
    • Annabelle Lee Bio
  • Media
    • Awards
    • Interviews
    • Resources
    • Events
  • Publications
  • Contact

PUBLICATIONS

  • Show all
  • Cryptography
  • NESCOR
  • Risk Management / Assessment
  • Security Architecture
  • Guidelines
  • by Annabelle Lee

Cyber Security Strategy and Roadmap Template


March 8, 2021

Read More

Guidelines,by Annabelle Lee

Cyber Security Risk Management and Risk Assessment Methodology Template


March 8, 2021

Read More

Guidelines,by Annabelle Lee

Recommendations for the European Commission on a European Strategic Framework and Potential Future Legislative Acts for the Energy Sector


June 9, 2020

Read More

Risk Management / Assessment,Guidelines

Industrial Control Systems Cybersecurity Strategy, A New Approach


March 6, 2018

Read More

Guidelines,by Annabelle Lee

Recommendations for the European Commission on a European Strategic Framework and Potential Future Legislative Acts for the Energy Sector


February 27, 2017

Read More

Guidelines

Security Architecture Methodology for the Electric Sector, Version 2.0


December 19, 2016

Read More

Security Architecture

Substation Attack Surface Analysis


December 16, 2016

Read More

Security Architecture

Substation Security Architecture Reference Diagrams


December 12, 2016

Read More

Security Architecture

Cyber Security Architecture Methodology for the Electric Sector, Version 1.0


December 31, 2015

Read More

Security Architecture

Attack Trees for Selected Electric Sector High Risk Failure Scenarios – Version 2.0


December 25, 2015

Read More

NESCOR

Electric Sector Failure Scenarios Common Vulnerabilities and Mitigations Mapping – Version 2.0


December 25, 2015

Read More

NESCOR

Analysis of Selected Electric Sector High Risk Failure Scenarios – Version 2.0


December 25, 2015

Read More

NESCOR

Electric Sector Failure Scenarios and Impact Analyses – Version 3.0


December 25, 2015

Read More

NESCOR

Risk Management in Practice: A Guide for the Electric Sector


December 15, 2014

Read More

Risk Management / Assessment

Cyber Security Risk Management in Practice: Comparative Analyses Tables


December 14, 2014

Read More

Risk Management / Assessment

Security Posture using the Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)


December 12, 2014

Read More

Risk Management / Assessment

Guidelines for Leveraging NESCOR Failure Scenarios in Cyber Security Tabletop Exercises


October 25, 2014

Read More

NESCOR

National Institute of Standards and Technology Interagency Report (NISTIR) 7628, Guidelines for Smart Grid Cyber Security


September 25, 2014

Read More

Guidelines

National Institute of Standards and Technology (NIST) Special Publication 800-53, Rev 5, Security and Privacy Controls for Information Systems and Organizations


September 25, 2014

Read More

Guidelines

Cybersecurity Procurement Language for Energy Delivery Systems


April 27, 2014

Read More

Guidelines

Electricity Subsector Cybersecurity Capability Maturity Model, Version 1.1


February 27, 2014

Read More

Guidelines

Integrating Electricity Subsector Failure Scenarios into a Risk Assessment Methodology


December 6, 2013

Read More

Risk Management / Assessment

Appropriate Security Measures for Smart Grids: Guidelines to Assess the Sophistication of Security Measures Implementation


December 6, 2012

Read More

Guidelines

Cryptographic Key Management (CKM) Design Principles for the Advanced Metering Infrastructure (AMI)


November 29, 2012

Read More

Cryptography

Cyber Security Strategy Guidance for the Electric Sector


May 30, 2012

Read More

Risk Management / Assessment

Smart Energy Profile (SEP) 1.x Summary and Analysis


October 31, 2011

Read More

Cryptography

Catalog of Control Systems Security: Recommendations for Standards Developers


September 27, 2009

Read More

Guidelines

Federal Information Processing Standard (FIPS) 140-2, Security Requirements for Cryptographic Modules


May 25, 2001

Read More

Guidelines

© 2023 Nevermore Security. All rights reserved

Privacy Preference Center

Privacy Preferences