Laserfiche WebLink
W A T E R E N E R G Y T I F F <br />id& <br />P U B L I C U T I L I T I E S <br />BOARD OF PUBLIC UTILITIES <br />RIVERSIDE PUBLIC UTILITIES <br />Board Memorandum <br />DATE: MARCH 25, 2019 <br />ITEM NO: 9 <br />SUBJECT: PURCHASE ORDER WITH INSIGHT PUBLIC SECTOR INC. OF IRVINE, CALIFORNIA <br />FOR THE SUPPLY OF EQUIPMENT AND SOFTWARE FOR $179,772 AND APPROVE <br />WORK ORDER NO. 1914017 IN THE AMOUNT OF $220,024 FOR THE CYBER <br />SECURITY UPGRADE PROJECT AT THE RIVERSIDE ENERGY RESOURCE CENTER <br />AND SPRINGS GENERATING STATION <br />ISSUES: <br />Approve the issuance of a purchase order with Insight Public Sector of Irvine, California for the supply of <br />equipment and software in the amount of $179,772 and approve Work Order No. 1914017 for $220,024 <br />for the Cyber Security Upgrade Project at the Riverside Energy Resource Center and Springs Generating <br />Station. <br />RECOMMENDATIONS: <br />That the Board of Public Utilities: <br />1. Approve the issuance of a purchase order with Insight Public Sector of Irvine, California in the <br />amount of $179,772 pursuant to Purchasing Resolution 23256, Section 702(e); and <br />2. Approve Work Order No. 1914017 in the amount of $220,024 for the Cyber Security Upgrade <br />Project at the Riverside Energy Resource Center and Springs Generating Station. <br />BACKGROUND: <br />In March 2016, Securicon, LLC (Securicon) conducted a comprehensive information technology (IT) <br />security assessment on the Supervisory Control and Data Acquisition (SCADA) networks at the Riverside <br />Energy Resource Center (RERC) and the Springs Generating Station (Springs). The assessment <br />consisted of internal and external penetration tests that evaluated each power plant's vulnerability to cyber <br />threats and unauthorized users. <br />Both RERC and Springs achieved excellent results on the external penetration tests. Securicon was <br />unable to infiltrate the existing security systems and firewalls at each facility. However, the internal <br />penetration tests resulted in five network security recommendations that solidify the SCADA infrastructure <br />and better align each facility with the industry's best practices. <br />One of the recommendations is to replace the SCADA devices that were installed since the power plants <br />were first constructed (over 10 years ago) and update the existing network to current security standards. <br />The newer devices allow for a configuration that provides higher security against unauthorized users to <br />the SCADA networks. <br />