Skip to main content

© All rights reserved.

LOOKING FOR SOMETHING?

The Real Bottom-Line Costs of False Alarms

Utility security professionals know it takes a multilayered approach to have effective security. What might not be known is just how multilayered the financial impact of false alarms can be to a utility. We sat down with Yaron Zussman from Magos to talk about the bottom-line costs of false alarms and what your organization can do to ensure they are minimized.   Utility Security: What are the biggest challenges utilities face when it comes to implementing a perimeter security strategy that minimizes false alarms? Yaron Zussman: One challenge I often see is that organizations might not...

Continue reading

Knowing Your Risks and Vulnerabilities and How to Prioritize Budget to Close Gaps

In a moment of serendipity, as I was planning out content for this issue, I took a moment to scroll through LinkedIn when I saw a post by Shawn Wallace that said he and Glenn Engel would be presenting an educational session at GSX. The session topic Wallace posted about has the title “Threats to Critical Infrastructure Sites: How to Evaluate Risk and Prioritize Spend to Close Vulnerabilities.” I immediately thought of how the topics in this session would also be great for this column, especially since this is our GSX-focused issue—and more so because these topics really hit at the heart of...

Continue reading

Why Your Organization Needs to Conduct Exercises: Understanding the The Bottom-Line Impacts

CURTIS MARQUARDT JR.: Thank you so much for joining us today. Can you please tell our readers more about yourself and your role at the Cybersecurity & Infrastructure Security Agency (CISA)? Interview with Gary Bower GARY BOYER: Absolutely. I’m the Branch Chief for the infrastructure Security Exercise Branch—which is part of the Infrastructure Security Division within CISA. I’ve been in emergency management for about 20 years, the last ten of which I have focused on exercises with the critical infrastructure and private sector communities. We conduct and plan exercises that...

Continue reading

11 Key Questions to Ask Before You Plan Your Security Solution

Can we “Talk Tech”? Leaders are charged with growing profitability, mitigating risks, and improving productivity, but in the utility space reducing threats to infrastructure is also a key deliverable. Although many methods are available to ensure regulatory compliance, the Security Industry Association (SIA) states, “Perimeter security and access control were cited as key components of protecting utilities’ sites, with video surveillance and other technologies playing important supporting roles.” Securing the border, so to speak, is an area where technology can be an indispensable asset....

Continue reading

Are You Prepared for the Next Attack?

Do you believe the energy sector has become a critical watchpoint because of its unprecedented constant attacks? You’re not the only one. More than 700 documented attacks from 2010 to 2020, ranging from cyber to physical to natural hazards, serve as real-life reminders that leaders in the utility space must remain focused on how best to protect our most vital assets, including information technology (IT), operational technology (OT) and SCADA systems for process automation. Do you recall the horrific physical attack in 2013 on California’s critical infrastructure that exposed the extreme...

Continue reading