
Mastering the three “Cs” of Security: Clarity, Communication and Consistency
As the Assassination Attempt that happened on July 13th Demonstrated, a Failure of Clarity, Communication and/or Consistency Can Lead to Devastating Consequences. It’s Vital that Your Substation Security Strategy Offers Certainty in All Three Areas. Albert Einstein once said, “Any fool can know. The point is to understand.” I often refer to this quote in […]
5 Questions with Utility Security Expert & Author Ross Johnson
1. When it comes to the terrorist threat, what are the greatest misconceptions about how they think and operate? There has been a lot of evolution in terrorist threats in the past fifty years. Earlier hierarchical terrorist organizations have given way to loose affiliations bound together by ideology and the internet. Today, they are not […]

Knowing Your Risks and Vulnerabilities and How to Prioritize Budget to Close Gaps
In a moment of serendipity, as I was planning out content for this issue, I took a moment to scroll through LinkedIn when I saw a post by Shawn Wallace that said he and Glenn Engel would be presenting an educational session at GSX. The session topic Wallace posted about has the title “Threats to […]

Secure by Design
The Cybersecurity & Infrastructure Security Agency (CISA) recently launched a Secure By Design initiative that provides guidance for software manufacturers to ship software solutions with security as a core consideration from the earliest stages of their development cycles. We talked with CISA’s Matthew Rogers about the process of building out the initiative and how it […]
Security Moves Pretty Fast. Don’t Miss It!
About 18 months ago, we began our process of creating Utility Security magazine. And as we gear up to attend the Global Security Exchange (GSX) conference this September in Orlando, Florida, it made me think back to last year’s GSX and how it was the very first security event I attended. With fresh eyes and […]
Getting Smart with Padlocks
The one constant facing utility operators every day is the real possibility of a physical threat forcing a disruption of operations at their facilities. Given the nature of today’s world, I’m not sure if those fears will ever dissipate. But I do know that with improved technology and increased collaboration, there are some practical solutions […]

Do You Know What You Don’t Know? How to Overcome the Dunning-Kruger Effect and Expand Your Security Expertise
In utility physical security practice, professionalism comes from knowing what to do, why it needs to be done and how to do it. Sounds simple enough, doesn’t it? However, gaining and maintaining true professional competency, or edge, requires continual effort. In our quest for professionalism we have to overcome a plethora of obstacles to success, […]

The AI Push to Smart and Speedy Security
Threats of theft, vandalism and terrorism are a continual concern for those responsible for the security of the nation’s utilities. Regulations are becoming increasingly stringent, making perimeter security vital to maintaining safety, safeguarding assets, and ensuring business continuity. If critical assets are damaged or disabled, it can have a negative impact on the communities and […]

Regulation Turmoil Ahead?
Earlier this year, the Supreme Court of the United States overturned the decades-old case often referred to as Chevron deference—setting the stage for potential impactful changes to federal agency regulations that utilities must adhere to for current and future cybersecurity regulations. The original 1984 ruling of Chevron U.S.A. v. Natural Resources Defense Council required federal […]

Green Protection: Two Perspectives on How to Effectively Plan and Implement a Security Strategy for Renewable Energy Sources
Whether it’s solar, geothermal, wind or hydro, utilities are implementing more renewable energy generation sources than ever before. But with their rapid march toward these green energy sources come some new and distinct security challenges. To learn about what risks to consider and strategies to implement, I had a conversation with Idaho National Laboratory’s Emma […]

Homeland Security Conference Provides Attendees with New Insights to Threats
As threats increase in size, scope and variety for security professionals, it can feel like the thermostat is turned up for all to feel the increased heat that comes with addressing those threats. So, as attendees arrived in the hot summer Miami Beach sun to attend the Homeland Security Conference this July, the local weather […]

Protecting Water Utilities from Drone Threats: Understanding the Steps of a Drone Security Methodology that Support the J100 framework
The small uncrewed aerial system (sUAS) ecosystem can seem overwhelmingly complex, but it doesn’t have to be that way. The wars in the Middle East, Nagorno Karabakh, Ukraine, and now Gaza have proven that we need to pay attention to the threat that drone technology poses to our critical infrastructure. The use cases of this […]