Skip to main content

LOOKING FOR SOMETHING?


Utility Security Podcast: Defending Utilities from the Drone Threat: Expert Strategies

In this episode of the Utility Security Podcast, host Curtis Marquardt welcomes back Bill Edwards of Phoenix 6 Consulting to discuss the growing threat of drones (UAS) to critical infrastructure. They explore how rapidly evolving drone technology—like first-person view (FPV) control and signal-dark modes—poses unique detection and mitigation challenges. Bill breaks down the latest federal […]

Drone Technology is Evolving Rapidly: Can Detection & Mitigation Solutions Keep Up?

With the rapid evolution of drone technology happening across the globe and especially in conflict zones, the need for the advancement of detection and mitigation solutions is needed more than ever
“Nothing in the world can take the place of persistence. … Persistence and determination alone are omnipotent. The slogan Press On! solved and always will solve the problems of the human race.” — Calvin Coolidge. This quote articulates and sums up the rapid evolution of the small uncrewed aircraft system (sUAS), or drone, which has […]

7 Key Strategies for Better Disaster Response Security

Should a Disaster Strike Your Utility, Is Your Security Plan Sound?
During disaster response deployments, I often remind our Disaster Protection Officers (DPOs), “If you don’t like what’s going on, wait 30 seconds—it will change.” It’s more than a catchy phrase; it’s a reflection of how unpredictable and fast-moving disaster environments truly are. In these situations, adaptability isn’t optional—it’s survival. As the DPOs often say, “Semper […]

New Research from AXIS Communications Reveals Video Surveillance AI Perspectives

Axis Communications has released its latest research report, The State of AI in Video Surveillance, which explores global industry perspectives on the use of artificial intelligence in the security industry and beyond. The report reveals current attitudes on AI technologies through in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of […]

Helping Secure Tomorrow Today: The SIA Utilities Advisory Board’s Aims to Educate the Next Generation of Utility Security Leaders

In an era where utilities are facing unprecedented threats from both physical and cyber domains, the Security Industry Association (SIA) Utilities Advisory Board (UAB) is working diligently to prepare the next generation of security leaders. Through strategic education initiatives, practical guidance development and industry collaboration, the UAB is transforming how we approach utility security in an increasingly complex technological landscape.
The security landscape for utility professionals has undergone a fundamental transformation that extends far beyond incremental change. Today’s security professionals have evolved from reactive protectors to proactive strategic leaders, serving as thought leaders, change agents and technology advocates in an increasingly interconnected world. Modern utility security encompasses a sophisticated understanding of multiple interconnected disciplines that […]

Theft, Ballistic Threats & Explosives, Oh My! – Dominic Dillon & Curtis Marquardt

In this episode of the Utility Security Podcast, host Curtis Marquardt engages with Dominic Dillon of 3B Protection to delve into the escalating threats facing utility infrastructures, including theft, ballistic attacks, and explosive devices. They discuss how 3B Protection’s innovative solutions, such as advanced barriers and EMP-resistant materials, are evolving to meet these challenges. The […]

Security Industry Association to Host Perimeter PREVENT Event This June

Security Professionals Will Gather in Washington D.C. to Share Knowledge & Insights Related to Perimeter Security Strategy
The Security Industry Association (SIA) will host its Perimeter PREVENT security event this June at the National Housing Center in Washington, D.C. The event will focus on providing insights into critical issues relating to physical perimeter defense for critical infrastructure, public events, government facilities and beyond. The symposium will bring together policymakers, federal agency personnel, […]

Theft, Ballistic Threats & Explosives, Oh My!

Talking Utility Security Barrier Solutions With Dominic Dillon, CEO of 3B Protection, and Brent Warzocha, Business Development Manager at Convergint
Ahead of my interview with Dominic Dillon, I visited the 3B Protection website and clicked on the section detailing how its products support utility security. I scrolled down the page to read the list. Then I scrolled down again. It struck me: This is a company that understands the depth and variety of safety and […]

Beyond Security: How Thermal Camera Technology Is Being Used to Monitor Critical Utility Components

Talking About How Security Equipment Is Expanding Into Other Areas of Operations With FLIR’s Security and Automation Sales Director, Jen Hones, and Convergint’s Utility Vertical Market Director, Steve Sinclair
Infrared technology has long been viewed as a solution that allows utilities to see beyond haze and fog for security applications. However, as more utilities look for ways to expand the use cases for security solutions, many are now applying the technology to monitor assets like substations and transformers — spotting signs of overheating or […]

Convergint and Deloitte Partner to Build Holistic Utility Security Solutions

Talking Unified Platforms, Cybersecurity and the Future of Utility Security With David Nowak, Principal at Deloitte, and Steve Sinclair, Utilities Vertical Market Director at Convergint
As the complexity of physical and cybersecurity grows for utilities, the need for a comprehensive understanding of risk has never been more critical. To address this, global systems integrator Convergint recently formed a strategic partnership with Deloitte — one of the world’s largest professional services networks and a member of the “Big Four” accounting firms. […]

Utility Security Podcast: Defending Utilities from the Drone Threat: Expert Strategies

In this episode of the Utility Security Podcast, host Curtis Marquardt welcomes back Bill Edwards of Phoenix 6 Consulting to discuss the growing threat of drones (UAS) to critical infrastructure. They explore how rapidly evolving drone technology—like first-person view (FPV) control and signal-da…
With the rapid evolution of drone technology happening across the globe and especially in conflict zones, the need for the advancement of detection and mitigation solutions is needed more than ever
“Nothing in the world can take the place of persistence. … Persistence and determination alone are omnipotent. The slogan Press On! solved and always will solve the problems of the human race.” — Calvin Coolidge. This quote articulates and sums up the rapid evolution of the small uncrewed aircraft system (sUAS), or drone, which has driven nations to reconsider military tactics and critical infrastructure protection and response while also shaping modern society for the coming tidal wave of change. In 2010, the first consumer drone was brought to the market for commercial sale. Since that…
Should a Disaster Strike Your Utility, Is Your Security Plan Sound?
During disaster response deployments, I often remind our Disaster Protection Officers (DPOs), “If you don’t like what’s going on, wait 30 seconds—it will change.” It’s more than a catchy phrase; it’s a reflection of how unpredictable and fast-moving disaster environments truly are. In these situati…
Axis Communications has released its latest research report, The State of AI in Video Surveillance, which explores global industry perspectives on the use of artificial intelligence in the security industry and beyond. The report reveals current attitudes on AI technologies through in-depth interv…

In an era where utilities are facing unprecedented threats from both physical and cyber domains, the Security Industry Association (SIA) Utilities Advisory Board (UAB) is working diligently to prepare the next generation of security leaders. Through strategic education initiatives, practical guidance development and industry collaboration, the UAB is transforming how we approach utility security in an increasingly complex technological landscape.
The security landscape for utility professionals has undergone a fundamental transformation that extends far beyond incremental change. Today’s security professionals have evolved from reactive protectors to proactive strategic leaders, serving as thought leaders, change agents and technology advocates in an increasingly interconnected world. Modern utility security encompasses a sophisticated understanding of multiple interconnected disciplines that form the backbone of contemporary infrastructure protection. This comprehensive approach integrates physical security infrastructure, advance…
In an era where utilities are facing unprecedented threats from both physical and cyber domains, the Security Industry Association (SIA) Utilities Advisory Board (UAB) is working diligently to prepare the next generation of security leaders. Through strategic education initiatives, practical guidance development and industry collaboration, the UAB is transforming how we approach utility security in an increasingly complex technological landscape.
In this episode of the Utility Security Podcast, host Curtis Marquardt engages with Dominic Dillon of 3B Protection to delve into the escalating threats facing utility infrastructures, including theft, ballistic attacks, and explosive devices. They discuss how 3B Protection’s innovative solutions…
Security Professionals Will Gather in Washington D.C. to Share Knowledge & Insights Related to Perimeter Security Strategy
The Security Industry Association (SIA) will host its Perimeter PREVENT security event this June at the National Housing Center in Washington, D.C. The event will focus on providing insights into critical issues relating to physical perimeter defense for critical infrastructure, public events, gove…

Talking Utility Security Barrier Solutions With Dominic Dillon, CEO of 3B Protection, and Brent Warzocha, Business Development Manager at Convergint
Ahead of my interview with Dominic Dillon, I visited the 3B Protection website and clicked on the section detailing how its products support utility security. I scrolled down the page to read the list. Then I scrolled down again. It struck me: This is a company that understands the depth and variet…
Talking About How Security Equipment Is Expanding Into Other Areas of Operations With FLIR’s Security and Automation Sales Director, Jen Hones, and Convergint’s Utility Vertical Market Director, Steve Sinclair
Infrared technology has long been viewed as a solution that allows utilities to see beyond haze and fog for security applications. However, as more utilities look for ways to expand the use cases for security solutions, many are now applying the technology to monitor assets like substations and tra…

Video

Utility Security Podcast: Defending Utilities from the Drone Threat: Expert Strategies

In this episode of the Utility Security Podcast, host Curtis Marquardt welcomes back Bill Edwards of Phoenix 6 Consulting to discuss the growing threat of drones (UAS) to critical infrastructure. They explore how rapidly evolving drone technology—like first-person view (FPV) control and signal-dark…

Featured Topics


Utility Security Podcast: Defending Utilities from the Drone Threat: Expert Strategies

In this episode of the Utility Security Podcast, host Curtis Marquardt welcomes back Bill Edwards of Phoenix 6 Consulting to discuss the growing threat of drones (UAS) to critical infrastructure. They explore how rapidly evolving drone technology—like first-person view (FPV) control and signal-da…
With the rapid evolution of drone technology happening across the globe and especially in conflict zones, the need for the advancement of detection and mitigation solutions is needed more than ever
“Nothing in the world can take the place of persistence. … Persistence and determination alone are omnipotent. The slogan Press On! solved and always will solve the problems of the human race.” — Calvin Coolidge. This quote articulates and sums up the rapid evolution of the small uncrewed airc…

Should a Disaster Strike Your Utility, Is Your Security Plan Sound?
During disaster response deployments, I often remind our Disaster Protection Officers (DPOs), “If you don’t like what’s going on, wait 30 seconds—it will change.” It’s more than a catchy phrase; it’s a reflection of how unpredictable and fast-moving disaster environments truly are. In these situati…
Axis Communications has released its latest research report, The State of AI in Video Surveillance, which explores global industry perspectives on the use of artificial intelligence in the security industry and beyond. The report reveals current attitudes on AI technologies through in-depth interv…
In an era where utilities are facing unprecedented threats from both physical and cyber domains, the Security Industry Association (SIA) Utilities Advisory Board (UAB) is working diligently to prepare the next generation of security leaders. Through strategic education initiatives, practical guidance development and industry collaboration, the UAB is transforming how we approach utility security in an increasingly complex technological landscape.
The security landscape for utility professionals has undergone a fundamental transformation that extends far beyond incremental change. Today’s security professionals have evolved from reactive protectors to proactive strategic leaders, serving as thought leaders, change agents and technology advoc…
In this episode of the Utility Security Podcast, host Curtis Marquardt engages with Dominic Dillon of 3B Protection to delve into the escalating threats facing utility infrastructures, including theft, ballistic attacks, and explosive devices. They discuss how 3B Protection’s innovative solutions…

In this episode of the Utility Security Podcast, host Curtis Marquardt welcomes back Bill Edwards of Phoenix 6 Consulting to discuss the growing threat of drones (UAS) to critical infrastructure. They explore how rapidly evolving drone technology—like first-person view (FPV) control and signal-dark modes—poses unique detection and mitigation challenges. Bill breaks down the latest federal executive orders, outlines proactive, low-cost steps utilities can take now, and emphasizes the importance of risk assessment, training, and layered detection strategies. Whether you’re a utility security professional, emergency planner, or critical infrastructure manager, this episode provides expert insight on preparing for the next wave of air-domain threats. Stay ahead of evolving risks and learn practical ways to safeguard your assets, teams, and communities against this rapidly growing challenge.

Tune in to stay updated and informed about securing our nation’s utilities! Subscribe to Utility Security Magazine at no cost! – https://utilitysecurity.com/subscribe-now/

Key Takeaways

  1. Drone technology is evolving rapidly—with new capabilities like FPV control and signal-dark modes making detection harder.

  2. Executive Orders signal growing federal support—but mitigation authority remains largely federal, requiring local facilities to prepare now.

  3. Proactive planning matters—even without mitigation authority, utilities can do risk assessments, training, and policy development.

  4. Layered detection is key—combining RF sensors, radar, optical, and acoustic approaches.

  5. Education is foundational—understanding the threat ecosystem is essential for smart, cost-effective security investments.

3 Questions and Answers

Q1: Why is the drone threat to utilities growing so quickly?

A: Drone technology is advancing in weeks, not years. Features like first-person view (FPV), improved payload capacity, and “dark mode” make drones cheaper, easier to control precisely, and harder to detect.


Q2: What can utilities do if mitigation authority is federal-only?

A: They can still act now with low- or no-cost steps: educate leadership, assess vulnerabilities, develop emergency response plans, and integrate air-domain awareness into existing security programs.


Q3: How can utilities improve drone detection?

A: By implementing layered detection strategies using radio frequency sensors, radar for non-emitting drones, high-fidelity optical cameras, and acoustic sensors—ensuring redundancy and coverage.

#UtilitySecurity #DroneThreat #CriticalInfrastructure #AirDomainAwareness #EmergencyPreparedness

With the rapid evolution of drone technology happening across the globe and especially in conflict zones, the need for the advancement of detection and mitigation solutions is needed more than ever
“Nothing in the world can take the place of persistence. … Persistence and determination alone are omnipotent. The slogan Press On! solved and always will solve the problems of the human race.” — Calvin Coolidge. This quote articulates and sums up the rapid evolution of the small uncrewed aircraft system (sUAS), or drone, which has driven nations to reconsider military tactics and critical infrastructure protection and response while also shaping modern society for the coming tidal wave of change. In 2010, the first consumer drone was brought to the market for commercial sale. Since that time, “drone” has become a common term and its systems have continued to evolve in capability, payload sophistication and, potentially most importantly, rapid maturity in component technological growth.  The endless cat-and-mouse game between drone platform manufacturers, detection sensor development and mitigation tool experimentation continues to amaze those who are watching while carefully sneaking up on those with responsibility for security, safety and emergency preparedness in critical areas of defense and private sector work. The evidence of this sweeping change resides in the laboratory called Ukraine and was solidified by the attack on Russian strategic assets on June 1, 2025. In this environment of total war, there is an innate need for survival as drones are reported to account for 70% to 80% of battlefield casualties, something that has shocked the seasoned military planner and shaken how defense organizations prepare their forces. In the beginning, it was common to see drone usage in its nascent stages, used mostly for intelligence, surveillance and reconnaissance missions that identified targets for artillery or airstrike missions.  Fast-forward to today’s reality and you see a complex, often chaotic employment of highly advanced equipment and techniques. Over time, commonly used drone platforms like DJI were prevalent, but as electronic warfare advanced, it became clear that these systems were easily defeated. This has relegated their use primarily to observation missions, leaving the attack platforms to time-tested, battle-ready form factors that are often customized for the mission, increased target success rates and electronic warfare defeat.  Hence, the introduction of fiber-optic command and control platforms has increased the target success rate from 50% with radio frequency drones to 90% to 100% target hit success with fiber optics. This has led to the advancement of the drone platform itself and thoughtful engineering in each component. Let’s start with the drone frame. It is common now to see carbon fiber, aluminum, glass fiber polymer, aramid fiber (Kevlar) and other fabricated materials that make up the drone foundation. It is also common to see a combination of these components to create even greater efficiency. Early reporting from the June attack on Russian strategic bombers and assets indicates drones with hardened frames. Next is the power supply or battery. Power manipulation and experimentation are continuing to evolve. Larger battery packs are evident on custom first-person view (FPV) drones to extend range, speed and distance while leveraging copper and nickel configurations to connect individual batteries to create a power pack. The size of the drone and payload must be considered in power composition. Propeller or rotor blade engineering looks at reshaping to support extended range and noise reduction. It is now emerging to think about propeller pitch and how it affects flight. Higher pitch in blade design adds thrust and speed to the platform but comes with a disadvantage — in this case, a power demand (hence increased power exploration with battery maturation) and a degradation in the ability to hover. Lower-pitch rotor blades are more efficient and give the operator longer flight times and stable hover operations but come with less thrust. The key is balance and mission need and, of course, preference. Motors are being designed for increased speed, payload increases, lower sound emission and range. Intelligent, brushless and high-efficiency magnets that support lower sound signatures make detection through acoustic sensors much harder. Lastly, onboard computing is moving to smaller components with more power and intelligence. Some key features include inertial navigation with optical collaboration for electronic warfare defeat, for a higher chance of success. Also, radio frequency variations are leaving the standard 2.4-5.8 GHz ISM operating band for bands ranging from 150-950 MHz. All of this is done to give the drone a better chance in a contested signals operating space where jamming is prevalent and lethal. These maturations are being tested across the globe, and experiments are taking place in challenged areas, but they are also emerging in younger people interested in robotics. Take, for example, a student in Pennsylvania and his vertical-takeoff-and-landing design. The consistent action-reaction technology design maturity keeps this ecosystem vibrant but also in an unpredictable state of growth and evolution.  As the drone platform grows technically, there are second- and third-order effects on detection and mitigation sensors and tools. These capabilities must keep up with drone design to effectively operate in a very complex environment. The detection operation is hard enough now but will only become more complicated as the technology improves. In its entirety, this is a fascinating story taking shape right before our eyes. Public servants, lawmakers and military professionals are not keeping pace with what is developing. This is a technology that matures in weeks and months, not years, and requires a persistent eye and creative thought for security, safety and emergency preparedness, as legacy physical security approaches have quickly become outdated. The level of potential threat and nefarious acts increases with the availability and advent of drone systems. Critical infrastructure, mass gathering venues and public transportation are all vulnerable based on current mitigation legislation, including a lack of delegation for mitigation authority, training and certification. A system of checks and balances does not exist, leaving all of these societal needs vulnerable to a nefarious event. The proactive step right now is to establish a plan and execute a tested methodology of counter-UAS (cUAS) and law education, Drone Vulnerability and Risk Assessment (DVRA), Drone Emergency Response Planning (DERP) and Left-of-Drone Launch (LoDL) CONOP development. It’s time for business owners and leaders to direct and implement an air domain program within a comprehensive security approach. We no longer have the luxury of viewing this technology as emerging; it’s now steadily maturing. Owners, leaders and security professionals, it’s time to wake up.
Bill Edwards is a retired U.S. Army colonel, a veteran of the Iraq War and the owner of Phoenix 6 Consulting LLC.  
Should a Disaster Strike Your Utility, Is Your Security Plan Sound?

7 Key Strategies for Better Disaster Response Security

During disaster response deployments, I often remind our Disaster Protection Officers (DPOs), “If you don’t like what’s going on, wait 30 seconds—it will change.” It’s more than a catchy phrase; it’s a reflection of how unpredictable and fast-moving disaster environments truly are. In these situations, adaptability isn’t optional—it’s survival. As the DPOs often say, “Semper Gumby”—a play on the Marine Corps’ motto “Semper Fi” that means “always flexible.” Protecting critical infrastructure during a disaster response is a mission that involves far more than just showing up. It’s a complex op…

Axis Communications has released its latest research report, The State of AI in Video Surveillance, which explores global industry perspectives on the use of artificial intelligence in the security industry and beyond.

The report reveals current attitudes on AI technologies through in-depth interviews with AI experts from Axis’ global network and a comprehensive survey of more than 5,800 respondents, including distributors, channel partners and end customers across 68 countries. The resulting insights cover AI integration and the opportunities and challenges that exist regarding security, safety, business intelligence and operational efficiency.

Axis’ research found that 62% of partners identify “AI and generative AI” as one of the most significant trends shaping the industry’s future, compared with 34% of end customers. This positions AI as the top trend for partner businesses—tied with “cybersecurity, risk and privacy,” which also garnered 62%. Among end customers, however, AI ranks third, with “cybersecurity, risk and privacy” leading at 61%. Additionally, half of partner respondents highlighted “analytics and actionable insights” as a key trend, while 36% of end customers agreed.

“AI remains one of the most powerful and transformative technologies within the video surveillance industry today,” said Mats Thulin, director, AI & analytics solutions, Axis Communications. “This new research reveals that while there are significant opportunities for AI to improve safety and security alongside business intelligence and operational efficiency, there must be a focus on ethical implementation and meaningful integrations to drive continuous value.”

Overall, the focus on AI and analytics signals a growing industry understanding of the many benefits of AI adoption, including greater efficiency, improved decision-making and enhanced output quality. However, end customers consider cybersecurity, risk and privacy to be a higher priority when it comes to technology integration, which likely signals ongoing ethical and compliance-related concerns surrounding AI. Trust, responsibility and accountability will be critical if providers hope to lead customers toward greater AI integration.

Report Reveals 9 Key Insights About the Acceleration of Cloud and Edge AI to the Growing Use of Facial Recognition

Participants of the study collectively revealed these nine key insights relating to cloud and edge AI:

  • AI adoption surges with differences between markets. Many view the technology as still growing, but recognize how it is evolving at different rates based on market and location.

  • The transition to cloud and edge AI continues to accelerate. In a hunt for easier scalability and faster processing, more and more are viewing cloud and edge AI as crucial to those goals.

  • Integration of diverse data is generating valuable insights. With the integration of diverse data sources, many believe this shift will fundamentally impact safety and security by providing a more comprehensive understanding of events.

  • Growing use of facial recognition. Many predict that facial recognition will continue to gain traction globally. While they express concerns about the ethics of this, they also acknowledge that there are ways of using this technology that align with ethical standards.

  • New opportunities for business intelligence and operational efficiency. Participants view AI integration as a means to empower network cameras to improve operations in a number of ways, including space optimization, people counting, asset tracking and more.

  • AI integration challenges: bridging expectations and capabilities. Participants expressed concerns about the challenge of effectively combining the right tools and technologies to achieve the desired surveillance and detection results.

  • Partnership and collaboration for effective and responsible AI integration. Participants emphasized the importance of partnering with organizations that align with the ethical challenges that may arise from implementing AI technologies.

  • Navigating responsible AI. Interviewees expressed concerns that decisions made by AI systems could become biased or unreliable. They also reiterated concerns about the legal and ethical challenges of using these tools.

  • The road ahead – future trends to watch. Participants acknowledged the difficulty in predicting future trends or solutions due to the rapid pace of technological development. However, they pointed to expectations of smarter AI pipelines and greater integration between AI and IoT sensors.

To read the full report, you can download it here.

In an era where utilities are facing unprecedented threats from both physical and cyber domains, the Security Industry Association (SIA) Utilities Advisory Board (UAB) is working diligently to prepare the next generation of security leaders. Through strategic education initiatives, practical guidance development and industry collaboration, the UAB is transforming how we approach utility security in an increasingly complex technological landscape.
The security landscape for utility professionals has undergone a fundamental transformation that extends far beyond incremental change. Today’s security professionals have evolved from reactive protectors to proactive strategic leaders, serving as thought leaders, change agents and technology advocates in an increasingly interconnected world. Modern utility security encompasses a sophisticated understanding of multiple interconnected disciplines that form the backbone of contemporary infrastructure protection. This comprehensive approach integrates physical security infrastructure, advanced cybersecurity frameworks, robust governance, risk and compliance (GRC) programs, comprehensive disaster recovery planning and integrated business continuity management. This multifaceted approach reflects the reality that today’s utility operations exist within a complex ecosystem where traditional boundaries between physical and digital security have dissolved. The days of securing isolated transformer substations, generating stations, transmission lines, data centers and control centers as discrete entities are behind us. Today’s security professionals must safeguard a vast, interconnected electrical ecosystem that includes:
  • Renewable energy integration: Solar farms, wind installations and battery storage systems that create new attack vectors and operational complexities.
  • Distributed grid technologies: Microgrids and smart grid technologies that multiply connection points and potential vulnerabilities.
  • High-demand computing infrastructure: AI data centers and cloud computing facilities that place unprecedented demands on power generation and distribution systems.
  • Smart city integration: IoT devices, electric vehicle charging networks and integrated urban systems that expand the attack surface exponentially.
  • Emerging technologies: Quantum computing infrastructure and next-generation communication systems that will reshape how utilities operate.
These components aren’t peripheral additions to our infrastructure — they represent the core of our future operations and are becoming essential to community resilience and economic stability.

Threat Landscape Evolution

Modern utilities face a multi-vector threat environment that includes:
  • Nation-state actors targeting critical infrastructure for strategic advantage
  • Ransomware groups seeking financial gain through operational disruption
  • Insider threats from employees with legitimate access but malicious intent
  • Physical attacks on substations and transmission infrastructure
  • Supply chain vulnerabilities in hardware and software components
  • Climate-related disasters that test resilience and recovery capabilities

Building a Utilities Advisory Board That Aligns With Strategic Foundations and Leadership Vision

The SIA Utilities Advisory Board emerged from a strategic recognition that the utility security sector required dedicated focus and specialized expertise. The Security Industry Association’s Board of Directors, under the visionary leadership of James Rothstein and with the full backing of CEO Don Erickson, identified a critical gap in industry support for emerging security professionals and the urgent need for systematic knowledge transfer. The board’s establishment represented more than organizational expansion — it signified a commitment to fostering innovation, sharing best practices and creating pathways for professional development in one of the most critical sectors of our economy.

Leadership Selection and Expertise

Finding the right leader for this initiative required identifying someone with both depth of experience and breadth of perspective. After an extensive selection process, I was honored to accept the role of chair, bringing over three decades of comprehensive experience including:
  • Infrastructure design and construction: Deep understanding of electrical distribution systems from design through implementation
  • SCADA and telecommunications: Expertise in the communication systems that form the nervous system of modern utilities
  • Integrated security approach: Practical experience implementing both physical and cybersecurity measures across diverse facility types
  • Global leadership: Management of international teams and cross-cultural security initiatives
  • Digital transformation and product development: Leading strategic initiatives that drive technological advancement and business growth within manufacturing environments
  • Consulting expertise: Orchestrating comprehensive security architecture solutions, including vulnerability assessments, risk analysis and innovative design methodologies specifically engineered for protecting critical infrastructure assets and operational continuity
From there, the mission became assembling a full working group — a carefully curated collection of industry leaders who bring diverse perspectives and a unified commitment to our mission. We knew we needed:
  • C-suite executives who understand the strategic implications of security decisions
  • Business owners and entrepreneurs who bring innovation and real-world experience
  • Hands-on practitioners with deep technical expertise in securing infrastructure
  • Global perspectives from professionals experienced in international threat landscapes
  • Academic and research leaders who contribute cutting-edge theory and practical application

Coming Together to Make an Impact Through Practical Solutions

To propel our mission, the UAB has implemented and continues to support several key initiatives:

Bi-monthly Meetings

Our bi-monthly meetings follow a structured agenda designed to maximize collective expertise. Each session includes:
  • Threat intelligence sharing
  • Technology assessments
  • Regulatory updates
  • Case study reviews
  • Best practice development

Educational Impact and Industry Engagement

To support industry education, we have organized two lunch-and-learn sessions hosted annually at ISC West and ISC East. These highly anticipated events consistently sell out and provide actionable, practical guidance — a testament to the industry’s recognition of our mission’s importance.

The NERC CIP Compliance Guide: Translating Complexity Into Action

One of our most significant achievements is the development of the Guide to NERC CIP Compliance, a comprehensive resource that simplifies complex regulatory requirements into actionable strategies. The guide was shaped by:
  • Former auditors
  • Utility professionals
  • Technology specialists
  • Risk management experts
Rather than just outlining what compliance entails, the guide offers roadmaps for achieving and maintaining compliance while enhancing security posture. It’s a free resource that is available to SIA members and is available to download here Global Knowledge Transfer and Conference Participation Many UAB members serve as thought leaders at international security conferences. This participation enhances our efforts through:
  • Early warning of emerging threats
  • Exposure to global security innovations
  • Insights from other regulatory environments
  • Cross-cultural security perspectives

Future-Focused Project Portfolio

Our current project portfolio includes:
  • Physical and cybersecurity integration
  • Governance, risk and compliance (GRC) frameworks
  • IT/OT collaboration
  • Insider threat detection
  • AI migration case studies
  • Audit preparation
  • Advanced threat modeling
  • Cross-sector collaboration
  • Technology integration
  • Workforce development
  • Research and development initiatives
The next generation of security professionals will leverage transformative technologies. Our role is to help them implement these tools effectively and responsibly. Areas of focus include:
  • Cloud infrastructure
  • Artificial intelligence and machine learning
  • Mobility solutions
  • Advanced biometrics
  • Drone and counter-drone systems
  • Next-generation encryption

Join Our Mission

The SIA Utilities Advisory Board is seeking new members who bring:
  • Passion for critical infrastructure security
  • Professional expertise
  • Educational commitment
  • Global insight
  • An innovation mindset
We welcome professionals from a variety of sectors, including utility security, technology vendors, consultants, academia, regulators and international experts. To learn more, contact Ron Hawkins at rhawkins@securityindustry.org. We welcome interest from professionals at all career stages.

In Conclusion: Securing Our Collective Future

The work of the SIA Utilities Advisory Board represents a commitment to securing the infrastructure that modern society depends on. By blending experience with forward-looking innovation, we are building a foundation for lasting security excellence. The challenges are real, but with collaboration, education and innovation, we can prepare future leaders to protect our infrastructure. The SIA Utilities Advisory Board is ready — and we invite you to join us. About the Author: Joey St. Jacques has built a distinguished 30-plus-year career in the critical infrastructure sector, demonstrating deep expertise in electrical utility security and strategic leadership. As chair of the SIA Utilities Advisory Board and a member of multiple industry boards, he leads initiatives that drive innovation, improve protective practices and shape educational programs for emerging security professionals across global markets.  

In this episode of the Utility Security Podcast, host Curtis Marquardt welcomes back Bill Edwards of Phoenix 6 Consulting to discuss the growing threat of drones (UAS) to critical infrastructure. They explore how rapidly evolving drone technology—like first-person view (FPV) control and signal-da…
With the rapid evolution of drone technology happening across the globe and especially in conflict zones, the need for the advancement of detection and mitigation solutions is needed more than ever
“Nothing in the world can take the place of persistence. … Persistence and determination alone are omnipotent. The slogan Press On! solved and always will solve the problems of the human race.” — Calvin Coolidge. This quote articulates and sums up the rapid evolution of the small uncrewed airc…
Should a Disaster Strike Your Utility, Is Your Security Plan Sound?
During disaster response deployments, I often remind our Disaster Protection Officers (DPOs), “If you don’t like what’s going on, wait 30 seconds—it will change.” It’s more than a catchy phrase; it’s a reflection of how unpredictable and fast-moving disaster environments truly are. In these situati…
Axis Communications has released its latest research report, The State of AI in Video Surveillance, which explores global industry perspectives on the use of artificial intelligence in the security industry and beyond. The report reveals current attitudes on AI technologies through in-depth interv…

In this episode of the Utility Security Podcast, host Curtis Marquardt welcomes back Bill Edwards of Phoenix 6 Consulting to discuss the growing threat of drones (UAS) to critical infrastructure. They explore how rapidly evolving drone technology—like first-person view (FPV) control and signal-da…
With the rapid evolution of drone technology happening across the globe and especially in conflict zones, the need for the advancement of detection and mitigation solutions is needed more than ever
“Nothing in the world can take the place of persistence. … Persistence and determination alone are omnipotent. The slogan Press On! solved and always will solve the problems of the human race.” — Calvin Coolidge. This quote articulates and sums up the rapid evolution of the small uncrewed airc…
Should a Disaster Strike Your Utility, Is Your Security Plan Sound?
During disaster response deployments, I often remind our Disaster Protection Officers (DPOs), “If you don’t like what’s going on, wait 30 seconds—it will change.” It’s more than a catchy phrase; it’s a reflection of how unpredictable and fast-moving disaster environments truly are. In these situati…
Axis Communications has released its latest research report, The State of AI in Video Surveillance, which explores global industry perspectives on the use of artificial intelligence in the security industry and beyond. The report reveals current attitudes on AI technologies through in-depth interv…