How Unified Physical Security Solutions are Helping Utilities
Utility Security Podcast – Securing the Future – Fredrik Nilsson on AI, Cybersecurity, and Utility Threats
Utility Security Deep Dive – Danger from Above – The Time is Now to Address Drone Risks
Danger from Above: The Time is Now to Address Drone Risks
Utility Security Magazine Reports in Live at the Utility Technology Association’s (UVA) Conference
Mastering the three “Cs” of Security: Clarity, Communication and Consistency
Utility Security Deep Dive – Strategies for Protecting Critical Infrastructure
Knowing Your Risks and Vulnerabilities and How to Prioritize Budget to Close Gaps
Green Protection: Two Perspectives on How to Effectively Plan and Implement a Security Strategy for Renewable Energy Sources
Homeland Security Conference Provides Attendees with New Insights to Threats
How Unified Physical Security Solutions are Helping Utilities
In the News
Utility Security Podcast – Securing the Future – Fredrik Nilsson on AI, Cybersecurity, and Utility Threats
Utility Security Deep Dive – Danger from Above – The Time is Now to Address Drone Risks
Danger from Above: The Time is Now to Address Drone Risks
Utility Security Magazine Reports in Live at the Utility Technology Association’s (UVA) Conference
Mastering the three “Cs” of Security: Clarity, Communication and Consistency
Utility Security Deep Dive – Strategies for Protecting Critical Infrastructure
Knowing Your Risks and Vulnerabilities and How to Prioritize Budget to Close Gaps
Green Protection: Two Perspectives on How to Effectively Plan and Implement a Security Strategy for Renewable Energy Sources
Opinion
How Unified Physical Security Solutions are Helping Utilities
Utility Security Podcast – Securing the Future – Fredrik Nilsson on AI, Cybersecurity, and Utility Threats
Utility Security Deep Dive – Danger from Above – The Time is Now to Address Drone Risks
Danger from Above: The Time is Now to Address Drone Risks
Video
How Unified Physical Security Solutions are Helping Utilities
Featured Topics
How Unified Physical Security Solutions are Helping Utilities
Utility Security Podcast – Securing the Future – Fredrik Nilsson on AI, Cybersecurity, and Utility Threats
Utility Security Deep Dive – Danger from Above – The Time is Now to Address Drone Risks
Danger from Above: The Time is Now to Address Drone Risks
Utility Security Magazine Reports in Live at the Utility Technology Association’s (UVA) Conference
Mastering the three “Cs” of Security: Clarity, Communication and Consistency
How Unified Physical Security Solutions are Helping Utilities
In the US, the Cybersecurity & Infrastructure Security Agency (CISA) has identified 16 critical infrastructure sectors ranging from Food and Agriculture to Manufacturing, Communications, Public Health, Transportation, and Energy & Utilities. These sectors are so vital that any incapacitation or destruction would have a debilitating effect on the nation’s stability.
Among these sectors, the Energy & Utilities sector stands out for its foundational role in supporting all the others. A reliable energy supply is crucial for economic growth, public health, and national welfare. Without it, health and welfare would be threatened, and a country’s economy would be at significant risk. As a uniquely critical sector, Energy & Utilities requires special consideration regarding physical security, especially as it’s currently undergoing a major transformation.
The Move Toward Renewable Energy Cross-border investments in renewable energy, combined with the convergence of oil, gas, and power utilities, mean that mergers and acquisitions (M&A) are occurring on a global scale. At the same time, the sector is also moving from an analog, scale-driven, centralized energy model to a digital, vast geographic and distributed model.
One of the unintended results of this transformation has been a rise in security-related challenges. Leaders in the industry are considering how they can standardize and centralize their solutions as they inherit legacy systems that were intended to perform in isolation. They’re asking themselves how they can secure a growing number of assets across a dispersed and expanding territory.
To keep pace, Energy & Utilities organizations will need to modernize their security technology. Deploying a unified security system is a critical step toward achieving this goal. A portfolio of unified security solutions will help address evolving security needs while also improving operations, simplifying compliance, and increasing a cybersecurity posture.
Securing Critical Infrastructure and Improving Operations A comprehensive physical security strategy is key to ensuring operational efficiency is maximized. Breaches in security often result in downtime that costs millions of dollars. In addition, breaches can have a far-reaching and potentially catastrophic impact on other critical infrastructure.
Unified security platforms offer organizations a powerful tool to enhance physical security and improve operational efficiency. Deploying a unified system helps organizations extend their security beyond the perimeter. Technologies like radar, LiDAR, fence intrusion detection, and video analytics detect potential intruders or drones beyond the fence line and enable teams to take action before a breach occurs. This is particularly vital for remote or isolated facilities, such as transmission stations or storage depots.
Within the perimeter, advanced tools like automatic license plate recognition (ALPR) can provide a real-time inventory of vehicles on-site that would allow security personnel to manage access to restricted areas based on license plates. This can also reduce downtime caused by unauthorized access attempts and streamlines operations.
A video management system (VMS) provides security personnel with a clear picture of events and enables them to quickly respond to threats or incidents. Organizations can further improve security with a unified access control system (ACS). For example, by using people counting analytics with access control solutions, security personnel can monitor the movement of employees, contractors, and visitors. This capability is essential for routine operations, incident management, and evacuation procedures. Automated reporting features can also deliver critical updates to key personnel and first responders.
Simplifying the Compliance Process One of NERC’s main physical security requirements is that Energy & Utilities organizations must record all access control activities, maintain logs, and monitor critical facilities for unauthorized access 24/7. In the event of an access breach, NERC stipulates that organizations must investigate and categorize the alarm incident and implement the appropriate response plan within 15 minutes.
Verification of the alarm details and the response must be documented and are subject to an audit and review by the NERC Regional Entity. Regulatory penalties can cost up to $1 million per day per violation.
A unified security system that can optimize evidence reporting and the digitization of standard operating procedures (SOPs), can help Energy & Utilities organizations comply with these regulations. Being able to securely collect, manage, and share digital evidence from multiple sites makes it much easier to meet audit requirements and helps to paint a picture of compliance.
Organizations can also use a unified security system to predefine a wide variety of criteria and create digitized SOPs to guide personnel in their responses to events. This ensures compliance across a distributed organization since all security teams, regardless of shift or location, are always operating according to the same SOPs.
Cybersecurity Risks and New Regulations Recent years have seen a rise in cyberattacks from sophisticated cybercriminal groups in virtually all areas of life. Because of its unique position within critical infrastructure, the Energy & Utilities sector is especially vulnerable. For many, it isn’t a question of if it will happen, but when.
Modern physical security devices and systems are increasingly interconnected, which is helping security personnel keep people and organizations secure. At the same time, this growing connectivity is increasing the risks associated with criminal cyber activity.
Greater connectivity of systems over the internet means that a vulnerable device can become a gateway to an organization’s data and sensitive information. A poorly protected camera, unencrypted communication between a server and client application, or out-of-date firmware all have the potential to be exploited by cybercriminals.
This means that security teams can no longer focus solely on physical threats. Organizations must choose hardened solutions that also work to protect all other systems and information connected to the network.
Because no single approach is enough, any solution deployed within the Energy & Utilities sector must include multiple layers of defense, including the use strong encryption, authentication, and authorization protocols to protect data captured for management, analysis, and storage.
Energy & Utilities organizations have a unique opportunity to strengthen their physical security strategies, enhancing their ability to manage growing operations effectively. Unified security solutions can enable them to adapt to evolving regulations, protect critical facilities, and defend against increasingly sophisticated cyber threats. Working in partnership with trusted physical security vendors is essential to securing this vital sector, a cornerstone of every nation’s critical infrastructure.
Utility Security Podcast – Securing the Future – Fredrik Nilsson on AI, Cybersecurity, and Utility Threats
Join us as we explore the cutting-edge of utility security with Fredrik Nilsson, VP of Americas for Axis Communications. Recorded live at ISC East in New York, this episode delves into the growing challenges of cyberattacks, drone threats, and copper theft. Discover actionable solutions, like proactive cybersecurity measures, drone detection technologies, and AI-powered innovations, from one of the leading voices in video surveillance and IoT integration. Don’t miss this deep dive into the strategies shaping the future of utility security.
Key Takeaways:
- Cybersecurity for Utilities: How proactive measures and processes enhance defense against growing cyber threats.
- Drone Defense: Advanced technologies for detecting and tracking drone incursions near critical infrastructure.
- Copper Theft Solutions: Leveraging light-sensitive and thermal cameras to deter and prevent theft.
- AI in Security: The evolution of analytics and AI for smarter, cost-effective surveillance and operational efficiency.
- Addressing Talent Shortages: Programs and initiatives to train and attract talent into the utility security industry.
#UtilitySecurity #CyberThreats #DroneDefense #CopperTheft #AISecurity #UtilityInnovation #GridSafety #ISCNewYork #AxisCommunications
Tune in to stay updated and informed about securing our nation’s utilities!
Subscribe to Utility Security Magazine at no cost! – https://utilitysecurity.com/subscribe-now/
Utility Security Deep Dive – Danger from Above – The Time is Now to Address Drone Risks
Danger from Above: The Time is Now to Address Drone Risks
It is not “if” but “when” for a major and nefarious event happens involving Small Unmanned Aircraft (sUAS) like drones. There is a distinct lack of urgency across all levels of government about security, safety and emergency preparedness given the rise of drones and their rapidly maturing capabilities and demonstrated use cases. The question is: are we paying attention?
Look at the increasing news reports about how these platforms are disrupting security and safety almost daily. In 2023 alone, there was an uptick in these events. Look no further than the New Hampshire incident during which a private citizen decided to use a drone to drop feces and eggs on homeless encampments. Or look at how in New Jersey, a man decided to drop chemicals into swimming pools, turning the water yellow or green. Major events like NFL playoff games and rock concerts have been disrupted and delayed by drones. Before these events, we’d seen drones harassing U.S. Customs and Border Protection helicopters in 2021, drones disrupting critical infrastructure power in Pennsylvania, leaflets dropped over NFL games, and the list goes on. Additionally, we see the rapid evolution of sUAS technology through the lens of current wars. In Ukraine, for example, the use of first-person-view (FPV) drones has become revolutionary in military affairs, changing modern conflict in a way that has not been seen since the advent of the machine gun during World War I. These drones used with this technique and current capabilities are precision strike weapons that put fear in combatants on both sides just by the sound of their rotors. In Gaza, the use of sUAS in urban combat has proven effective for Israeli ground forces for reconnaissance in buildings and tunnels. These wars and wars before them show that drone technology is maturing fast, and use cases abound for threat considerations. Their use is only limited by imagination and creativity, which poses a significant challenge for critical infrastructure protection professionals. And as the creativity emerges, the ideas are shared worldwide via the internet—creating a scenario where copycatting is only a click away. Militaries around the world are paying attention. In fact, it would be hard to find a country today that isn’t diving deep into technology, and not just aerial applications. For those of us who are keeping a mindful eye on the dangers of drones, we continue to have a front-row seat to one of the greatest revolutions in military affairs that has a direct impact on society and everyday life. However, despite this rapid technology evolution and the now countless incidents that have raised the red flag over and over, changes have been slow, delayed or even nonexistent at times. Of particular concern is the security of critical infrastructure and mass-gathering events. These important functions and aspects of daily life are tremendously under-resourced for proper risk mitigation measures, and quite frankly, owners/operators should be screaming from the highest mountaintop about this issue. Like the cybersecurity shock and awe 10 years ago, drone technology can cause serious physical harm, disrupt life systems and affect the Internet of Things—making it an even more formidable problem. Consider the threats that are posed by common drones with payloads:- Drone with an IED payload.
- Drone with a liquid payload.
- Drone with surveillance payload (camera/video capability).
- Drone with electronic jamming payload.
- Drone with a cyberattack payload.
- Drone with contraband payload.
- Drones used in a swarm, loitering munition or FPV direct attack mode.
- Drones used by hobbyists for pictures and videos (no nefarious intent) but that cause disruption.
- Drone sellers/manufacturers. The commercial drone market already produces technology for a myriad of use cases and is expected to grow to $100 billion in sales by 2030. These companies produce drones that are used for deliveries, inspections, monitoring and many additional applications.
- Drone detection, monitoring and visualization. This segment of the market creates and sells systems designed to detect, track, monitor and inform on a drone’s location. and potential intentions.
- Counter-uncrewed aerial systems (CUAS) mitigation. This portion of the market creates and sells systems that can be used to impact a UAS’s flight, including kinetic, jamming, GPS disruption and signal take control/command.
- Drone as a Security Service. This market segment allows security practitioners to use drone technology as a patrolling and quick-reaction resource. It can be implemented as a permanent solution or contracted for special events.
- Training, exercises and operations. A growing section of the market is focusing on assessment and staff coordination to set conditions for a drone event. Training, exercises and operations are a direct reflection of a drone vulnerability and risk assessment (DVRA), drone emergency response planning (DERP) and Left of sUAS Launch (LoDL).
- Consumers (private and public) or drone users. The buyers of technology.
- CUAS and law.
- DVRA (to include data from a detection technology).
- DERP.
- LoDL plan development and operationalization.
In the Absence of Adequate Legislation, Here’s What You Can Do
Critical infrastructure and utility security, safety and emergency preparedness professionals should consider the state of current legislation when developing and planning an upgrade to their security programs. The current law, known as the Preventing Emerging Threats Act of 2018, is nested under the FAA Reauthorization Act and remains under a continuing resolution until December 20, 2024, when the next decision on funding will be made. In general, this law is recognition that drones are evolving, but it falls short of authorizing mitigation technologies and operations below the federal level of government, with some rare exceptions. However, regarding detection, tracking and identification of potential drone events, utility professionals should consider assessing, building emergency response and operationalizing LoDL plans to identify any sUAS approaching their facilities while also (1) executing geolocation of the operator and (2) simultaneously informing local law enforcement to take action in real time. This would require detailed mutual-aid agreements that support the foundational assessment, emergency plan and proactive LoDL operation. The reality is that legislation does exist that supports some form of proactive posture. The true gap in market understanding is developing the physical security program to address an air-domain event. Lack of knowledge and foundational assessment, policy, plans and procedures require rapid development.Ways to Make Change Happen
Given that legislation is not moving at a speed that adequately addresses the threat, your organization can take some steps to influence change that will empower greater sUAS security. The first step is to notify your representative of your concern. The more voices heard, the more likely our representatives will be to entertain meetings and a deeper dive about drone evolution from a threat perspective. Second, work with critical infrastructure governing and professional organizations to include CUAS and law, DVRA, DERP and LoDL in the standards for emergency response planning and inculcation into governing policy and procedures. This is a major gap in traditional and legacy physical security. Lastly, look at the organizations in the market that represent security, safety and emergency preparedness and add your voice to their membership by highlighting the need to protect critical infrastructure from the air domain. Our life systems are vulnerable more now than at any other time in recent history. The more you can do to proactively address the threat and make change happen, the better your utility security will be.In Conclusion
Security, safety and emergency preparedness professionals are in a unique position to take advantage of the changing physical security landscape. The air domain is now a viable threat consideration. We already know critical infrastructure and mass-gathering events are key targets with high-risk factors for a nefarious event. And we know emerging tactics with drones continue to rise. The key consideration here is the relative speed of change. Specifically, in the last six months, we have seen potential threat vector additions added to drones, and we can expect more new ideas to continue to surface. In the end, security, safety and emergency preparedness professionals do not have the luxury of time and space pertaining to drones. The ability to avoid considering the air domain has passed; we must now “look up” when developing comprehensive, layered and integrated security programs. About Col. Bill Edwards: Col. Bill Edwards retired from the military in 2018 and is now the executive vice president of security services for PMY Group. Bill has more than 35 years of expertise in operational/technical security, counterterrorism, counterintelligence, surveillance and counter-surveillance. He served as the director of intelligence for Theater Special Operations Command-North (USSOCOM), a position that required extensive collaboration and partnering across the U.S. whole of government security enterprise. Bill recently published a book, “Inside Abu Ghraib: Memoirs of Two U.S. Military Intelligence Officers,” and he has also published more than 100 articles on security-related topics. Bill teaches leadership, strategic communications and negotiations to Department of Defense officers and civilians through the Air War College. Reach him at bill.edwards@pmygroup.com.Utility Security Magazine Reports in Live at the Utility Technology Association’s (UVA) Conference
Utility Security Magazine reports in live on location at the Utility Technology Association’s (UVA) annual conference which was held in Huntsville, Alabama this year. We talk with UTA President Vicky Wilson Turner all about why this annual event brings a wealth of learning and networking opportunities to utility cybersecurity and technology professionals.
Tune in to stay updated and informed about securing our nation’s utilities!
Subscribe to Utility Security Magazine at no cost! – https://utilitysecurity.com/subscribe-now/