From Vulnerability to Strength – Utility Security Strategies – Jim Willis, MSc, CMAS, CHS1
How Unified Physical Security Solutions are Helping Utilities
Utility Security Podcast – Securing the Future – Fredrik Nilsson on AI, Cybersecurity, and Utility Threats
Utility Security Deep Dive – Danger from Above – The Time is Now to Address Drone Risks
Danger from Above: The Time is Now to Address Drone Risks
Utility Security Magazine Reports in Live at the Utility Technology Association’s (UVA) Conference
Mastering the three “Cs” of Security: Clarity, Communication and Consistency
Utility Security Deep Dive – Strategies for Protecting Critical Infrastructure
Knowing Your Risks and Vulnerabilities and How to Prioritize Budget to Close Gaps
Green Protection: Two Perspectives on How to Effectively Plan and Implement a Security Strategy for Renewable Energy Sources
From Vulnerability to Strength – Utility Security Strategies – Jim Willis, MSc, CMAS, CHS1
In the News
How Unified Physical Security Solutions are Helping Utilities
Utility Security Podcast – Securing the Future – Fredrik Nilsson on AI, Cybersecurity, and Utility Threats
Utility Security Deep Dive – Danger from Above – The Time is Now to Address Drone Risks
Danger from Above: The Time is Now to Address Drone Risks
Utility Security Magazine Reports in Live at the Utility Technology Association’s (UVA) Conference
Mastering the three “Cs” of Security: Clarity, Communication and Consistency
Utility Security Deep Dive – Strategies for Protecting Critical Infrastructure
Knowing Your Risks and Vulnerabilities and How to Prioritize Budget to Close Gaps
Opinion
From Vulnerability to Strength – Utility Security Strategies – Jim Willis, MSc, CMAS, CHS1
How Unified Physical Security Solutions are Helping Utilities
Utility Security Podcast – Securing the Future – Fredrik Nilsson on AI, Cybersecurity, and Utility Threats
Utility Security Deep Dive – Danger from Above – The Time is Now to Address Drone Risks
Video
From Vulnerability to Strength – Utility Security Strategies – Jim Willis, MSc, CMAS, CHS1
Featured Topics
From Vulnerability to Strength – Utility Security Strategies – Jim Willis, MSc, CMAS, CHS1
How Unified Physical Security Solutions are Helping Utilities
Utility Security Podcast – Securing the Future – Fredrik Nilsson on AI, Cybersecurity, and Utility Threats
Utility Security Deep Dive – Danger from Above – The Time is Now to Address Drone Risks
Danger from Above: The Time is Now to Address Drone Risks
Utility Security Magazine Reports in Live at the Utility Technology Association’s (UVA) Conference
From Vulnerability to Strength – Utility Security Strategies – Jim Willis, MSc, CMAS, CHS1
In this episode of the Utility Security Podcast, we sit down with Jim Willis, CEO of Indev Tactical, to discuss the growing security challenges facing utilities today. From the increasing number of substation attacks to mass shooting preparedness, Jim shares invaluable insights from his extensive experience in the field. We cover best practices for securing substations, the importance of vendor selection, and how to implement effective security training without overwhelming employees. With evolving threats, including drones used for surveillance and attacks, utilities must stay ahead of the curve. Tune in to learn how to enhance your security posture and protect critical infrastructure.
Key Takeaways:
- Understanding Utility Security Risks – Why attacks on substations and infrastructure are increasing.
- Mass Shooting Preparedness – How to train effectively without causing unnecessary panic.
- Vendor Selection – Why not every vendor is a security expert and how to choose the right one.
- Beyond Cybersecurity – Why physical security and personnel safety are just as critical.
- The Role of Drones – How drones are being used for both inspections and attacks.
- Public Perception Shifts – Why utilities are now seen as adversaries and what that means for security.
- Training Matters – Why employees should have security skills to match their technical skills.
Tune in to stay updated and informed about securing our nation’s utilities!
Subscribe to Utility Security Magazine at no cost! – https://utilitysecurity.com/subscribe-now/
#UtilitySecurity #GridProtection #CriticalInfrastructure #MassShootingPreparedness #SubstationSecurity #CyberThreats #SecurityTraining #JimWillis #InfrastructureProtection #UtilitySafety
How Unified Physical Security Solutions are Helping Utilities
In the US, the Cybersecurity & Infrastructure Security Agency (CISA) has identified 16 critical infrastructure sectors ranging from Food and Agriculture to Manufacturing, Communications, Public Health, Transportation, and Energy & Utilities. These sectors are so vital that any incapacitation or destruction would have a debilitating effect on the nation’s stability.
Among these sectors, the Energy & Utilities sector stands out for its foundational role in supporting all the others. A reliable energy supply is crucial for economic growth, public health, and national welfare. Without it, health and welfare would be threatened, and a country’s economy would be at significant risk. As a uniquely critical sector, Energy & Utilities requires special consideration regarding physical security, especially as it’s currently undergoing a major transformation.
The Move Toward Renewable Energy Cross-border investments in renewable energy, combined with the convergence of oil, gas, and power utilities, mean that mergers and acquisitions (M&A) are occurring on a global scale. At the same time, the sector is also moving from an analog, scale-driven, centralized energy model to a digital, vast geographic and distributed model.
One of the unintended results of this transformation has been a rise in security-related challenges. Leaders in the industry are considering how they can standardize and centralize their solutions as they inherit legacy systems that were intended to perform in isolation. They’re asking themselves how they can secure a growing number of assets across a dispersed and expanding territory.
To keep pace, Energy & Utilities organizations will need to modernize their security technology. Deploying a unified security system is a critical step toward achieving this goal. A portfolio of unified security solutions will help address evolving security needs while also improving operations, simplifying compliance, and increasing a cybersecurity posture.
Securing Critical Infrastructure and Improving Operations A comprehensive physical security strategy is key to ensuring operational efficiency is maximized. Breaches in security often result in downtime that costs millions of dollars. In addition, breaches can have a far-reaching and potentially catastrophic impact on other critical infrastructure.
Unified security platforms offer organizations a powerful tool to enhance physical security and improve operational efficiency. Deploying a unified system helps organizations extend their security beyond the perimeter. Technologies like radar, LiDAR, fence intrusion detection, and video analytics detect potential intruders or drones beyond the fence line and enable teams to take action before a breach occurs. This is particularly vital for remote or isolated facilities, such as transmission stations or storage depots.
Within the perimeter, advanced tools like automatic license plate recognition (ALPR) can provide a real-time inventory of vehicles on-site that would allow security personnel to manage access to restricted areas based on license plates. This can also reduce downtime caused by unauthorized access attempts and streamlines operations.
A video management system (VMS) provides security personnel with a clear picture of events and enables them to quickly respond to threats or incidents. Organizations can further improve security with a unified access control system (ACS). For example, by using people counting analytics with access control solutions, security personnel can monitor the movement of employees, contractors, and visitors. This capability is essential for routine operations, incident management, and evacuation procedures. Automated reporting features can also deliver critical updates to key personnel and first responders.
Simplifying the Compliance Process One of NERC’s main physical security requirements is that Energy & Utilities organizations must record all access control activities, maintain logs, and monitor critical facilities for unauthorized access 24/7. In the event of an access breach, NERC stipulates that organizations must investigate and categorize the alarm incident and implement the appropriate response plan within 15 minutes.
Verification of the alarm details and the response must be documented and are subject to an audit and review by the NERC Regional Entity. Regulatory penalties can cost up to $1 million per day per violation.
A unified security system that can optimize evidence reporting and the digitization of standard operating procedures (SOPs), can help Energy & Utilities organizations comply with these regulations. Being able to securely collect, manage, and share digital evidence from multiple sites makes it much easier to meet audit requirements and helps to paint a picture of compliance.
Organizations can also use a unified security system to predefine a wide variety of criteria and create digitized SOPs to guide personnel in their responses to events. This ensures compliance across a distributed organization since all security teams, regardless of shift or location, are always operating according to the same SOPs.
Cybersecurity Risks and New Regulations Recent years have seen a rise in cyberattacks from sophisticated cybercriminal groups in virtually all areas of life. Because of its unique position within critical infrastructure, the Energy & Utilities sector is especially vulnerable. For many, it isn’t a question of if it will happen, but when.
Modern physical security devices and systems are increasingly interconnected, which is helping security personnel keep people and organizations secure. At the same time, this growing connectivity is increasing the risks associated with criminal cyber activity.
Greater connectivity of systems over the internet means that a vulnerable device can become a gateway to an organization’s data and sensitive information. A poorly protected camera, unencrypted communication between a server and client application, or out-of-date firmware all have the potential to be exploited by cybercriminals.
This means that security teams can no longer focus solely on physical threats. Organizations must choose hardened solutions that also work to protect all other systems and information connected to the network.
Because no single approach is enough, any solution deployed within the Energy & Utilities sector must include multiple layers of defense, including the use strong encryption, authentication, and authorization protocols to protect data captured for management, analysis, and storage.
Energy & Utilities organizations have a unique opportunity to strengthen their physical security strategies, enhancing their ability to manage growing operations effectively. Unified security solutions can enable them to adapt to evolving regulations, protect critical facilities, and defend against increasingly sophisticated cyber threats. Working in partnership with trusted physical security vendors is essential to securing this vital sector, a cornerstone of every nation’s critical infrastructure.
Utility Security Podcast – Securing the Future – Fredrik Nilsson on AI, Cybersecurity, and Utility Threats
Utility Security Deep Dive – Danger from Above – The Time is Now to Address Drone Risks
Utility Security Deep Dive – Danger from Above – The Time is Now to Address Drone Risks
Written by William Edwards on October 31, 2024. Posted in Infrastructure Security.
Read the article here – https://utilitysecurity.com/blog/danger-from-above-the-time-is-now-to-address-drone-risks/
In this episode, we dive deep into the rapidly evolving world of drone technology, examining the growing risks and potential impacts on both civilian and military fronts. We discuss unsettling real-world incidents, from drones dropping hazardous materials to sophisticated cyber-attack capabilities. As drones become more accessible and adaptable, the conversation explores the complex ecosystem surrounding drone technology, including detection systems, legal challenges, and the urgent need for effective countermeasures. While highlighting both the dangers and opportunities of drones, we also consider how collective action, education, and proactive regulation can help shape a safer future for this powerful technology.
Key Takeaways
- Escalating Risks: Drones are increasingly used for malicious activities, from chemical attacks to sophisticated cyber intrusions.
- Complex Ecosystem: The drone industry involves not only manufacturers but also detection technology developers, legal frameworks, and advocacy groups.
- Legal Challenges: Rapid advancements in drone technology are outpacing current laws, making regulation a significant challenge.
- Proactive Measures: Education, collaboration, and updated regulations are crucial to harnessing the positive potential of drones while minimizing threats.
- Future Vision: Despite the risks, drones offer groundbreaking opportunities in fields like agriculture, construction, and urban air mobility.
#DroneSecurity #CyberThreats #TechRegulation #FPVDrones #FutureOfDrones #UrbanAirMobility #CounterDroneMeasures #CyberAttackPrevention #DroneTechnology #AerialSurveillance
Tune in to stay updated and informed about securing our nation’s utilities!
Subscribe to Utility Security Magazine at no cost! – https://utilitysecurity.com/subscribe-now/
Bill Edwards is the Executive Vice President of Security Services at PMY Group. He leads the National Institute of Drone Security Standards and Training (NIDSST) and is a retired U.S. Army Colonel and Veteran of the Iraq War.
Danger from Above: The Time is Now to Address Drone Risks
It is not “if” but “when” for a major and nefarious event happens involving Small Unmanned Aircraft (sUAS) like drones. There is a distinct lack of urgency across all levels of government about security, safety and emergency preparedness given the rise of drones and their rapidly maturing capabilities and demonstrated use cases. The question is: are we paying attention?
Look at the increasing news reports about how these platforms are disrupting security and safety almost daily. In 2023 alone, there was an uptick in these events. Look no further than the New Hampshire incident during which a private citizen decided to use a drone to drop feces and eggs on homeless encampments. Or look at how in New Jersey, a man decided to drop chemicals into swimming pools, turning the water yellow or green. Major events like NFL playoff games and rock concerts have been disrupted and delayed by drones. Before these events, we’d seen drones harassing U.S. Customs and Border Protection helicopters in 2021, drones disrupting critical infrastructure power in Pennsylvania, leaflets dropped over NFL games, and the list goes on. Additionally, we see the rapid evolution of sUAS technology through the lens of current wars. In Ukraine, for example, the use of first-person-view (FPV) drones has become revolutionary in military affairs, changing modern conflict in a way that has not been seen since the advent of the machine gun during World War I. These drones used with this technique and current capabilities are precision strike weapons that put fear in combatants on both sides just by the sound of their rotors. In Gaza, the use of sUAS in urban combat has proven effective for Israeli ground forces for reconnaissance in buildings and tunnels. These wars and wars before them show that drone technology is maturing fast, and use cases abound for threat considerations. Their use is only limited by imagination and creativity, which poses a significant challenge for critical infrastructure protection professionals. And as the creativity emerges, the ideas are shared worldwide via the internet—creating a scenario where copycatting is only a click away. Militaries around the world are paying attention. In fact, it would be hard to find a country today that isn’t diving deep into technology, and not just aerial applications. For those of us who are keeping a mindful eye on the dangers of drones, we continue to have a front-row seat to one of the greatest revolutions in military affairs that has a direct impact on society and everyday life. However, despite this rapid technology evolution and the now countless incidents that have raised the red flag over and over, changes have been slow, delayed or even nonexistent at times. Of particular concern is the security of critical infrastructure and mass-gathering events. These important functions and aspects of daily life are tremendously under-resourced for proper risk mitigation measures, and quite frankly, owners/operators should be screaming from the highest mountaintop about this issue. Like the cybersecurity shock and awe 10 years ago, drone technology can cause serious physical harm, disrupt life systems and affect the Internet of Things—making it an even more formidable problem. Consider the threats that are posed by common drones with payloads:- Drone with an IED payload.
- Drone with a liquid payload.
- Drone with surveillance payload (camera/video capability).
- Drone with electronic jamming payload.
- Drone with a cyberattack payload.
- Drone with contraband payload.
- Drones used in a swarm, loitering munition or FPV direct attack mode.
- Drones used by hobbyists for pictures and videos (no nefarious intent) but that cause disruption.
- Drone sellers/manufacturers. The commercial drone market already produces technology for a myriad of use cases and is expected to grow to $100 billion in sales by 2030. These companies produce drones that are used for deliveries, inspections, monitoring and many additional applications.
- Drone detection, monitoring and visualization. This segment of the market creates and sells systems designed to detect, track, monitor and inform on a drone’s location. and potential intentions.
- Counter-uncrewed aerial systems (CUAS) mitigation. This portion of the market creates and sells systems that can be used to impact a UAS’s flight, including kinetic, jamming, GPS disruption and signal take control/command.
- Drone as a Security Service. This market segment allows security practitioners to use drone technology as a patrolling and quick-reaction resource. It can be implemented as a permanent solution or contracted for special events.
- Training, exercises and operations. A growing section of the market is focusing on assessment and staff coordination to set conditions for a drone event. Training, exercises and operations are a direct reflection of a drone vulnerability and risk assessment (DVRA), drone emergency response planning (DERP) and Left of sUAS Launch (LoDL).
- Consumers (private and public) or drone users. The buyers of technology.
- CUAS and law.
- DVRA (to include data from a detection technology).
- DERP.
- LoDL plan development and operationalization.