Skip to main content

LOOKING FOR SOMETHING?


Utility Security Podcast – Deep Dive – Rocking the Boat – Why Utility Security Must Challenge the Status Quo

In the utility sector, the most formidable adversaries aren’t always external threats. Often, the biggest hurdles are internal: complacency, misconceptions, and parochialism. In this episode, we dive into the critical need to challenge the “if it ain’t broke, don’t fix it” mindset. Discover why this internal resistance can be more dangerous than any external threat […]
ISC East 2025

ISC East 2025 Preview: Spotlighting Critical Infrastructure, New Innovations, and Utility Security Insights

1. ISC East is near. What aspects of this year’s event are you most excited about? Being in New York City right before the holidays always brings its own excitement, but what’s truly important about bringing the industry together at the end of the year is the opportunity to connect in person, discover new technologies, […]
Elephant in the Room - Kinetic Cyberattacks

The Risk Elephant in the Room

Why aren’t kinetic cyberattacks being addressed?
Much work has gone into addressing known data cybersecurity threats that impact utilities, and this has been ongoing for quite some time. Yet when we look at the threat of kinetic cyberattacks – which can cause extensive, long-term equipment damage – there is a lack of urgency and insight to address the seriousness of this […]
Essential for Protection

Rocking the Boat: Why Challenging the Status Quo is Essential for Protection

To establish a sustainable security stance, utilities must overcome complacency, misconceptions and parochialism.
For those tasked with securing and protecting utility assets, the most formidable adversaries aren’t always external. While threat actors, cybercrime and infrastructure sabotage are real and constant threats, internal biases and resistance to change are some of the most challenging security obstacles. If not overcome, three specific challenges – complacency, misconceptions and parochialism – will […]
Cybersecurity Gaps

Critical Infrastructure at a Crossroads: Cybersecurity Gaps in the Utility Sector

Investment and advancement in utility cybersecurity are more important than ever.
If you’ve ever had the lights go out in the middle of a Netflix binge, you know just how fragile our utility systems can feel. Now, imagine that same blackout – not caused by a storm, squirrel or clumsy backhoe operator but by a hacker halfway across the globe who thinks it’s hilarious to shut […]
Utility Fragility - Climate Change

Addressing Utility Fragility in the Face of Escalating Climate Disasters

With these events on the rise, it’s time to reassess the resilience of your organization’s infrastructure.
Climate-related disasters are becoming more frequent. In 2024, there were 27 weather and climate disasters that caused at least $1 billion in damage, according to the National Oceanic and Atmospheric Administration’s National Centers for Environmental Information. Some disasters have revealed fragility in utility infrastructure that also presents security issues that can quickly escalate. Recent examples […]

Leadership Lessons and Strategies I Learned From PBS

Great leaders inspire growth and foster healthy organizational cultures.
Leadership isn’t easy. Along with all the responsibilities that come with navigating the organization toward increased success and reduced risk, how leaders interact with others sets the tone for the rest of the company. Great leaders know that a big part of the job is building trust and connection and inspiring their teams to be […]

The Myth of Delegated Security

True protection demands personal responsibility.
What do Iryna Zarutska’s murder in North Carolina, the killing of Charlie Kirk in Utah and the shooting of President Donald Trump in Pennsylvania have in common? They highlight the fallacy of delegated security. Many people don’t grasp the necessity of taking ownership of their personal security. We have been conditioned to believe it is […]
Physical-Cyber Convergence

Physical-Cyber Convergence is the Future of Utility Security

Such convergence is essential to strengthen resilience, ensure compliance and defend against evolving threats.
As threats to critical infrastructure continue to grow in complexity, the divide between physical and cyber security is dissolving, and a unified approach is becoming essential for a robust and proactive risk management security program. Within the utility industry, attacks targeting water supplies, power grids and other vital systems are becoming more sophisticated, underscoring the […]
Our Electricity Infrastructure

Our Electricity Infrastructure: Built for a World That No Longer Exists

Chain-link fences remain the predominant security barrier at substations, exposing the facilities to potential theft and attack.
I see a lot of substations every year, and most of them have chain-link fences. I think chain-link fences are obsolete, but don’t take my word for it. IEEE 1402-2021, “IEEE Guide for Physical Security of Electric Power Substations,” includes the following statement: “A standard chain-link fence is easily cut, and most purposeful intruders use […]

Utility Security Podcast – Deep Dive – Rocking the Boat – Why Utility Security Must Challenge the Status Quo

In the utility sector, the most formidable adversaries aren’t always external threats. Often, the biggest hurdles are internal: complacency, misconceptions, and parochialism. In this episode, we dive into the critical need to challenge the “if it ain’t broke, don’t fix it” mindset. Discover why…
1. ISC East is near. What aspects of this year’s event are you most excited about? Being in New York City right before the holidays always brings its own excitement, but what’s truly important about bringing the industry together at the end of the year is the opportunity to connect in person, discover new technologies, and unveil fresh ideas. This year, we are introducing several new areas on the show floor designed to do more than just keep pace with innovation. These dynamic experiences will allow professionals to see, touch, and truly understand the impact of these technologies firsthand…
Why aren’t kinetic cyberattacks being addressed?
Much work has gone into addressing known data cybersecurity threats that impact utilities, and this has been ongoing for quite some time. Yet when we look at the threat of kinetic cyberattacks – which can cause extensive, long-term equipment damage – there is a lack of urgency and insight to addres…
To establish a sustainable security stance, utilities must overcome complacency, misconceptions and parochialism.
For those tasked with securing and protecting utility assets, the most formidable adversaries aren’t always external. While threat actors, cybercrime and infrastructure sabotage are real and constant threats, internal biases and resistance to change are some of the most challenging security obstacl…

Investment and advancement in utility cybersecurity are more important than ever.
If you’ve ever had the lights go out in the middle of a Netflix binge, you know just how fragile our utility systems can feel. Now, imagine that same blackout – not caused by a storm, squirrel or clumsy backhoe operator but by a hacker halfway across the globe who thinks it’s hilarious to shut down the power grid. Welcome to the reality of cybersecurity in the utility sector, a mix of legacy technology, patchwork defenses and enough regulatory acronyms to make your head spin. We’re at a crossroads. One direction: modernize, secure and actually get ahead of attackers. The other: keep duct-t…
Investment and advancement in utility cybersecurity are more important than ever.
With these events on the rise, it’s time to reassess the resilience of your organization’s infrastructure.
Climate-related disasters are becoming more frequent. In 2024, there were 27 weather and climate disasters that caused at least $1 billion in damage, according to the National Oceanic and Atmospheric Administration’s National Centers for Environmental Information. Some disasters have revealed fr…
Great leaders inspire growth and foster healthy organizational cultures.
Leadership isn’t easy. Along with all the responsibilities that come with navigating the organization toward increased success and reduced risk, how leaders interact with others sets the tone for the rest of the company. Great leaders know that a big part of the job is building trust and connection…

True protection demands personal responsibility.
What do Iryna Zarutska’s murder in North Carolina, the killing of Charlie Kirk in Utah and the shooting of President Donald Trump in Pennsylvania have in common? They highlight the fallacy of delegated security. Many people don’t grasp the necessity of taking ownership of their personal secur…
Such convergence is essential to strengthen resilience, ensure compliance and defend against evolving threats.
As threats to critical infrastructure continue to grow in complexity, the divide between physical and cyber security is dissolving, and a unified approach is becoming essential for a robust and proactive risk management security program. Within the utility industry, attacks targeting water suppl…

Video

Utility Security Podcast – Deep Dive – Rocking the Boat – Why Utility Security Must Challenge the Status Quo

In the utility sector, the most formidable adversaries aren’t always external threats. Often, the biggest hurdles are internal: complacency, misconceptions, and parochialism. In this episode, we dive into the critical need to challenge the “if it ain’t broke, don’t fix it&#8…

Featured Topics


Utility Security Podcast – Deep Dive – Rocking the Boat – Why Utility Security Must Challenge the Status Quo

In the utility sector, the most formidable adversaries aren’t always external threats. Often, the biggest hurdles are internal: complacency, misconceptions, and parochialism. In this episode, we dive into the critical need to challenge the “if it ain’t broke, don’t fix it” mindset. Discover why…
1. ISC East is near. What aspects of this year’s event are you most excited about? Being in New York City right before the holidays always brings its own excitement, but what’s truly important about bringing the industry together at the end of the year is the opportunity to connect in person, disc…

Why aren’t kinetic cyberattacks being addressed?
Much work has gone into addressing known data cybersecurity threats that impact utilities, and this has been ongoing for quite some time. Yet when we look at the threat of kinetic cyberattacks – which can cause extensive, long-term equipment damage – there is a lack of urgency and insight to addres…
To establish a sustainable security stance, utilities must overcome complacency, misconceptions and parochialism.
For those tasked with securing and protecting utility assets, the most formidable adversaries aren’t always external. While threat actors, cybercrime and infrastructure sabotage are real and constant threats, internal biases and resistance to change are some of the most challenging security obstacl…
Investment and advancement in utility cybersecurity are more important than ever.
If you’ve ever had the lights go out in the middle of a Netflix binge, you know just how fragile our utility systems can feel. Now, imagine that same blackout – not caused by a storm, squirrel or clumsy backhoe operator but by a hacker halfway across the globe who thinks it’s hilarious to shut down…
With these events on the rise, it’s time to reassess the resilience of your organization’s infrastructure.
Climate-related disasters are becoming more frequent. In 2024, there were 27 weather and climate disasters that caused at least $1 billion in damage, according to the National Oceanic and Atmospheric Administration’s National Centers for Environmental Information. Some disasters have revealed fr…

In the utility sector, the most formidable adversaries aren’t always external threats. Often, the biggest hurdles are internal: complacency, misconceptions, and parochialism. In this episode, we dive into the critical need to challenge the “if it ain’t broke, don’t fix it” mindset. Discover why this internal resistance can be more dangerous than any external threat actor and learn practical strategies to dismantle these obstacles, foster a holistic security culture, and build a truly resilient and sustainable protection stance for our critical infrastructure. Read the article written by Jim Willis – https://utilitysecurity.com/blog/rocking-the-boat-why-challenging-the-status-quo-is-essential-for-protection/

Key Takeaways

  • Internal Obstacles are Formidable: The greatest challenges to enhancing utility security are often internal biases and resistance to change, specifically complacency (“it hasn’t happened yet”), misconceptions about security, and parochialism (departmental silos).
  • Complacency is the “Silent Assassin”: A false sense of security, often built on a long period without a critical incident, leads to relaxed protocols and slashed budgets, leaving the organization vulnerable.
  • Compliance Does Not Equal Security: Simply meeting minimum regulatory standards (like NERC-CIP) is not a comprehensive security strategy. A robust posture must be proactive, holistic, and continually evolving.
  • Security is a Shared Responsibility: Effective security is not just an IT problem, a silver bullet technology, or the sole responsibility of law enforcement. It requires a collaborative, “all-hands-on-deck” approach that breaks down departmental silos and involves every employee.
  • Challenging the Status Quo is Essential: To stay ahead of evolving threats, security professionals must be willing to “rock the boat” and push for change, even if it’s unpopular. This involves fostering cross-departmental collaboration, promoting an “all in the same boat” attitude, and leveraging industry partnerships.

3 Questions & Answers

1. Q: The article mentions “complacency” as vigilance’s silent assassin. Why is this specific mindset so dangerous in the utility industry? A: Complacency is dangerous because security threats are often intangible and can be easily overlooked. A utility might go decades without a major incident, which creates a false sense of security. This “it hasn’t happened yet” attitude leads to security budgets being cut, protocols becoming optional, and a static security posture that is completely unprepared for the modern, evolving threat landscape. 2. Q: What is one of the biggest misconceptions about security that the article debunks? A: A primary misconception is that compliance equals security. Many utilities believe that by meeting the minimum regulatory requirements, like NERC-CIP standards, they are secure. The article argues that this is just “ticking off boxes.” A truly robust security stance is proactive, inclusive, and protects against emerging threats on all fronts, going far beyond any minimum compliance standard. 3. Q: The article talks about “parochialism,” or departmental silos. How can an organization overcome this “it’s not my problem” mindset? A: To overcome parochialism, security must be redefined as a corporate-wide effort. The article suggests fostering cross-departmental collaboration through joint security task groups (with members from IT, OT, physical security, HR, etc.), promoting an “all in the same boat” attitude through comprehensive training so every employee understands their role, and leveraging industry partnerships like ISACs to build a strong collective defense. #UtilitySecurity #CriticalInfrastructure #CyberSecurity #SecurityCulture #RiskManagement
1. ISC East is near. What aspects of this year’s event are you most excited about?

Being in New York City right before the holidays always brings its own excitement, but what’s truly important about bringing the industry together at the end of the year is the opportunity to connect in person, discover new technologies, and unveil fresh ideas.

This year, we are introducing several new areas on the show floor designed to do more than just keep pace with innovation. These dynamic experiences will allow professionals to see, touch, and truly understand the impact of these technologies firsthand. Our goal is to empower the security community to anticipate future needs and collectively shape the direction of our industry. This year’s show will deliver exactly that.

2. Tell me more about what you have planned for the Critical Infrastructure this year?

Critical Infrastructure remains a central theme, but we have evolved our approach. The former Critical Infrastructure area on the show floor will be reimagined as the Trends Pavilion, featuring exhibitors in critical infrastructure, wire and cable, and advanced sensors. To bring the pavilion to life, Lee Odess, CEO of Access Control Executive Brief, will host live interviews directly from the show floor.

Additionally, Thursday, November 20, Amanda Mason, VP of Intelligence at Related Companies, will deliver the Day 2 keynote, presented by the SIA Women in Security Forum. This session, “Protecting New York’s Critical Infrastructure: A Hudson Yards Perspective,” will provide an exclusive look into the complexities of securing the largest private real estate development in U.S. history. Mason will explore the convergence of cyber, physical, and geopolitical risks, sharing strategies for integrating intelligence into operations to safeguard critical assets.

Our can’t miss collection of SIA Education@ISC sessions and panel discussions will also spotlight Critical Infrastructure, providing our ISC East audience with actionable insights for one of the industry’s most pressing challenges.

3. What is an educational session that utility security professionals should not miss?

For professionals in the utility sector, I highly recommend the session: “Effective Security Project Planning in the Utilities and Energy Sector: Do’s and Don’ts.

This session is specifically designed to equip participants with the essential skills and best practices for navigating the complexities of security project planning in this critical industry. The panel features experts from across the security spectrum—including a manufacturer, an end user, a system integrator, and a consultant—all with deep experience in the energy and utility sectors. The discussion will delve into strategic and tactical planning techniques that drive project success, ensuring that each initiative delivers value and aligns with organizational goals.

4. What on the expo floor are you most looking forward to seeing? 

We’re introducing several exciting new areas on the expo floor this year to showcase where the security industry is headed.

Beyond our Trends Pavilion, the new Startup Area will spotlight emerging brands, giving attendees a front-row seat to discover the next wave of security innovation. Another major addition is the debut of the Smart Building Experience Center, an immersive activation that guides visitors through a mini smart building environment. From real-world access control elements to a security operations center, this interactive journey connects the dots between devices, data, and decisions to show how integrated systems work together in practice.

Attendees will also have access to complimentary education sessions at The Bridge and the Career Zone, offering even more opportunities to connect, learn, and network throughout the event.

 
5. If our readers want more info about ISC East, where should they go?

The latest event details, up-to-date information on education sessions, and all registration options for ISC East can be found on our website.

Why aren’t kinetic cyberattacks being addressed?

The Risk Elephant in the Room

Much work has gone into addressing known data cybersecurity threats that impact utilities, and this has been ongoing for quite some time. Yet when we look at the threat of kinetic cyberattacks – which can cause extensive, long-term equipment damage – there is a lack of urgency and insight to address the seriousness of this risk across many sectors. The question is, if you do not have the technical capabilities to truly address the threat of kinetic cyberattacks, how can you stop them from happening? Earlier this year, I had an opportunity to brief congressional House Homeland Security staf…
To establish a sustainable security stance, utilities must overcome complacency, misconceptions and parochialism.
For those tasked with securing and protecting utility assets, the most formidable adversaries aren’t always external. While threat actors, cybercrime and infrastructure sabotage are real and constant threats, internal biases and resistance to change are some of the most challenging security obstacles. If not overcome, three specific challenges – complacency, misconceptions and parochialism – will render futile any attempt to enhance security. Pervasive complacency, entrenched misconceptions and long-standing parochialism create security challenges that no firewall or physical barrier can remedy. They coalesce into a form of resistance that blinds decision-makers to the need for enhanced security and allows embedded vulnerabilities to go unchecked. This internal resistance leads to poorly considered, quick-fix, one-size-fits-all solutions. It also leads to panicked, knee-jerk reactions and perception-driven fortification overkill when a critical incident does occur. The only way to clear these obstacles is to challenge the status quo – which is easier said than done. Establishing a sustainable security stance requires identifying, confronting and dismantling all three internal obstacles. This means dismantling traditions, changing long-held beliefs and overcoming mental rigidity. In other words, you must rock the boat and shake things up right down to the core. It isn’t easy to do, nor is it fun, and it won’t make you popular with your colleagues. But as a utility security professional, your job is to enhance protection, not win popularity contests. How do we accomplish such a monumental task? It is not easy, but it is doable, so let’s get started. Vigilance’s Silent Assassin Complacency and desire to maintain the status quo lie at the core of institutionalized resistance. Complacency is vigilance’s silent assassin. “If it ain’t broke, don’t fix it” is an industrywide mantra among utility personnel, permeating the ranks of executive leadership, filtering down to operational staff, and even affecting those entrusted with safety and security. Clinging to well-worn routines cultivates a security posture that is both weak and static, leaving the organization ill-equipped to respond to today’s evolving threat landscape. “That’s how we’ve always done it” cultivates the illusion that a utility is protected by the presence of an ancient chain-link fence, a few lights in the parking lot and the remnants of a half-dozen faded signs, along with a smattering of unmonitored security cameras and maybe a few stagnant security practices that have long-since lost their effectiveness. The Quietest Threat Complacency is the quietest threat, making it the most dangerous of the three. The problem stems from the fact that security threats are mostly intangible dangers that can be easily overlooked. A complacent utility can go years or even decades without facing a critical incident, inevitably leading to a false sense of security. The “it hasn’t happened yet” mindset becomes the norm, security budgets are slashed or disappear altogether, and protection protocols become relaxed and optional. If everything continues to go smoothly, the mindset shifts to “things like that just don’t happen to us.” At this stage, security protocols are all but forgotten. Employees regularly cut corners on procedures, and protection protocols become optional and rarely used. Ironically, when a critical incident finally happens, the employees voicing these views are the ones most stunned by the incident and most vocal in demanding to know why preventive steps weren’t taken. Overcoming complacency will be a challenge. The key is to adopt an approach that emphasizes acceptance and buy-in from all internal stakeholders. Focus on accomplishing incremental changes. Remember, every 1-degree directional shift puts you on a different trajectory. Debunking Misconceptions Misconceptions about security stem from a lack of understanding, overreliance on outdated techniques or years of accumulated misinformation. Misconceptions hinder progress; if not addressed, they will stifle innovation and advancement. To accomplish meaningful change, you will need to dispel widespread myths and clarify the facts behind security strategies. The list of misconceptions is long, but here are four you are likely to encounter. Misconception 1: Security is solely an information technology (IT) problem. This overlooks the fact that every utility has four distinct security domains; cyber/data is just one of them. Digital attackers seldom distinguish between IT and operational technology (OT). A network breach can be devastating, but it can also serve as a gateway to control system attacks. For example, although they are separate systems, a phishing attack on a staff member could provide an attacker with the necessary information to launch an attack on the OT network. Other times, threat actors focus solely on the OT system. Thus, both the IT and OT technical staff must be engaged in security. We haven’t even touched on the other three security domains (i.e., facilities, infrastructure and personnel). Achieving a strong security posture requires a holistic, 360-degree defense that can only be achieved through a collaborative, all-hands-on-deck approach. Misconception 2: Compliance equals security. For utilities subject to the North American Electric Reliability Corp.’s Critical Infrastructure Protection regulatory requirements, it is important to understand that meeting the minimum NERC standards does not necessarily constitute a comprehensive security strategy. Each compliance standard has a specific purpose and focus. A robust security stance is proactive, inclusive and continually evolving to protect against emerging threats on all fronts; it is not merely ticking off boxes and filing obligatory regulatory reports. Misconception 3: Advanced technology is a silver bullet. While new technologies such as AI-driven monitoring, advanced threat detection systems and zero-trust architecture are powerful tools, they are not all-encompassing, singular solutions to security threats. Relying solely on technology creates a false sense of security. However, no matter how sophisticated, relying exclusively on technology will inevitably create vulnerabilities that can be exploited. Technologies are only as effective as the people who manage and operate them and the policies that govern their use. They also become obsolete at an astonishing speed. It is important to recognize that for every new technological advancement, an entire industry emerges to devise methods to counteract it. A strong security posture will embrace technology as a tool and a resource rather than relying on it as a silver bullet that defeats every threat. Misconception 4: Law enforcement provides all the security protection we need. The widely held belief that law enforcement is an end-all solution to any security incident – one that will always arrive in the nick of time to save the day – is a myth. Unfortunately, it is perpetuated by law enforcement, popular culture and politicians. Although it is easy and comfortable to believe this myth is true, the simple fact is that law enforcement and security are not the same thing. This distinction has been proven time and again, with lethal results, yet it remains one of the most insidious myths we continue to face. For many, it’s easier to hand off security to “the professionals” than it is to take on the responsibility of ensuring that the utility is protected. I will reiterate that law enforcement and security are not the same domains. Yes, there is overlap, and yes, there are security professionals within the ranks of law enforcement. But assuming every member of law enforcement is a security specialist is akin to believing every member of the U.S. Air Force is a pilot – it’s just not true. And as recent tragedies have proven, trusting in this myth can have lethal consequences. So, how do we dispel it? First, understand that you cannot delegate your organization’s security to a third party, not even law enforcement. They are a valuable resource to integrate into a comprehensive security strategy, but you should never cede the ultimate responsibility for security to anyone outside the organization. That must always remain in-house. Breaking Down Parochialism Parochialism is characterized by an insular, narrow-minded focus on a single department or subsector, creating operational silos within an organization. The “it’s not my problem” mindset, stemming from parochial thinking, fosters a culture of isolationism that inhibits the collaboration needed to protect a complex, interconnected system. In many utilities, the operational landscape is marked by the isolation of IT, OT, physical security and corporate administration, with each functioning as a separate entity with distinct priorities, territories and budgets. This creates a fractured security environment that threat actors can easily identify and exploit. Experienced aggressors can easily spot and manipulate the unprotected weak seams and communication gaps created by departmental silos. To overcome parochialism, security must be redefined as a corporate-wide effort – one that must be continually refreshed and adapted. Disparate security activities should be consolidated into a comprehensive, manageable strategy that integrates and supports diverse efforts across all security domains. In other words, break down the silos. Here are three suggestions for overcoming parochialism to get things moving. 1. Foster cross-departmental collaboration. Create joint security task groups with representatives from IT, OT, physical security, operations, human resources and executive management. These groups can share threat intelligence, coordinate incident response protocols and ensure security is integrated into all aspects of the utility’s business. Establish a standing risk assessment and response team made up of members from every department who can quickly assemble to evaluate emerging threats and respond to ongoing incidents. 2. Promote an “all in the same boat” attitude. Ensure that every employee, regardless of job description or responsibilities, understands their role in contributing to the utility’s security framework. Ensure they see the connection between their daily tasks and the broader security landscape. Develop a comprehensive training plan to enhance security skills and foster a culture of vigilance and responsibility. Effective ongoing training helps ensure employees understand the significant impact of their actions on the organization’s overall safety and security. 3. Leverage industry partnerships. Look beyond the boundaries of your own organization. Actively engage in Information Sharing and Analysis Centers and other industry peer networks. Sharing information about threats, vulnerabilities and best practices with others in your sector can help build a strong collective defense. Conclusion In an increasingly hostile world, a static security posture is a ticking time bomb. Rocking the boat isn’t about creating unnecessary chaos; it’s about actively adapting and evolving to stay one step ahead of those who wish to do harm. Embracing this challenge is the only way to ensure long-term protection. Challenging the status quo is also the basis for a more resilient and reliable utility. To accomplish this, you will have to overcome real issues of complacency, misconception and parochialism. So, be warned: you’ll need a truckload of stamina and courage. Achieving real change means pushing people out of their comfort zones and shifting long-held paradigms and beliefs. Some people will inevitably be upset, and you’ll face anger and resentment along the way. But with persistence, patience and thoughtfulness, these issues can be overcome. Good luck, and now, get at it. About the Author: Jim Willis, M.Sc., CMAS, CHS-V, is the president of InDev Tactical, a security training and consulting firm. He is a utility engineer, credentialed homeland security specialist and anti-terrorism expert. To discuss utility-focused security training or consulting assistance, contact Jim at 703-623-6819 or jim.willis@indevtactical.net.
Investment and advancement in utility cybersecurity are more important than ever.
If you’ve ever had the lights go out in the middle of a Netflix binge, you know just how fragile our utility systems can feel. Now, imagine that same blackout – not caused by a storm, squirrel or clumsy backhoe operator but by a hacker halfway across the globe who thinks it’s hilarious to shut down the power grid. Welcome to the reality of cybersecurity in the utility sector, a mix of legacy technology, patchwork defenses and enough regulatory acronyms to make your head spin. We’re at a crossroads. One direction: modernize, secure and actually get ahead of attackers. The other: keep duct-taping outdated systems together and hope no one notices until it’s too late. Spoiler alert: the bad guys already noticed. Where Dinosaurs Roam Utilities are a unique beast. They sit on top of legacy operational technology (OT) systems designed decades ago to keep turbines spinning and water flowing. These systems were never built with cybersecurity in mind. Passwords? Ha. Encryption? Forget it. For many, “security by obscurity” was the best defense (“No one would ever think to hack this rusty old pump controller, right?”). Unfortunately, nation-state adversaries and ransomware gangs have proven time and again that, yes, they will happily hack that rusty old pump controller. Add to that the workforce challenge. Utilities are fighting to hire cybersecurity professionals in a market where talent is already scarce. OT cybersecurity pros are basically unicorns – rare, mythical and very expensive if you manage to catch one. And then there’s modernization. Some utilities are racing forward with smart grids, Internet of Things sensors and artificial intelligence (AI) monitoring. Others are still trying to migrate off Windows XP. The result? A messy quilt of defenses that leave gaping holes attackers can – and do – exploit. Not Your Grandma’s Cyber Criminals Today’s attackers aren’t just script kiddies running port scans from their basement. Utilities face a rogues’ gallery of adversaries, such as:
  • Nation-state hackers testing how quickly they can turn off your heat in January.
  • Ransomware syndicates that don’t care if their victim is a hospital, power grid or wastewater plant – money is money.
  • Supply chain risks where one vulnerable vendor becomes the hacker’s golden ticket. Remember SolarWinds? That wasn’t just an information technology (IT) problem.
  • AI-powered threats that make phishing more convincing, intrusions more automated and disinformation campaigns practically indistinguishable from reality.
It’s a fun mix of cyber chaos. And while utilities are considered critical infrastructure, many of them are still under-protected compared to banks, retailers and even the Wi-Fi at your local Starbucks. Regulatory Pressures Governments know the risk, so they’ve rolled out frameworks, mandates and compliance checklists galore. In the U.S., utilities navigate North American Electric Reliability Corp. Critical Infrastructure Protection, Department of Energy directives, Environmental Protection Agency initiatives, and the National Institute of Standards and Technology Cybersecurity Framework. The problem? Regulations often lag behind threats. Compliance becomes a box-checking exercise, not true resilience. It’s the equivalent of installing a seat belt in a car that’s already missing its brakes. Sure, you’re technically “compliant,” but you’re not exactly safe driving down the highway. Mind the Gaps: Where Utilities Still Struggle Even with all the attention, utilities have some glaring cybersecurity gaps:
  • Visibility across IT and OT. Many utilities don’t have a single pane of glass to see attacks spanning both networks.
  • Incident response. Tabletops and crisis drills are often underfunded or nonexistent.
  • Zero Trust adoption. In most utilities, this is still more buzzword than reality.
  • Threat intelligence sharing. Utilities often operate in silos, reluctant to share information even though attackers are collaborating just fine.
It’s not that leaders don’t care. It’s that years of underinvestment, technical debt and operational pressures make it hard to prioritize cybersecurity until an incident forces the issue. And by then, it’s too late. The Bright Side Here’s the good news: tools and models exist to fix these issues. Utilities don’t need to reinvent the wheel; they just need to commit to:
  • Technology. If implemented properly, AI-driven threat detection; network segmentation and integrated endpoint detection and response; network detection and response; and extended detection and response platforms are game changers.
  • Governance, including integrated security operations centers and network operations centers, risk-based frameworks, and accountability that goes all the way to the boardroom.
  • The workforce. Public-private partnerships, upskilling programs and scenario-based training can start to close the talent gap.
  • Resiliency. Redundancy, crisis communication planning and cyber-physical response exercises make the difference between a bad day and a catastrophic one.
Utilities that embrace these changes don’t just protect themselves – they safeguard national security, public health and the economy. Choose Wisely Utilities today face a choice. They can continue patching systems reactively, hoping attackers don’t find the next weak spot. Or they can embrace proactive security, invest in resilience, and build defenses strong enough to deter and withstand modern threats. The stakes couldn’t be higher. Failure means disrupted services, public safety risks and even threats to national security. Success means reliable utilities, safer communities and maybe – just maybe – fewer Netflix cliff-hangers caused by blackouts. So yes, utilities are at a crossroads. The question is whether they’ll choose the road paved with modernization, collaboration and resilience or the one marked “shortcut” that ends in a large ditch. Conclusion Cybersecurity in the utility sector isn’t optional. It’s existential. The threats are real, the gaps are glaring, and the attackers are only getting smarter. But so can we. The call to action is simple: Utilities must stop treating cybersecurity as an afterthought and start treating it as mission-critical infrastructure, right alongside turbines, substations and water pumps. Delay is not an option. The crossroads is here, and the choice utilities make today will define whether we live in a future of resilience or in the dark. About the Author: Stacy Mill is a visionary cybersecurity leader with success developing talent, securing engineering solutions and driving value for organizations across a variety of industries. As CIO and CISO at Nashville Electric Service, she transformed the company’s legacy mainframe, multiple data center environment into an efficient hybrid cloud model that empowered NES customers and the workforce, providing increased security and reliability. Currently, Mill is senior vice president of NOC and SOC services for Pomeroy (https://pomeroy.com), a global technology solutions provider.

In the utility sector, the most formidable adversaries aren’t always external threats. Often, the biggest hurdles are internal: complacency, misconceptions, and parochialism. In this episode, we dive into the critical need to challenge the “if it ain’t broke, don’t fix it” mindset. Discover why…
1. ISC East is near. What aspects of this year’s event are you most excited about? Being in New York City right before the holidays always brings its own excitement, but what’s truly important about bringing the industry together at the end of the year is the opportunity to connect in person, disc…
Why aren’t kinetic cyberattacks being addressed?
Much work has gone into addressing known data cybersecurity threats that impact utilities, and this has been ongoing for quite some time. Yet when we look at the threat of kinetic cyberattacks – which can cause extensive, long-term equipment damage – there is a lack of urgency and insight to addres…
To establish a sustainable security stance, utilities must overcome complacency, misconceptions and parochialism.
For those tasked with securing and protecting utility assets, the most formidable adversaries aren’t always external. While threat actors, cybercrime and infrastructure sabotage are real and constant threats, internal biases and resistance to change are some of the most challenging security obstacl…

In the utility sector, the most formidable adversaries aren’t always external threats. Often, the biggest hurdles are internal: complacency, misconceptions, and parochialism. In this episode, we dive into the critical need to challenge the “if it ain’t broke, don’t fix it” mindset. Discover why…
1. ISC East is near. What aspects of this year’s event are you most excited about? Being in New York City right before the holidays always brings its own excitement, but what’s truly important about bringing the industry together at the end of the year is the opportunity to connect in person, disc…
Why aren’t kinetic cyberattacks being addressed?
Much work has gone into addressing known data cybersecurity threats that impact utilities, and this has been ongoing for quite some time. Yet when we look at the threat of kinetic cyberattacks – which can cause extensive, long-term equipment damage – there is a lack of urgency and insight to addres…
To establish a sustainable security stance, utilities must overcome complacency, misconceptions and parochialism.
For those tasked with securing and protecting utility assets, the most formidable adversaries aren’t always external. While threat actors, cybercrime and infrastructure sabotage are real and constant threats, internal biases and resistance to change are some of the most challenging security obstacl…