Skip to main content

© All rights reserved.

LOOKING FOR SOMETHING?


Know your Diamonds from your pencils

Know Your Diamonds from Your Pencils: Talking All Things Physical Security with SERC’s Travis Moran

An in-Depth Conversation About Physical Security Strategies, Dealing with Emerging Threats, Robotic Dogs, Preventing Theft, Where Regulations are Heading and More
Curtis Marquardt Jr.: Can you tell our readers more about your background and what you do for SERC Reliability Corporation.? Travis Moran: I began my career in law enforcement, first as an analyst with Interpol. After several years, I joined the U.S. State Department as a special agent, where I served for six-and-a-half years. I […]
Critical Decision Making Progress - Substation Security

Substation Security Challenges: The Importance of the Critical Decision Making Process

The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our decisions have consequences. For these decisions, we need a better decision-making method. We need a reliable technique that can produce sound decisions and stand up to intense scrutiny.
The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our decisions have consequences. For these decisions, we need a better decision-making method. […]
Duke article illustration

Forging a Secure Tomorrow: Duke Energy’s Path to a More Resilient Future

An Interview with Mark Aysta, Duke Energy’s Managing Director of Enterprise Security
There’s a great quote by Confucius that says: “Our greatest glory is not in never falling, but in rising every time we fall.” And it’s truly applicable for security professionals because no matter how much one plans, strategizes and fully commits to preventing an incident, along comes something that challenges those efforts in ways that […]
infrastructure-security-july-article

How ‘Global Weirding’ is Creating New Threats for Utility Security Professionals

An Interview with Idaho National Laboratory’s Andrew Bochman About How Climate Impacts Need to be Planned for and Acted on Today
If you search for “Andrew Bochman” on Amazon’s website, the first listing to appear is a book he co-authored about countering cyber sabotage. If you search his name on YouTube, you’ll find videos of him presenting on topics including managing risk and operational technology cybersecurity. Bochman dedicated much of his career to helping with the […]
frontline worker security july article

The Storm Work Security Conundrum

How A New Zealand-Based Company is Hoping to Revolutionize the Ways Utility Organizations can Quickly Verify Worker Security Credentials, Skills and Training Qualifications
As storm restoration work becomes more frequent, so do the challenges of verifying that the workers that flock to the disaster areas are qualified to do the work as well as meet background checks and security verifications they need. We talked with Dan Stemp, the chief customer officer at JNCTN, a New Zealand-based company that […]
facilities security july article

Perimeter Control as the First Line of Defense

Strong perimeter protection can be one of your best investments. But don’t make the mistake of thinking it’s a set-it-and-forget-it endeavor.
For many utilities, physical security begins at the door or the parking lot. However, robust facility protection starts at the perimeter. But we often abandon this defense resource to aesthetics, budget restraints, or misplaced values. This makes a secure perimeter the least considered and most often overlooked element of facility security. However, resilient perimeter protection […]
cybersecurity article july

GridEx VII Reveals Continuing Challenges of Post-Covid Hybrid Work, Communications and Technology

The Biennial Drill and Tabletop Brought Together 252 Organizations to Test Their Security and Resiliency and Discover Areas of Need
In November 2023, the North American Electric Reliability Corp. (NERC) and its Electricity Information Sharing and Analysis Center (E-ISAC) conducted the seventh biennial GridEx. “GridEx is one of the largest and most comprehensive security drawings that are done in any critical infrastructure sector,” said Manny Cancel, senior vice president and CEO of E-ISAC. “It has […]
July csuite article

Why Your Organization Needs to Conduct Exercises: Understanding the The Bottom-Line Impacts

We talk with Gary Bower, the Branch Chief of CISA’s Infrastructure Security Exercise Branch About the Many Layers of Value in Conducting Exercises
Ten article

5 QUESTIONS WITH ELECTRICAL & COMPUTER ENGINEERING RESEARCHER AND EDUCATOR CHEE-WOOI TEN

Utility Security Magazine Asks 5 Vital Questions to an Industry Expert
We sat down with Chee-Wooi Ten, a professor of electrical and computer engineering at Michigan Technological University. He spends his time researching actuarial science and risk profiling for the power infrastructure industry, linking cyber events with operational risk mitigation. During our discussion, Ten shared his insights about the risks of a cascading cyberattack and the […]

Meet NERC CIP Compliance Guidelines with ALCEA High Security Locking Solutions

. North American Electric Reliability Corporation (NERC) compliance standards obligate utilities with critical assets to take steps to address physical security risks and vulnerabilities. They also require all electric utilities to have a physical security plan and program in place to monitor and manage physical access to protect critical infrastructure. With these standards in mind, […]
An in-Depth Conversation About Physical Security Strategies, Dealing with Emerging Threats, Robotic Dogs, Preventing Theft, Where Regulations are Heading and More

Know Your Diamonds from Your Pencils: Talking All Things Physical Security with SERC’s Travis Moran

Curtis Marquardt Jr.: Can you tell our readers more about your background and what you do for SERC Reliability Corporation.? Travis Moran: I began my career in law enforcement, first as an analyst with Interpol. After several years, I joined the U.S. State Department as a special agent, wher…
The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our decisions have consequences. For these decisions, we need a better decision-making method. We need a reliable technique that can produce sound decisions and stand up to intense scrutiny.

Substation Security Challenges: The Importance of the Critical Decision Making Process

The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our decisions have consequences. For these decisions, we need a better decision-making method. We need a reliable technique that can produce sound decisions and stand up to intense scrutiny. General Colin Powell once said: “You can’t make good decisions unless you have good information and can separat…
An Interview with Mark Aysta, Duke Energy’s Managing Director of Enterprise Security

Forging a Secure Tomorrow: Duke Energy’s Path to a More Resilient Future

There’s a great quote by Confucius that says: “Our greatest glory is not in never falling, but in rising every time we fall.” And it’s truly applicable for security professionals because no matter how much one plans, strategizes and fully commits to preventing an incident, along comes something t…
An Interview with Idaho National Laboratory’s Andrew Bochman About How Climate Impacts Need to be Planned for and Acted on Today

How ‘Global Weirding’ is Creating New Threats for Utility Security Professionals

If you search for “Andrew Bochman” on Amazon’s website, the first listing to appear is a book he co-authored about countering cyber sabotage. If you search his name on YouTube, you’ll find videos of him presenting on topics including managing risk and operational technology cybersecurity. Bochman…

frontline worker security july article
How A New Zealand-Based Company is Hoping to Revolutionize the Ways Utility Organizations can Quickly Verify Worker Security Credentials, Skills and Training Qualifications

The Storm Work Security Conundrum

Interview with Dan Stemp and Alex Wakeland As storm restoration work becomes more frequent, so do the challenges of verifying that the workers that flock to the disaster areas are qualified to do the work as well as meet background checks and security verifications they need. We talked with Dan Stemp, the chief customer officer at JNCTN, a New Zealand-based company that is hoping to bring a solution to the U.S. market that will not only empower utilities to verify workers but also give the workers ownership of that …
How A New Zealand-Based Company is Hoping to Revolutionize the Ways Utility Organizations can Quickly Verify Worker Security Credentials, Skills and Training Qualifications

The Storm Work Security Conundrum

facilities security july article
Strong perimeter protection can be one of your best investments. But don’t make the mistake of thinking it’s a set-it-and-forget-it endeavor.

Perimeter Control as the First Line of Defense

For many utilities, physical security begins at the door or the parking lot. However, robust facility protection starts at the perimeter. But we often abandon this defense resource to aesthetics, budget restraints, or misplaced values. This makes a secure perimeter the least considered and most o…
cybersecurity article july
The Biennial Drill and Tabletop Brought Together 252 Organizations to Test Their Security and Resiliency and Discover Areas of Need

GridEx VII Reveals Continuing Challenges of Post-Covid Hybrid Work, Communications and Technology

In November 2023, the North American Electric Reliability Corp. (NERC) and its Electricity Information Sharing and Analysis Center (E-ISAC) conducted the seventh biennial GridEx. “GridEx is one of the largest and most comprehensive security drawings that are done in any critical infrastructure…

July csuite article

Why Your Organization Needs to Conduct Exercises: Understanding the The Bottom-Line Impacts

We talk with Gary Bower, the Branch Chief of CISA’s Infrastructure Security Exercise Branch About the Many Layers of Value in Conducting Exercises
Ten article
Utility Security Magazine Asks 5 Vital Questions to an Industry Expert

5 QUESTIONS WITH ELECTRICAL & COMPUTER ENGINEERING RESEARCHER AND EDUCATOR CHEE-WOOI TEN

We sat down with Chee-Wooi Ten, a professor of electrical and computer engineering at Michigan Technological University. He spends his time researching actuarial science and risk profiling for the power infrastructure industry, linking cyber events with operational risk mitigation. During our dis…

Video

Know Your Diamonds from Your Pencils: Talking All Things Physical Security with SERC’s Travis Moran

Curtis Marquardt Jr.: Can you tell our readers more about your background and what you do for SERC Reliability Corporation.? Travis Moran: I began my career in law enforcement, first as an analyst with Interpol. After several years, I joined the U.S. State Department as a special agent, where I s…

Featured Topics


An in-Depth Conversation About Physical Security Strategies, Dealing with Emerging Threats, Robotic Dogs, Preventing Theft, Where Regulations are Heading and More

Know Your Diamonds from Your Pencils: Talking All Things Physical Security with SERC’s Travis Moran

Curtis Marquardt Jr.: Can you tell our readers more about your background and what you do for SERC Reliability Corporation.? Travis Moran: I began my career in law enforcement, first as an analyst with Interpol. After several years, I joined the U.S. State Department as a special agent, wher…
Critical Decision Making Progress - Substation Security
The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our decisions have consequences. For these decisions, we need a better decision-making method. We need a reliable technique that can produce sound decisions and stand up to intense scrutiny.

Substation Security Challenges: The Importance of the Critical Decision Making Process

The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our…

Duke article illustration
An Interview with Mark Aysta, Duke Energy’s Managing Director of Enterprise Security

Forging a Secure Tomorrow: Duke Energy’s Path to a More Resilient Future

There’s a great quote by Confucius that says: “Our greatest glory is not in never falling, but in rising every time we fall.” And it’s truly applicable for security professionals because no matter how much one plans, strategizes and fully commits to preventing an incident, along comes something t…
infrastructure-security-july-article
An Interview with Idaho National Laboratory’s Andrew Bochman About How Climate Impacts Need to be Planned for and Acted on Today

How ‘Global Weirding’ is Creating New Threats for Utility Security Professionals

If you search for “Andrew Bochman” on Amazon’s website, the first listing to appear is a book he co-authored about countering cyber sabotage. If you search his name on YouTube, you’ll find videos of him presenting on topics including managing risk and operational technology cybersecurity. Bochman…
frontline worker security july article
How A New Zealand-Based Company is Hoping to Revolutionize the Ways Utility Organizations can Quickly Verify Worker Security Credentials, Skills and Training Qualifications

The Storm Work Security Conundrum

Interview with Dan Stemp and Alex Wakeland As storm restoration work becomes more frequent, so do the challenges of verifying that the workers that flock to the disaster areas are qualified to do the work as well as meet …
facilities security july article
Strong perimeter protection can be one of your best investments. But don’t make the mistake of thinking it’s a set-it-and-forget-it endeavor.

Perimeter Control as the First Line of Defense

For many utilities, physical security begins at the door or the parking lot. However, robust facility protection starts at the perimeter. But we often abandon this defense resource to aesthetics, budget restraints, or misplaced values. This makes a secure perimeter the least considered and most o…

Know your Diamonds from your pencils
An in-Depth Conversation About Physical Security Strategies, Dealing with Emerging Threats, Robotic Dogs, Preventing Theft, Where Regulations are Heading and More

Know Your Diamonds from Your Pencils: Talking All Things Physical Security with SERC’s Travis Moran

Curtis Marquardt Jr.: Can you tell our readers more about your background and what you do for SERC Reliability Corporation.? Travis Moran: I began my career in law enforcement, first as an analyst with Interpol. After several years, I joined the U.S. State Department as a special agent, where I served for six-and-a-half years. I then spent 17 years at the Bureau of Alcohol, Tobacco, Firearms and Explosives dealing with violent crime, terrorism, bombs and murders. Following my retirement in 2013, I joined Dominion Energy’s corporate security department. This tenure coincided with the aftermath of the Metcalf substation sniper attacks, which led to significant changes in physical security measures. Subsequently, I worked at NERC before coming to SERC, where I currently provide outreach training and education on security and reliability. SERC covers the southeastern and central U.S., encompassing 17 states and a population of approximately 93 million. Curtis Marquardt Jr.: That’s quite a résumé. So, let’s talk about physical security. You mentioned the Metcalf substation attack and its impacts on the industry. As you are aware, physical attacks on utilities are on the rise, which is really pushing utility security professionals to adapt to that increasing risk. From your viewpoint as a physical security expert, what do utilities need to do to be ready for the increase in physical attacks? Travis Moran: Ballistic attacks continue to be very impactful throughout the nation on our infrastructure, particularly some of our critical assets. So, we need to understand and think more holistically about how to deal with and understand the threat posture. From the recent incidents we have seen, we are seeing that our adversaries are learning and evolving. But that’s always the case, right? The key is to apply risk-based approaches to our critical assets. What happened in Moore County, North Carolina, in 2022 was just the beginning. Our adversaries are not only targeting the large entities but the small ones now as well. It’s important for all utilities, big or small, to understand what their diamonds—or critical facilities—are. Because even if you don’t have a really big critical facility, the loss of a smaller one can impact life-sustaining entities like hospitals, government facilities, fire, EMS dispatch and so on which is a diamond for them. So, in understanding the threat picture, it will help us tier and rank our facilities so we know which ones to protect the most and that are the most impactful. I like to say you have to know your diamonds from your pencils. It’s a simple analogy, but one that works quite well. Curtis Marquardt Jr.: It does feel like the Moore County attack really underlined the fact that every utility is at risk and that no utility should view itself as too small to be attacked. Earlier you mentioned that you do outreach training for SERC, teaching physical security concepts. What are some physical security concepts that utility security professionals are really good at? On the flip side, what are some areas you feel utilities should start focusing on more? Travis Moran: We’re really good at knowing our technologies. Whether it’s access control,  fencing, camera systems or so on, there are really bright people who know how to maximize those solutions. I think there is really good collaboration between the entities, integrators and manufacturers to better equip utilities with what specifically aligns with their needs. And I also know we are getting better about communicating with each other and sharing information. But again, we have to pivot back to the question of, can we do better? And although I might risk sounding like a broken record, the way utilities can get better is to get a better holistic understanding of their diamonds and pencils. It’s the best pathway toward improvement. Curtis Marquardt Jr.: I’ve been asking people in the industry about the best solution to protecting substations, and the answer I get most often is, “It’s complicated.” What do you feel are the best security practices and strategies to make an organization’s substation a less desirable target? Travis Moran: Beyond the risk-based approach to protection, I think electric utilities really need to provide protection in depth. And if it’s a diamond you are protecting, you try to put more resources into protecting those. And when you add depth, what you are really also achieving is adding time to the detect, delay, assess, communicate, respond process. The ideal first goal is to deter by making your facility so undesirable that the adversaries will want to go somewhere else. That’s a win. But again, it takes some understanding of what your adversaries  want to achieve to get to that point. The Electricity Information Sharing Analysis Center (E-ISAC) has a great program that they teach called Vulnerability of Integrated Security Analysis (VISA) that has a really great process for understanding your assets and threats. SERC pivots off of that with what we call SERC University whereby we  train on physical security for utilities  using a building block approach all the way up so you first understand your threats, understand your assets, implement the technologies and test those technologies and mitigation techniques using the VISA process. The building block approach is key as we first want to level set with regard to skills, understand their true threat, mitigation tools that they can use against the threat, then test the mitigations they employed for effectiveness – all within the confines of the Critical Infrastructure Protection (CIP) Standards. We like to highlight in our course that although the CIP Standards may not apply to every entity, they do provide an excellent framework to help increase the security of your facilities and system. Curtis Marquardt Jr.: Attacks that are making the recent national news involve adversary nations that are hacking into utilities via information technology components. As convergence grows, where do you see the changes happening in the physical space to prevent remotely triggered physical attacks via IT/OT connections? Travis Moran: The world is heading toward convergence. On the physical side, outside of some simple padlocks, it is more and more likely that most every device comes with some Internet of Things or IoT component. I like to say to people we teach at our physical security workshop class that every cyber incident has a physical manifestation. I have people looking back at me cockeyed when I say that But the truth is somewhere The malware had to be written. The malware had to be injected somehow, whether somebody put a drive in or somebody hit send on a keyboard. So, it’s imperative that physical security and cybersecurity are brought together and understand each other in ways that, if something happens, there are protocols and procedures that impact both. Some  smaller utilities don’t have cybersecurity. Some don’t have a dedicated physical security staff either. They may just have an IT department for cyber and one person wearing four or five different hats that is in charge of emergency response. Even in those instances, they have to find ways to work together. One of the best ways to accomplish that is doing tabletop exercises to help both areas understand where those gaps are. Curtis Marquardt Jr.: On that topic, what changes are needed in laws and regulations to better empower critical infrastructure to guard against attacks? Travis Moran: After the Moore County attack, FERC directed NERC to do a reevaluation of its specific physical security standards, the CIP-14 standard. That process is still going on. Overall, the risk assessment process requirement within the standard is appropriate, but they wanted to look at how the initial assessment of applicable facilities might need to be refined. However, the risk-based approach—which is part of that particular standard—is still appropriate because every facility and the environment they operate in is different. It may sound like a cop-out to say this, but it’s not: utilities need to have some flexibility in designing their physical security protection plans  because it’s not a one-size-fits-all solution for everybody. You can’t say everybody has to have fiber-optic networked cameras at every substation throughout the system because that would just be unreasonable for several reasons. So, that flexibility to know their system and design appropriate protection measures for those facilities is built into the standard. I have seen state commissions, utility commissions and county commissioners take a greater interest since the Moore County attack to see what more they can do from the distribution-level assets piece of it. Overall, it’s a complicated system, but a brilliant one as well. Curtis Marquardt Jr.: So I want to stay on this topic, but drill down to a specific threat which is drones. Where do you see the changes in laws or regulations heading there? Travis Moran: So let me go back a bit to answer this question. Back in 2016, the FAA Extension Safety & Security Act was passed into law and within that was a provision called section 2209 which specifically enumerated the FAA was going to develop a process for certain covered facilities of which energy was a part of. The plan was to have a process for those entities to be able to apply for and get flight restrictions around their identified facilities. For a lack of a better term, the can has been kicked down the road and now it’s 2024. Recently, in May 2024,  the FAA Reauthorization Act of 2024 was passed and signed into law. In that is section 929, which reinvigorated , section 2209 from the 2016 Act. So, they’re going to put out a notice of proposed rulemaking (NOPR) soon and, in that, it’s probably going to entail the process for applying and it’s going to define unmanned aircraft flying restrictions around certain levels of transmission and generation facilities. By levels, I mean there will probably be a total megawatt threshold for generation facilities to be applicable, and probably a kilovolt threshold for transmission facilities. However, it will not provide any sort of mitigation ability whatsoever. A new bill was just introduced in Congress in May 2024 regarding mitigation authorities  but that’s going to be complicated and who knows how long it’ll take. But this new section 929 will at least be a tool in the toolbox of an electric utility. So, if they have a facility that meets the required thresholds, it would be designated as a facility that unmanned aircraft are not allowed to fly around if applied for and accepted under the program . That would then most likely appear in the FAA’s “B4UFLY” application and the drone operator would be notified electronically that they are not allowed to fly around that facility. There’s lots of issues with it including questions about whether or not it could be enforced. But it’s the beginning of a tool and a process. When it comes out, our industry really needs to read through it and comment on it because our infrastructure and needs are obviously very complicated. The FAA is all about the safety of the air space and DHS is  about security of infrastructure, but neither are specifically understanding of all of the nuances of electricity security. So, I urge all those in the industry to make sure we ingest this NOPR and comment on it, because they will read it. They will pay attention to what we say. Curtis Marquardt Jr.: So let’s shift to the topic of renewables. Many organizations are moving full steam ahead on solar, wind and so on. What new or different physical security challenges come with that shift to inverter-based resources? Travis Moran: These resources are coming online fast and furious. Being able to manage the security on them comes in a wave of different modalities. Protecting them is interesting. Say for example you’re an an entity that is getting ready to put in a 5,000 acre solar farm. How do you protect that?  What’s your fence cost going to look like? And it’s a lot of generation. It’s a lot of megawatts. So, if it is a diamond for that organization, they’re going to need a lot of security by design – which simply means having security’s input at the very beginning.. Even if you put up a fence around 5,000 Acres, you need to think about it’s not just a one-time capital expenditure. There are ongoing maintenance costs. Are you going to have cameras? Do you have fiber that is out there to bring the data back from the cameras? ARe you just going to put some goats in there to handle the grass maintenance and leave it. It’s divergent and it really comes down again to a risk-based approach and each company’s individual philosophy. I caution those to make sure that they look forward and see what sort of levels of generation or transmission they will be creating because you don’t want to be behind the curve on CIP Standards if you start hitting levels that require greater security considerations. Curtis Marquardt Jr.: I just attended ISC West a couple months ago. The amount of technology choices that a utility physical security professional can use is overwhelming. And it’s growing. What technologies do you see as most impactful in physical security efforts and what are some new and emerging technologies are you most excited about? Travis Moran: For me, it’s ground-based robotics. I know there’s some utilities piloting these things and I cannot wait to see the results. These ground-based robots are going to be impactful. They never sleep. As long as the sensors and the technologies are working, they can respond. Your personnel are safe because the robots can go right up and confront and do things like video-based talk downs. As long as they get the bugs worked out on the geospatial stuff (go/no go areas), they will be very reliable solutions. Curtis Marquardt Jr.: Let’s talk about theft. More than a billion dollars of copper is stolen every year alone, and that does not factor in the costs of replacement. What are some best practices or strategies you’d recommend to utilities to better deter theft attempts? Travis Moran: I know I’ve kind of beat it into the ground, but it goes back to the risk-based approach. You have got to know your facilities and their value. If you have the facility that is in a high crime, high transient area and you’re having repeated thefts of copper and break-ins, you have to make that decision about whether or not you want to upgrade your fencing. Now, everything can be defeated, but upgraded fencing may add enough delay to allow for effective law enforcement or security response. But you can also do simple things like take criminal draws away from your spaces. For example, don’t put a porta potty outside your fence line or even inside your fence line because potential thieves will see it as a place to use the restroom, but then, while there, will look at your facility a little closer than they might would have if not drawn in to use that porta potty. Don’t make it a crime of opportunity. Another tip is to keep your facilities clean. Don’t have stuff laying around. Don’t have vehicles that look like they are sitting there unattended to. Don’t leave spools of copper or other construction materials laying out in the open. Vegetation management is also very important because it gets rid of places to hide or easier access in. Sometimes, we  see pallets stacked outside of a substation fence which essentially is gifting a would-be thief and makeshift staircase up and over the fence. Look, I get it. Operations professionals are taxed with a lot of work these days and a lot of the work might be done by contractors. But these little things do matter and it really falls on the organization to have a culture of clean, maintained and secure facilities. Curtis Marquardt Jr.: I end every interview with a “crystal ball” question as it is vital for utility security professionals to work to be ahead of the next threat. So, I’ll ask you to look into the future 5 or 10 years from now and tell me what you think or hope you’ll see in the world of physical security at utilities. What changes do you see? What new threats? Travis Moran: On the threat side, the  IED drone improvised explosive device threat, especially the first person view (PFVs) that we’re seeing overseas, is something that is really concerning. Those things can fly 100 to 150 miles an hour right up to a facility, which is way too fast for any detection measures to be effective. The ballistic ground-based threats will always be persistent just because of the way that our infrastructure is set up and where it’s located. So, on a more optimistic note, the emergence of artificial intelligence and its ability to predict and use AI and machine learning to be able to better respond is very exciting. And, as I mentioned prior, I’m excited about the future of robotics and where it is heading in terms of the response. Curtis Marquardt Jr.: Thanks so much for your time today, Travis! Can you let our readers know how they might participate in the training that you all offer at SERC? Travis Moran: Certainly! It’s called SERC University and you can learn more about it at sercuniversity.org. If you’re looking to learn about what the individual CIP standards are or other operations and planning pieces, there are a lot of options for you. We also offer an on-site in-person physical security workshop where we come to your organization and teach a building-block approach to physical security including methodologies, technologies, techniques, the standards that apply to them and how all of that is interwoven into a physical security program. We also teach design-basis threat and the VISA process—as well as tour the facility to show learners what a true threat vulnerability assessment should look like.
Critical Decision Making Progress - Substation Security
The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our decisions have consequences. For these decisions, we need a better decision-making method. We need a reliable technique that can produce sound decisions and stand up to intense scrutiny.

Substation Security Challenges: The Importance of the Critical Decision Making Process

The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our decisions have consequences. For these decisions, we need a better decision-making method. We need a reliable technique that can produce sound decisions and stand up to intense scrutiny.
General Colin Powell once said: “You can’t make good decisions unless you have good information and can separate facts from opinion and speculation. Facts are verified information, which is then presented as objective reality. The rub here is the verified. How do you verify verified?” In my previous article, I discussed how dangerous unverified assumptions can be when it comes to substation security issues. Now, we will consider the impact of our decision-making process on substation security. Critical decision-making has nothing to do with “criticizing”. In critical decision-making, we’re using the third definition of “critical” in the Merriam-Webster Dictionary: “exercising or involving careful judgment or judicious evaluation”. At first glance, critical decision-making appears to be a complicated, overly sophisticated, technical process. In reality, it’s a learnable skill that anyone can employ. However, the methodical application of a rigorous problem-solving approach does require focus and discipline, so it isn’t effortless. But, if you want easy, don’t pursue a career as a utility security practitioner; it’s not easy or glamorous. It’s underappreciated hard work that can be extraordinarily satisfying. Okay, back to critical decision-making. So, why is critical decision-making important? Its importance lies in its impact. Whether you are a member of a large security team with dozens of substations or the team is you and a cup of coffee with a couple of substations to deal with, you’re responsible for protecting the most critical infrastructure assets your organization possesses. (Generation protection is another story). If a security breach shuts down a substation, it shuts down a system. Shut down enough substations; you shut society down. Now add the axiom I’m continually repeating: when it comes to utility security, you have to get it right every time; a threat actor only has to get it right once. With this level of impact and responsibility, your decisions are important, so they need to be fact-based, reasoned, and defendable. Critical decision-making is involved in every aspect of substation security. It is crucial in conducting security assessments, planning, and resource allocation. It’s an essential skill for investigations and forensic analysis and provides a strong foundation for litigation defense. It is also our mental best defense in a crisis. If you have a solid grasp of critical decision-making, you can make sound, quick, and decisive decisions even under duress. What is Critical Decision-Making? It’s the process of objectively analyzing and evaluating information to form a qualified and defendable judgment. It involves gathering relevant information, interpreting it, assessing its value, and formulating ideas, theories, and solutions. Critical decision-making is crucial to making informed judgments and reaching rational conclusions. The process that leads the critical decision-making process is known as Critical Thinking. Critical decision-making is based on a technique known as critical thinking. Trust me, we’re not going in circles. Critical thinking is essential for verifying information and making informed decisions. It helps identify mistakes, flawed conclusions, and misrepresentations. It allows you to sort through the fog of information overload to spot errors arising from unverified assumptions, unsubstantiated conclusions, and less rigorous decision-making processes. It also provides proven and defensible problem-solving methods, incident investigation approaches, and data analysis methods. However, in the critical decision-making process, critical thinking is not a stand-alone technique; it is best used in concert with analytical thinking and reasoning techniques. Effective decision-making skills require understanding three information-processing techniques: analytical thinking, critical thinking, and reasoning; each is a specific information-gathering and deciphering method. The good news is that it doesn’t take a PhD to use these techniques, and you don’t need to master them in their entirety; you just need to understand the concepts, how they relate to each other, and how to put them into practice. Is it possible to give you a complete lesson in the art of critical decision-making in one introductory article? Sadly, no; it’ll take a little more effort than that. However, I can introduce the key terms and concepts you need and point you in a direction for acquiring these skills to make informed decisions based on solid criteria, not conjecture. Analytical Thinking – Fact Based Analytical thinking involves data harvesting and breaking down complex information into smaller parts. Analytical thinking is the logical and systematic breakdown of information. While the critical thinking process considers external criteria and knowledge, including institutional history, personal experience, and perspective, analytical thinking focuses on linear information processing. It’s the task of dispassionately collecting and sorting data to arrive at a conclusion. For those who have watched the television series, Star Trek, think of Mr. Spock. Analytical Thinking:
  • Breaks down complex information into smaller parts
  • Is the systematic, linear, and logical sequencing of information
  • Uses facts within the information gathered to support conclusions
The need to employ analytical thinking techniques should be your first consideration in the critical decision-making process. When you have a complex problem to solve or overwhelming amounts of information to process, you should put your analytical skills to work first. The goal will be to ensure that all relevant data or information is collected and evaluated without consideration of the information’s impact on the final analysis. Then, with all relevant data collected, compiled, and sorted, it’s time to shift gears and employ critical thinking skills. Critical Thinking – Judgment Based Unlike analytical thinking, critical thinking involves making opinion-based judgments, which are arrived at by evaluating various sources of information, including expertise, knowledge, and experience. Where analytical thinking is data harvesting, critical thinking is an investigative technique that involves assessing, questioning, verifying, inferring, interpreting, and formulation tasks. It also involves breaking down information into smaller parts and analyzing each part logically and systematically, but not in the dispassionate manner of analytical thinking. In critical thinking, even “gut feelings” count. In the critical thinking process, every form of information, including open-sourced data, subject-matter-expertise, and personal experience, is used to arrive at a well-considered decision or to produce an innovative solution. Think Sherlock Holmes. Critical Thinking:
  • Considers outside knowledge, including your own, when evaluating information
  • Assesses, questions, verifies, infers, interprets, and formulates to be more holistic
  • Uses other information to make judgments or find solutions
  • Evaluates a myriad of sources to form an informed opinion
The critical thinking process verifies evidence, whether it supports or contradicts your initial assumptions and conclusions, before making a final judgment. It includes the consideration and unbiased evaluation of alternative possibilities to form a clear line of reasoning that leads to reasoned conclusions. To give you an idea of the complexity of the critical thinking discipline, there are 14 commonly used tools or techniques in the critical thinking process. There are many more, but these fourteen will suffice. Personally, there are four I use regularly, and there are several that I’ve never used. 14 Critical Thinking tools:
  1. Problem Restatement;
  2. Pros, Cons, and Fixes;
  3. Divergent/Convergent Thinking;
  4. Sorting, Timelines, and Chronologies;
  5. Causal Flow Diagramming;
  6. Matrixes;
  7. Scenarios;
  8. Weighted Ranking;
  9. Hypothesis Testing;
  10. Devil’s Advocacy;
  11. Probability Trees;
  12. Utility Trees;
  13. Utility Matrixes;
  14. and Advanced Utility Analysis
In investigative analysis situations, I usually start with hypothesis testing. In contrast, I often begin with weighted ranking for criteria-based decisions. One of the basic principles of Hypothesis Testing is a great example of how a proven critical thinking technique can help guide your decision-making process. In proving a hypothesis to be true, the number of consistencies isn’t as significant as the number of inconsistencies. In almost every case, when you apply hypothesis testing, you will find several potential outcomes that will have many of the same consistencies. The evidence will point to them. However, it’s the outcome or conclusion with the fewest inconsistencies that will prove to be the correct one. By the way, this is why an innocent person is often accused and sometimes convicted of a crime they didn’t commit. Once the investigators found evidence pointing to a person as the culprit, they stopped looking. They either failed to consider or discounted any evidence that didn’t support their decision (i.e., inconsistent evidence). As a security professional, it is your responsibility to expend the energy and time resources needed to evaluate all the evidence or data provided until it is absolutely clear that you have reached the correct, defendable conclusion. Critical thinking provides the tools needed to do just that. Reasoning Reasoning is the technique used to pull everything together. It takes the data-based results of analytical thinking and the opinion-based results derived from critical thinking, verifies tests, and critiques them to ensure a sound conclusion has been reached. By consciously applying reasoning to your decision-making process, you’ll minimize adverse consequences, ensure the accuracy of your outcomes, and achieve better results. The reasoning process involves eight essential elements:
  1. purpose,
  2. problem/question clarification,
  3. information,
  4. interpretation,
  5. concepts,
  6. assumptions,
  7. point of view,
  8. and implications
Applying these elements as a reasoning checklist can be a valuable tool for breaking down complex problems, identifying causes, and finding solutions. The Role of Intellectual Standards As a utility security professional, you are responsible for collecting, analyzing, and evaluating security-related data, investigating incidents, and creating reliable reports to aid your leadership’s decision-making. This includes security-related decisions regarding substations and other key infrastructure assets. You are the expert; it’s your responsibility to provide the best information and recommendations possible. To achieve this, you must apply critical thinking processes and intellectual standards to analyze and report information. Professional rigor demands a systematic approach and comprehensive research from all available sources, identification of trends and patterns, accurate summaries of issues, and qualified recommendations for courses of action. The role of critical decision-making in substation security cannot be overstated. Whether you’re evaluating security-related expenditures, investigating an incident, judging surveillance evidence, or conducting a threat assessment, your ability to gather, organize, and assess information and produce concrete and actionable decisions and recommendations is an essential but often overlooked skill. In a crisis, your ability to make quick, decisive, and defensible choices and institute effective damaging-mitigating countermeasures will be tied directly to your critical decision-making skills. By utilizing critical thinking and analytical thinking techniques and adhering to intellectual standards, you can generate informative and accurate reports that keep your team informed of incidents, offer sound advice to leadership, and provide expert support to your utility on potential threats. So, make sure you have a firm grasp of critical decision-making techniques and expend the time and effort needed to apply them. As a utility security practitioner, the only decisions you may come to regret are those you didn’t critique through the critical decision-making process. About the Author: Jim Willis is president of InDev Tactical, a security training and consulting firm. He is an electrical engineer, an experienced utility professional, and a credentialed homeland security specialist and anti-terrorism expert. If you want to discuss utility-focused security training or consulting assistance, you can reach Jim at 703-623-6819 or jim.willis@indevtactical.net.
An Interview with Mark Aysta, Duke Energy’s Managing Director of Enterprise Security

Forging a Secure Tomorrow: Duke Energy’s Path to a More Resilient Future

There’s a great quote by Confucius that says: “Our greatest glory is not in never falling, but in rising every time we fall.” And it’s truly applicable for security professionals because no matter how much one plans, strategizes and fully commits to preventing an incident, along comes something that challenges those efforts in ways that can help an organization grow, evolve and achieve an even better security posture. On Dec. 3, 2022, Duke Energy experienced a “something” in the form of an unprecedented and sophisticated attack on a low-level substation that knocked out power to more tha…
infrastructure-security-july-article
An Interview with Idaho National Laboratory’s Andrew Bochman About How Climate Impacts Need to be Planned for and Acted on Today

How ‘Global Weirding’ is Creating New Threats for Utility Security Professionals

If you search for “Andrew Bochman” on Amazon’s website, the first listing to appear is a book he co-authored about countering cyber sabotage. If you search his name on YouTube, you’ll find videos of him presenting on topics including managing risk and operational technology cybersecurity. Bochman dedicated much of his career to helping with the security and resiliency of utilities.
Interview with Andy Bochman
Interview with Andy Bochman
But as the years passed, he watched—along with the rest of us—climate event after climate event continuously wreak havoc on utilities. In bearing witness to those events, Bochman saw a threat so alarming that it inspired in him a new passion to educate and inform the industry about how to start planning today for the challenging days ahead. Some call it climate change. Others refer to it as global warming. To avoid the politically charged nature of those terms, Bochman has come up with the novel term of “global weirding,” which essentially means that even if we disagree about the “why” of the change, we can all agree it is occurring. We sat down with Bochman to talk about why the systems we use today are simply not engineered to deal with the climate chaos of tomorrow—and how that is going to impact your security and resiliency plans. Curtis Marquardt: 
 Let’s start off by letting you tell our readers about yourself. Andrew Bochman: I’m nearing my ten-year anniversary at one of the 17 National Labs, the Idaho National Laboratory. There, I serve as a senior grid strategist in the National and Homeland Security directorate. My interpretation of “strategy” happily aligns with my boss’s expectations. I focus on identifying the most pressing challenges, often future-oriented issues that others might not yet notice. In essence, I operate with a five- to 10-year horizon. By considering mid-to-longer trends, I am able to provide helpful guidance to all manner of colleagues working on grid security and resilience, new energy solutions, and cyber and physical security—all critically important areas in today’s environment. Curtis Marquardt: 
 My next question might seem unusual: Why is the concept of the 500-year flood no longer viable? Andrew Bochman: 
 The terms 500-year flood, 1000-year drought, or similar used to be useful in risk management for physical phenomena. These are as much insurance terms as engineering terms. And when the weather patterns were more stable and more predictable, this concept worked just fine. The problem is that—and I’ll use just one of many examples—the city of Houston had three 500-year floods in three consecutive years. We are consistently seeing things that were once considered these once-in-a-century or once-in-a-millenium events happening all the time, from floods to fires to freezes to heat domes and some incredible storms too. I know that the terms “climate change” and “global warming” sometimes trigger political responses and cause arguments about why it is occuring. But if we can look past those terms, I think we would all probably agree that there has been some “global weirding” happening all over the world, and it’s happening at a frequency that we haven’t seen before. And if you’re an infrastructure defender like myself and my colleagues in the lab, you are seeing it impacting utilities with more and more frequency. Curtis Marquardt: 
 Our readers are utility security professionals who are worried about copper thieves. They’re worried about cyberattacks from adversary nations. They’re focused on protecting frontline workers from threats out in the field. Can you talk to them about why global weirding should be a focal point as well? Andrew Bochman: Well, the good news is that some out there already are. They’re running vulnerability assessments. They are ingesting climate models that not only look back at historical data, but look forward and project what is likely coming and by approximately when. For those who aren’t already putting focus on this, I’d like to use an example to help illustrate why it’s so important. Let’s just look at increasing temperatures and heat domes. As temperatures rise and high-temperature events occur, we have to look at the equipment we have and realize that the design decisions made in the past for that equipment aren’t going to work the same way in temperatures they weren’t designed to handle. Whether that’s substations, transmission lines, cooling systems, security equipment or wastewater treatment plants, all was designed for a different world than the one we are entering into. So, this creates a big resiliency problem. And we have to look at the load changes as well. Will more and more people be turning on their air conditioners or keeping them on longer than they used to? Or, look at places where excessive heat is never common, like the heat wave that London and the Pacific Northwest went through recently. They don’t even have air conditioners, and all of a sudden, it’s well over 100 degrees fahrenheit there. Consider data centers, which are massive users of electricity. They require a lot of cooling to stay online. How many of your organization’s IT systems depend on these data centers? If we can’t cool them enough to operate, we are looking at outages and downtime on critical systems. I’ll throw one more out there: transmission lines and distribution lines become less efficient with high heat. So, I need to have more lines or I won’t be able to pump as much through to reach those customers on those days when they need it most. And we are just talking about extreme heat. Add in all of the other layers of global weirding and you can see just how impactful this is on your security and resiliency. Curtis Marquardt: 
 I want to ask you about some of the other impacts of these climate-related changes. We see events like floods, freezes and fires happening and have an awareness of those. But there’s also a long-term impact that could lead to things like population displacement, global conflict and more. Can you talk about these deeper layers of the proverbial onion and how they may impact security moving forward? Andrew Bochman: We have seen how quickly social disruption and chaos can grow when resources get scarce, both in history and more recent events that are happening around the globe. And things like blackouts and brownouts that are going to become much more frequent and common in the future. Part of the reason for that is that we’ve been really aggressive in shutting down coal plants and limiting the number of gas plants while we build wind and solar energy infrastructure. In certain areas, this has cut into our capacity too much. So now, NERC is now regularly publishing alerts for the winter and fall seasons that warn of possible energy shortages. Curtis Marquardt: 
 It makes me think of the 1977 New York blackout and how chaos quickly erupted from that outage. I imagine this will present a lot of serious security issues if they occur more frequently. So, to shift gears, we know this is a physical issue. How can cybersecurity professionals use their skills and knowledge to combat tomorrow’s “global weirding” threats that impact cyber areas of their organizations? Andrew Bochman: What’s great about security professionals in general is that they have this “defender DNA” in them that gives them the instincts to defend something that’s valuable—whether it’s one’s self, one’s family, the community or the assets that one’s company uses. I am a part of the cybersecurity community, so I possess that instinct as well. When we talk about cybersecurity pro’s, those folks are very focused on their particular niche. One thing I’ll ask them is to open up the aperture a bit more. Although climate risks are physical risks, they are pounding on your assets in many ways, and we don’t want to be flatfooted about responding to that. I also want to go back to the topic of our rapid deployment of wind, solar, storage, EVs and other renewables. We are deploying them so fast, and some of those components are inverter-based resources. These digital controllers in the inverters are all sourced from China, and it’s making a lot of people in US national security organizations very uneasy. So, as renewables continue to grow, so too will be our need for them to be secure and reliable. And if China is the primary supplier of the components for the foreseeable future, that puts us in a very precarious position. We need to get really smart really fast on how we deploy these systems, with inherent security features that account for their country of origin. As in, for critical functions supporting the US grid, don’t trust anything. Curtis Marquardt:
 Thank you for your time, Andrew! How can folks reach you if they’d like to learn more? Andrew Bochman: 
 Thank you for having me. I can be reached by email at andrew.bochman@inl.gov, and I’ll be happy to connect folks with my deep SME colleagues in cyber and physical defense roles at INL.I’m also quite active on LinkedIn and can be reached there as well at www.linkedin.com/in/Andrewbochman/.
frontline worker security july article
How A New Zealand-Based Company is Hoping to Revolutionize the Ways Utility Organizations can Quickly Verify Worker Security Credentials, Skills and Training Qualifications

The Storm Work Security Conundrum

Interview with Dan Stemp and Alex Wakeland
Interview with Dan Stemp and Alex Wakeland
As storm restoration work becomes more frequent, so do the challenges of verifying that the workers that flock to the disaster areas are qualified to do the work as well as meet background checks and security verifications they need. We talked with Dan Stemp, the chief customer officer at JNCTN, a New Zealand-based company that is hoping to bring a solution to the U.S. market that will not only empower utilities to verify workers but also give the workers ownership of that information. Included in the discussion is Alex Wakeland, a journeyman lineman for the International Brotherhood of Electrical Workers and a JNCTN product champion. Curtis Marquardt: 
 Storm restoration work in the U.S. typically requires utility workers to descend upon the impacted area from all over the country. From a security perspective, what are the biggest concerns utilities should have about this way of restoring services? Alex Wakeland: 
 As a journeyman lineman, I have seen this firsthand very often. The main problem is that you have a flood of utility workers descending upon the restoration area from all over the country, but there’s no way for the utility company to quickly verify all the paperwork to make sure they have the background, experience, security clearance and training to do the job. They simply don’t have enough staff. Ideally, utilities would have their own in-house staff to handle everything, but that’s not always cost-effective. So, they hire subcontractors. However, this can create challenges when it comes to verifying worker qualifications as well. Additionally, from a logistical perspective, sometimes utilities have rules where they require each crew to have one journeyman lineman, one apprentice lineman and one groundman. This really slows down the process as they wait on traditional paperwork to verify and group these teams. Often, these storm restoration workers get down on-site and have to wait for days to actually be cleared to start working. It’s an incredibly inefficient process. Curtis Marquardt: 
 JNCTN has a solution that can help with this challenge and provide utilities with a tool to help them be more secure and efficient.Can you talk about that solution? Dan Stemp: Correct. Our solution is what I like to call digital protective equipment, or DPE—modeled off the common industry term “personal protective equipment.” What we do is provide a digital wallet for individual workers. For example, someone like Alex can create a digital wallet on their device. This wallet allows them to create credentials for themselves, and they can be imported from the organizations that employ them or provide their training. These credentials are created using open standards so they can be interoperable with other systems. For example, a utility company could use our system to verify that a worker has the necessary qualifications before allowing them access to a worksite. This would improve security and efficiency. This information could be stored electronically so that when a crew arrives at a worksite, it can be quickly verified that they meet the qualifications. This would improve security, billing and safety metrics. Alex Wakeland: 
 There are many advantages to this approach, but the first step is getting utilities to agree to a standardized system. This will make the industry more efficient and help us recover from disasters more quickly. Disasters are never a good thing, but we can make them a little bit better. Dan Stemp: The key is to ensure that the people responding to the disaster are who they say they are and have the necessary skills and training to do the job safely and do not compromise security. Alex Wakeland: Exactly. This is not just about protecting personal data; it’s about improving safety, security and efficiency across the entire industry. Dan Stemp: 
 This is a solution that can be applied to any sector, not just energy. In New Zealand, we’ve had success in the forestry and high-hazard industries as well. What’s great about our system is that it allows workers to own and manage their own credentials. They can then choose to share these credentials with authorized organizations or revoke them. They own it. Alex Wakeland: 
 In a world where data leaks create a whole host of problems, we found the system provides a centralized ecosystem for all consumers where the consumer controls access to their own data. This also solves another inefficiency, which is duplicate training. Often, when a worker leaves one job for another, getting the training records from the previous employer isn’t always so easy. So often, the new employer requires that employee to do the same training all over again. If each worker can control their own verified personal job data, they can easily produce proof of training themselves. Curtis Marquardt: 
 One area I’m thinking about is access control into sensitive areas of a facility. Can this solution integrate with existing access control systems used by utilities to help with the verification process whether they are an employee, contractor or other? Dan Stemp:
 Great question. The answer is yes. Our software is built to be interoperable with many other solutions. For example, a large company might have a human resources system that holds information you want to use. Our platform can connect with that existing system via API to avoid redundant data entry. The same goes for access systems. If someone’s credentials match requirements, the platform can grant access. JNCTN allows credentials to have more utility. So, a person’s credentials might allow specific actions. Let’s say there’s a geothermal power station with safety rules for entry. When someone arrives at the gate, they wouldn’t have to find every single credential. The person at the gate can select the rule set or location that applies, requiring specific credentials. If the person has them all, it’s just a scan of a QR code from their digital wallet. The system checks everything and grants access. JNCTN isn’t saying someone has this or that credential, it’s just checking a pre-created rule set. The person at the gate might just be a security guard who sees a message saying “meets requirements” or “doesn’t meet requirements.” There can then be specific rules the guard follows if someone doesn’t meet the set. For example, maybe someone is missing a site induction, but it’s their first time there, so they might be allowed in with an exemption. Our product can create a digital audit trail of all that. The New Zealand government used JNCTN for their pandemic response, managing isolation and quarantine facilities. Workers turning up for their shift each day had their credentials verified through our platform. Curtis Marquardt:
 So, you brought up New Zealand. This system has been implemented into real-world utility industry applications there and has proven to be effective. Can you talk more about how it was implemented and the successes it brought? Dan Stemp: 
 The New Zealand and U.S. markets are quite different, and our approaches differed as well. In New Zealand, there was a very supportive industry environment. As I mentioned earlier, the entire industry came together and acknowledged the need to improve worker safety. They wanted workers to go home safely to their families and feel secure knowing they’re working alongside people who meet the same qualifications. The New Zealand utility companies, specifically the generation companies, took the lead. They created an initiative with a branded name, “Stay Safe,” to identify it across the industry and drive its adoption. It wasn’t just about our technology; the initiative encompassed other aspects related to worker health, safety and security. Having the generation companies at the forefront ensured buy-in from everyone in the industry, from subcontractors to transmission and distribution companies. New Zealand has a smaller workforce, but our generation capacity is significant at 9,500 megawatts nationwide. New Zealand has a substantial workforce, and the generation companies prioritized their employees first.They then collaborated with subcontractors who work in those environments, including plumbers, builders, scaffolders, utility workers and generation workers themselves. This broad approach ensures everyone who touches the industry is included. And the benefits extend beyond the energy sector, as subcontractors see the value in other industries. For example, a scaffolder who obtains credentials for a generation site’s maintenance can use those same credentials in the construction industry, demonstrating their scaffolding ticket and working-at-height certificate. This experience is fostering a broader mindset across industries: There’s a way to do this, and it’s working, so maybe we should adopt it. But really, it’s our success in the utility segment in New Zealand that really has us looking at ways we can help in U.S.-based utilities. We hope to see a similar adoption and collaborative approach in the U.S. where workers can leverage credentials across industries. Alex Wakeland: This is the utopia we’re striving for, but there are steps to get there. Every other tech company seems to think this is a one-size-fits-all solution. Dan Stemp: The flow-on effect is important, but establishing the use case and demonstrating value is crucial first. Alex Wakeland: We recognize there might be imperfect measures to get us there, but they bridge the gap to the next step. JNCTN is working on it. They talk to the frontline workers who will manage this. Most conversations I get are like, “How do you even show up for storms?” It’s as if they’re trying to manage us without understanding. Just come talk to us! We’ll tell you about the challenges. To learn more about JNCTN, visit JNCTN.nz.

Know your Diamonds from your pencils
An in-Depth Conversation About Physical Security Strategies, Dealing with Emerging Threats, Robotic Dogs, Preventing Theft, Where Regulations are Heading and More

Know Your Diamonds from Your Pencils: Talking All Things Physical Security with SERC’s Travis Moran

Curtis Marquardt Jr.: Can you tell our readers more about your background and what you do for SERC Reliability Corporation.? Travis Moran: I began my career in law enforcement, first as an analyst with Interpol. After several years, I joined the U.S. State Department as a special agent, wher…
Critical Decision Making Progress - Substation Security
The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our decisions have consequences. For these decisions, we need a better decision-making method. We need a reliable technique that can produce sound decisions and stand up to intense scrutiny.

Substation Security Challenges: The Importance of the Critical Decision Making Process

The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our…
Duke article illustration
An Interview with Mark Aysta, Duke Energy’s Managing Director of Enterprise Security

Forging a Secure Tomorrow: Duke Energy’s Path to a More Resilient Future

There’s a great quote by Confucius that says: “Our greatest glory is not in never falling, but in rising every time we fall.” And it’s truly applicable for security professionals because no matter how much one plans, strategizes and fully commits to preventing an incident, along comes something t…
infrastructure-security-july-article
An Interview with Idaho National Laboratory’s Andrew Bochman About How Climate Impacts Need to be Planned for and Acted on Today

How ‘Global Weirding’ is Creating New Threats for Utility Security Professionals

If you search for “Andrew Bochman” on Amazon’s website, the first listing to appear is a book he co-authored about countering cyber sabotage. If you search his name on YouTube, you’ll find videos of him presenting on topics including managing risk and operational technology cybersecurity. Bochman…

Know your Diamonds from your pencils
An in-Depth Conversation About Physical Security Strategies, Dealing with Emerging Threats, Robotic Dogs, Preventing Theft, Where Regulations are Heading and More

Know Your Diamonds from Your Pencils: Talking All Things Physical Security with SERC’s Travis Moran

Curtis Marquardt Jr.: Can you tell our readers more about your background and what you do for SERC Reliability Corporation.? Travis Moran: I began my career in law enforcement, first as an analyst with Interpol. After several years, I joined the U.S. State Department as a special agent, wher…
Critical Decision Making Progress - Substation Security
The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our decisions have consequences. For these decisions, we need a better decision-making method. We need a reliable technique that can produce sound decisions and stand up to intense scrutiny.

Substation Security Challenges: The Importance of the Critical Decision Making Process

The most commonly used decision-making process is conjecture-based; we use it countless times daily. We go through life making decisions based on assumptions, speculation and whimsy, with little thought to impact or outcomes. However, when it comes to security, especially substation security, our…
Duke article illustration
An Interview with Mark Aysta, Duke Energy’s Managing Director of Enterprise Security

Forging a Secure Tomorrow: Duke Energy’s Path to a More Resilient Future

There’s a great quote by Confucius that says: “Our greatest glory is not in never falling, but in rising every time we fall.” And it’s truly applicable for security professionals because no matter how much one plans, strategizes and fully commits to preventing an incident, along comes something t…
infrastructure-security-july-article
An Interview with Idaho National Laboratory’s Andrew Bochman About How Climate Impacts Need to be Planned for and Acted on Today

How ‘Global Weirding’ is Creating New Threats for Utility Security Professionals

If you search for “Andrew Bochman” on Amazon’s website, the first listing to appear is a book he co-authored about countering cyber sabotage. If you search his name on YouTube, you’ll find videos of him presenting on topics including managing risk and operational technology cybersecurity. Bochman…