Critical Infrastructure And Cyber Security

The way power grids are operated and managed has changed fundamentally in the last years with the integration of more renewable and decentralised energy sources. With information and communication technology penetrating transmission and distribution networks, the growing interconnections create more vectors for potential attacks on digital energy grids. 

Cyber security is now a top priority for power system operators and government bodies. The need for network optimisation, interaction between both consumers and producers, along with the number of new market participants have all significantly increased.

Siemens Smart Infrastructure and the NATO Cooperative Cyber Defense Centre of Excellence have recently signed a Memorandum of Understanding to continue the cooperation on cyber security for critical infrastructure. Advancing their existing cooperation, the two sides will be involved with cyber security training for power grids.

In experimenting with grid control software Spectrum Power, Siemens gains valuable insights on the potential attack vectors and can thoroughly test new security features or protocols for its products and solutions. Locked Shields is an annual cyber defence exercise organised by NATO to train cyber response teams to defend against massive cyberattacks.   

In the exercise, the defenders have to set the defense lines of a complex infrastructure including various systems and applications that should withstand massive cyber-attacks executed by a large group of hackers.

Last year a Report published by Dr Edward Oughton from Oxford University claimed that a cyber-attack on London’s power grid alone could cost as much as £111 million per day and that even a small attack on our energy network would result in chaos for 1.5 million people. He said, “Critical national infrastructure such as smart electricity networks are susceptible to malicious cyber-attacks which could cause substantial power outages and cascading failure.”

Also late last year the US Government announced a surprising move to secure power grids by using “retro” technologies. That came after numerous attempts by foreign actors to launch cyber-attacks on Critical National Infrastructure (CNI).

Nations have been trying to secure the industrial control systems that power CNI for years. The challenge lies in the fact that these systems were not built with security in mind, because they were not originally meant to be connected to the Internet.

Siemens:       I-HLS:         Shenton Group:      Forbes:      Energy Live:   

You Might Also Read: 

The EU Power Grid Is Under Attack:

 

« Problems With Using Big Data For Policing
Machine Learning Transforms Threat Detection »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

Secure Technology Alliance

Secure Technology Alliance

Secure Technology Alliance is a multi-industry association working to stimulate the adoption and widespread application of secure solutions.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Wolf Hill Group

Wolf Hill Group

Wolf Hill Group, a Slone Partners company, is a national recruitment firm focused on Cybersecurity.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Advantio

Advantio

Advantio offers a unique combination of technologies and managed, advisory and testing services to increase your cyber resilience and compliance.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.

NetSentries Technologies

NetSentries Technologies

NetSentries provide smart cybersecurity solutions and services to protect Governments, Enterprise and Individuals from threats through a comprehensive range of protocols, products and services.

Aikido Security

Aikido Security

Aikido is the no-nonsense security platform for developers. Secure your code, cloud, and runtime in one central system. Find and fix vulnerabilities automatically.