New Cyber Security Measures To Protect US Energy

The United States is launching new research programs to protect the security of America's energy system. The Department of Energy’s (DOE) Office of Cyberscurity, Energy Security & Emergency Response (CESER), which announced the new programs, said that they will help "to safeguard the US energy system from growing cyber and physical hazards.”

Potential vulnerabilities in the global supply chain will be addressed by the new schemes, which will also explore ways to shield critical infrastructure from geomagnetic and electromagnetic interference. 

“Our energy system faces unprecedented threat levels from hackers, foreign actors, and natural catastrophes supercharged by climate change, which is why enhancing security is a priority for this administration.. What’s more, President Biden’s clean energy goals all depend on resilient electrical infrastructure. These new programs will help put us a step ahead of all manner of threats so we can provide safe, reliable power to American households.” said Secretary of Energy Jennifer Granholm. 

Creating a research and talent pipeline for the next generation of cybersecurity professionals is another area that the freshly announced programs will be focused on. 

“Securing US critical infrastructure, particularly in the energy sector, is one our most important and complex national security challenges,” said Patricia Hoffman of CESER. “Our vision with these programs is to bring together key partners, from industry to the states to universities, with the expertise and inventiveness needed to enhance energy sector resilience.”

The range of threats facing US  critical energy infrastructure include digital hazards like cyber attacks as well  as environmental dangers such as wildfires, extreme weather, and climate change, according to CESER. “Our energy system faces unprecedented threat levels from hackers, foreign actors, and natural catastrophes supercharged by climate change—which is why enhancing security is a priority for this administration,” said Jennifer M. Granholm, Secretary of Energy, in a government statement.

News of the programs comes days after 21 states led by attorneys general from Texas and Montana took legal action agianst President Biden for cancelling the Keystone XL pipeline project that they argue would bolster US energy independence and security. 

The three research programs were welcomed by the chairman of the house energy and commerce committee, Congressman Frank Pallone, Jr, who said that “foreign adversaries are taking new and aggressive tactics to compromise our critical infrastructure, including our electric grid... We must increase our efforts to ensure our energy sector is prepared to mitigate any threat that poses a risk to Americans’ connectivity and access to power," he said.

Dept. of Energy:     Texas Attorney General:    Infosecurity Magazine:   Akin Gump:    Mondaq:

You Might Also Read: 

The Growing Cyber Threat To Renewable Energy:

 

« NSA Will Hunt Cyber Attackers Inside The US
Avoiding Arrest: Cyber Criminals Share Dark Web Secrets »

Perimeter 81

Directory of Suppliers

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Center for Information Security Awareness (CFISA)

Center for Information Security Awareness (CFISA)

CFISA provides online and onsite information security training courses.

CipherPoint Software

CipherPoint Software

CipherPoint Software provides data-centric auditing and protection solutions for securing unstructured information

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

International School of IT Security (ISITS)

International School of IT Security (ISITS)

The International School of IT Security (ISITS) is a leading provider of professional training in the field of IT Security.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

DNeX

DNeX

DNeX IT & eServices offers enterprise security solutions, managed security services and advisory services.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.