Critical Infrastructure And Cyber Security

The way power grids are operated and managed has changed fundamentally in the last years with the integration of more renewable and decentralised energy sources. With information and communication technology penetrating transmission and distribution networks, the growing interconnections create more vectors for potential attacks on digital energy grids. 

Cyber security is now a top priority for power system operators and government bodies. The need for network optimisation, interaction between both consumers and producers, along with the number of new market participants have all significantly increased.

Siemens Smart Infrastructure and the NATO Cooperative Cyber Defense Centre of Excellence have recently signed a Memorandum of Understanding to continue the cooperation on cyber security for critical infrastructure. Advancing their existing cooperation, the two sides will be involved with cyber security training for power grids.

In experimenting with grid control software Spectrum Power, Siemens gains valuable insights on the potential attack vectors and can thoroughly test new security features or protocols for its products and solutions. Locked Shields is an annual cyber defence exercise organised by NATO to train cyber response teams to defend against massive cyberattacks.   

In the exercise, the defenders have to set the defense lines of a complex infrastructure including various systems and applications that should withstand massive cyber-attacks executed by a large group of hackers.

Last year a Report published by Dr Edward Oughton from Oxford University claimed that a cyber-attack on London’s power grid alone could cost as much as £111 million per day and that even a small attack on our energy network would result in chaos for 1.5 million people. He said, “Critical national infrastructure such as smart electricity networks are susceptible to malicious cyber-attacks which could cause substantial power outages and cascading failure.”

Also late last year the US Government announced a surprising move to secure power grids by using “retro” technologies. That came after numerous attempts by foreign actors to launch cyber-attacks on Critical National Infrastructure (CNI).

Nations have been trying to secure the industrial control systems that power CNI for years. The challenge lies in the fact that these systems were not built with security in mind, because they were not originally meant to be connected to the Internet.

Siemens:       I-HLS:         Shenton Group:      Forbes:      Energy Live:   

You Might Also Read: 

The EU Power Grid Is Under Attack:

 

« Problems With Using Big Data For Policing
Machine Learning Transforms Threat Detection »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

Terralogic

Terralogic

Terralogic is a software and IT services company, an expert in IoT, Cloud, DevOps, App development and Cybersecurity.

HMS Networks

HMS Networks

HMS stands for Hardware meets Software. Our technology enables industrial hardware to communicate and share information with software and systems.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

RecoLabs (Reco)

RecoLabs (Reco)

Reco empowers organizations to discover their SaaS applications, identities, and data, control access and prevent the risk of exposure.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

Alpha Echo

Alpha Echo

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level.