Critical Infrastructure And Cyber Security

The way power grids are operated and managed has changed fundamentally in the last years with the integration of more renewable and decentralised energy sources. With information and communication technology penetrating transmission and distribution networks, the growing interconnections create more vectors for potential attacks on digital energy grids. 

Cyber security is now a top priority for power system operators and government bodies. The need for network optimisation, interaction between both consumers and producers, along with the number of new market participants have all significantly increased.

Siemens Smart Infrastructure and the NATO Cooperative Cyber Defense Centre of Excellence have recently signed a Memorandum of Understanding to continue the cooperation on cyber security for critical infrastructure. Advancing their existing cooperation, the two sides will be involved with cyber security training for power grids.

In experimenting with grid control software Spectrum Power, Siemens gains valuable insights on the potential attack vectors and can thoroughly test new security features or protocols for its products and solutions. Locked Shields is an annual cyber defence exercise organised by NATO to train cyber response teams to defend against massive cyberattacks.   

In the exercise, the defenders have to set the defense lines of a complex infrastructure including various systems and applications that should withstand massive cyber-attacks executed by a large group of hackers.

Last year a Report published by Dr Edward Oughton from Oxford University claimed that a cyber-attack on London’s power grid alone could cost as much as £111 million per day and that even a small attack on our energy network would result in chaos for 1.5 million people. He said, “Critical national infrastructure such as smart electricity networks are susceptible to malicious cyber-attacks which could cause substantial power outages and cascading failure.”

Also late last year the US Government announced a surprising move to secure power grids by using “retro” technologies. That came after numerous attempts by foreign actors to launch cyber-attacks on Critical National Infrastructure (CNI).

Nations have been trying to secure the industrial control systems that power CNI for years. The challenge lies in the fact that these systems were not built with security in mind, because they were not originally meant to be connected to the Internet.

Siemens:       I-HLS:         Shenton Group:      Forbes:      Energy Live:   

You Might Also Read: 

The EU Power Grid Is Under Attack:

 

« Problems With Using Big Data For Policing
Machine Learning Transforms Threat Detection »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

XLAB

XLAB

XLAB is an R&D company with a strong research background in the fields of distributed systems, cloud computing, security and dependability of systems.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Neptune Cyber

Neptune Cyber

Neptune is a cyber security company that works exclusively in the marine sector. Our team combines experts in shipbuilding, maintenance and operations and cyber security testing and design.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.

Walacor

Walacor

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.