article thumbnail

FERC, NERC joint report on cyber incident response at electric utilities

Security Affairs

The US FERC and NERC published a study on cyber incident response at electric utilities that also includes recovery best practices. electric utilities. A cyber attack could have a severe impact on the operations of the utilities and consequent economical losses.

article thumbnail

DoS attack the caused disruption at US power utility exploited a known flaw

Security Affairs

A DoS attack that caused disruptions at a power utility in the United States exploited a flaw in a firewall used in the facility. In May, the Department of Energy confirmed that on March 5, 2019, between 9 a.m. a cyber event disrupted energy grid operations in California, Wyoming, and Utah. The report did not include the name of the utility company that suffered the incident. . SecurityAffairs – power utility, hacking).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Content Services Are Enabling the Digital Transformation of Electric Utilities

AIIM

Electric utilities in the United States are a major source of CO2 – they created 1.55 And according to the US Energy Information Agency, consumption is expected to grow by 50% by the year 2050. To get greener, electric utilities must digitally transform.

article thumbnail

Dept. of Energy announced the Liberty Eclipse exercise to test electrical grid against cyber attacks

Security Affairs

This is the first time the Department of Energy will test the electrical grid’s ability to recover from a blackout caused by cyberattacks. The Department of Energy wants to test the resilience of an electrical grid to a cyber attack, so it’s going to launch the first hands-on exercise to test the ability of the operators of such infrastructure in recovering from a blackout caused by a cyber attack.

article thumbnail

A ‘Cyber Event’ disrupted power grid operations in three US states

Security Affairs

The Department of Energy confirmed that in March a cyber event disrupted power grid operations in California, Wyoming, and Utah. The Department of Energy confirmed that on March 2019, between 9 a.m. a cyber event disrupted energy grid operations in California, Wyoming, and Utah. The report doesn’t include the name of the utility company that suffered the incident.

article thumbnail

European cooperation on flexibility to accelerate the energy transition

CGI

European cooperation on flexibility to accelerate the energy transition. Early in September, we invited a number of our clients from around Europe to participate in a roundtable discussion on energy flexibility. Read more about energy flexibility.

article thumbnail

Insight-driven decisions are required to operate digital energy grids - and keep my EV charged

CGI

Insight-driven decisions are required to operate digital energy grids - and keep my EV charged. Last summer, I had an experience that made me realize how, in the future, utility network operators will need to work based on data they get from assets they may or may not own.

article thumbnail

Key strategies and technologies to help utilities respond to a “storm” never seen before

CGI

Key strategies and technologies to help utilities respond to a “storm” never seen before. For more than three decades, I served at a leading electric utility, responding to numerous storms to keep the lights on for customers and to support critical infrastructure.

article thumbnail

FERC issues notice of proposed rulemaking to extend reporting requirements for cyberattacks targeting the energy sector

Data Protection Report

DHS’ webinar explained that the hackers obtained access to vendors providing computer services to electric utilities companies. In response to such concerns, regulatory agencies are increasing reporting requirements for cyberattacks targeting the energy sector. 147, at 37727-36741), the Federal Energy Regulatory Commission (FERC), which regulates the energy sector, recently directed that the power industry’s regulating body, the North American Electric Reliability Corp.

article thumbnail

Next-gen, real-time data exchanges will power the energy industry

CGI

Next-gen, real-time data exchanges will power the energy industry. Now in its eighth year, the event brings together global energy experts and influencers to debate and discuss the future of central market operations. As the event draws closer, it is interesting to see how data exchanges in utilities are changing purpose following the liberalization of the energy market. sonya.balasubr…. Wed, 05/01/2019 - 22:32.

article thumbnail

European Utility Week 2018: Top 5 takeaways and the call to ‘journey together’

CGI

European Utility Week 2018: Top 5 takeaways and the call to ‘journey together’. This ancient African proverb sums up, quite accurately, the sentiment at the recently concluded European Utility Week (EUW) 2018. Among the event’s numerous sessions and conversations on the low carbon energy program, energy markets and digitalization, what stood out was an overarching call to ‘journey together’. Blockchain is enabling the “democratization” of energy.

article thumbnail

Thinking Out Loud: Potential Information

John Battelle's Searchblog

image ) If you took first-year physics in school, you’re familiar with the concepts of potential and kinetic energy. If you skipped Physics, here’s a brief review: Kinetic energy is energy possessed by bodies into motion. Potential energy is energy stored inside a body that has the potential to create motion. I like to think of potential energy as a force that’s waiting to become kinetic.

article thumbnail

Russia Sanctions May Spark Escalating Cyber Conflict

Krebs on Security

The West has promised tougher sanctions are coming, but experts warn these will almost certainly trigger a Russian retaliation against America and its allies, which could escalate into cyber attacks on Western financial institutions and energy infrastructure.

article thumbnail

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk

Hunton Privacy

In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack. Hunton Andrews Kurth LLP recently represented an electric utility in obtaining a first-of-its-kind enterprise-wide SAFETY Act Certification for its cybersecurity risk management program.

article thumbnail

Hackers Target Oil Producers During COVID-19 Slump

Security Affairs

Real-Life Examples of Spear-Phishing Attacks in the Energy Production Sector. The threat of spear-phishing for energy companies is, unfortunately, not a theoretical one. Why are cyberattacks in the energy industry suddenly on the rise? The Energy Industry Must Remain Vigilant.

article thumbnail

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

From taking a shower, to brewing your coffee, and watching the news, your morning routine is fueled by the energy sector. But the energy sector also underpins our emergency and response systems, our hospitals and healthcare, our schools, our businesses, and virtually everything we do as a society. Unfortunately, the energy sector is of great interest to cyber attackers today. It’s even possible that the attackers didn’t even know they were targeting a power utility.

Cloud 85
article thumbnail

PseudoManuscrypt, a mysterious massive cyber espionage campaign

Security Affairs

of all systems targeted by the PseudoManuscrypt malware are part of industrial control systems (ICS) used by organizations in multiple industries, including Engineering, Building Automation, Energy, Manufacturing, Construction, Utilities, and Water Management.

article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

To prove ownership over the hijacked firms, they hire low-wage image editors online to help fabricate and/or modify a number of official documents tied to the business — including tax records and utility bills.

article thumbnail

Heading toward a data bright future: key takeaways from the 8th CGI Central Market Debate

CGI

Are there learnings for the utilities industry from an augmented reality game’s incredible 19-day time-to-market, or the possibility that flying taxis could become cheaper than owning a car? The 8th CGI Central Market Debate, attended by more than 50 global industry experts, influencers and executives from across Europe, raised many such thought-provoking questions and discussions on trends, technologies and implementation approaches in the energy market.

article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

The threat of attacks against Critical National Infrastructure (CNI) – energy, utilities, telecommunications, and transportation – is now front of mind for many. The Ongoing Cyber Threat to Critical Infrastructure. divya. Thu, 07/21/2022 - 12:28.

Cloud 68
article thumbnail

China-linked APT40 used ScanBox Framework in a long-running espionage campaign

Security Affairs

TA423 is a China-linked cyber espionage group that has been active since 2013, it focuses on political events in the Asia-Pacific region, specifically on the South China Sea.

article thumbnail

List of Data Breaches and Cyber Attacks in August 2022 – 97 Million Records Breached

IT Governance

August 2022 has been a lesson in being careful with whom you provide sensitive information. In a month that saw the former US president accused of misappropriating classified government documents, there were also a spate of malicious insiders compromising their employer’s systems.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

Energy and utility companies have been some of the most high-profile cyber attacks in recent memory, such as the May 2021 Colonial Pipeline attack or the Delta-owned Monroe Energy attack in November 2021. Cybercrime is a growth industry like no other.

article thumbnail

Coming together for DC ‘21

Collibra

Attendees will hear from numerous industries including healthcare, telecommunications, energy and utilities, higher education, technology, life sciences, and retail. I am eagerly waiting for June 16th to kick off this great event.

article thumbnail

INSIGHTS from SENTINEL

Thales Cloud Protection & Licensing

The virtual event provided hundreds of attendees with thought-provoking sessions and lots of practical tools for growing revenue in a digital age. INSIGHTS from SENTINEL. jstewart. Wed, 06/23/2021 - 16:11. Author Karine Ganem, Director of Global Field Marketing.

Cloud 68
article thumbnail

FERC Approves NERC’s Supply Chain Risk Management Reliability Standards and Directs NERC to Expand Their Scope

Data Matters

A string of Governmental announcements have increasingly sounded the alarm about the growing cybersecurity threat facing the energy sector. Among other things, these reports have announced that state-sponsored cyber actors have successfully gained access to the control rooms of utilities. Against this backdrop, it is unsurprising that energy regulators have increasingly focused their attention on cybersecurity issues.

article thumbnail

Risky Business Aging critical infrastructure networks and advanced attacks

Thales Cloud Protection & Licensing

In fact, an event straight out of our nightmares happened in February when a hacker accessed a vulnerable network of a water treatment facility in the city of Oldsmar, Florida, and modified chemical levels. Risky Business Aging critical infrastructure networks and advanced attacks. madhav.

Cloud 72
article thumbnail

Critical Success Factors to Widespread Deployment of IoT

Thales Cloud Protection & Licensing

Electric grid utilities are deploying smart meters to better correspond to consumers energy demands while lowering costs. Critical Success Factors to Widespread Deployment of IoT. madhav. Tue, 02/16/2021 - 16:33.

Cloud 84
article thumbnail

What the Blockchain Taught Us about IT Security

Security Affairs

It is not just about security, but in utilizing Blockchain to secure your company and your information. But it is not just about security, but in utilizing Blockchains to secure your company and your information. IT helps the American economy create new products, find the full potential in their employees, participate in global events and company offers, and even manage their own companies. Energy Efficiency.

article thumbnail

Updates on Federal Cybersecurity Legislation

Hunton Privacy

This bill would amend the Federal Power Act to grant the Federal Energy Regulatory Commission (“FERC”) authority to issue emergency orders requiring critical infrastructure facility operators to take actions necessary to protect the bulk power system. The GRID Act is being considered by the Senate Committee on Energy and Natural Resources at this time. The American Clean Energy Leadership Act.

article thumbnail

NIST Updates Cybersecurity Framework

Data Matters

As with the first version of NIST’s Cybersecurity Framework, all companies should review the new version, determine its potential utility, and consider adopting, adapting or comparing the new Framework for use within their own cyber ecosystems. The Framework was originally developed to focus on energy, banking, communications, and defense sectors, but has been adopted voluntarily by a much broader group of companies and government agencies.

article thumbnail

Innovative Solutions to Real Business Problems with Big Data from Space

CGI

We are particularly interested in the following markets and potential application areas, although good solutions in any business area are welcome: Energy: Submission to support site surveys, monitor pollution, or inform environmental regulatory requirements. Utilities: Submissions to monitor networks/assets for threats, target maintenance needs, or enable more efficient operations. Innovative Solutions to Real Business Problems with Big Data from Space. p.butler@cgi.com.

article thumbnail

A Soccer Field on the Data Center, Chickens in the Parking Lot - in Northern Virginia

Interactive Information Management

A user/purchaser of local resources, from facility supplies, energy and materials to IT equipment and services 4. A participant in local government planning and operations – from energy and land use policy to economic development and homeland security 6. events, in-person groups, speakers, etc.) online presence, groups, events, communities, advertising) 10.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

Think of a room in a larger conference where people of like interests gather to hear speakers, see demonstrations and participate in themed Capture the Flag events. It's individual pieces of it that fall apart and become a nightmare for that company or that utility or whatever.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. And again, smart meters were positioned squarely as making the environment more friendly by knowing how and when energy is being used by individual customers.

article thumbnail

Game Theory: Why System Security Is Like Poker, Not Chess

ForAllSecure

When you capture someone else’s exploit and use it (or patch it), you’ve used their energy against them. If you can better use an adversary’s energy and time for your own benefit, you have a higher chance of succeeding.

article thumbnail

Game Theory: Why System Security Is Like Poker, Not Chess

ForAllSecure

When you capture someone else’s exploit and use it (or patch it), you’ve used their energy against them. If you can better use an adversary’s energy and time for your own benefit, you have a higher chance of succeeding.

article thumbnail

GAME THEORY: WHY SYSTEM SECURITY IS LIKE POKER, NOT CHESS

ForAllSecure

When you capture someone else’s exploit and use it (or patch it), you’ve used their energy against them. If you can better use an adversary’s energy and time for your own benefit, you have a higher chance of succeeding.

article thumbnail

Building smarter communities through public-private collaboration

CGI

Lafayette, Louisiana, is a community with an economy that historically has been driven by the energy sector. The emerging technology sector in Lafayette is made possible in part by gigabit-fiber-to-the-home infrastructure from municipal-owned Lafayette Utilities System (LUS Fiber), making Lafayette one of the relatively small number of gigabit cities in the country. (On Building smarter communities through public-private collaboration. harini.kottees…. Wed, 09/13/2017 - 07:00.

article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

If you want to get to put the energy into it. And and that spans everything from commercial companies, to militaries, to utilities to hospitals. So every six months, we're doing an event, and we're bringing the sock and so it started off with just the one in us and then it was the US with a handover to the Europe and then a handover to say Asia Pacific and we're doing a ship handovers between sock two because the threat just doesn't stop after three hours.