What’s holding back operational excellence in the utility sector?

OpenText Information Management

Once upon a time, the utility industry was a relatively simple place to be. It was all about the safe and consistent generation and distribution of energy with good capacity planning, minimal outages and happy customers.

Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs)


Cybersecurity in utilities: Critical questions for securing distributed energy resources (DERs). The energy transition is driving a shift toward the increasing use of distributed energy resources (DERs).

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

European cooperation on flexibility to accelerate the energy transition


European cooperation on flexibility to accelerate the energy transition. Early in September, we invited a number of our clients from around Europe to participate in a roundtable discussion on energy flexibility. Read more about energy flexibility.

Why Russian APT Fancy Bear hacked the Ukrainian energy firm Burisma?

Security Affairs

Russia-linked cyber-espionage group hacked the Ukrainian energy company Burisma at the center of the impeachment trial of US President Donald Trump. The post Why Russian APT Fancy Bear hacked the Ukrainian energy firm Burisma?

Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates


Utilities Digital Journey Insights (Part 4): Utilities’ pursuit of new business models accelerates. Some utilities even provide vehicle-to-grid services and home energy management systems to help consumers manage their electricity usage.

NERC $10,000,000 Fine of Public Utility Highlights the Need for Cybersecurity Preparedness and CIP Compliance Programs

Data Matters

On January 25, 2019, the North American Electric Reliability Corporation (“NERC”) asked the Federal Energy Regulatory Commission (“FERC”) to approve a settlement issuing a record $10 million fine against an unidentified utility resulting from violations of critical infrastructure protection standards (“CIP”) occurring mostly between 2015 and 2018 (referred to hereafter as the “Settlement Agreement”). Cybersecurity Energy Enforcement Information Security National Security

Lessons for In-House Counsel from Cybersecurity’s Front Lines

HL Chronicle of Data Protection

Cybersecurity & Data Breaches city governments cyberattack cybersecurity educational institutions energy utilities financial institutions hospital systems hotel chains in-house counsel retail risk social media sites Telecommunications

Strategize your next move to become a utilities leader, delivering value at scale and pace


Strategize your next move to become a utilities leader, delivering value at scale and pace. Additionally, utilities leaders say their IT investments have increased, and they have moved beyond progressing with discrete digital projects, such as mobile applications.

DHS Officials: Hundreds of US Utility Victims Infiltrated by Russian Hackers

Dark Reading

Federal government officials up their count of US energy sector victims from dozens to hundreds, according to a Wall Street Journal report

Do You Have the Right Stuff to Transition to Information Governance?

ARMA International

Follow this trajectory and you’ll push the envelope toward information governance (IG) and position yourself as a Very Important Person in your enterprise. all of which require the same disciplines we utilize when managing our records. Information Governance

Tiao Discusses Utilities’ Concerns in Sharing Information with the Government

Hunton Privacy

Tiao was featured on Platts Energy Week discussing the importance of the homeland security partnership between electric utility companies and the U.S. government. Utilities Wary of Sharing Grid Risks,” Tiao talked about the recent leak to The Wall Street Journal of a sensitive internal memo at the Federal Energy Regulatory Commission that revealed potential vulnerabilities in the electricity grid. View the Platts Energy Week feature with Paul Tiao.

Electrification: a lottery ticket that utilities must claim


Electrification: a lottery ticket that utilities must claim. Utilities face a fundamental dilemma. Due to unprecedented pressure to support the move to an energy-efficient and low-carbon system, they face the paradox of encouraging consumers to consume less of what they sell and distribute—electricity. Is there a lottery ticket for utilities around the corner ? However, this will not happen without a strong commitment and effort from utilities.

Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI


Utilities Digital Journey Insights (Part 3): Data, the new “digital capital” - Going beyond the hype of advanced analytics and AI. This series of blog posts builds on the 2018 CGI Client Global Insights, providing insights into how utilities are making progress toward digital transformation.

DHS and FBI – Hackers Are Targeting US Nuclear, Energy, and Manufacturing Facilities

Privacy and Cybersecurity Law

According to a new joint report issued by the US Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI), hackers have been penetrating the computer networks of companies that operate nuclear power stations, energy facilities, and manufacturing plants in the US since May 2017. If you or your enterprise is engaged in the energy or manufacturing sectors, cyber threat preparation and monitoring is your first line of defense against bad actors.

Securing the electricity network: Understanding the unique ICS environment of a utility


Securing the electricity network: Understanding the unique ICS environment of a utility. As utilities and energy delivery systems begin to seek the benefits that the convergence of information technology (IT) and operational technology (OT) offers, they also face the challenge of increased vulnerability to cyberattacks. Digitalization is altering the way information is collected, used and processed in the energy system.

Thinking Out Loud: Potential Information

John Battelle's Searchblog

image ) If you took first-year physics in school, you’re familiar with the concepts of potential and kinetic energy. If you skipped Physics, here’s a brief review: Kinetic energy is energy possessed by bodies into motion.

Protecting America’s Critical Infrastructure

Thales eSecurity

From taking a shower, to brewing your coffee, and watching the news, your morning routine is fueled by the energy sector. Unfortunately, the energy sector is of great interest to cyber attackers today.

Recent Federal Government Activity on Cybersecurity

Hunton Privacy

This client alert focuses on some of those efforts, including the Federal Energy Regulatory Commission’s (“FERC’s”) creation of a new cybersecurity office, North American Electric Reliability Corporation (“NERC”) action on cybersecurity Critical Infrastructure Protection (“CIP”) standards, continuing legislative developments concerning cybersecurity and anticipated White House executive orders on cybersecurity.

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

The Last Watchdog

Buried in the Shamoon code was an image of a burning American flag, intended as an admonishment to the Saudi government for supporting American foreign policy in the Middle East. Less than 48 hours after the killing of Iran’s General Qasem Soleimani, the U.S.

The Growing Presence (and Security Risks) of IoT

Thales eSecurity

That pace is unlikely to slow down over the coming years; Pagely noted that organizations are still turning to IoT devices as a way to automate and optimize their business processes as well as save on energy costs. As most of us know, IoT devices are on the rise in enterprise networks.

IoT 127

Congratulations to Sidley’s Newest Partners!

Data Matters

Kate brings to her practice substantial experience working with a broad range of government agencies and federal programs across the national security, healthcare, and energy and environmental fields.

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

billion IoT devices in use as of 2017, half are consumer gadgets, like smart TVs, speakers, watches, baby cams and home thermostats; much of the rest is made up of things like smart electric meters and security cameras in corporate and government use. This will be led by the manufacturing, consumer, transportation and utilities sectors. Industry standards-setting bodies and government regulators recognize what’s at stake.

IoT 152

Iran-linked APT33 updates infrastructure following its public disclosure

Security Affairs

The APT33 group has been around since at least 2013, since mid-2016, the group targeted the aviation industry and energy companies with connections to petrochemical production.

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

In fact, memory attacks have quietly emerged as a powerful and versatile new class of hacking technique that threat actors in the vanguard are utilizing to subvert conventional IT security systems. Allegedly developed by US and Israeli operatives, Stuxnet was discovered circulating through Iranian nuclear energy facilities in 2010. Today, if you examine any high-profile data breach, you’re likely to find memory-hacking techniques utilized at multiple key stages of the attack.

Centralized vs. blockchain: A head-to-head comparison of storage requirements


In an earlier blog post, we addressed blockchain energy dependency. To explore this further, let’s zoom in on a real-life use case to compare a centrally governed system and a future blockchain-based system. Three producers of residual heat deliver to an energy wholesaler.

Tips for Choosing the Right Records Management Service

Armstrong Archives

Some companies may not work to stay current with regulations that govern your industry. Government. Energy & Utilities.

State Attackers Moving from Stealing Data to Social Meddling

Ascent Innovations

The utilities and energy industries experienced high indicators of attack activity, suggests that attackers have access to critical infrastructure and are waiting to exploit this access. State actors tend to zero in on government agencies or utilities and energy targets. State Attackers Moving from Stealing Data to Social Meddling.

What the Blockchain Taught Us about IT Security

Security Affairs

It is not just about security, but in utilizing Blockchain to secure your company and your information. But it is not just about security, but in utilizing Blockchains to secure your company and your information. Energy Efficiency.

US Cyber Command warns of Iran-linked hackers exploiting CVE-2017-11774 Outlook flaw

Security Affairs

The alert refers to an ongoing activity aimed at infecting government networks by exploiting the CVE-2017-11774 Outlook vulnerability. These executables are both downloaders that utilize powershell to load the PUPY RAT. industries and government agencies.

NYT Report: U.S. Cyber units planted destructive Malware in Russian Power Grid

Security Affairs

The New York Times, citing current and former government officials, revealed that the United States planted a potentially destructive malware in Russia’s electric power grid. ” The hacking operations aimed at warning the Russian Government about the cyber capabilities of the U.S.

Leak of Grid Vulnerabilities Creates National Security Risks

Hunton Privacy

The recent leak of an internal memo to the former Chair of the Federal Energy Regulatory Commission, which was widely reported by national news media, has created a national security setback for the United States. In an article published in Intelligent Utility Update , Hunton & Williams partner Paul M. Tiao discusses the effects of the leak on national security and on the relationship between the energy industry and the government.

DOE and DHS Assess U.S. Readiness to Manage Potential Cyber Attacks

Hunton Privacy

On May 30, 2018, the federal government released a report that identifies gaps in assets and capabilities required to manage the consequences of a cyber attack on the U.S. Department of Energy (“DOE”) and the U.S. electrical utilities has been observed, the assessment references a December 2015 cyber attack on three Ukrainian electricity distribution companies.

Ethical Use of Data for Training Machine Learning Technology - Part 3


there is still much debate over providing a private right of action for individuals (versus just government agencies) to sue over unethical AI. government are making strides towards AI fairness. The nervous energy had been replaced with exhaustion.

Why Information Sharing Precedes Open Data - Coffee Talk

Interactive Information Management

ODCE – "Open Data is the new currency of the Internet, a public utility, it’s like free energy for everyone. Also, please check [link] text truncated ) KatieEA (Thinking – I thought we were skipping the “as-is”, and focusing on the “to-be” – that’s what the new OMB 300 guys really want this year, part of the “Open Government” mandate or something. information sharing open data open government


Defending a Data-Driven Business Model

Information Matters

The need to build on this research has been given impetus by the recent UK government’s Industrial Strategy White Paper 4) Department for Business, Energy & Industrial Strategy, 2017. ↑ Department for Business, Energy & Industrial Strategy, 2017.

The Internet of Things (IoT): Managing the Data Tsunami


Yet along that path there will be numerous obstacles to overcome – chiefly related to data privacy and governance. But exactly how that data is utilized (and potentially monetised) will differ across sectors. For example, an electricity company can utilise data gathered from IoT-enabled smart meters as well as weather sensors to better model and predict energy consumption patterns, which in turn can help optimise pricing and capacity planning strategies.

90% of critical infrastructure providers have fallen victim to a cyber attack since 2017

IT Governance

The anonymous survey covered the utility, energy, health and transport sectors – industries renowned for keeping their activities secret because they store highly sensitive information and are responsible for essential services. The post 90% of critical infrastructure providers have fallen victim to a cyber attack since 2017 appeared first on IT Governance Blog.