Remove Energy and Utilities Remove Government Remove How To Remove White Paper
article thumbnail

Securing the electricity network: Understanding the unique ICS environment of a utility

CGI

Securing the electricity network: Understanding the unique ICS environment of a utility. As utilities and energy delivery systems begin to seek the benefits that the convergence of information technology (IT) and operational technology (OT) offers, they also face the challenge of increased vulnerability to cyberattacks.

article thumbnail

Defending a Data-Driven Business Model

Information Matters

Available at: < [link] > but there is still a lot of work to be done in understanding how to build a profitable and commercially sustainable business from the processing of data. ↑ Department for Business, Energy & Industrial Strategy, 2017. The world’s most valuable resource is no longer oil, but data. The Economist.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

The CUPS model, or Control and User Plane Separation, isn’t new, but it shows how 5G relies on more virtualized workloads and cloud-based systems. Also Read: How to Implement Microsegmentation. federal government is actively seeking opportunities to assist private and public organizations in meeting the cyber challenges of today.

Risk 126
article thumbnail

SAA/CoSA/NAGARA 2018 recap: Session 204

The Schedule

Beth, Kristen, and Laura presented a program in which they each brought their unique perspective to the management of social media as records within the Federal Government. By doing so, they effectively demonstrated how vital cross-team collaboration really is, and how clear policy informs good practice. Troubleshoot #2.