article thumbnail

Securing the electricity network: Understanding the unique ICS environment of a utility

CGI

Securing the electricity network: Understanding the unique ICS environment of a utility. As utilities and energy delivery systems begin to seek the benefits that the convergence of information technology (IT) and operational technology (OT) offers, they also face the challenge of increased vulnerability to cyberattacks.

article thumbnail

Defending a Data-Driven Business Model

Information Matters

The need to build on this research has been given impetus by the recent UK government’s Industrial Strategy White Paper 4) Department for Business, Energy & Industrial Strategy, 2017. ↑ Department for Business, Energy & Industrial Strategy, 2017. Unique Data. online] Oxford Internet Institute.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SAA/CoSA/NAGARA 2018 recap: Session 204

The Schedule

Beth, Kristen, and Laura presented a program in which they each brought their unique perspective to the management of social media as records within the Federal Government. The Secretary of Commerce’s official government account used her real name as her Twitter handle when it was set up. Best Practices for Social Media White Paper.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

federal government is actively seeking opportunities to assist private and public organizations in meeting the cyber challenges of today. In May, the ever-growing Cybersecurity and Infrastructure Security Agency (CISA) published a white paper entitled, Potential Threat Vectors to 5G Infrastructure. How 5G Goes Beyond 4G.

Risk 137