article thumbnail

FERC, NERC joint report on cyber incident response at electric utilities

Security Affairs

The US FERC and NERC published a study on cyber incident response at electric utilities that also includes recovery best practices. Federal Energy Regulatory Commission (FERC) and the North American Electricity Reliability Corporation (NERC) released a study on cyber incident response and recovery best practices for electric utilities.

article thumbnail

Utilities Digital Journey Insights (Part 5): Utilities decentralize organizational models to meet consumer needs

CGI

Utilities Digital Journey Insights (Part 5): Utilities decentralize organizational models to meet consumer needs. To gain the true value of digital transformation, utilities are embracing more dynamic and autonomous organizational structures that enable them to make decisions closer to the customer. Wed, 03/27/2019 - 03:33.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Get Your Work Email Under Control

OneHub

Even deciphering a generic announcement about the office coffee maker requires effort, which leaves less energy for work that matters.” Adobe did an email usage study in 2016 that found employees spend over four hours every weekday on work emails. Meetings are time and energy intensive. Secure your inbox.

article thumbnail

Russia Sanctions May Spark Escalating Cyber Conflict

Krebs on Security

The West has promised tougher sanctions are coming, but experts warn these will almost certainly trigger a Russian retaliation against America and its allies, which could escalate into cyber attacks on Western financial institutions and energy infrastructure. ” What kinds of attacks are experts most concerned about?

article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

What if you could have this training more often, say, once a month. Rossi: We create separate ranges to be able to provide training, testing, assessment, and overall measure the readiness of organization. A red team would be the enemy and they’d study your network and try to exploit any weaknesses. Well, you can.

article thumbnail

How AI Could Write Our Laws

Schneier on Security

Big energy companies expect action whenever there is a move to end drilling leases for federal lands, in exchange for the tens of millions they contribute to congressional reelection campaigns. . We should expect these techniques to get better and their utilization to grow, just as we’ve seen in so many other domains.

article thumbnail

Creating a sustainable future with the experts of today and tomorrow

IBM Big Data Hub

Equipping the current and future workforce with green skills According to new Morning Consult research commissioned by IBM, 71% of business leaders surveyed anticipate their business will emphasize sustainability skills criteria in their hiring in the next two years, with 92% expecting to invest in sustainability training in the next year.