{"id":15812,"date":"2019-10-25T11:02:00","date_gmt":"2019-10-25T15:02:00","guid":{"rendered":"https:\/\/lexingtoninstitute.org\/?p=15812"},"modified":"2019-10-25T11:06:33","modified_gmt":"2019-10-25T15:06:33","slug":"electric-grid-cyber-protection-seven-recent-developments-to-know","status":"publish","type":"post","link":"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/","title":{"rendered":"Electric Grid Cyber Protection: Seven Recent Developments To Know"},"content":{"rendered":"

Protecting America\u2019s electric grid from cyberattacks is a formidable and evolving challenge, requiring continuous evolution and improvement. In recent weeks there have been seven notable developments. While there is no single solution or \u201csilver bullet\u201d to ensure the electric grid is safeguarded from cyberattacks, each of the following is an important and positive building block.<\/p>\n

Senate Legislation.<\/em><\/strong> On September 25, the Senate Committee on Energy and Natural Resources passed two measures. The Energy Cybersecurity Act<\/a>, introduced by Senator Maria Cantwell (D-WA), directs the U.S. Department of Energy (DOE) to develop advanced cybersecurity applications and technologies for the energy sector. A bill introduced by Senator Cory Gardner (R-CO), the Enhancing Grid Security through Public-Private Partnerships Act<\/a>, calls for the U.S. Secretary of Energy to work with state regulators, industry stakeholders, and others to develop programs for assessing grid security and to share related best practices.<\/p>\n

GAO Report.<\/em><\/strong> Also on September 25, the U.S. Government Accountability Office (GAO), publicly released a report, “Critical Infrastructure Protection: Actions Needed to Address Significant Cybersecurity Risks Facing the Electric Grid.”<\/a> GAO found the grid faces significant cybersecurity risks from hostile nations, terrorists, criminals and others. It said, \u201cThe grid is becoming more vulnerable to cyberattacks \u2013 particularly those involving industrial control systems that support grid operations.\u201d<\/p>\n

National Institute of Standards Program.<\/em><\/strong> This U.S. Department of Commerce agency issued a Federal Register notice<\/a> on October 8 that \u201cinvites organizations to provide products and technical expertise to support and demonstrate security platforms for Securing the Industrial Internet of Things (IIoT) for the energy sector use case. This notice is the initial step for the National Cybersecurity Center of Excellence in collaborating with technology companies to address cybersecurity challenges identified under the energy sector program.\u201d<\/p>\n

FERC and NERC Proposal to Name Utilities for Grid Security Violations. <\/em><\/strong>An August 27 white paper<\/a> from the Federal Energy Regulatory Commission (FERC) and the North American Electric Reliability Corporation (NERC) calls for naming utilities that violate Critical Infrastructure Protection Reliability Standards, and specifying the standards violated and the penalty amounts. Any information helpful to those planning an attack would not be disclosed. The threat of increased public scrutiny, and related embarrassment for violations, will lead many utilities to be more diligent in their cybersecurity practices.<\/p>\n

TVA Devotes Vast Resources to Grid Security. <\/em><\/strong>The Tennessee Valley Authority\u2019s (TVA\u2019s) commitment to grid cybersecurity was the subject of a profile story in the October 18 Chattanooga Times<\/a>. \u201cThe 60-employee cybersecurity division monitors more than 1 billion activities a day across different digital platforms in TVA\u2019s 7-state region while also keeping in contact with government and private watchdog agencies for signs of possible cyberthreats from around the globe to the electric grid,\u201d says the article.<\/p>\n

FERC Chairman Op-Ed.<\/em><\/strong> In an October 6 Fortune<\/em> Op-Ed, “The Power Grid Is Evolving; Cybersecurity Must Too,”<\/a> FERC Chairman Neil Chatterjee made a strong case for robust, \u00a0evolving and nimble standards. \u201cI believe that technological advancements will play a critical role in building the stronger and more secure grid of tomorrow. To allow for that innovation to flourish, we as regulators must continually evaluate our rules, ensuring that utilities can both harness the benefits of new technologies and mitigate associated risks,\u201d said Chatterjee.<\/p>\n

Siemens\/Ponemon Institute Study.<\/em><\/strong> An October study by Siemens and the Ponemon Institute, “Caught in the Crosshairs: Are Utilities Keeping Up with the Industrial Cyber Threat?”<\/a> assessed how the global energy sector is able to meet cyberattacks. The survey of 1,726 utility professionals responsible for cyber risks found that 25 percent are impacted by a mega attack each year. Fifty-six percent have a shutdown or an operational data loss each year.<\/p>\n

About the Author:<\/u> Paul Steidler is a Senior Fellow with the Lexington Institute, a public policy think tank based in Arlington, Virginia.<\/p>\n","protected":false},"excerpt":{"rendered":"

Protecting America\u2019s electric grid from cyberattacks is a formidable and evolving challenge, requiring continuous evolution and improvement. In recent weeks there have been seven notable developments. While there is no single solution or \u201csilver bullet\u201d to ensure the electric grid is safeguarded from cyberattacks, each of the following is an important and positive building block. […]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"yoast_head":"\nElectric Grid Cyber Protection: Seven Recent Developments To Know - Lexington Institute<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Electric Grid Cyber Protection: Seven Recent Developments To Know - Lexington Institute\" \/>\n<meta property=\"og:description\" content=\"Protecting America\u2019s electric grid from cyberattacks is a formidable and evolving challenge, requiring continuous evolution and improvement. In recent weeks there have been seven notable developments. While there is no single solution or \u201csilver bullet\u201d to ensure the electric grid is safeguarded from cyberattacks, each of the following is an important and positive building block. […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Lexington Institute\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-25T15:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-25T15:06:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lexingtoninstitute.org\/wp-content\/uploads\/2015\/02\/lex_share.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Steidler\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LexNextDC\" \/>\n<meta name=\"twitter:site\" content=\"@LexNextDC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Steidler\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/\",\"url\":\"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/\",\"name\":\"Electric Grid Cyber Protection: Seven Recent Developments To Know - Lexington Institute\",\"isPartOf\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#website\"},\"datePublished\":\"2019-10-25T15:02:00+00:00\",\"dateModified\":\"2019-10-25T15:06:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/78ab63eecbfa0095703339e3074b0e58\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lexingtoninstitute.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Electric Grid Cyber Protection: Seven Recent Developments To Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#website\",\"url\":\"https:\/\/www.lexingtoninstitute.org\/\",\"name\":\"Lexington Institute\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lexingtoninstitute.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/78ab63eecbfa0095703339e3074b0e58\",\"name\":\"Paul Steidler\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e82d49d4f33316dd8789cb24f864f429?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e82d49d4f33316dd8789cb24f864f429?s=96&d=mm&r=g\",\"caption\":\"Paul Steidler\"},\"url\":\"https:\/\/www.lexingtoninstitute.org\/author\/paul-steidler\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Electric Grid Cyber Protection: Seven Recent Developments To Know - Lexington Institute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Electric Grid Cyber Protection: Seven Recent Developments To Know - Lexington Institute","og_description":"Protecting America\u2019s electric grid from cyberattacks is a formidable and evolving challenge, requiring continuous evolution and improvement. In recent weeks there have been seven notable developments. While there is no single solution or \u201csilver bullet\u201d to ensure the electric grid is safeguarded from cyberattacks, each of the following is an important and positive building block. […]","og_url":"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/","og_site_name":"Lexington Institute","article_published_time":"2019-10-25T15:02:00+00:00","article_modified_time":"2019-10-25T15:06:33+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.lexingtoninstitute.org\/wp-content\/uploads\/2015\/02\/lex_share.png","type":"image\/png"}],"author":"Paul Steidler","twitter_card":"summary_large_image","twitter_creator":"@LexNextDC","twitter_site":"@LexNextDC","twitter_misc":{"Written by":"Paul Steidler","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/","url":"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/","name":"Electric Grid Cyber Protection: Seven Recent Developments To Know - Lexington Institute","isPartOf":{"@id":"https:\/\/www.lexingtoninstitute.org\/#website"},"datePublished":"2019-10-25T15:02:00+00:00","dateModified":"2019-10-25T15:06:33+00:00","author":{"@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/78ab63eecbfa0095703339e3074b0e58"},"breadcrumb":{"@id":"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lexingtoninstitute.org\/electric-grid-cyber-protection-seven-recent-developments-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lexingtoninstitute.org\/"},{"@type":"ListItem","position":2,"name":"Electric Grid Cyber Protection: Seven Recent Developments To Know"}]},{"@type":"WebSite","@id":"https:\/\/www.lexingtoninstitute.org\/#website","url":"https:\/\/www.lexingtoninstitute.org\/","name":"Lexington Institute","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lexingtoninstitute.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/78ab63eecbfa0095703339e3074b0e58","name":"Paul Steidler","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e82d49d4f33316dd8789cb24f864f429?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e82d49d4f33316dd8789cb24f864f429?s=96&d=mm&r=g","caption":"Paul Steidler"},"url":"https:\/\/www.lexingtoninstitute.org\/author\/paul-steidler\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts\/15812"}],"collection":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/comments?post=15812"}],"version-history":[{"count":0,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts\/15812\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/media?parent=15812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/categories?post=15812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/tags?post=15812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}