Small Steps, Big Results: What Your Utility Can Do Today to Improve the Security of Your AMI Program
- Jun 7, 2018 8:00 pm GMT
This item is part of the Special Issue - 2018-05 - Customer Care, click here for more
You have seen the news stories:
- Lansing, Michigan’s Board of Water & Light invested $2.4M to develop a cyber-emergency response after doling out a $25,000 ransom to cyber criminals in 2016
- "Grizzly Steppe", a Russian cyberattack aimed at political organizations hit Burlington Electric utility in Vermont
- A ransomware incident of $52,000 cost the City of Atlanta $2.6M in recovery
- "Dragonfly" - A cyberespionage campaign that targeted energy-sector entities and enabled attackers to mount sabotage operations against victims (Chertoff Group)
Cyberattacks were once isolated occurrences mainly targeted at credit merchants for personal financial gain, but now extend to utility companies with the intent to cause extensive damage to infrastructure. Today's wars are being fought less on the ground, and more from behind the screen of a laptop. These attacks have become so commonplace that rarely a day goes by where a breach does not hit the news, yet two out of three Directors report having little to no knowledge in cybersecurity (Chertoff Group).
No discussions yet. Start a discussion below.
Get Published - Build a Following
The Energy Central Power Industry Network is based on one core idea - power industry professionals helping each other and advancing the industry by sharing and learning from each other.
If you have an experience or insight to share or have learned something from a conference or seminar, your peers and colleagues on Energy Central want to hear about it. It's also easy to share a link to an article you've liked or an industry resource that you think would be helpful.