- Mar 12, 2021 9:59 pm GMT
Cybersecurity is at the top of mind of all organizations as threats continue to escalate from nefarious players across the globe. Utilities have a huge burden to bear when it comes to securing the grid and vast amounts of infrastructure in place. As the expansion and modernization of the grid evolve, so expands the number of interconnected cyber-enabled devices.
In an interview with Utility 2030 Collaborative, Tim Conway of the SANS Institute shares some valuable information on risks, implications, and advice. I had the privilege of working with Tim at SANS and he is among the best in the industry. He is actively involved in the ICS (Industrial Control System Space). He has over 20 years of experience working in critical infrastructure and has worked with asset owners and operators in efforts to defend their environments and respond to incidents.
What implications do you see for utilities as IoT continues to grow for utilities?
There is going to be confusion and debate around terms like Internet of Things (IoT), Industrial Internet of Things (IIoT), Industry 4.0, etc. depending on device placement and use. What is important to focus on is the movement toward cyber-physical devices in all elements of our lives. Utilities will need to constantly balance the needs of the customers they serve and enable those capabilities in a way that does not impact the safety or reliability of the system.
Do you see it impacting operational areas differently i.e. billing, power generation, grid, industrial control systems (ICS), Supervisory Control, and Data Acquisition (SCADA)?
There are obviously some environments of greater concern than others as they have wide area views and wide-area impact. However, an interesting trend that we need to pay close attention to is the interconnectedness and interdependence of these systems, which can provide attack vectors from lower impact assets or technologies to be leveraged and enable attacks on higher impact areas.
Do you see one area being more vulnerable than another?
Really tough to answer as there are a number of variables at play, and many of these variables are not controllable by the asset owner. However, thinking about areas that may be more vulnerable than others, I would look at those process or automation environments that are becoming more and more distant from human operators and support personnel. Distance from the process under control results in a high reliance on the whole of system integrity in order to operate effectively, which introduces a number of attack vectors and associated vulnerabilities.
How do attackers usually infiltrate?
They target humans.
What do you attribute the ever-increasing cyber-attacks to?
The ubiquity of cyber devices.
Do utilities have what they need today to protect the grid (i.e. employee expertise, software, culture)?
Culturally, operations personnel within utilities are filled with mission-focused and dedicated personnel. The struggles will always be a question around how much investment is enough around capital and O&M expenses, appropriate balance around workforce development programs (initial and continuing) and obtaining the necessary tools and technology for the operations environment.
What is the ideal model for infrastructure protection?
There is no perfect model that will rule them all—an Ideal model needs to meet a sector where it is and address the greatest risk—then progress to address greatest identified risk areas over time. Areas of strength learned across different models should be highlighted – Requirements designed by industry for industry, with clear asset prioritization criteria and effective incentives or enforcement approach will exist in mature approaches over time.
Do you see utilities working together more to solve cyber issues? Is there a collaborative group that exists? If so, what is that group?
Information sharing and analysis centers, industry working groups, cyber mutual aid efforts, joint exercises, and competitions are growing and becoming increasingly more integral in many sectors.
If you were to recommend the top 3 things utilities should be doing for mission-critical security, what would they be?
Train and retain teams, know your assets (inventory hardware, software, and configurations), and practice IR and recovery.
What steps should utilities be taking to protect themselves?
Understand adversary capabilities, identify achievable operational impacts, and mitigate the most impactful of those.
Since all utilities are most likely in various stages of cybersecurity protection, would this guideline help to assess their current risk and how to mitigate?
There are certainly assessment tools and maturity model approaches, but I would start easy….. ask some of your key, experienced personnel how would they attack the system and what keeps them up at night.
With customer-centricity in mind, how do you see the best way to assure customers that their power is safe, secure and available 24 X 7 X 365?
Educate customers on the balance of those items.
Any other cyber advice would you give to utilities?
Help each other when you can and ask for help more than you do.
Outside of SANS, Tim continues to work on projects that blend cybersecurity, operations technology, and critical infrastructure protection with a focus on the energy sector.
Author: Mechele Herres
No discussions yet. Start a discussion below.
Get Published - Build a Following
The Energy Central Power Industry Network is based on one core idea - power industry professionals helping each other and advancing the industry by sharing and learning from each other.
If you have an experience or insight to share or have learned something from a conference or seminar, your peers and colleagues on Energy Central want to hear about it. It's also easy to share a link to an article you've liked or an industry resource that you think would be helpful.