News

Is utility cybersecurity getting lost in compliance red tape?

The possibility of cyberattacks turning off the lights and knocking pipelines offline is getting a lot of attention on Capitol Hill this summer, and that has some experts in the field worried.

While the threat of malevolent hackers is certainly something to take seriously, addressing the problem in a regulatory fashion with rulemaking, congressional hearings, and stacks of reports and recommendations might fit nicely with the Beltway’s Byzantine method of doing things, but not necessarily with the actual day-to-day operation of the power grid.

“The utilities are really trying to address cyber pragmatically and be proactive about it,” said Jon Stanford, Global Principal for Industrial Security and IoT Solutions at Cisco.

In an interview with Daily Energy insider, Stanford proposed that developing a detailed compliance strategy for protecting the grid could turn into an unnecessary headwind for the utilities that will have to carry it out. “We (utilities) want to do the right thing, but we also now have to invest in compliance, and that can sometimes drain your resources,” he said. “Private industry is struggling with compliance.”

A federal law passed in 2015 designated the Department of Energy as the lead agency on utility infrastructure security. But Stanford contends that the DOE’s latest plan issued in March to secure the grid was an example of being more focused on utilities all landing neatly on the same page rather than on the cutting edge.

“The core issue is that they are basically proposing an approach that is based on how the federal government addresses IT security,” he said. “It doesn’t recognize that the electric grid does not address security that way.”

“The two approaches need to go hand-in-hand, and that’s not occurring,” said Stanford.

Standard IT security is generally an effort to keep viruses, malware, or other digital weapons out of an individual computer system and prevent these bugs from causing havoc with a company’s data. An attack on a utility, however, has a physical component in the form of causing equipment such as power transformers or pumps to shut down or even suffer actual damage. “There is so much focus on the cyber part of this, but if destruction is your motive, you have to cause something to physically happen,” Stanford said.

Washington has also handed a level of influence and authority over critical infrastructure to the Department of Homeland Security (DHS), which issued the National Infrastructure Protection Plan back in 2013.

Stanford cautioned that the DHS’s involvement focuses a share of attention and resources on discussions of who the hostile nations might be and what their nefarious intentions are. “One of the core barriers regarding DHS is they are very heavily focused on anti-terrorism,” he said. “But when it comes to critical infrastructure, it becomes fragmented.”

“There is a lot of discussion taking place on threats, and it’s good to understand the threats and who the different actors are, but the conversation really needs to center on the physical risks,” Stanford said, citing the targeting of high-voltage transformers with malware that disrupts monitoring and control, and eventually lead to instability in the flow of electricity.

A better course, according to Stanford, is the recognition that threats are constantly evolving, and the power system is by nature vulnerable to attack. But utilities can minimize the effects of an intrusion and quickly get back on line, if necessary, by having their staff trained and transformers and other spare equipment stockpiled for rapid deployment.

Washington can then leave more of the planning for recovery to the utilities and private sector. Stanford predicted that would eliminate any vagaries in the compliance process and take advantage of the commonalities in the designs and terminologies of power grids and other industrial systems. The result would be a clearer path for utilities in terms of cybersecurity planning and investment.

“There is a lot of information and material that can be drawn on right now,” Stanford said. “We could use that as a starting point and not have to start from Ground Zero.”

Hil Anderson

Recent Posts

Markets+ State Committee elects Nick Myers as new chairman

For its next chairman, the Markets+ State Committee (MSC) – a standing committee of the Markets+ western day-ahead market –…

47 mins ago

ISO New England proposes new planning processes for transmission upgrades

ISO New England has proposed new processes to ensure that plans for future transmission upgrades address state clean energy policies.…

47 mins ago

New report warns industrial sector could become highest-emitting U.S. sector without rapid decarbonization solutions

A new report from the Rhodium Group determined that quickly expanding industrial decarbonization options will be key to keep decarbonizing…

47 mins ago

Duke Energy Carolinas reaches settlement on rate review request

Duke Energy Carolinas reached a settlement agreement for its rate review request filed back in January. If the agreement is…

48 mins ago

Minerals critical to clean energy technologies see major price declines, bolstering market in face of future supply struggles

The energy transition continues marching on, according to the International Energy Agency (IEA), but in its Global Critical Minerals Outlook…

1 day ago

Treasury, IRS release guidance on domestic content bonus

The U.S. Department of the Treasury and Internal Revenue Service (IRS) issued further guidance on an initiative designed to boost…

1 day ago

This website uses cookies.