Protect Our Power

@GridProtection

Protect Our Power is a not-for-profit nonpartisan organization comprised of industry experts focused on strengthening the nation’s electrical power grid.

Vrijeme pridruživanja: kolovoz 2016.

Tweetovi

Blokirali ste korisnika/cu @GridProtection

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @GridProtection

  1. 31. sij

    "The website of the Public Utility Commission of Texas was "defaced" on Jan. 28 in a low-impact attack which exposed no sensitive information but highlights the cyber threat faced by power sector entities and their regulators."

    Poništi
  2. 31. sij

    A great week in San Antonio for the Best Practices Conference and . Thank you again to all who came out as well as our sponsors - . We look forward to a year of progress safeguarding the grid.

    Poništi
  3. 30. sij

    ", one of the Cybersecurity & Vulnerability Identification & Notification Act’s sponsors & a key cybersecurity advocate in the House, said that the legislation would give 'the ability to say something when they see something.'"

    Poništi
  4. 30. sij

    "We see it [best practices] as a transformative idea: It's moving us away from the [federal] standards, which can take a year or two years to put in place," said Jim Cunningham, executive director of POP

    Poništi
  5. 30. sij

    "TX utilities are wary of a cybersecurity monitor proposed in a Dec. rule by state's Public Utilities Commission, stressing in comments filed that legislators intended the new entity to focus on best practices sharing rather than oversight & enforcement."

    Poništi
  6. 30. sij

    Last day of , stop by booth 4233 to learn about POP's activities surrounding grid and best practices.

    Poništi
  7. 29. sij

    "With IoT devices representing a relatively new and often ineffectively secured surface for cybercriminals to exploit, it is now more important than ever for the energy industry to make securing this increasingly widespread technology a major priority."

    Poništi
  8. 29. sij

    "The new leader of the Utility Workers Union of America is calling attention to a lack of public accountability for utilities’ practices."

    Poništi
  9. 29. sij

    At today? Stop by Protect Our Power's Booth 4233 to chat about priority projects concerning and .

    Poništi
  10. 28. sij

    How we can assure electric grid resilience NOW? Come visit with us at Booth 4233 on the exhibit floor to discuss Protect Our Power’s priority projects.

    Poništi
  11. proslijedio/la je Tweet
    27. sij

    Great event by ! Thanks for inviting me to talk about our work

    Poništi
  12. 27. sij

    That’s a wrap on our Best Practices in Utility Cybersecurity conference! Many thanks to our sponsors, speakers & 100 attendees. Also to & staff at the Henry B. Gonzalez Convention Center in beautiful San Antonio.

    Poništi
  13. 27. sij

    In presentation on Identity Access Management, Harry Perper, chief engineer for , walks attendees through means to reduce risk of untrained parties gaining access to critical infrastructure & to disable access more quickly

    Poništi
  14. 27. sij

    Hand in hand w/ growth of wind power is growth in cybersecurity challenges. Anecodotal examples of vulnerabilities w/ varying likelihoods sprinkled through presentation on roadmap from Jake Gentle, senior power systems engineer for

    Poništi
  15. 27. sij

    Compliance w/ cybersecurity requirements can be “proactive stepping stone” to enhance electric grid resilience, Network Perception President Robin Berthier tells attendees. Successful use of best practices necessitates understanding barriers to adoption.

    Poništi
  16. 27. sij

    Lessons from biology — predictions on spread of viruses & epidemic thresholds are applicable to assessing risks to cyber systems & prioritizing defensive & remedial actions. Shared by CTO Yehonatan Kfir.

    Poništi
  17. 27. sij

    To reduce cyber risks associated with firmware, utilize & keep track of updates to devices, seek firmware that is encrypted, & make sure it comes from trusted source. Counsel to attendees from power system researcher Brad Whipple of

    Poništi
  18. 27. sij

    “Incredible acceleration” in cybersecurity focus on Zero Trust approach, analyst Tony Massimini of tells audience. Fueled by growth of less secure IoT devices. Key aim is preventing a trusted party “inside the castle” from moving around.

    Poništi
  19. 27. sij

    Asst Prof , team lead for evaluation of vendors’ capabilities re Monitoring of OT Networks, provides overview of new effort to help utilities make more informed cybersecurity buying decisions. Dozens of practices will be examined.

    Poništi
  20. 27. sij

    Supply chain is the exclusive channel that Russians are using to attack US electric sector. That underscores its importance to grid security, consultant & CIP-013 (NERC supply chain standard) blogging expert Tom Alrich notes.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·