Cybersecurity Information Sharing in Electric Utilities

February 25, 2016

Cyber threat sharing will play a major role in the electric utility industry in protecting our critical infrastructure. This paper provides an overview of various sharing programs, standardized approaches for sharing, as well as an overview of the recently enacted law on Cybersecurity Information Sharing Act 2015. Some utilities in the United States believe there is a need to share the cyber threat information so that they will be better prepared to respond to the cyber-attacks on our electrical grid system. Last year FirstEnergy testified to the US House committee that cyber threat sharing facilities among public and private organizations is not adequate.

Spotlight

Cyber Security Jobsite

Cyber Security Jobsite is Job Board dedicated to assisting clients and agencies recruiting candidates within the Cyber Security marketplace. With the increasing level of cyber attacks of government and company IT Networks the demand for professionals with Cyber Security experience is on the increase. We look to be the No1 website within this marketplace and to provide a platform where clients and potential candidates can network with each other.

OTHER WHITEPAPERS
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | May 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More
news image

Supply Chain Security in MongoDB’s Software Development Lifecycle

whitePaper | May 25, 2022

Cybersecurity breaches do more than expose data to malicious actors. They generate headlines, captivate the public’s attention, and shine a light on security gaps. Whether it’s weak passwords or the software supply chain, if a vulnerability exists, cybercriminals will exploit it.

Read More
news image

Cisco Secure and the NIST Cybersecurity Framework

whitePaper | December 6, 2022

Cybersecurity can seem overwhelming, and there’s plenty of long to-do lists. The Center for Internet Security (CIS) has the Critical Security Controls, the International Organization for Standardization (ISO) has its 27000-series publications, and ISACA manages its COBIT 5 framework. Layer those atop compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach Bliley Act (GLBA) — and it’s often hard to know where to start.

Read More
news image

Systemic Cybersecurity Risk and role of the Global Community: Managing the Unmanageable

whitePaper | November 29, 2022

In February 2022, a cyberattack on commercial satellite services in Ukraine caused electricitygenerating wind farms to shut down across Central Europe. In July 2021, supermarkets in Sweden were forced to close their doors after a cyberattack on an IT services provider based in Florida, USA.

Read More
news image

Navigating the Changing Cyber Landscape in Australia

whitePaper | April 13, 2023

Those high profile data breaches led to a swift response from the Government with the penalties for serious or repeated privacy breaches increased from $2.22 million to a minimum of $50 million at the end of December. Since then, the Government has released the Privacy Act Review Report and the 2023-2030 Australian Cyber Security Strategy that signpost a significant shift for Australia’s cyber landscape. Critical infrastructure; personal information; cyber security; dealing with ransomware attacks – all are likely to be shaken up.

Read More
news image

File Upload Security: The Missing Category for a Comprehensive Security Posture

whitePaper | December 15, 2022

Applications are the backbone of modern business and must be protected. Yet, most organizations have an underserved attack vector — malicious files uploaded to their custom business applications. If internal, external, or third-party files contain malware, they pose a large risk as they traverse through an organization and are stored in local or cloud repositories. Public file sharing platforms are another area where malicious file uploads can cause widespread damage.

Read More

Spotlight

Cyber Security Jobsite

Cyber Security Jobsite is Job Board dedicated to assisting clients and agencies recruiting candidates within the Cyber Security marketplace. With the increasing level of cyber attacks of government and company IT Networks the demand for professionals with Cyber Security experience is on the increase. We look to be the No1 website within this marketplace and to provide a platform where clients and potential candidates can network with each other.

Events