Cybersecurity Information Sharing in Electric Utilities

February 25, 2016

Cyber threat sharing will play a major role in the electric utility industry in protecting our critical infrastructure. This paper provides an overview of various sharing programs, standardized approaches for sharing, as well as an overview of the recently enacted law on Cybersecurity Information Sharing Act 2015. Some utilities in the United States believe there is a need to share the cyber threat information so that they will be better prepared to respond to the cyber-attacks on our electrical grid system. Last year FirstEnergy testified to the US House committee that cyber threat sharing facilities among public and private organizations is not adequate.

Spotlight

Next Step Innovation

Headquartered in Clinton, Mississippi, Next Step Innovation employs technology advisors to provide services throughout the Southeast region. Experts in the IT industry, our differentiators include our ability to source an expansive product portfolio, provide an impressive service offering, and develop strong client relationships that have lasted for years. Our representatives in Mississippi, Arkansas, Alabama, Louisiana, and Tennessee serve a diverse client base across a variety of verticals, such as K-12, higher education, healthcare, legal, real estate, and technology, and range across local, state and federal government to the private sector including small business, non-profits, and large corporations.

OTHER WHITEPAPERS
news image

How MX Protects Your Data

whitePaper | December 22, 2022

MX’s approach to security includes a defense-in-depth strategy. This strategy is supported by an established, operational MX Security Program, with a robust suite of governing policies, processes, security controls, and procedures to achieve MX’s security strategy. MX enacts defense in depth by hardening each layer of MX’s infrastructure and supporting processes.

Read More
news image

Leading Cybersecurity in Higher Education

whitePaper | February 11, 2023

Higher-education institutions are experiencing a high volume of cyberattacks and greater vulnerability to threats. Today’s educational technology environments connect a variety of endpoints—laptops, desktops, student management data, and email servers. They use Internet-of-Things (IoT) devices for managing environmental controls, security cameras, and door alarms. Both ends of the education spectrum gather, store, and use personal data from students and staff—and if they collect it, they must also protect it. As a result, schools need dedicated, skilled, and experienced executive leadership that is empowered, resourced, and responsible for campuswide cybersecurity issues.

Read More
news image

Security Protocol and Data Model (SPDM) Architecture White Paper

whitePaper | September 26, 2022

This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Read More
news image

IoT Application Provisioning for Security Using FDO and TPM

whitePaper | December 29, 2022

The Internet of Things (IoT) offers the appealing possibility of harnessing millions of devices that measure or modify real world things and allows processes to be optimized. There are many opportunities: thermostats optimized for tomorrow’s weather, shipping containers optimized for packing before their contents arrive, assembly lines that reconfigure automatically for each item, street lighting adjusted to make streets safer, and so on.

Read More
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

CloudVision as-a-Service: Security and Data Protection

whitePaper | January 24, 2023

Cloud-based software delivery has increasingly become the norm in today’s world, owing to the elasticity, scalability, and economy of cloud architectures. Arista has established a leadership position in the delivery of reliable and secure cloud networking and services management through the introduction of CloudVision®, a single unified AI/ML-enabled network management platform supporting every place in the cloud – and CloudVision is now available in an “as-aService” delivery model in the cloud.

Read More

Spotlight

Next Step Innovation

Headquartered in Clinton, Mississippi, Next Step Innovation employs technology advisors to provide services throughout the Southeast region. Experts in the IT industry, our differentiators include our ability to source an expansive product portfolio, provide an impressive service offering, and develop strong client relationships that have lasted for years. Our representatives in Mississippi, Arkansas, Alabama, Louisiana, and Tennessee serve a diverse client base across a variety of verticals, such as K-12, higher education, healthcare, legal, real estate, and technology, and range across local, state and federal government to the private sector including small business, non-profits, and large corporations.

Events