SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Smart Grid Security
nCircle, the leader in information risk and security performance management solutions, partnered with
EnergySec, a DOE-funded public-private partnership that works to enhance the cyber security of the
electric infrastructure, to sponsor a smart grid security survey of over 104 energy security professionals.
The online survey was conducted between March 16 and March 31, 2012.

Key smart grid security findings:

       64% said smart meters are vulnerable to false data injection
       75% said security has not been adequately addressed in smart grid deployment
       90% believe we need smart grid security standards
       64% believe smart grid deployment should slow down until we have better security controls
       Only 50% said their organization has a security program and security policies for smart grid
        deployment
       66% say for smart grid projects funded by American Recovery and Reinvestment Act grants
        have not adequately addressed security

    The complete results of the survey, including commentary from Patrick Miller, CEO of EnergySec,
    and Elizabeth Ireland, vice president of marketing for nCircle are below:




          Has the hype around privacy issues                      Has security been adequately
             associated with smart meter                       addressed in smart grid deployment?
           consumer data been overblown?                                          75%
                  53%
                            47%

                                                                        25%



                      Yes   No                                              Yes    No


    "Smart Grid meter privacy is still a new area," said Patrick Miller. "State regulations are inconsistent
    and sensitive customer details in smart grid data vary from utility to utility. I expect the smart grid
    industry to struggle with several challenges around who ultimately 'owns' customer data. There are
    several grey areas that impact how smart grid customer data will be used as the industry attempts
    to maximize revenue potential. Even seemingly innocuous customer data has significant value -- just
    ask Facebook or Google.”
Patrick Miller noted, "Smart meters vary widely in
      Do smart meter installations have
        sufficient security controls to
                                               capability and many older meters were not designed to
     protect against false data injection?     adequately protect against false data injection. It doesn't
                                               help that some communication protocols used by the
                        61%                    smart meter infrastructure don't offer much protection
                                               against false data injection either. Together, these facts
              39%                              highlight a much larger potential problem with data
                                               integrity across the smart grid infrastructure. Because our
                                               nation relies on the smart grid to deliver robust and
                                               reliable power, we need to make sure that all systems that
                                               process usage data, especially those that make
                                               autonomous, self-correcting, self-healing decisions, assure
                 Yes     No
                                               data integrity."


"A false data injection attack is another example of technology advancing faster than security controls,”
said Elizabeth Ireland. “This is a problem that has been endemic in the evolution of security and it's a key
reason for the significant cyber security risks we face across many facets of critical infrastructure.
Installing technology without sufficient security controls presents serious risks to our power
infrastructure and to every power user in the U.S."


"Security has been addressed to varying degrees in many
smart grid deployments, however it is going to be a                   Are smart grid security standards
                                                                      moving fast enough to keep pace
challenge to keep pace with the constantly changing
                                                                        with smart grid deployment?
security landscape," said Patrick Miller. "The analog and
mechanical devices installed in most utilities were designed
for a very different maintenance model than newer digital                              72%
equipment being designed and installed today."
Elizabeth Ireland noted, "It's pretty clear that information
security professionals in the energy industry are
                                                                             28%
uncomfortable with standards currently available for smart
grid technology. Defining and implementing meaningful
security standards is always a challenge but without
standards, adoption of critical security controls across the
                                                                                 Yes    No
smart grid industry is likely to be uneven at best."
Do you think we need smart grid                    Does your organization have a
             specific security standards and                security program and security policies
                   89% policies?                                 for smart grid deployment?

                                                                      49%       51%



                             11%

                      Yes     No                                         Yes        No




                                   What part of smart grid infrastructure is most
                                           vulnerable to cyber attack?

                                                   41%
                                         29%
                                                            20%
                                                                      10%



                               Smart meters
                               Metering infrastructure including transport networks
                               Utility energy management systems
                               Energy management, such as phasor measurement units



According to Patrick Miller, CEO of EnergySec, "The enormous range of technology in the smart grid
presents many points of potential vulnerability, and we are moving at the speed of light to insert even
more technology 'shims' into the existing network structures of the smart grid. This ever-increasing rate
of complexity and hyper-embedded technology will be very difficult to secure."

"The complexity of SCADA technology combined with the range of results from survey respondents on
this issue indicates that we don't have any single section of the smart grid fully secured," said Elizabeth
Ireland, vice president of marketing for nCircle. "It's not surprising that energy industry security
professionals deem metering infrastructure as the highest area of risk. Individual partners in any
complex supply chain often have very limited visibility into the security for the entire process."
How should the security risks associated with the smart
                    grid affect deployment plans?
                                64%


                    33%

                                             4%

   No change from current plans; full steam ahead
   Deployment should slow down until we have better security controls
   We don’t need a smart grid at all




     Should regulatory oversight for smart             Have the American Recovery and
      grid distribution be transitioned to             Reinvestment Act of 2009 grants
           the Federal government?                      awarded to smart grid projects
                                                        adequately addressed security?
                          60%                                          66%
              40%
                                                                  34%



                 Yes       No                                       Yes   No


"The modernized grid encompasses new digital components all the way from the toaster to the
turbine,” noted Patrick Miller. “It spans local, state and federal regulatory lines. In an environment
where innovation is paramount, a federal one-size-fits-all approach may significantly slow down
progress. On the other hand, potential inconsistencies in regulatory approaches may introduce
complexity and risk smart grid landscape. Either model, whether state or federally regulated, comes
with pros and cons. I see the regulatory oversight of the smart grid as one of our biggest smart grid
challenges with the least obvious solution."

“It’s likely that the division of opinion on regulatory oversight reflects, at least to some degree,
fundamental political beliefs” said Elizabeth Ireland. “Some security professionals probably see
government regulation in industry as beneficial, and some feel we should minimize the role of
government in industry as much as possible. The majority of energy security professionals surveyed
believe the energy industry will police itself.”

Más contenido relacionado

La actualidad más candente

Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
EnergySec
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
Frederic Roy-Gobeil, CPA, CGA, M.Tax.
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
Bricata, Inc.
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
Austin Eppstein
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
Christopher Bennett
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
David Blanco
 

La actualidad más candente (20)

Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 
The Digital Telecom. Security Services
The Digital Telecom. Security ServicesThe Digital Telecom. Security Services
The Digital Telecom. Security Services
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
Antigena Overview
Antigena OverviewAntigena Overview
Antigena Overview
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
 
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, EthiopiaPresentation to GFCE 2019 in Addis Ababa, Ethiopia
Presentation to GFCE 2019 in Addis Ababa, Ethiopia
 
Smart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit RevereSmart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit Revere
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 

Destacado

Il valore del dato nel mondo del gas
Il valore del dato nel mondo del gasIl valore del dato nel mondo del gas
Il valore del dato nel mondo del gas
canaleenergia
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembre
canaleenergia
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembre
canaleenergia
 
SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre
canaleenergia
 
Opportunità per le aziende di vendita
Opportunità per le aziende di venditaOpportunità per le aziende di vendita
Opportunità per le aziende di vendita
canaleenergia
 
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
canaleenergia
 

Destacado (9)

Il valore del dato nel mondo del gas
Il valore del dato nel mondo del gasIl valore del dato nel mondo del gas
Il valore del dato nel mondo del gas
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembre
 
SMART WATER 4 novembre
SMART WATER 4 novembreSMART WATER 4 novembre
SMART WATER 4 novembre
 
Wataclic_Conte
Wataclic_ConteWataclic_Conte
Wataclic_Conte
 
SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre
 
Opportunità per le aziende di vendita
Opportunità per le aziende di venditaOpportunità per le aziende di vendita
Opportunità per le aziende di vendita
 
Roma Tech &Lighting
Roma Tech &LightingRoma Tech &Lighting
Roma Tech &Lighting
 
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
La misurazione elettronica nell'attività di vendita: le opportunità offerte d...
 
Claudia Canaveri
Claudia CanaveriClaudia Canaveri
Claudia Canaveri
 

Similar a Sondaggio smart meter

DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020
Neil McDonnell
 
Prédictions 2021, étude Deloitte
Prédictions 2021, étude DeloittePrédictions 2021, étude Deloitte
Prédictions 2021, étude Deloitte
Paperjam_redaction
 

Similar a Sondaggio smart meter (20)

Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for Smartgrid
 
Protecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated SecurityProtecting Utilities from Risk - Iain Morton, Tyco Integrated Security
Protecting Utilities from Risk - Iain Morton, Tyco Integrated Security
 
IBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart GridsIBM End-to-End Security for Smart Grids
IBM End-to-End Security for Smart Grids
 
Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...Powering up the shocking truth about cyber security in the energy industry - ...
Powering up the shocking truth about cyber security in the energy industry - ...
 
DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020DHS CISA 5G Strategy 2020
DHS CISA 5G Strategy 2020
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
Nreca kickoff meeting
Nreca kickoff meetingNreca kickoff meeting
Nreca kickoff meeting
 
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network SecuritySECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
SECURING FUTURE CONNECTIVITY: An Extensive Analysis on 5G Network Security
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Deep Dive into Operational Technology Security - USCSI®.pdf
Deep Dive into Operational Technology Security - USCSI®.pdfDeep Dive into Operational Technology Security - USCSI®.pdf
Deep Dive into Operational Technology Security - USCSI®.pdf
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Prédictions 2021, étude Deloitte
Prédictions 2021, étude DeloittePrédictions 2021, étude Deloitte
Prédictions 2021, étude Deloitte
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 

Más de canaleenergia

Sviluppo energetico in Italia
Sviluppo energetico in ItaliaSviluppo energetico in Italia
Sviluppo energetico in Italia
canaleenergia
 
Sviluppo energetico del Messico
Sviluppo energetico del MessicoSviluppo energetico del Messico
Sviluppo energetico del Messico
canaleenergia
 
Media kit canaleenergia.com
Media kit canaleenergia.comMedia kit canaleenergia.com
Media kit canaleenergia.com
canaleenergia
 
Last modelli di business pv
Last modelli di business pvLast modelli di business pv
Last modelli di business pv
canaleenergia
 
Regolazione&mercato pv
Regolazione&mercato pvRegolazione&mercato pv
Regolazione&mercato pv
canaleenergia
 
Conferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e PironConferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e Piron
canaleenergia
 
Conferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano ZocchiConferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano Zocchi
canaleenergia
 
Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli
canaleenergia
 
Automazione per rinnovabili
Automazione per rinnovabiliAutomazione per rinnovabili
Automazione per rinnovabili
canaleenergia
 
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di TrasmissionePass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
canaleenergia
 
All compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenzaAll compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenza
canaleenergia
 
Ottimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensioneOttimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensione
canaleenergia
 
Deic il punto di convergenza
Deic il punto di convergenzaDeic il punto di convergenza
Deic il punto di convergenza
canaleenergia
 
L'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitivitàL'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitività
canaleenergia
 

Más de canaleenergia (20)

Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot project
 
Mauro Brolis (Finlombarda)
Mauro Brolis (Finlombarda)Mauro Brolis (Finlombarda)
Mauro Brolis (Finlombarda)
 
Gas
GasGas
Gas
 
Sviluppo energetico in Italia
Sviluppo energetico in ItaliaSviluppo energetico in Italia
Sviluppo energetico in Italia
 
Sviluppo energetico del Messico
Sviluppo energetico del MessicoSviluppo energetico del Messico
Sviluppo energetico del Messico
 
Media kit canaleenergia.com
Media kit canaleenergia.comMedia kit canaleenergia.com
Media kit canaleenergia.com
 
Media kit 2013
Media kit 2013Media kit 2013
Media kit 2013
 
Last modelli di business pv
Last modelli di business pvLast modelli di business pv
Last modelli di business pv
 
Regolazione&mercato pv
Regolazione&mercato pvRegolazione&mercato pv
Regolazione&mercato pv
 
Clusit
ClusitClusit
Clusit
 
Kingfisher-dal riciclo plastica vergine
Kingfisher-dal riciclo plastica vergineKingfisher-dal riciclo plastica vergine
Kingfisher-dal riciclo plastica vergine
 
Conferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e PironConferenza Gas: Morabito e Piron
Conferenza Gas: Morabito e Piron
 
Conferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano ZocchiConferenza Gas: Tiziano Zocchi
Conferenza Gas: Tiziano Zocchi
 
Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli Conferenza Gas: Marco Golinelli
Conferenza Gas: Marco Golinelli
 
Automazione per rinnovabili
Automazione per rinnovabiliAutomazione per rinnovabili
Automazione per rinnovabili
 
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di TrasmissionePass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
Pass M0S 420 kv per le sottostazioni della rete elettrica di Trasmissione
 
All compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenzaAll compatible: la nuova tecnologia dei convertitori di frequenza
All compatible: la nuova tecnologia dei convertitori di frequenza
 
Ottimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensioneOttimizzazione dei consumi di energia con interruttori di bassa tensione
Ottimizzazione dei consumi di energia con interruttori di bassa tensione
 
Deic il punto di convergenza
Deic il punto di convergenzaDeic il punto di convergenza
Deic il punto di convergenza
 
L'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitivitàL'automazione motore dell'innovazione e della competitività
L'automazione motore dell'innovazione e della competitività
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Sondaggio smart meter

  • 1. Smart Grid Security nCircle, the leader in information risk and security performance management solutions, partnered with EnergySec, a DOE-funded public-private partnership that works to enhance the cyber security of the electric infrastructure, to sponsor a smart grid security survey of over 104 energy security professionals. The online survey was conducted between March 16 and March 31, 2012. Key smart grid security findings:  64% said smart meters are vulnerable to false data injection  75% said security has not been adequately addressed in smart grid deployment  90% believe we need smart grid security standards  64% believe smart grid deployment should slow down until we have better security controls  Only 50% said their organization has a security program and security policies for smart grid deployment  66% say for smart grid projects funded by American Recovery and Reinvestment Act grants have not adequately addressed security The complete results of the survey, including commentary from Patrick Miller, CEO of EnergySec, and Elizabeth Ireland, vice president of marketing for nCircle are below: Has the hype around privacy issues Has security been adequately associated with smart meter addressed in smart grid deployment? consumer data been overblown? 75% 53% 47% 25% Yes No Yes No "Smart Grid meter privacy is still a new area," said Patrick Miller. "State regulations are inconsistent and sensitive customer details in smart grid data vary from utility to utility. I expect the smart grid industry to struggle with several challenges around who ultimately 'owns' customer data. There are several grey areas that impact how smart grid customer data will be used as the industry attempts to maximize revenue potential. Even seemingly innocuous customer data has significant value -- just ask Facebook or Google.”
  • 2. Patrick Miller noted, "Smart meters vary widely in Do smart meter installations have sufficient security controls to capability and many older meters were not designed to protect against false data injection? adequately protect against false data injection. It doesn't help that some communication protocols used by the 61% smart meter infrastructure don't offer much protection against false data injection either. Together, these facts 39% highlight a much larger potential problem with data integrity across the smart grid infrastructure. Because our nation relies on the smart grid to deliver robust and reliable power, we need to make sure that all systems that process usage data, especially those that make autonomous, self-correcting, self-healing decisions, assure Yes No data integrity." "A false data injection attack is another example of technology advancing faster than security controls,” said Elizabeth Ireland. “This is a problem that has been endemic in the evolution of security and it's a key reason for the significant cyber security risks we face across many facets of critical infrastructure. Installing technology without sufficient security controls presents serious risks to our power infrastructure and to every power user in the U.S." "Security has been addressed to varying degrees in many smart grid deployments, however it is going to be a Are smart grid security standards moving fast enough to keep pace challenge to keep pace with the constantly changing with smart grid deployment? security landscape," said Patrick Miller. "The analog and mechanical devices installed in most utilities were designed for a very different maintenance model than newer digital 72% equipment being designed and installed today." Elizabeth Ireland noted, "It's pretty clear that information security professionals in the energy industry are 28% uncomfortable with standards currently available for smart grid technology. Defining and implementing meaningful security standards is always a challenge but without standards, adoption of critical security controls across the Yes No smart grid industry is likely to be uneven at best."
  • 3. Do you think we need smart grid Does your organization have a specific security standards and security program and security policies 89% policies? for smart grid deployment? 49% 51% 11% Yes No Yes No What part of smart grid infrastructure is most vulnerable to cyber attack? 41% 29% 20% 10% Smart meters Metering infrastructure including transport networks Utility energy management systems Energy management, such as phasor measurement units According to Patrick Miller, CEO of EnergySec, "The enormous range of technology in the smart grid presents many points of potential vulnerability, and we are moving at the speed of light to insert even more technology 'shims' into the existing network structures of the smart grid. This ever-increasing rate of complexity and hyper-embedded technology will be very difficult to secure." "The complexity of SCADA technology combined with the range of results from survey respondents on this issue indicates that we don't have any single section of the smart grid fully secured," said Elizabeth Ireland, vice president of marketing for nCircle. "It's not surprising that energy industry security professionals deem metering infrastructure as the highest area of risk. Individual partners in any complex supply chain often have very limited visibility into the security for the entire process."
  • 4. How should the security risks associated with the smart grid affect deployment plans? 64% 33% 4% No change from current plans; full steam ahead Deployment should slow down until we have better security controls We don’t need a smart grid at all Should regulatory oversight for smart Have the American Recovery and grid distribution be transitioned to Reinvestment Act of 2009 grants the Federal government? awarded to smart grid projects adequately addressed security? 60% 66% 40% 34% Yes No Yes No "The modernized grid encompasses new digital components all the way from the toaster to the turbine,” noted Patrick Miller. “It spans local, state and federal regulatory lines. In an environment where innovation is paramount, a federal one-size-fits-all approach may significantly slow down progress. On the other hand, potential inconsistencies in regulatory approaches may introduce complexity and risk smart grid landscape. Either model, whether state or federally regulated, comes with pros and cons. I see the regulatory oversight of the smart grid as one of our biggest smart grid challenges with the least obvious solution." “It’s likely that the division of opinion on regulatory oversight reflects, at least to some degree, fundamental political beliefs” said Elizabeth Ireland. “Some security professionals probably see government regulation in industry as beneficial, and some feel we should minimize the role of government in industry as much as possible. The majority of energy security professionals surveyed believe the energy industry will police itself.”