0
  • Home
  • CXO Insights
  • CIO Viewpoints
  • News
  • Conference
  • Newsletter
  • Subscribe
  • About Us
Utility
US
APAC
EUROPE
  • Solar Energy Tech
  • Transmission & Distribution
  • Waste Water Management
  • Utility Communications
  • Analytics
  • Smart Grid
  • GRC
  • Billing and Customer Information System
  • Battery Technology
×
#

Utilities Tech Outlook Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Utilities Tech Outlook

Subscribe

loading
  • Home
  • News
Editor's Pick(1 - 4 of 8)
left
Leveraging Asset Management Best Practices for a World-Class Water Utility

Vennard Wright, Chief Information Officer, Washington Suburban Sanitary Commission

Enhancing Power Distribution Reliability using Sensors

Scott Self, CIO, Tennessee Valley Authority

How to Attract Next Generation IT Talent

John Burke, CIO, Ambit Energy

How to 'Fix' your CMDB with Hardware Asset Management

Orland Dami, CIO Advisory Senior Associate, KPMG

CIOs are Not Turning the Machines or Generating Power; We Give Visibility and Provide Perspective of How to Operate those Machines or Generate Adequate Power

Zeeshan Sheikh, CIO, Entergy [NYSE:ETR]

Digital Twin' in Optimizing Lifecycle Performance of Oil & Gas Assets and Equipment

Yanni Charalambous, VP & CIO, Occidental Petroleum Corporation

The Road to Becoming a Digital Utility

Todd Inlander, VP & CIO, Southern California Edison

Asset Management's Role in Enterprise Digital Transformation

Mujib Lodhi, CIO, Washington Suburban Sanitary Commission

right

THANK YOU FOR SUBSCRIBING

Weekly Brief

loading

Securing the Energy Ecosystem in the Ripe IoT Age

By Utilities Tech Outlook | Monday, July 29, 2019

Tweet

Internet of thingsIoT, as one of the significant catalysts for the transformation in the energy and utility sector, drives enumerable opportunities prioritizing security.  

FREMONT, CA: The Internet of Things (IoT) is already creating waves across both the business and the customer landscape. Power suppliers and utilities are looking to leverage IoT technologies to drive internal and external benefits as they design programs that enhance customer service. Smart metering and advanced infrastructure are the first set of steps to progress. These systems enable greater forecasting capabilities, thereby cutting down costs through efficient scheduling and reliability in the grid. It is also allowing the customers to foresee spending patterns and better plan their energy usage over time.   

Utilities indeed have a great deal of experience in installing and managing IoT. But the challenge today is ensuring device and data security of these systems against attackers and eavesdroppers. With the takeoff of the IoT adoption, threat reports have already started to appear. Energy and utility providers represent a high-value target for cyber attackers, and its broad geographic diversity presents a challenge with a highly distributed surface attack.

IoT security threats are persistent and rapidly evolving in the energy and utility sector. As protecting every asset from every potential danger is not realistic, utilities need to manage their risk by deploying defense-in-depth strategies. Data encryption is one of the most powerful security tools available for IoT adopters. The challenges associated with IoT communications within the sector drives this requirement foe encryption throughout the distributed IoT infrastructure. All communication between endpoints and sensors to the edge and the cloud must be encrypted so that the data can't be compromised. Encryption is the most effective method when used wherever IoT data travels.

Check Out: Top Security Solution Companies 

Authentication technology can also be used to ensure that only authenticated or approved users gain access to IoT networks and related systems. Accessing data in the device or system or the cloud must require authentication and authorization to ensure no one manipulates the utility environment. Advanced firewalls are another essential IoT security tool, providing features including application awareness, stateful inspection, and integrated intrusion protection system technology. They offer security and operations teams necessary capabilities for segmentation, application visibility, and threat management.

Physical security, including site access controls and surveillance technologies, constitute another essential part of the IoT security strategy. Access control technologies, including the password-protected cabinet, help energy and utility providers, secure physical network assets against breach and destruction. Video analytics solutions scrutinize live images in real-time to detect unusual activities that could pose threats to IoT systems. It also provides an essential tool in mitigating physical security risks and protecting high-value assets. Besides managing cyber threats and physical security, firms must make sure to consider the business risks of unplanned downtime caused by natural disasters, equipment failures, and worker safety incidents.

Considering the critical nature of these systems and the rising cyber security threats against them, establishing a connected and trusted infrastructure is becoming more crucial than ever.

tag

IoT

Utilities

Smart Metering

Cyber Threats

ON THE DECK

Top Vendors

Smart Grid 2020

Top Vendors

Previous Next

Read Also

ZOME Chosen for DOE's Advanced Building Technologies Program

ZOME Chosen for DOE's Advanced Building Technologies Program

How Smart Grids Transform the Facets of Asset Management

How Smart Grids Transform the Facets of Asset Management

Major Solar Energy Trends to have an Eye on!

Major Solar Energy Trends to have an Eye on!

CleanSpark Launches mVoult for Home Grids

CleanSpark Launches mVoult for Home Grids

Environmental Lights Launches REVI Remote-Voltage Illumination System

Environmental Lights Launches REVI Remote-Voltage Illumination System

Livent Announces New Set of Sustainability Goals

Livent Announces New Set of Sustainability Goals

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2021 Utilities Tech Outlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy.
follow on linkedin
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

www.utilitiestechoutlook.com/news/securing-the-energy-ecosystem-in-the-ripe-iot-age--nwid-389.html?utm_source=google&utm_campaign=utilitiestech_topslider