Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Utility Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Utility Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Beyond the Fence - Strengthening Substation Security Through Threat Assessments

28:01
 
Share
 

Manage episode 467868955 series 3554054
Content provided by Utility Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Utility Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of the Utility Security Podcast, we explore the critical challenges facing substation security and the importance of comprehensive threat assessments. Inspired by Jim Willis’s article, Substation Security Challenges: Conducting Threat Assessments, we break down the three main threat categories—consequential, indirect, and direct threats—and explain why “hope is an expensive commodity” when it comes to protecting essential infrastructure.

From increasing risks of cyberattacks and vandalism to natural disasters and social unrest, our discussion dives into real-world examples, proactive defense strategies, and the four-step process to securing substations. Tune in to learn how utilities can stay ahead of evolving threats and keep the power grid resilient.

Key Takeaways:

✔️ Threat assessments are essential—security isn’t just about fences and cameras.

✔️ Utilities face three main types of threats: consequential (social/political unrest), indirect (natural disasters), and direct (deliberate attacks).

✔️ Understanding attacker motivations—from activists to cybercriminals—helps shape better defenses.

✔️ The four-step threat assessment process identifies vulnerabilities and prepares utilities for the worst.

✔️ Physical security, cybersecurity, and emergency response all play a role in protecting substations.

✔️ Trust and transparency between utilities, employees, and the public are key to a safer grid.

Tune in to stay updated and informed about securing our nation's utilities!

Subscribe to Utility Security Magazine at no cost! - https://utilitysecurity.com/subscribe-now/

#UtilitySecurity #SubstationSecurity #CriticalInfrastructure #CyberThreats #PowerGridProtection #ThreatAssessment

  continue reading

17 episodes

Artwork
iconShare
 
Manage episode 467868955 series 3554054
Content provided by Utility Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Utility Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of the Utility Security Podcast, we explore the critical challenges facing substation security and the importance of comprehensive threat assessments. Inspired by Jim Willis’s article, Substation Security Challenges: Conducting Threat Assessments, we break down the three main threat categories—consequential, indirect, and direct threats—and explain why “hope is an expensive commodity” when it comes to protecting essential infrastructure.

From increasing risks of cyberattacks and vandalism to natural disasters and social unrest, our discussion dives into real-world examples, proactive defense strategies, and the four-step process to securing substations. Tune in to learn how utilities can stay ahead of evolving threats and keep the power grid resilient.

Key Takeaways:

✔️ Threat assessments are essential—security isn’t just about fences and cameras.

✔️ Utilities face three main types of threats: consequential (social/political unrest), indirect (natural disasters), and direct (deliberate attacks).

✔️ Understanding attacker motivations—from activists to cybercriminals—helps shape better defenses.

✔️ The four-step threat assessment process identifies vulnerabilities and prepares utilities for the worst.

✔️ Physical security, cybersecurity, and emergency response all play a role in protecting substations.

✔️ Trust and transparency between utilities, employees, and the public are key to a safer grid.

Tune in to stay updated and informed about securing our nation's utilities!

Subscribe to Utility Security Magazine at no cost! - https://utilitysecurity.com/subscribe-now/

#UtilitySecurity #SubstationSecurity #CriticalInfrastructure #CyberThreats #PowerGridProtection #ThreatAssessment

  continue reading

17 episodes

Semua episod

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play