{"id":2295,"date":"2021-03-08T08:57:27","date_gmt":"2021-03-08T08:57:27","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=2295"},"modified":"2021-04-12T05:18:51","modified_gmt":"2021-04-12T05:18:51","slug":"supply-chain-risk-management-in-electric-grid-utilities","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/","title":{"rendered":"Supply Chain Risk Management in Electric Grid Utilities"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>With the recent attack against software developed by SolarWind which affected both public and private organizations, the public has become more acutely aware of the impending threat of the usage of either products or services from organizations that are part of any supply chain management.<\/p>\n<h2 class=\"navy\">The supply chain risk<\/h2>\n<p>To understand the impact a supply chain attack may have, it is useful to focus on how the SolarWinds hack developed and its impact.<\/p>\n<p>Malicious actors got inside the development operations of SolarWinds and managed to insert malware inside a software update that was distributed by the company in March. Once installed, the malware \u201cphoned home\u201d to a command-and-control network run by the hacking group, which enabled them to enter the network and take further action. Since the patch originated and was digitally signed by SolarWinds, most user companies were not aware that the version of their software was compromised.<\/p>\n<p>Until recently, it was known that the attack had affected a handful of US federal and government agencies and organizations, and technology or security firms. However, a recent report from Kaspersky\u2019s ICS CERT unit <a href=\"https:\/\/ics-cert.kaspersky.com\/reports\/2021\/01\/26\/sunburst-industrial-victims\/\" target=\"_blank\" rel=\"noopener noreferrer\">noted<\/a> that \u201cabout 18,000 users may have installed backdoored versions of SolarWinds.\u201d What is particularly interesting is that among those 18,000 victims, there were \u201cnearly 2,000 domains impacted by Sunburst and estimated that roughly 32% of them were associated with industrial organizations.\u201d<\/p>\n<p>A majority of them are organizations in the manufacturing sector, followed by utilities, construction, transportation and logistics, oil and gas, mining, and energy. The SolarWinds software is highly integrated into many systems around the globe in different industries, therefore, it shouldn\u2019t come as a surprise if we experience second-stage activity in any of these organizations.<\/p>\n<h2 class=\"navy\">How NERC manages supply chain risks<\/h2>\n<p>The digital transformation of the industrial sector, including the energy and power industry, has brought many benefits, but it has also created a never seen before expanded threat landscape. Interdependence and interconnectivity are holes in the security, safety, and reliability posture of the electric grid, threatening to wreak havoc if their vulnerabilities are exploited.<\/p>\n<p>We could rephrase this as &#8220;The North American Electric Reliability Corporation (NERC), in response to FERC Order 829 which recognizes the impact of supply chain risks to the organizations, developed <a href=\"https:\/\/itegriti.com\/kw022024\/2021\/blog\/an-introduction-to-nerc-cip-013-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">Critical Infrastructure Protection (CIP) standard 13-1<\/a>. The standard includes cybersecurity requirements and their related security controls for supply chain risk management of BES Cyber Systems for electric power and utility companies.&#8221;The new standard was approved by the Federal Energy Regulatory Commission (FERC) on October 18, 2018, and it has been enforced on October 1, 2020.<\/p>\n<p>The standard applies to assets that are rated as high- and medium-impact Bulk Electric System Cyber Systems (BCS). It requires registered entities to develop documented plans to identify and assess vendor risks associated with their sold and installed products including software and the vendor\u2019s own supply chain. In addition to having an overarching plan, the requirements also explicitly cover six key required process areas.<\/p>\n<p>The five covered areas are:<\/p>\n<ul>\n<li>Vendor security incident notification and coordinated response<\/li>\n<li>Vendor personnel off-boarding notification<\/li>\n<li>Receiving disclosures by vendors of known vulnerabilities<\/li>\n<li>Verification of vendor software integrity and authenticity<\/li>\n<li>Coordination of vendor remote access.<\/li>\n<\/ul>\n<p>As NERC does not have regulatory jurisdiction over the vendors, they are regulating the vendors by proxy. The Registered Entity has to include the vendor risks associated with the processes noted above in their compliance risk management.<\/p>\n<p>In addition to CIP 013-1, NERC has enhanced several other existing CIP standards to include supply risk management.<\/p>\n<ul>\n<li>CIP-005 requires the identification of active vendor remote access sessions and the establishment of methods to disable active vendor remote access sessions.<\/li>\n<li>CIP-010 requires an entity to verify the origin of its software and the integrity of the software it has obtained from its source. The intent is to make it increasingly difficult for attackers to take advantage of vendor patches and software distribution practices to introduce compromises into a system.<\/li>\n<\/ul>\n<h2 class=\"navy\">Lessons learned<\/h2>\n<p>Supply chain risks are a business risk. Therefore, the management of these risks should include various teams within an organization and would require coordination and alignment with common objectives and goals. As an off-shoot of that exercise, the organization would require an evaluation of their standards, processes, and procedures from not only an operational standpoint, but, also from a technical one.<\/p>\n<p>Although the CIP 013-1 standard applies to high- and medium-impact BCS, it is advised that electric grid entities extend its applicability to low-impact BES Cyber Systems as well. As the SolarWinds hack proved, adversaries need to put their feet on one component, and they can take it from there to expand their operations to a multitude of organizations. With the electric grid being increasingly interdependent, it is prudent to safeguard any pathways that may act as backdoors to conquering our castle.<\/p>\n<h2 class=\"navy\">How ITEGRITI can help<\/h2>\n<p>As this standard is fairly new, organizations need to consider the risks associated with non or partial compliance of the standard.\u00a0 They may want to consider the services of organizations, such as ITEGRITI that are well-versed in the interpretation and implementation of <a href=\"https:\/\/itegriti.com\/kw022024\/CIPGSD\/\">NERC CIP<\/a> regulations.<\/p>\n<p>ITEGRITI helps protect some of the nation\u2019s most critical infrastructure, serving clients in energy, healthcare, transportation, education, retail and financial sectors.\u00a0 We develop and implement programs that mitigate cyber and compliance risk, supported by internal controls to measure, monitor, and report ongoing program effectiveness. Our programs help companies avoid hacks and minimize business impact during a cybersecurity event.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As we saw with SolarWinds, supply chain risks are business risks. How can NERC help guide us despite not having regulatory jurisdiction over vendors?<\/p>\n","protected":false},"author":10,"featured_media":2303,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Supply Chain Risk Management in Electric Grid Utilities - kw022024<\/title>\n<meta name=\"description\" content=\"As we saw with SolarWinds, supply chain risks are business risks. How can NERC help guide us despite not having regulatory jurisdiction over vendors?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Supply Chain Risk Management in Electric Grid Utilities\" \/>\n<meta property=\"og:description\" content=\"As we saw with SolarWinds, supply chain risks are business risks. How can NERC help guide us despite not having regulatory jurisdiction over vendors?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-08T08:57:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T05:18:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_supply_chain_risk2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Supply Chain Risk Management in Electric Grid Utilities\",\"datePublished\":\"2021-03-08T08:57:27+00:00\",\"dateModified\":\"2021-04-12T05:18:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/\"},\"wordCount\":1152,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_supply_chain_risk2.jpg\",\"articleSection\":[\"Compliance\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/\",\"name\":\"Supply Chain Risk Management in Electric Grid Utilities - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_supply_chain_risk2.jpg\",\"datePublished\":\"2021-03-08T08:57:27+00:00\",\"dateModified\":\"2021-04-12T05:18:51+00:00\",\"description\":\"As we saw with SolarWinds, supply chain risks are business risks. How can NERC help guide us despite not having regulatory jurisdiction over vendors?\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_supply_chain_risk2.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_supply_chain_risk2.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Supply Chain Risk Management in Electric Grid Utilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Supply Chain Risk Management in Electric Grid Utilities - kw022024","description":"As we saw with SolarWinds, supply chain risks are business risks. How can NERC help guide us despite not having regulatory jurisdiction over vendors?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/","og_locale":"en_US","og_type":"article","og_title":"Supply Chain Risk Management in Electric Grid Utilities","og_description":"As we saw with SolarWinds, supply chain risks are business risks. How can NERC help guide us despite not having regulatory jurisdiction over vendors?","og_url":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2021-03-08T08:57:27+00:00","article_modified_time":"2021-04-12T05:18:51+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_supply_chain_risk2.jpg","type":"image\/jpeg"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Supply Chain Risk Management in Electric Grid Utilities","datePublished":"2021-03-08T08:57:27+00:00","dateModified":"2021-04-12T05:18:51+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/"},"wordCount":1152,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_supply_chain_risk2.jpg","articleSection":["Compliance","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/","url":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/","name":"Supply Chain Risk Management in Electric Grid Utilities - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_supply_chain_risk2.jpg","datePublished":"2021-03-08T08:57:27+00:00","dateModified":"2021-04-12T05:18:51+00:00","description":"As we saw with SolarWinds, supply chain risks are business risks. How can NERC help guide us despite not having regulatory jurisdiction over vendors?","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_supply_chain_risk2.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_supply_chain_risk2.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Supply Chain Risk Management in Electric Grid Utilities"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2295"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=2295"}],"version-history":[{"count":5,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2295\/revisions"}],"predecessor-version":[{"id":2304,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2295\/revisions\/2304"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/2303"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=2295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=2295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=2295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}