{"id":3367,"date":"2022-04-21T14:05:05","date_gmt":"2022-04-21T14:05:05","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3367"},"modified":"2022-09-12T10:47:44","modified_gmt":"2022-09-12T10:47:44","slug":"how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/","title":{"rendered":"How do Power Plants and Renewables Differ in Cybersecurity Requirements"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><p>\u201cIn 2019, the <a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-125\/Accenture-Cybersecurity-Renewables-Services.pdf\" target=\"_blank\" rel=\"noopener\">renewable energy sector<\/a> recorded its largest ever increase in installed capacity, with more than 200 GW added, outpacing net installations in fossil fuels and nuclear power combined,\u201d reads a report from Accenture about the cyber state of renewables. With more surface area comes more attack surface. Luckily, there are <a href=\"https:\/\/www.energy.gov\/eere\/femp\/energy-and-cybersecurity-integration\" target=\"_blank\" rel=\"noopener\">measures in place<\/a> to combine energy and cybersecurity, such as the <a href=\"https:\/\/www.energy.gov\/eere\/femp\/federal-energy-management-program\" target=\"_blank\" rel=\"noopener\">Federal Energy Management Program (FEMP)<\/a>. And, knowledge is power.<\/p>\n<p>Cybersecurity poses a serious challenge for renewables operators. Many of the systems currently in use were built prioritizing efficiency over security. Other risk factors include an ecosystem of original equipment manufacturers and third-party maintenance providers with lingering access to their assets, and the fact that many are still mired in manual processes. The road to full cybersecurity maturity for the renewable energy sector won\u2019t be easy, but in time it can develop into the security posture seen in traditional power plants. We\u2019ll go over the differences here, and what has to be done to close the gap.<\/p>\n<h2><strong>Renewables vs. Traditional Power Plants<\/strong><\/h2>\n<p>Renewable energy facilities and traditional power plants are <em>not <\/em>the same thing; therefore, cybersecurity works a little differently for them, too. Traditional power plants run off exhaustible supplies like coal or natural gas. Once you use them, they\u2019re gone (sorry, Earth). <a href=\"https:\/\/www.eia.gov\/energyexplained\/renewable-sources\/\" target=\"_blank\" rel=\"noopener\">Renewables<\/a> are just that \u2013 naturally replenishing but flow-limited resources like biomass, hydropower, geothermal, wind, and solar. This means you can\u2019t use them up, but you can also just use what\u2019s available at the time. It takes time to charge a solar panel.<\/p>\n<p>The main cybersecurity challenge between renewables and traditional power lies in environment structure. Renewables rely on more than one industry: water and power, wind and power, sun and power. You\u2019re combining two sectors, each with its own personnel, infrastructure, and security challenges. Think of the cybersecurity difficulties in combining IT\/OT: you\u2019re combining often up-to-date IT with often lagging <a href=\"https:\/\/www.tripwire.com\/state-of-security\/ics-security\/key-security-challenges-facing-critical-national-infrastructure-cni\/\" target=\"_blank\" rel=\"noopener\">legacy OT resources<\/a>, especially where much critical national infrastructure is concerned. Now imagine doing that for two different industries (each with its own IT\/OT problems). Now you\u2019re starting to see why securing the renewable power sector can be such a difficulty.<\/p>\n<p>Another challenge, ironically, is the expansion of technology. Renewable grides typically feature more <a href=\"https:\/\/www.renewableenergyworld.com\/om\/renewables-lag-in-cyber-safeguards-heres-how-the-sector-plans-to-catch-up\/\" target=\"_blank\" rel=\"noopener\">IoT technology<\/a>, and that can be a [security] problem if not handled with care. With every new IoT device, smart water meter, or smart inverter on a solar panel, the attack surface (and risk potential) multiplies. Traditional power supplies \u2013 think coal, oil, and natural gas \u2013 only have to worry about gadgets infiltrating from one side: energy. Renewables have to deal with potential new technologies being integrated from multiple sectors and funneling into their electric grid. It\u2019s double the trouble.<\/p>\n<p>A third, and perhaps inescapable challenge, is that &#8220;going green\u201d is on the rise.\u00a0 That simply means the attack surface is growing with every new solar farm, hydropower plant, and windmill. If the sector\u2019s inherent cybersecurity problems aren\u2019t solved quickly, and at the root, they will just proliferate into each new build. These problems are dynamic, as opposed to those of the oil, coal, and fracking facilities that are increasingly being <a href=\"https:\/\/www.cnn.com\/2021\/01\/27\/business\/fracking-ban-biden-federal-leasing\/index.html\" target=\"_blank\" rel=\"noopener\">threatened with shut down<\/a> as we struggle to transition to clean energy.<\/p>\n<p>And lastly, a <a href=\"https:\/\/www.renewableenergyworld.com\/om\/renewables-lag-in-cyber-safeguards-heres-how-the-sector-plans-to-catch-up\/\" target=\"_blank\" rel=\"noopener\">lack of regulations<\/a> for distributed energy resources (DERs) and inverter-based resources (IBRs). Says Kenneth Boyce, senior director for Principal Engineering with UL\u2019s Industrial group, \u201cCurrently, there are no cybersecurity certification requirements to which manufacturers and vendors can certify their DER devices and IBRs against an established and widely adopted cybersecurity certification program.\u201d He concludes that developing said requirements will provide a &#8220;single unified approach&#8221; for testing and certifying DERs before they are deployed in the field.<\/p>\n<h2><strong>How to Close the Gaps <\/strong><\/h2>\n<p>Although traditional power plants are streaking ahead in cyber safety, measures can be put in place to close the gap. Michael Sanchez, CEO (CISA, CCSFP) noted <a href=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/03\/10_Essential_Steps_to_Cyber_Resilience.pdf\" target=\"_blank\" rel=\"noopener\">10 essential steps<\/a> organizations can take today to improve their cybersecurity posture \u2013 no matter where they are on the maturity scale. They include:<\/p>\n<ol>\n<li>A culture of cybersecurity<\/li>\n<li>Asset inventory<\/li>\n<li>Minimize attack surface<\/li>\n<li>Identify business-critical data<\/li>\n<li>Manage cyber and physical boundaries<\/li>\n<li>Prepare for real-time events<\/li>\n<li>The principle of least privilege<\/li>\n<li>Manage vulnerabilities<\/li>\n<li>Keep track of baselines<\/li>\n<li>Balance preventative and protective controls<\/li>\n<\/ol>\n<p>And, a <a href=\"https:\/\/www.eenewspower.com\/en\/report-flags-cybersecurity-risks-of-renewable-energy-technologies\/\" target=\"_blank\" rel=\"noopener\">report<\/a> from the Renewables Consulting Group (RCG) and cyber specialist Cylance recommends the following cybersecurity suggestions for the renewable power industry specifically:<\/p>\n<ul>\n<li><strong>\u201cEnvironment assessment:<\/strong> Renewable energy companies should carry out comprehensive assessments of their current cybersecurity posture.<\/li>\n<li><strong>Asset update: <\/strong>Updated systems provide a last line of defense when other security measures fail so it is critical IT infrastructure is updated and staff are trained to recognize the threats.<\/li>\n<li><strong>Access management: <\/strong>Access to sensitive systems and data needs to be properly managed.<\/li>\n<li><strong>Predictive tools: <\/strong>New tools, including artificial intelligence and machine learning, can help maintain strong security as cyberattacks and operating environments become more complex.\u201d<\/li>\n<\/ul>\n<p>By implementing the above suggestions, underfunded, legacy-ridden renewables operators can begin to keep up with the rest of the power sector in securing their assets. Managed service providers like ITEGRITI can help establish baselines, track goals and implement solutions.<\/p>\n<h2><strong>Managed Security Services<\/strong><\/h2>\n<p>Choosing a Managed Security Service Provider (MSSP) like ITEGRITI can help offload the burden of achieving cyber-stability all on your own. A good MSSP can give you the manpower to get stuff done. No, we\u2019re not a staffing agency. But we do provide you with managed service experts who can make tough calls and provide ongoing advisory through our Virtual Support models. Check out <a href=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\" target=\"_blank\" rel=\"noopener\">vCISO, vCompliance Team, and Workforce Support<\/a>.<\/p>\n<p>We can also cut through the jargon and legislation to help your renewables plant <a href=\"https:\/\/itegriti.com\/kw022024\/compliance\/\">achieve cyber compliance<\/a>. As we state, \u201cOur team members served in operational, management, and auditor roles and have deep experience in regulatory compliance and affairs.\u201d We\u2019ll help you with program implementation (NERC, FERC, NIST), audit prep, and mitigation activities.<\/p>\n<p>And lastly, none of this means anything without <a href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">resilience<\/a>. If you can swat off one cyberattack, great. But what happens the next time? Choosing a good MSSP means finding one who not only implements the solutions but measures them on a consistent basis to ensure they\u2019ve still got what it takes to fight off the latest threats.<\/p>\n<p>When the energy sector is facing ever more sophisticated threats, not one weak link can be allowed in the chain. Renewables may well be the future of the energy industry but right now, this industry has yet to mature from a cybersecurity perspective. Choose the managed service provider that can work with your renewable power plant\u2019s unique security challenges and catch you up to the rest of the sector.<\/p>\n<p>If you are looking to bolster your defenses and ensure you are compliant with all current frameworks, <a href=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\">contact ITEGRITI today<\/a>.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In 2019, the renewable energy sector recorded its largest ever increase in installed capacity, with more than 200 GW added, outpacing net installations in fossil fuels and nuclear power combined,\u201d reads a report from Accenture about the cyber state of renewables.<\/p>\n","protected":false},"author":53,"featured_media":3370,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"gallery","meta":{"footnotes":""},"categories":[2179],"tags":[2188,2193],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How do Power Plants and Renewables Differ in Cybersecurity Requirements<\/title>\n<meta name=\"description\" content=\"In 2019, the renewable energy sector recorded its largest ever increase in installed capacity, with more than 200 GW added.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do Power Plants and Renewables Differ in Cybersecurity Requirements\" \/>\n<meta property=\"og:description\" content=\"In 2019, the renewable energy sector recorded its largest ever increase in installed capacity, with more than 200 GW added.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-21T14:05:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-12T10:47:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_91_RenewablePowerPlants.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Katrina Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@itegriti\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Katrina Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/\"},\"author\":{\"name\":\"Katrina Thompson\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\"},\"headline\":\"How do Power Plants and Renewables Differ in Cybersecurity Requirements\",\"datePublished\":\"2022-04-21T14:05:05+00:00\",\"dateModified\":\"2022-09-12T10:47:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/\"},\"wordCount\":1405,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_91_RenewablePowerPlants.jpg\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/\",\"name\":\"How do Power Plants and Renewables Differ in Cybersecurity Requirements\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_91_RenewablePowerPlants.jpg\",\"datePublished\":\"2022-04-21T14:05:05+00:00\",\"dateModified\":\"2022-09-12T10:47:44+00:00\",\"description\":\"In 2019, the renewable energy sector recorded its largest ever increase in installed capacity, with more than 200 GW added.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_91_RenewablePowerPlants.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_91_RenewablePowerPlants.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How do Power Plants and Renewables Differ in Cybersecurity Requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136\",\"name\":\"Katrina Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g\",\"caption\":\"Katrina Thompson\"},\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How do Power Plants and Renewables Differ in Cybersecurity Requirements","description":"In 2019, the renewable energy sector recorded its largest ever increase in installed capacity, with more than 200 GW added.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/","og_locale":"en_US","og_type":"article","og_title":"How do Power Plants and Renewables Differ in Cybersecurity Requirements","og_description":"In 2019, the renewable energy sector recorded its largest ever increase in installed capacity, with more than 200 GW added.","og_url":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2022-04-21T14:05:05+00:00","article_modified_time":"2022-09-12T10:47:44+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_91_RenewablePowerPlants.jpg","type":"image\/jpeg"}],"author":"Katrina Thompson","twitter_card":"summary_large_image","twitter_creator":"@itegriti","twitter_site":"@itegriti","twitter_misc":{"Written by":"Katrina Thompson","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/"},"author":{"name":"Katrina Thompson","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136"},"headline":"How do Power Plants and Renewables Differ in Cybersecurity Requirements","datePublished":"2022-04-21T14:05:05+00:00","dateModified":"2022-09-12T10:47:44+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/"},"wordCount":1405,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_91_RenewablePowerPlants.jpg","keywords":["Cybersecurity","Energy Sector"],"articleSection":["Compliance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/","url":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/","name":"How do Power Plants and Renewables Differ in Cybersecurity Requirements","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_91_RenewablePowerPlants.jpg","datePublished":"2022-04-21T14:05:05+00:00","dateModified":"2022-09-12T10:47:44+00:00","description":"In 2019, the renewable energy sector recorded its largest ever increase in installed capacity, with more than 200 GW added.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_91_RenewablePowerPlants.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/04\/itegriti_91_RenewablePowerPlants.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/how-do-power-plants-and-renewables-differ-in-cybersecurity-requirements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"How do Power Plants and Renewables Differ in Cybersecurity Requirements"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/ff092b5c137e1b22bbdf945e338cb136","name":"Katrina Thompson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eb6922488ad3d43afcad125286ad0f16?s=96&d=mm&r=g","caption":"Katrina Thompson"},"url":"https:\/\/itegriti.com\/kw022024\/author\/kthompson\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3367"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3367"}],"version-history":[{"count":4,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3367\/revisions"}],"predecessor-version":[{"id":3565,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3367\/revisions\/3565"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3370"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}