{"id":3524,"date":"2022-09-06T14:49:08","date_gmt":"2022-09-06T14:49:08","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3524"},"modified":"2022-09-12T13:17:38","modified_gmt":"2022-09-12T13:17:38","slug":"protecting-the-us-power-grid-against-foreign-threats","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/","title":{"rendered":"Protecting the US Power Grid Against Foreign Threats"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><p><strong>Summary:<\/strong> <em>Cyber threat actors are targeting the capacity of the US energy grid to maintain consistent supply at an affordable cost. In an evolving global landscape, concerns of a potential attack from a foreign nation are increasing. However, protecting the grid is a tough act that requires both federal guidance and the introduction of novel security technologies.<\/em><\/p>\n<p>On Plum Island, a remote outcrop of land off Long Island, New York, a tragic scenario has occurred five times in the past three years. The population is now in the dark, and vital facilities like hospitals are in severe need of power because a significant portion of the electrical grid has failed. While attackers attempt to keep the grid down, a team of utility operators and cybersecurity professionals work frantically to restore service.<\/p>\n<p>Fortunately, <a href=\"https:\/\/www.bloomberg.com\/news\/features\/2022-01-26\/what-happens-when-russian-hackers-cyberattack-the-u-s-electric-power-grid\" target=\"_blank\" rel=\"noopener\">that was only the scenario of a Defense Advanced Research Projects Agency (DARPA) drill<\/a>. Its objective was to show utilities used to battling hurricanes, blizzards, and other difficulties what it would be like to successfully hack the American electricity grid.<\/p>\n<h2>The importance of energy security<\/h2>\n<p>Energy is one of the 16 sectors that the Department of Homeland Security has identified as key infrastructure in the United States, and it may perhaps be the most important because it supplies the energy required to power every other essential infrastructure sector. However, the U.S. power grid, which serves as the backbone of the energy industry, is supported by an aged skeleton that is deteriorating daily. The electricity grid is vulnerable to both physical attacks and cyber intrusions, whether from domestic terrorists or nation-states like China and Russia. However, if the United States takes the necessary actions to protect the power infrastructure and avert a potential catastrophe in the future, much of this threat can be reduced.<\/p>\n<p><a href=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-1.png\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone wp-image-3525 size-medium lazyload\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-1-600x301.png\" alt=\"Energy Grid Infrastructure\" width=\"600\" height=\"301\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-1-200x100.png 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-1-400x201.png 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-1-540x272.png 540w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-1-600x301.png 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-1.png 610w\" data-sizes=\"(max-width: 600px) 100vw, 600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 600px; --smush-placeholder-aspect-ratio: 600\/301;\" \/><\/a><\/p>\n<p><em>Figure 1: Energy Grid Infrastructure, Photo Credit US Senate Republican Policy Committee. Source: American Security Project<\/em><\/p>\n<p>The ability to maintain a consistent supply of energy at a sustainable price is known as <a href=\"https:\/\/www.americansecurityproject.org\/climate-energy-and-security\/energy\/threats-to-the-energy-grid\/\" target=\"_blank\" rel=\"noopener\">energy security<\/a>. In this definition, &#8220;consistent supply&#8221; and &#8220;sustainable price&#8221; are the words of importance. Anything that compromises the United States&#8217; capacity to store or distribute energy is <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/collective-action-on-cyber-resilience\/\" target=\"_blank\" rel=\"noopener\">a threat to energy security<\/a>.<\/p>\n<p>A winter storm in February 2021 <a href=\"https:\/\/www.bloomberg.com\/news\/features\/2021-02-25\/texas-blackouts-what-went-wrong-with-ercot-and-state-power-grids\" target=\"_blank\" rel=\"noopener\">brought down the Texas electricity grid<\/a>. 702 people died as a result of the storm, which caused millions of Texans to go without electricity for several days in the cold weather. The energy infrastructure was not created to maximize alternative energy sources, and the Department of Energy has acknowledged that the clean energy transition is already <a href=\"https:\/\/www.energy.gov\/articles\/reimagining-and-rebuilding-americas-energy-grid\" target=\"_blank\" rel=\"noopener\">pushing the grid to its breaking point<\/a>. There are dangers outside the grid as well. Wildlife, cybersecurity, <a href=\"https:\/\/www.seattletimes.com\/business\/extremists-see-us-power-grid-as-target-govt-report-warns\/\" target=\"_blank\" rel=\"noopener\">domestic terrorism<\/a>, and extreme weather are some of the biggest dangers.<\/p>\n<h2>The increasing cyber threat of foreign actors<\/h2>\n<p>After the cyberattack that targeted the Ukrainian system in 2015, worries about a prospective <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/lloyds-will-exclude-catastrophic-state-sponsored-attacks-from-its-cyber-insurance-plans\/\" target=\"_blank\" rel=\"noopener\">attack by a foreign nation-state<\/a> on the electric grid began to grow. Using its BlackEnergy malware, the Russian cyberthreat group Sandworm hacked Ukrainian computer systems that allow for remote control of the country&#8217;s power infrastructure. Cyber specialists expressed alarm about the same malware already present in NATO and the U.S. power networks after this attack and another one in 2016 both left Kyiv&#8217;s capital city without electricity.<\/p>\n<p>Then-National Security Agency Director Mike Rogers testified before Congress that hackers had been <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2014-11-20\/foreign-governments-have-hacked-u-s-power-system-nsa-head-says\" target=\"_blank\" rel=\"noopener\">breaking into American power companies to look for vulnerabilities<\/a> and that Russia had been discovered <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2014-10-30\/security-firms-tie-russian-government-to-utilities-hacks\" target=\"_blank\" rel=\"noopener\">installing malware<\/a> in the same kind of industrial computers that power companies use.<\/p>\n<p><a href=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-2.jpg\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone wp-image-3531 size-medium lazyload\" data-src=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-2-600x345.jpg\" alt=\"How a hack on the grid might play out\" width=\"600\" height=\"345\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-2-200x115.jpg 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-2-400x230.jpg 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-2-600x345.jpg 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-2-768x442.jpg 768w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-2-800x460.jpg 800w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-2-1200x691.jpg 1200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-2-1536x884.jpg 1536w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/116-Image-2.jpg 1682w\" data-sizes=\"(max-width: 600px) 100vw, 600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 600px; --smush-placeholder-aspect-ratio: 600\/345;\" \/><\/a><\/p>\n<p><em>Figure 2: How a hack on the US grid might play out. Source: <a href=\"https:\/\/www.bloomberg.com\/news\/features\/2022-01-26\/what-happens-when-russian-hackers-cyberattack-the-u-s-electric-power-grid\" target=\"_blank\" rel=\"noopener\">Bloomberg<\/a>.<\/em><\/p>\n<p>China is a significant threat to the energy infrastructure of the United States since it is another country with the capacity to target vital energy facilities. Christine Wormuth, the secretary of the Army, recently informed reporters that in a conflict with China over Taiwan, the electrical system <a href=\"https:\/\/www.defense.gov\/News\/News-Stories\/Article\/Article\/2864536\/army-marine-corps-leaders-discuss-deterring-chinas-military-menace\/\" target=\"_blank\" rel=\"noopener\">would also be a target<\/a>.<\/p>\n<p>The Mission Support Center at Idaho National Laboratory <a href=\"https:\/\/www.hstoday.us\/subject-matter-areas\/cybersecurity\/perspective-cyber-and-physical-threats-to-the-u-s-power-grid-and-keeping-the-lights-on\/\" target=\"_blank\" rel=\"noopener\">characterized<\/a> these attacks as \u201cmultiple intrusions into US ICS\/SCADA and smart grid tools [that] may be aimed more at intellectual property theft and gathering intelligence to bolster their own infrastructure, but, likely, they are also using these intrusions to develop capabilities to attack the [bulk electric system], as well.\u201d<\/p>\n<h2>Threat vectors: software, networks, and hardware<\/h2>\n<p>The rising use of remote-control technologies to run crucial machinery and regulate energy loads all the way from power generation to transmission <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/the-biggest-threats-to-the-us-critical-national-infrastructure\/\" target=\"_blank\" rel=\"noopener\">adds to the vulnerability of the energy infrastructure<\/a>. The more connected critical energy infrastructure is to a network, the more vulnerable it becomes to cyberattack.<\/p>\n<p>The Mission Support Center further described this vulnerability, stating that due to the growth of networks and communication protocols used throughout ICS networks, vulnerabilities will continue to present attack vectors that criminals will seek to exploit for the foreseeable future. The cyberattack surface will keep growing as a result of the interoperable technologies developed for the transition to a smart grid.<\/p>\n<p>Cyberattacks can use more than just software and networks. In fact, <a href=\"https:\/\/www.forbes.com\/sites\/llewellynking\/2021\/01\/28\/how-the-supply-chain-in-heavy-bulk-power-equipment-is-vulnerable-to-undetected-cyberattack\/?sh=59a1b3cf7213\" target=\"_blank\" rel=\"noopener\">hardware like transformers and ICS also presents a huge opportunity for cyberattack<\/a>. The additional risk posed by this channel is that ICS controls may be impacted without the monitors&#8217; knowledge. In the case of STUXNET, Iranian engineers could detect that something was off but were unable to identify the source in time to prevent the centrifuges from being destroyed.<\/p>\n<h2>Protecting the US grid is a tough task<\/h2>\n<p>Plum Island&#8217;s consequences are being felt today. The National Rural Electric Cooperative Association, whose members are primarily small, not-for-profit operators, <a href=\"https:\/\/www.bloomberg.com\/news\/features\/2022-01-26\/what-happens-when-russian-hackers-cyberattack-the-u-s-electric-power-grid\" target=\"_blank\" rel=\"noopener\">recently started employing a new security tool<\/a> that it originally tested on Plum Island. However, a lot of substations continue to be weak points.<\/p>\n<p>The American electrical grid is the largest machinery in human history. There are 3,000 distinct public and private companies that own or run small portions of the electric system. Even if a large portion of the country&#8217;s key infrastructure has been privatized, it nevertheless <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-prepared-is-the-u-s-for-a-cyberattack-on-the-grid\/\" target=\"_blank\" rel=\"noopener\">serves a vital public purpose that must be upheld<\/a>. The federal government is ultimately responsible for protecting such infrastructure because the general public relies heavily on it for not only business and communication but also existence.<\/p>\n<p>The federal government must lead a top-down effort to secure the electricity grid. According to President Biden&#8217;s homeland security adviser Dr. Liz Sherwood-Randall, the issue is that <a href=\"https:\/\/www.cbsnews.com\/news\/america-electric-grid-60-minutes-2022-08-28\/\" target=\"_blank\" rel=\"noopener\">the federal government cannot enforce rules<\/a>. However, regulations and standards adopted by the whole electric industry that fortify the power grid against cyber threats would be a more effective means of attaining this goal.<\/p>\n<p>Utilizing &#8220;microgrids,&#8221; which are <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S136403211830128X\">defined as<\/a> &#8220;grid architecture that could manage electricity generation and demand locally in sub-sections of the grid that could be automatically isolated from the larger grid to provide critical services even when the grid at large fails,&#8221; is another option that might be used to prevent a cascading failure. Mass power outages can be reduced by adding microgrids to the main grid as a redundancy. Even though they are not the ideal option, microgrids do offer a potential way to prevent a catastrophic failure of the US electrical infrastructure.<\/p>\n<p>Risks associated with cyber systems controlling Critical Infrastructure such as the US electric grid, are growing as regulations mount, hacking tactics evolve, and bad press meets social media.\u00a0 The Federal Government and the public demand protection of these assets, and these regulations can carry civil, operational, and financial penalties.\u00a0 And companies are becoming keenly aware that compliance does not alone provide cybersecurity.<\/p>\n<p><a href=\"https:\/\/itegriti.com\/kw022024\/compliance\/\" target=\"_blank\" rel=\"noopener\">ITEGRITI\u2019s team members<\/a> have served in operational, management, and auditor roles and have deep experience in regulatory compliance and affairs, internal compliance program development, cybersecurity, training development, and delivery. To learn how we can help you, <a href=\"https:\/\/itegriti.com\/kw022024\/contact\/\" target=\"_blank\" rel=\"noopener\">contact us<\/a> and we will be glad to listen to you.<\/p>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":3550,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179],"tags":[2188,2193],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting the US Power Grid Against Foreign Threats<\/title>\n<meta name=\"description\" content=\"Cyber threat actors are targeting the capacity of the US energy grid to maintain consistent supply at an affordable cost.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting the US Power Grid Against Foreign Threats\" \/>\n<meta property=\"og:description\" content=\"Cyber threat actors are targeting the capacity of the US energy grid to maintain consistent supply at an affordable cost.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-06T14:49:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-12T13:17:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/Protecting-the-US-Power-Grid-Against-Foreign-Threats-800-\u00d7-450-px-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Protecting the US Power Grid Against Foreign Threats\",\"datePublished\":\"2022-09-06T14:49:08+00:00\",\"dateModified\":\"2022-09-12T13:17:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/\"},\"wordCount\":1904,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/Protecting-the-US-Power-Grid-Against-Foreign-Threats-800-\u00d7-450-px-1.png\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\"],\"articleSection\":[\"Compliance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/\",\"name\":\"Protecting the US Power Grid Against Foreign Threats\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/Protecting-the-US-Power-Grid-Against-Foreign-Threats-800-\u00d7-450-px-1.png\",\"datePublished\":\"2022-09-06T14:49:08+00:00\",\"dateModified\":\"2022-09-12T13:17:38+00:00\",\"description\":\"Cyber threat actors are targeting the capacity of the US energy grid to maintain consistent supply at an affordable cost.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/Protecting-the-US-Power-Grid-Against-Foreign-Threats-800-\u00d7-450-px-1.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/Protecting-the-US-Power-Grid-Against-Foreign-Threats-800-\u00d7-450-px-1.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting the US Power Grid Against Foreign Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting the US Power Grid Against Foreign Threats","description":"Cyber threat actors are targeting the capacity of the US energy grid to maintain consistent supply at an affordable cost.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/","og_locale":"en_US","og_type":"article","og_title":"Protecting the US Power Grid Against Foreign Threats","og_description":"Cyber threat actors are targeting the capacity of the US energy grid to maintain consistent supply at an affordable cost.","og_url":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2022-09-06T14:49:08+00:00","article_modified_time":"2022-09-12T13:17:38+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/Protecting-the-US-Power-Grid-Against-Foreign-Threats-800-\u00d7-450-px-1.png","type":"image\/png"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Protecting the US Power Grid Against Foreign Threats","datePublished":"2022-09-06T14:49:08+00:00","dateModified":"2022-09-12T13:17:38+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/"},"wordCount":1904,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/Protecting-the-US-Power-Grid-Against-Foreign-Threats-800-\u00d7-450-px-1.png","keywords":["Cybersecurity","Energy Sector"],"articleSection":["Compliance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/","url":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/","name":"Protecting the US Power Grid Against Foreign Threats","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/Protecting-the-US-Power-Grid-Against-Foreign-Threats-800-\u00d7-450-px-1.png","datePublished":"2022-09-06T14:49:08+00:00","dateModified":"2022-09-12T13:17:38+00:00","description":"Cyber threat actors are targeting the capacity of the US energy grid to maintain consistent supply at an affordable cost.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/Protecting-the-US-Power-Grid-Against-Foreign-Threats-800-\u00d7-450-px-1.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/09\/Protecting-the-US-Power-Grid-Against-Foreign-Threats-800-\u00d7-450-px-1.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2022\/compliance\/protecting-the-us-power-grid-against-foreign-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Protecting the US Power Grid Against Foreign Threats"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3524"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3524"}],"version-history":[{"count":15,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3524\/revisions"}],"predecessor-version":[{"id":3571,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3524\/revisions\/3571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3550"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}