WSi News2014-05-06 10:25:08

Advancing NERC-CIP Compliance for Utilities Through Best Practices

When the North American Electric Reliability Corporation (NERC) signed Order 791 in January 2014, more than 400 utilities suddenly faced a tight timetable to plan for and comply with version 5 of the Critical Infrastructure Protection (CIP) cybersecurity standards.

The reason for the change is clear and timely: A report from the Department of Homeland Security's Cyber Emergency Response Team disclosed that the energy industry faced more cyberattacks between October 2012 and May 2013 than any other sector.

Booz Allen understands that for utilities to achieve compliance, it takes a specialized strategy. Before utility organizations embark on addressing the new regulations, Booz Allen offers the following best practices for information security executives to consider on their journey to NERC-CIP version 5 compliance:

1. Conduct a cybersecurity strategic simulation that will enable a utility to identify security gaps, prioritize assets, and identify areas for improvement -- without the consequences of an actual cybersecurity incident or an audit. The controlled environment of a simulation allows participants to safely explore real-world situations, resulting in improved communication, coordination and
the identification of any gaps in existing response plans.

2. Develop a strategic plan that positions the utility to manage future threats as well as standards. Implementing best practices from the start can serve as a footprint for success, allowing utilities to leverage existing investments in people, processes and technology that ultimately prevent them from overspending.

3. Pursue a knowledge management system that will ensure business continuity for today and the future. The aging workforce presents a major industry challenge: an exodus of institutional and technological "know how" that could hamper a company's ability to continue its mission effectively. It is important to establish a team that understands the regulatory environment, threats, and overall enterprise.

4. Implement an internal program to address employee cyber "hygiene" and the potential for insider threats. Ultimately, all staff within an organization can pose as a cyber threat -- either accidental or intentional. These challenges can no longer be the sole responsibility of IT. Utilities should communicate to all employees the significance of being cyber risk aware, and knowing what to do when a concern arises.

5. Acknowledge and understand the difference between compliance and security. Keeping up with standards will help utilities avoid legal exposure, fines, and the like. But that does not necessarily make a utility company more secure -- there is no silver bullet formula for security. Rather, cybersecurity is intimately tied to a utility's business strategy and operations, and must be customized to the organization.

"Utilities will continue to face the challenge of balancing strong cyber risk management and constantly evolving regulation," said David Cronin, principal, Booz Allen Hamilton. "Going from NERC-CIP version 3 to the version 5 requires a partner that knows not only the rules, but just as an importantly, has deep industry experience to recognize the diverse needs of utility companies -- all while minimizing cost and leveraging existing investments, where possible," Cronin added.

For more information contact:






 

 


Email: info@worldsecurity-index.com By using worldsecurity-index.com you are agreeing to our Conditions of Use.
© KNM Media Kent Ltd 2024. All rights reserved.