CYBER RISKS FOR ENERGY PROVIDERS | by RHEBO
Industrial threat detection from the control room to the substations
Although energy infrastructure disruptions have been rare, the increasing frequency of targeted attacks on industrial companies, as well as lessons learned from larger-scale attacks, indicate that the willingness and means to cause disruption on a large scale exist.
✳️ Original data from audits and monitoring projects showing where gaps exist and what risks (i.e., vulnerabilities, cybersecurity threats, and technical error states) are common and previously unnoticed in both central (control room) and peripheral (substation) networks of energy providers and multi-utility companies.
✳️ Critical Infrastructures need to be able to detect professional, long-term actors (Advanced Persistent Threats) that may spend months spying on networks and moving laterally across authorized connections before launching the final attack.
✳️ The need for a clear defense-in-depth strategy that provides early intrusion and threat detection and a 360-degree view of automated industrial networks in critical infrastructures.
✳️ Case History Thüringer Energie Netze
TEN is the largest distribution network operator in the German federal state of Thuringia. Its networks reliably supply more than 1.1 million people. Project: risk analysis, correction of vulnerabilities and weaknesses and simultaneous increase in network quality.
✳️ Case History BayWa r.e.
BayWa r.e. designs, builds and operates wind farms and photovoltaic parks worldwide. 99 % of technical operations management, servicing and maintenance are carried out via remote access. Project: protection of wind farms and remotely controlled photovoltaic systems with software monitoring system.
At the meeting this brand-new project will be launched: community, news portal, video-newsletter and meetings on Cybersecurity for Energy Providers and Multi-Utilities
Who you will meet:
Attend this confidential meeting to engage with other selected professionals in an informal and interactive setting.
In the open discussion you will be able to compare experiences, ask questions and expose your doubts to the Rhebo experts, who will answer by drawing on examples of real projects from the field.
REGISTER NOW with the green button below.
The meeting is reserved for a limited number of selected professionals, in order to enhance the interaction and discussion between those present at the discussion table, in particular Chief Information Officer, Chief Technology Officer, Chief Information Security Officer, Head of Operations Technology , Head of Telecontrol from large companies in the UTILITIES / ENERGY field.
The organizing secretariat reserves the right to validate the registration received.