https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/IoTWorldToday-mobile-logo.png
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • Roundups
  • Strategy
  • Special Reports
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Podcasts
    • Strategic Partners
    • Latest videos
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Editorial Submissions
  • Events
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Metaverse
  • Development
  • Security
ioti.com

Security


Thinkstock

Water treatment facility

Funding Available for Critical Infrastructure Security

There’s been so much sensational news recently, it’s very easy to overlook the dire need for improved critical infrastructure security.
  • Written by Mary Scott Nabers
  • 12th April 2018

Last month, the Trump administration released a report detailing a massive Russian hacking campaign. But rather than election hacking, the report focused on critical infrastructure security — including power plants, nuclear generators and water facilities. The joint report by the Federal Bureau of Investigation and Department of Homeland Security outlined how hackers gained access to computers. And while the report only pointed to surveillance, the possibility of future attacks is enormous. 

Our power plants, nuclear generators and water infrastructure are all outdated and vulnerable. It would not be that difficult for unsophisticated hackers to shut this infrastructure down. It’s even plausible to think that hackers could reroute our airline flights. 

The Department of Energy has begun the task of creating an office of cybersecurity and emergency response, which will take a federal approach to this problem. But, at the local levels of government, it will be up to officials to take whatever steps are needed to bolster the state of our critical infrastructure security.

[Internet of Things World addresses the security concerns for IoT implementation in every vertical, attracting senior security professionals from the world’s biggest organizations. Get your tickets and free expo passes now.]

Many network breaches occur through human error. It usually happens when an employee clicks on a suspicious email or an infected website. Then, any collaborating partners are immediately at risk as well. To gain access to something significant like a power plant, hackers usually first attack smaller, less secure networks — like the firms that make parts for generators or sell software to power plants. Malicious code usually enters a network via a third-party breach.

While we are investing already in safeguards, that will escalate significantly in the near future. Here are some statistics related to  critical infrastructure security that few citizens have time to ponder: 

  • U.S. utilities will spend an estimated $7 billion on grid cybersecurity by 2020.
  • Between 2010 and 2014, hackers infiltrated the U.S. Department of Energy’s networks 150 times.
  • Last week, several U.S. gas pipelines were hit by a cyberattack targeted at a third-party supplier.
  • 68 percent of oil and gas companies experienced at least one compromise over the past 12 months.
  • Policymakers are calling for the creation of a federal Department of Cyber.
  • Reps. Bob Latta of Ohio and Jerry McNerney of California introduced the Cyber Sense Act to create a program that will identify, test and report on cybersecurity product effectiveness for the bulk-power system. The bill is currently being considered by the House Committee on Energy and Commerce.
  • The House energy subcommittee is currently considering H.R. 5240, the Enhancing Grid Security through Public-Private Partnerships Act, which will encourage public-private partnerships and improve cybersecurity of electric utilities.

On May 11, 2017, President Trump issued an executive order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. In September 2017, the Department of Energy announced plans to pump $20 million into 20 energy cybersecurity projects. There has been little press about any of this. 

The Federal Emergency Management Agency has non-disaster grants focused now on preparedness and preventing a future cyberattack. The grants are available to local and state governments. In 2017, the program was allocated $288 million for six fiscal years. That funding was in addition to $350 million which had already been allocated to the Energy Management Performance Grant program to provide assistance to local governments in enhancing and sustaining emergency management capabilities.

Hopefully, local officials are taking advantage of this type of funding. FEMA offers an overview of preparedness grants on its website.

Another program, the Critical Infrastructure Cyber Community Voluntary Program (C?VP) focuses on providing assistance to organizations needing to improve cybersecurity risks. The program offers a cybersecurity self-assessment for utilities and local governments to calculate their risk of a cyberattack. US-CERT offers a summary of its Critical Infrastructure Cyber Community Voluntary Program.

Finally, the National Institute of Science and Technology developed a framework that covers everything necessary to organize and execute a successful cybersecurity framework. Updated in December 2017, this program provides recommendations for industries interested in protecting themselves from cyber threats. 

The federal government is large, complicated and bureaucratic. Occasionally, it is difficult for state and local officials to literally find the time to navigate the various funding sources efficiently. But, since the threats are significant and funding and assistance are available, it seems important for state and local officials to avail themselves of all the assistance possible. 

Tags: Article Metaverse Security Smart Environments Energy/Utilities Technologies Vertical Industries

Related Content


  • Caltech campus
    Robots Could Gain Sense of Touch, With New Artificial Skin
    New design can help businesses determine the presence of hazardous materials, offer greater safety for workers
  • Clearview AI Fined $9.4M Over Facial Data Scraping
    The company was ordered to delete any data it held on U.K. citizens.
  • Microsoft Ramping up Cybersecurity Service Offerings
    Three new managed services will boost the company’s presence in the security space
  • IoT Product Roundup
    IoT Product Roundup: PTC, Nokia, Arm and More
    All the latest Internet of Things products

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest News

  • Microsoft Extends Secured-Core Program to IoT Devices
  • Spot the Robot Dog Helps Police Ahead of Boston’s Fourth of July Celebration
  • Image shows a Vodafone storefront in Munich Germany
    Vodafone Hints at IoT Spinoff
  • Image shows Siemens headquarters in Munich
    Siemens Launches Digital Business Platform, Partners with Nvidia

Roundups

View all

IoT Product Roundup: Canonical, InfluxData, Wiliot and More

23rd June 2022

IoT Product Roundup: Cisco, Telit, Draganfly and More

9th June 2022

IoT Deals, Partnerships Roundup: Google, Arm, Senet and More

26th May 2022

White Papers

View all

The Role of Manufacturing Technology in Continuous Improvement Ebook

6th April 2022

IIoT Platform Trends for Manufacturing in 2022

6th April 2022

Latest Videos

View all
Image shows Unilever's Alberto Prado at AI Summit 2022 in London

AI Summit 2022: Unilever’s Alberto Prado

Prado talks about how Unilever is using AI to accelerate the speed of new discoveries and gives them access to more breakthrough innovation

Image Shows John Lewis' Barry Panai at AI Summit London 2022

AI Summit 2022: John Lewis’ Barry Panayi on AI in Retail

Panayi talks about data and AI in retail and how individuals and the technology can work together

E-books

View all

How Remote Access Helps Enterprises Improve IT Service and Employee Satisfaction

12th January 2022

An Integrated Approach to IoT Security

6th November 2020

Webinars

View all

Rethinking the Database in the IoT Era

18th May 2022

Jumpstarting Industrial IoT solutions with an edge data management platform

12th May 2022

AI led Digital Transformation of Manufacturing: Time is NOW

9th December 2021

Special Reports

View all

Omdia’s Smart Home Market Dynamics Report

7th January 2022

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

IoT Security Best Practices for Industry and Enterprise

20th October 2020

Twitter

IoTWorldToday, IoTWorldSeries

🤔 Looking for 3 Strategies to Avoid IoT Key Theft? We’ve got you covered! As tech companies continue to develop an… twitter.com/i/web/status/1…

5th July 2022
IoTWorldToday, IoTWorldSeries

AI Summit 2022: Unilever’s Alberto Prado dlvr.it/STMpRN https://t.co/1dyLREr8N6

5th July 2022
IoTWorldToday, IoTWorldSeries

Seoul Robotics Expands 3D Perception Platform across South America dlvr.it/STMhSV https://t.co/a10l3Eb2Kn

5th July 2022
IoTWorldToday, IoTWorldSeries

Microsoft Extends Secured-Core Program to IoT Devices dlvr.it/STMg4k https://t.co/laBPF5VjC4

5th July 2022
IoTWorldToday, IoTWorldSeries

Spot the Robot Dog Helps Police Ahead of Boston’s Fourth of July Celebration dlvr.it/STKWjb https://t.co/LdRg7a2xqU

4th July 2022
IoTWorldToday, IoTWorldSeries

Another 59,000 @Teslas being recalled over a software glitch affecting the vehicle’s Emergency Call safety system… twitter.com/i/web/status/1…

4th July 2022
IoTWorldToday, IoTWorldSeries

Join us in the premier #tech destination of #Austin this November 2-3 for our next #IoT event. Connect and collabo… twitter.com/i/web/status/1…

4th July 2022
IoTWorldToday, IoTWorldSeries

SoftBank, May Mobility Team on Autonomous Driving dlvr.it/STJrW0 https://t.co/mOYoBsgs14

4th July 2022

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X