Tag Archives: Substation Security

A New Approach to Substation Security and NERC Compliance

This entry was posted by on .

Join us for our Webinar: Tuesday April 29, 2014
10:00 am – 11:00 am PT | 1:00 pm – 2:00 pm ET 

Lessons you will learn:
• Why integrating physical and cyber security is key
• How to overcome the challenges of extending security across organizational boundaries
• New techniques that cover upfront risk analysis and automated workflow to simplify onboarding offboarding, anomaly detection and threat correlation


High profile intrusions and physical attacks against substations have spurred a lot of discussion about physical security resulting in a FERC directive, for NERC to propose new physical security standards from NERC. A holistic approach to security has been proven to be more effective and addresses compliance requirements In the Utilities Industry at the same time. It is now essential to monitor and report roles-based physical access to various facilities, control rooms, substations and critical assets. Utilities of all size need to know who has access to specific facilities, critical assets and cyber critical assets and how much area access they should have within those facilities.
Additionally Version 5 of the NERC CIP compliance requirements adds more to physical security requirements in addition to complete background check and criminal history record checks for employees and un-escorted contractors. Additionally, highly critical assets must be housed in secured boundaries and any access to that area recorded and tracked.
Join the experts who are leading this session to discuss why this new approach is the only way to detect and identify complex threats that extend across the boundaries of cyber and physical security. read more

AlertEnterprise Announces 2014 User Group Meeting

This entry was posted by on .

IT-OT Security Convergence Gains Center Stage to Deliver Critical Infrastructure Protection: April 30 – May 2, 2014.

AlertEnterprise customers are arriving to the Bay Area to see why we all love living in the Bay Area. Silicon Valley based AlertEnterprise is hosting the 2014 AEUG – AlertEnterprise User Group Meeting April 30th – May 2nd..


Determined attackers have a more holistic view of security. They attack the enterprise. They understand that security silos represent vulnerability. Segregation means each silo is real-time blind to breaches in the others. Communications gaps between silos mean time delays. Time delays mean opportunities for attackers. The failure to integrate physical security with IT security and operational technology – regardless of budget – is the moral equivalent of aiding and abetting thieves and saboteurs. read more