Click here to close now.




















Welcome!

News Feed Item

Keeping the Lights On: Electric Grid Safety Hinges on Partnership and Information Sharing

Public Power CEO Sue Kelly Testifies at Senate Hearing

WASHINGTON, April 10, 2014 /PRNewswire-USNewswire/ -- Electric utilities have been focused on improving the safety and reliability of the complex and dynamic electric grid for years, testified Sue Kelly, president and CEO of the American Public Power Association (Public Power) at a Senate Energy and Natural Resources Committee hearing today. Kelly testified on behalf of investor-owned, cooperatively owned, and publicly owned utilities, as well as independent generators and Canadian utilities.  The industry's top priority is to protect critical power infrastructure from cyber and physical threats by partnering with all levels of government and sharing critical information, she said.

"Keeping the lights on for customers is of paramount importance to electric utilities. Because electricity is produced and consumed instantaneously and follows the path of least resistance, ensuring reliability and grid security is a collective affair," said Kelly.

The hearing, "Keeping the Lights On — Are We Doing Enough to Ensure the Reliability and Security of the U.S. Electric Grid?" was convened by the Senate Energy and Natural Resources Committee headed by Sen. Mary Landrieu (D–La.), with ranking member Sen. Lisa Murkowski (R-Ala.).

Kelly explained the robust measures electric utilities already have in place to address physical and cybersecurity and outlined how these measures have remained responsive to evolving threats over the years.

Recent media reports profiled attacks on physical infrastructure including the incident at Pacific Gas and Electric's Metcalf substation in California. While electric utilities take this incident seriously, the notion that media stories have spurred action on grid security is inaccurate, Kelly noted. Well before the media reports, government and industry initiated a series of briefings across the country to help utilities and local law enforcement learn more about the Metcalf attack and its potential implications.

On March 7, 2014, the Federal Energy Regulatory Commission (FERC) directed the North American Electric Reliability Corporation (NERC) under Section 215 of the Federal Power Act (FPA) to submit proposed reliability standards on physical security of critical assets within 90 days.  Investor-owned, cooperatively owned, publicly owned utilities, and other industry stakeholders are participating in the NERC process to develop this important standard.

The key to electric utility physical security is a "defense-in-depth" approach, which relies on resiliency, redundancy and the ability to recover, should an extraordinary event occur, Kelly said. The industry applies a similar "defense-in-depth" approach to cyber-security to ensure a quick response if an attack occurs. As there are more than 45,000 substations in the United States, prioritizing the most critical assets and focusing security planning on them is very important, explained Kelly. She noted that cybersecurity must be an iterative process, as the nature of threats constantly evolves.

Cybersecurity of the electric grid can be enhanced by improving information sharing between the federal government and industry, emphasized Kelly. The Electricity Sub-sector Coordinating Council (ESCC), a public/private partnership between the utility sector and the federal government, plays an essential role in coordination and information sharing. The ESCC has representatives from electricity trade associations, utilities and regional transmission organizations.

"The only way industry participants on the ground can truly protect against an event is to be aware of a specific threat or concern. They know which of their assets are critical. They know what they need to do to protect against the majority of physical and cyber threats," explained Gerry Cauley, CEO of the North American Electric Reliability Corporation who also testified at the hearing. "However, if the government is aware of a specific threat, communicating that information to those individuals on the front lines is important. This communication differs from providing public access to sensitive information, but is an essential component of security protection," he added.

Others who testified were Cheryl LaFleur, FERC acting chair; Colette Honorable, National Association of Regulatory Utility Commissioners president; and Phil Moeller, FERC commissioner.

The American Public Power Association (Public Power) represents more than 2,000 not-for-profit, community-owned electric utilities providing reliable electric service to over 47 million Americans. More at www.PublicPower.org.

Kelly's full testimony is available at http://www.publicpower.org/files/PDFs/Kelly,%20Sue;%20testimony,%2004.10.14.pdf

SOURCE American Public Power Association

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
SYS-CON Events announced today that IceWarp will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IceWarp, the leader of cloud and on-premise messaging, delivers secured email, chat, documents, conferencing and collaboration to today's mobile workforce, all in one unified interface
In 2014, the market witnessed a massive migration to the cloud as enterprises finally overcame their fears of the cloud’s viability, security, etc. Over the past 18 months, AWS, Google and Microsoft have waged an ongoing battle through a wave of price cuts and new features. For IT executives, sorting through all the noise to make the best cloud investment decisions has become daunting. Enterprises can and are moving away from a "one size fits all" cloud approach. The new competitive field has ...
In his session at @ThingsExpo, Lee Williams, a producer of the first smartphones and tablets, will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ETwater. He will explain how M2M controllers work through wirelessly connected remote controls; and specifically delve into a retrofit option that reverse-engineers control codes of existing conventional controller systems so the...
Everyone talks about continuous integration and continuous delivery but those are just two ends of the pipeline. In the middle of DevOps is continuous testing (CT), and many organizations are struggling to implement continuous testing effectively. After all, without continuous testing there is no delivery. And Lab-As-A-Service (LaaS) enhances the CT with dynamic on-demand self-serve test topologies. CT together with LAAS make a powerful combination that perfectly serves complex software developm...
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
This Enterprise Strategy Group lab validation report of the NEC Express5800/R320 server with Intel® Xeon® processor presents the benefits of 99.999% uptime NEC fault-tolerant servers that lower overall virtualized server total cost of ownership. This report also includes survey data on the significant costs associated with system outages impacting enterprise and web applications. Click Here to Download Report Now!
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a disciplined and multi-layered approach that spans all of your processes, staff, vendors and technologies is required. This may sound expensive and time consuming to achieve as you plan how to move selected applicati...
Consumer IoT applications provide data about the user that just doesn’t exist in traditional PC or mobile web applications. This rich data, or “context,” enables the highly personalized consumer experiences that characterize many consumer IoT apps. This same data is also providing brands with unprecedented insight into how their connected products are being used, while, at the same time, powering highly targeted engagement and marketing opportunities. In his session at @ThingsExpo, Nathan Trel...
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, will discuss how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a prac...
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies leverage disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advance...
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...