Welcome!

News Feed Item

Keeping the Lights On: Electric Grid Safety Hinges on Partnership and Information Sharing

Public Power CEO Sue Kelly Testifies at Senate Hearing

WASHINGTON, April 10, 2014 /PRNewswire-USNewswire/ -- Electric utilities have been focused on improving the safety and reliability of the complex and dynamic electric grid for years, testified Sue Kelly, president and CEO of the American Public Power Association (Public Power) at a Senate Energy and Natural Resources Committee hearing today. Kelly testified on behalf of investor-owned, cooperatively owned, and publicly owned utilities, as well as independent generators and Canadian utilities.  The industry's top priority is to protect critical power infrastructure from cyber and physical threats by partnering with all levels of government and sharing critical information, she said.

"Keeping the lights on for customers is of paramount importance to electric utilities. Because electricity is produced and consumed instantaneously and follows the path of least resistance, ensuring reliability and grid security is a collective affair," said Kelly.

The hearing, "Keeping the Lights On — Are We Doing Enough to Ensure the Reliability and Security of the U.S. Electric Grid?" was convened by the Senate Energy and Natural Resources Committee headed by Sen. Mary Landrieu (D–La.), with ranking member Sen. Lisa Murkowski (R-Ala.).

Kelly explained the robust measures electric utilities already have in place to address physical and cybersecurity and outlined how these measures have remained responsive to evolving threats over the years.

Recent media reports profiled attacks on physical infrastructure including the incident at Pacific Gas and Electric's Metcalf substation in California. While electric utilities take this incident seriously, the notion that media stories have spurred action on grid security is inaccurate, Kelly noted. Well before the media reports, government and industry initiated a series of briefings across the country to help utilities and local law enforcement learn more about the Metcalf attack and its potential implications.

On March 7, 2014, the Federal Energy Regulatory Commission (FERC) directed the North American Electric Reliability Corporation (NERC) under Section 215 of the Federal Power Act (FPA) to submit proposed reliability standards on physical security of critical assets within 90 days.  Investor-owned, cooperatively owned, publicly owned utilities, and other industry stakeholders are participating in the NERC process to develop this important standard.

The key to electric utility physical security is a "defense-in-depth" approach, which relies on resiliency, redundancy and the ability to recover, should an extraordinary event occur, Kelly said. The industry applies a similar "defense-in-depth" approach to cyber-security to ensure a quick response if an attack occurs. As there are more than 45,000 substations in the United States, prioritizing the most critical assets and focusing security planning on them is very important, explained Kelly. She noted that cybersecurity must be an iterative process, as the nature of threats constantly evolves.

Cybersecurity of the electric grid can be enhanced by improving information sharing between the federal government and industry, emphasized Kelly. The Electricity Sub-sector Coordinating Council (ESCC), a public/private partnership between the utility sector and the federal government, plays an essential role in coordination and information sharing. The ESCC has representatives from electricity trade associations, utilities and regional transmission organizations.

"The only way industry participants on the ground can truly protect against an event is to be aware of a specific threat or concern. They know which of their assets are critical. They know what they need to do to protect against the majority of physical and cyber threats," explained Gerry Cauley, CEO of the North American Electric Reliability Corporation who also testified at the hearing. "However, if the government is aware of a specific threat, communicating that information to those individuals on the front lines is important. This communication differs from providing public access to sensitive information, but is an essential component of security protection," he added.

Others who testified were Cheryl LaFleur, FERC acting chair; Colette Honorable, National Association of Regulatory Utility Commissioners president; and Phil Moeller, FERC commissioner.

The American Public Power Association (Public Power) represents more than 2,000 not-for-profit, community-owned electric utilities providing reliable electric service to over 47 million Americans. More at www.PublicPower.org.

Kelly's full testimony is available at http://www.publicpower.org/files/PDFs/Kelly,%20Sue;%20testimony,%2004.10.14.pdf

SOURCE American Public Power Association

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of D...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal ...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
DevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on software to run more traditional business, such as financial firms or high-end manufacturers. Microservices and DevOps have created software development and therefore business speed and agility benefits, but they have also created problems; specifically, they have created software securi...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
"There is a huge interest in Kubernetes. People are now starting to use Kubernetes and implement it," stated Sebastian Scheele, co-founder of Loodse, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walked through how Octob...