Information security in a digital world: Building resilience into a distributed data architecture
Security is a key focus for many grid operators and IT specialists. It has now become a priority for many utilities. There is a growing need to have access to more data across the enterprise, but this also means that more utility data is exposed to potential threats. Secure devices, secure communication links and secure systems are typical tools that utilities employ to thwart would-be attackers.
In the utilities sector, a data breach can be costly. Last May the Colonial Pipeline was hacked followed shortly by two successful breaches of a United States municipal water supply. This had a massive impact on the utilities and their clients. We discuss the topic with William White in today’s podcast episode. William White (Dub) has recently joined Greenbird as Chief Information Security Officer and has extensive experience in information and cybersecurity solutions for companies.
In this podcast you will learn:
- Types and examples of security breaches
- How organizations can protect against a breach
- The difference between information and cybersecurity
- The importance of focusing on resilience and recovery
- The cost of a security breach
- Useful steps to follow in information security management
Play Episode
Speaker
“In today’s digital and connected environment the chances are high that a breach will occur. As utilities consider information and cyber security it is important for them not to think about the cost but the loss of a data breach. For utilities, this means the loss of man-hours, the loss of information, intellectual property, and more. It is important for them not only to think about the cost of a data breach but also what is (forever?) lost because of that breach.” – William White, CISO, Greenbird Integration Technology.
For more information regarding information security and our ISO/IEC 27001:2017 certification for Information Security Management please visit our FAQs.