Network Segmentation


Network segmentation divides network architecture into logical, homogeneous networks with protection between them. This slows an attack from spreading at a minimum.

Read More

Penetration Testing


The process of probing a utility's cyber-defenses for weaknesses. The only way to for a utility to be confident it is well-protected is testing, but most energy companies resist full-scale penetration testing for fear of causing outages.

Read More

Phishing


Most attacks start with an unaware individual who is problematically, albeit innocently, drawn into a situation and inappropriately provides confidential information. This Topic – Phishing – addresses the need for companies to educate employees and take other preventative measures designed to minimize inappropriate links from being accessed.

Read More

Remote Access


Remote access allows individuals computer access into a company from outside the company, or from a lower security network to a higher security network within a company.

Read More

Risk Assessment, Quantification, and Management


This Topic focuses on the broad subject of risk. Risk areas must be assessed, quantified, and managed. The focus of this project is risk that utilities face related to managing their own assets.

Read More

Social Engineering


Social Engineering in the security world differs from social engineering within the social sciences, which does not concern the divulging of confidential information.

Read More