CIOApplications
  • Home
  • Applications
      • 3D Scanning
      • Bioinformatics
      • Blockchain
      • BPM
      • Business Continuity
      • Business Intelligence
      • Collaboration
      • Configuration Management
      • CPQ
      • Container Management
      • CEM
      • Data Platform
      • Data Preparation
      • DMS
      • e-Discovery
      • Employee Engagement
      • EAM
      • Enterprise Communications
      • Enterprise Mobility
      • ERP
      • GIS
      • GRC
      • Human Resource
      • Innovation Management
      • Inventory Management
      • IT Infrastructure
      • IT Service Management
      • IT Services
      • Low Code
      • Managed IT Services
      • Marketing
      • Master Data Management
      • Mobile Application
      • Portal Software
      • Procurement
      • Project Management
      • Remote Monitoring
      • Remote Support
      • Sales
      • Software Asset Management
      • Software Testing
      • Supply Chain
      • Task Management
      • Unified Communications
      • Voice Recognition
      • Workflow
  • Verticals
      • Aerospace & Defense
      • Automotive
      • Banking
      • BioTechnology
      • Casino
      • Construction
      • Contact Center
      • E-commerce
      • Education
      • Field Service
      • Fintech
      • Food and Beverages
      • Government
      • Healthcare
      • Insurance
      • Legal
      • Life Sciences
      • Logistics
      • Manufacturing
      • Media and Entertainment
      • Oil & Gas
      • Retail
      • Space Tech
      • Telecom
      • Travel and Hospitality
      • Utilities
  • Technologies
      • API
      • Artificial Intelligence
      • Augmented Reality
      • Big Data
      • Chatbot
      • Cloud
      • Content Delivery Network
      • Cyber Security
      • Data Center
      • DevOps
      • Distributed Technology
      • Drone
      • Enterprise Architecture
      • Enterprise Search
      • Enterprise Startups
      • Graphics
      • HPC
      • IoT
      • Java
      • Load Balancing
      • Machine Learning
      • Machine to Machine
      • Machine Vision and Imaging
      • Nano Tech
      • Predictive Analytics
      • Robotic Process Automation
      • Robotics
      • Security
      • Telematics
      • Testing
      • Video Surveillance
      • Virtual Assistant
      • Wireless
  • Partner Network
      • Adobe
      • Amazon
      • Avaya
      • ESRI Partner
      • IBM
      • Infor Solutions
      • Microsoft
      • Mitel Partners
      • National Instruments
      • NetSuite
      • Nintex
      • Oracle
      • Progress
      • Riverbed
      • Salesforce
      • SAP
      • ServiceNow
      • SiteCore
  • News
  • conferences
  • Newsletter
  • About us
×
news

Subscribe to our Newsletter

Become a member of our mailing list for the latest articles, news, and exclusive insights.

news
news

Enter Your Email Address:

Thank you for subscribing with us. We sent you an email regarding this.

loading
SUBSCRIBE
  • Home
  • Utilities
Editor's Pick (1 - 4 of 8)
left
Reinventing Electric Power Value Chain

Reinventing Electric Power Value Chain
Joseph Santamaria, CIO, PSEG

Will the Smart Meter Deliver on its Promise?

Will the Smart Meter Deliver on its Promise?
John Burke, CIO, Ambit Energy

Water and Wastewater Utility Revolution: Operational and Information Technology Integration

Water and Wastewater Utility Revolution: Operational and...
Mark S Smith, VP & CIO, American Water

The Transforming Utility Industry

The Transforming Utility Industry
Ken Lee, SVP & CIO, New York Power Authority

Our Ultimate Goal is to Become a Real Time Smart Utility

Our Ultimate Goal is to Become a Real Time Smart Utility
Mujib Lodhi, CIO, Washington Suburban Sanitary Commission’s (WSSC)

The Role Of AI In A Smart Utility

The Role Of AI In A Smart Utility
Vennard Wright, CIO, Washington Suburban Sanitary Commission

Creating Value for Utilities in the Cloud

Creating Value for Utilities in the Cloud
Rodger Smith, SVP & GM, Oracle Utilities

Electric Utilities Start Joining the Club of Digital Businesses

Electric Utilities Start Joining the Club of Digital Businesses
Dr Dirk E Mahling, VP, Technology, Alliant Energy

right

A Cyber Security Metrics Tool for Utilities

By Mark McGranaghan, VP, Distribution & Utilization, EPRI

Tweet

Mark McGranaghan, VP, Distribution & Utilization, EPRI

As cyber threats grow and become more sophisticated, utilities must constantly evaluate and improve the effectiveness of security programs. Moreover, utilities must manage their security programs across both traditional information technology (IT) and operational technology (OT) systems.

Utilities must also be able to quantify the investments and technologies needed to satisfy rate case requirements. Determining a utility’s existing cyber security posture is a necessary first step. Lord Kelvin famously observed, “When you can measure what you are speaking about, and express it in numbers, you know something about it.”

As part of the Electric Power Research Institute’s (EPRI) research program in Cyber Security, we initiated a collaborative effort with the Edison Electric Institute, the American Public Power Association, the National Rural Electric Cooperative Association, the Utilities Telecom Council, and the SANS Institute to examine security metrics for the electric sector. In 2015 the collaboration created a security metrics methodology and a framework for creating security metrics. In 2016 the group revised the methodology and developed specific metrics for utilities to use as a starting point in evaluating their own posture and path forward.

A Practical Methodology for Cyber Security Metrics Development

EPRI’s research approach incorporated five common-sense rules to our metrics development:

• Utility cyber security metrics must be based on quantitative and repeatable data
• Metrics must be independent of compliance to mandatory standards
• Metrics must allow for tailoring across the utility’s business units, functions, and ownership structures
• Metrics must take into account difference between IT and OT architectures
• Metrics must be able to clearly communicate the utility’s state of cyber security to different stakeholders

EPRI’s approach, as shown in the metrics “pyramid” (Figure 1) organizes data points, then rolls them up and assigns a weight of importance to either an operational, tactical, or strategic metric. The resulting tiers of data will help a broad range of utility stakeholders gain improved knowledge about cyber security postures and thus inform decision-making about policies, investments, and action plans.

"Determining a utility’s existing cyber security posture is a necessary first step"

More than 100 data points provide the quantitative foundation for the metrics, consisting of various operational statistics collected from different points in utility operations. The availability and quality of these data are important factors in metrics calculations.

Operational metrics measure real-time, day-to-day operations such as logs, rule sets, and signatures. Tactical metrics address programmatic health and progress in the organization. Strategic metrics measure corporate risk and alignment of the metrics to the direction of the business.

A Cyber Security Scorecard for Utilities

Each succeeding layer of metrics is based on rolling up the lower level metrics to the higher level ones. As shown in the figure, the top-level, three strategic metrics are calculated from 11 tactical metrics; and each tactical metric is calculated by summarizing relevant operational metrics. As data points shift, the impacts are reflected in metrics calculations and scorecards.

A Path Forward

As a relatively new field, security metrics is not as mature or robust as metrics in finance, reliability operations, or safety. However, EPRI’s collaborative research and practical methodology offers an optimal, standardized and complementary approach utilities can use to evaluate their own postures and resulting action plans.

Read Also

Our Ultimate Goal is to Become a Real Time Smart Utility

Our Ultimate Goal is to Become a Real Time Smart Utility

Mujib Lodhi, CIO, Washington Suburban Sanitary Commission’s (WSSC)
The Role Of AI In A Smart Utility

The Role Of AI In A Smart Utility

Vennard Wright, CIO, Washington Suburban Sanitary Commission
Creating Value for Utilities in the Cloud

Creating Value for Utilities in the Cloud

Rodger Smith, SVP & GM, Oracle Utilities
Electric Utilities Start Joining the Club of Digital Businesses

Electric Utilities Start Joining the Club of Digital Businesses

Dr Dirk E Mahling, VP, Technology, Alliant Energy

Utilities Special

  •  QHi Group: Ending Downtime with Continuous Thermal Monitoring
  • Avertra: Spearheading the Utility Industry through its Evolution

Featured Vendors

  • Avertra: Spearheading the Utility Industry Through its Evolution
    Avertra: Spearheading the Utility Industry Through its Evolution
  • QHi Group: Ending Downtime with Continuous Thermal Monitoring
    QHi Group: Ending Downtime with Continuous Thermal Monitoring
  • MARS Company: Triggering Innovation in Water Utility Industry
    MARS Company: Triggering Innovation in Water Utility Industry
  • UtilityBilling.com: The Easy Way to move your Utility into the Cloud
    UtilityBilling.com: The Easy Way to move your Utility into the Cloud

Copyright © 2019 CIOApplications. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap  |  Subscribe

follow on linkedin follow on twitter follow on rss
This content is copyright protected close

However, if you would like to share the information in this article, you may use the link below:

https://utilities.cioapplications.com/cxoinsights/a-cyber-security-metrics-tool-for-utilities-nid-455.html