Hitachi ABB Power Grids is joining with Fortress Information Security (Fortress) as a participant in its Asset to Vendor Network (A2V), which will enable the company to quickly and seamlessly share information about its cybersecurity preparedness with United States and Canada-based power utilities. Companies such as American Electric Power (AEP) and Southern Company (Southern) are already participants in the A2V network.
Hitachi ABB Power Grids is leveraging its power systems capabilities together with advanced digital technologies from Hitachi and its proven track record of innovation to build on its position as the partner of choice for enabling a stronger, smarter and greener grid. The company plays a critical role as a supplier of grid infrastructure, operations and control systems for power utilities throughout the U.S., helping to ensure the delivery of reliable energy to millions of consumers. Power grid operators in the U.S. and Canada rely on Hitachi ABB Power Grids to deliver solutions capable of withstanding cyber threats from multiple threat actors.
Through its collaboration with Fortress, Hitachi ABB Power Grids will share responses to cybersecurity assessment requests from the company with members of the A2V Network, such as AEP and Southern. This will help to simplify the process of information gathering and confirmation of compliance with key cybersecurity standards and protocols.
“Utilities are required to conduct cybersecurity assessments of many of their vendors to remain in compliance with regulatory requirements. By sharing information through the Asset to Vendor Network, Hitachi ABB Power Grids is simplifying the process for utilities and reducing the amount of effort and cost involved in completing multiple, similar assessments,” said David Goddard, head of digital at Hitachi ABB Power Grids. “This in turn frees up resources for all concerned, enabling them to focus on their core businesses, maintaining strong, reliable and resilient grids.”
“Hitachi ABB Power Grids is making a huge statement that transparency and trust is core to their business,” said Alex Santos, CEO and co-founder of Fortress. “This action will make the grid safer. Because of Hitachi ABB Power Grids’ participation, utility companies will be better positioned to take fast action to protect their customers and physical assets from cyber threats.”
“We are delighted to be among the first companies to participate in this industry-wide effort to provide utilities with a simpler way to access the information they need to meet their security and compliance obligations. We look forward to working with Fortress and its utility partners to make A2V a success,” said David Goddard.
With information from multiple vendors in a single location, A2V member utilities can access standardized assessments that will lower their risk and expedite their compliance with Critical Infrastructure Protection (CIP) standards from the North American Electric Reliability Corporation (NERC). A2V is also helping utilities comply with The White House’s new Executive Order 13920 on the acquisition and installation of bulk power system (BPS) equipment sourced from foreign adversaries.
News item from Hitachi ABB Power Grids Ltd.
Solarman says
“Power grid operators in the U.S. and Canada rely on Hitachi ABB Power Grids to deliver solutions capable of withstanding cyber threats from multiple threat actors.”
Here’s the deal, there will always be a “weak link” in the system. The “push” to put one’s SCADA system on the “cloud” can be hacked by other member subscribers of this same cloud. The threat of harm to a family member, (If) a high level pass word is not made available or just plain disgruntled employees or ex- employees and an IT group that is slow to purge the system of “lose ends” on a regular basis.
The bottom line is (always), the more connectivity, the more risk and the more security will be needed to keep the system up and running. You get all of this salesman software advice of “layering” communications protocols, then adding security like firewalls and malware programs, encryption. The hacker community seems to have plenty of ‘tools’ available to “peel the onion” until the system operator cries. It will come to the point of review, defend and attack software involved in a “honey pot” off of the main system to catch, identify and send destructive software to hackers to stop them cold or write GPS gathering information on their computers to make it easy for law enforcement to find and arrest them in the act.