Monday, September 30, 2019

The Most Critical Sector With Cyber Risk


When it comes to cyber risk, electricity is without a doubt the most critical of critical sectors. Imagine if all of a sudden there was no electricity for several days.  What if it was for several weeks or longer. It would be catastrophic. Just about everything, everywhere would come to a halt.

It would cause severe economic, health and environmental damage. In the U.S., just in the east coast, Lloyd’s of London estimates $243 billion in insurance costs and loss of life and damage from a cyberattack disrupting the electricity distribution network.

Bad actors such as organized crime groups and rogue nation-states know this and are going after the electricity sector with more cyberattacks than ever before.

They are also targeting the supply chain first, to infiltrate and use as the “backdoor” into the electricity sector. So not only are the 3,300 electricity utilities in the U.S. prime targets, so are its suppliers.

In my book, Next LevelCybersecurity: Detect The Signals, Stop The Hack, in one of the cases, I show how a rogue nation-state broke into several “staging targets” first. These were suppliers. They used the suppliers as the “back door” to break into the electricity utilities to steal detailed information about the Crown Jewels (i.e. mission-critical cyber assets and systems) to plan the eventual attack on the utilities.

The book shows what a cyberattack chain is and reveals the common signals to look for to detect the attacker timely, regardless of whether you are an electricity utility or other type of entity.

The North American Electric Reliability Corporation (NERC) in January 2019 also sent a warning to the electricity sector and raised the bar for cyber risk management by assessing a $10 million penalty for 127 violations of cyber security standards by a electricity utility.

NERC determined that the violations in aggregate created serious and substantial risk, and mandated cybersecurity enhancements.

The Federal Energy Regulatory Commission (FERC) also approved new cybersecurity standards on security management controls and supply chain risk management that utilities must comply by January 1, 2020 and July 1, 2020, respectively.

Electricity utilities must be proactive and not get caught by surprise by either a cyberattack or a regulatory audit. The stakes are too high.

A regulatory audit discovering non-compliance can be costly, but a cyberattack will be even more costly. Just one successful cyberattack on one utility or a supplier can cause a domino effect and lead to a systemic catastrophe.

So what can electricity utilities do now?  Here are three steps to remain proactive:

1.     Perform a “reverse stress test” where you assume the worst case (a successful cyberattack that shuts the power supply off for several days), then trace back all of the high probability steps the attacker would have taken, all the way back to the “intrusion” source. This will help identify gaps and blind spots, for risk mitigation.

2.     Performing ongoing Crown Jewels Risk Assessment, to make sure you not only correctly categorize low, medium and high impact cyber assets and systems per NERC cybersecurity regulations, but also map to threats, vulnerabilities and risk mitigation, including monitoring for signals of cyber attackers trying to get to the Crown Jewels, and report results to the board for ongoing oversight.

3.     Train your entire organization using three tiers (oversight, awareness and performance) and on the NERC cybersecurity standards, beyond basic security awareness, to prevent non-compliance as happened in the recent $10 million penalty case, to transform your people, to be the strongest link in the chain, not the weakest and the most vulnerable.

To learn more on risk mitigation, please visit www.saihuda.com.