Cyber Threat Data Sharing Needs Refinement

Cyber Threat Data Sharing Needs Refinement

A report courtesy of the Lexington Institute gives an insight into the technologies that are being interconnected and integrated onto the nation’s electric grid to decrease weaknesses. However, these physical and computerized elements multiply the number of access points for cyber risks, making protection of the grid challenging. If done correctly, sharing cyber threat information eliminates the chances for one cyber threat or attack to affect multiple stakeholders. In theory, one entity identifies a cyber threat or attack and shares the collected information with public and private sector partners. The intelligence is then applied to protect these partners’ networks. The intent is for data and systems to become more secure and less prone to cyber attacks when intelligence and resources are shared among many stakeholders. Without data sharing, it is almost impossible to detect, defend and contain systemic attacks early. While sharing cyber threat data sounds easy, it is complicated by legal, operational and privacy issues. Download this report to learn the latest in power grid cyber threats.


Please note: That all fields marked with an asterisk (*) are required.



This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.