Paper 4- featured image

Network Perimeter Defense: Common Mistakes

EnergySec’s new white paper, “Network Perimeter Defense: Common Mistakes,” has now been released. Read the paper for tips on how to some common mistakes that happen in designing a network perimeter. Abstract: ...

EnergySec Honorees

EnergySec Honors Executive and Professionals of the Year

EnergySec is excited to announce Lena Smart as the recipient of the Energy Sector Security Executive of the Year, and Adam Crain and Chris Sistrunk as the Energy Sector Security ...

summit banner

EnergySec 10th Anniversary Security Summit Presentation Archive

This year’s Annual Security Summit held in Austin, Texas from August 18-22 has concluded. Thank you to all who participated and helped make this a huge success! Be sure to mark your ...

Upcoming Events

raleigh-skyline-joye-ardyn-durham

NERC CIP Version 5 Bootcamp – Raleigh, NC – October 7-9, 2014

 EnergySec/NESCO Members receive a 30% discount. Click here to obtain your discount code(s) for ...
liido-isle-newport-beach_720

NERC CIP Version 5 Bootcamp – Newport Beach, CA – November 4-6, 2014

EnergySec Members receive a 30% discount. Click here to obtain your discount code(s) for ...
Phoenix_AZ_Downtown_from_airplane

NERC CIP Version 5 Bootcamp – Phoenix, AZ – January 13-15, 2015

EnergySec Members receive a 30% discount. Send an email to info@energysec.org for ...

Latest News

Paper 3- featured image

Network Perimeter Defense: Analyzing the Data

Our new white paper, “Network Perimeter Defense: Analyzing the Data,” has now been released. Read the paper for tips on how to improve your data collection and analysis capabilities. Abstract: An organization or security analyst can quickly become overwhelmed with monitoring logs and responding to security alerts. One problem is that, in order to be thorough, […]

Continue Reading
Paper 2- featured image

Network Perimeter Defense: What Information to Collect

The new EnergySec white paper, “What Information to Collect at the Network Perimeter,” is the second in our series on Network Perimeter Defense. This paper provides guidance on what information to collect in order to make your monitoring and logging program more beneficial. Executive Summary: There is an almost never-ending supply of information that can be collected […]

Continue Reading
Castle

“The Perimeter is Dead” Should be Laid to Rest

The new EnergySec white paper, “Network Perimeter Defense: ‘The Perimeter is Dead’ Should be Laid to Rest,” is the beginning of a series of white papers, technical documents, and how-to articles. This paper introduces the series, and examines how perimeter defense applies to various cybersecurity frameworks and regulations such as NIST standards, the NERC CIP […]

Continue Reading
6718260_l

OpenICS ICS Protocol Decoder Builds Data Dictionaries | Threatpost

“Operators and engineers are generally tasked with one thing: uptime. Service availability is king and that often comes at the expense of patching systems, for example, that might require a service to be temporarily taken down. The processes for monitoring and analyzing incidents are even less refined, experts say. That’s the gap Scott Weston sought […]

Continue Reading
Computer Web Signin User Security

Webinar: NERC CIP Version 5 – Compliance Support with Microsoft

Partnered with: Abstract Listen to Oxford Computer Group (OCG), Microsoft, EnergySec and other utility security experts in this panel discussion exploring how Microsoft can strengthen your internal compliance and identity systems. Access control and data protection in relation to identities using Bulk Electric System (BES) cyber systems that must be protected represent a major component of NERC CIP V5 requirements. […]

Continue Reading
Page 1 of 2112345...1020...Last »