Paper 3- featured image

Network Perimeter Defense: Analyzing the Data

Our new white paper, “Network Perimeter Defense: Analyzing the Data,” has now been released. Read the paper for tips on how to improve your data collection and analysis capabilities. Abstract: An ...

Paper 2- featured image

Network Perimeter Defense: What Information to Collect

The new EnergySec white paper, “What Information to Collect at the Network Perimeter,” is the second in our series on Network Perimeter Defense. This paper provides guidance on what information to ...

summit banner

EnergySec 10th Anniversary Security Summit Presentation Archive

This year’s Annual Security Summit held in Austin, Texas from August 18-22 has concluded. Thank you to all who participated and helped make this a huge success! Be sure to mark your ...

Upcoming Events

raleigh-skyline-joye-ardyn-durham

NERC CIP Version 5 Bootcamp – Raleigh, NC – October 7-9, 2014

 EnergySec/NESCO Members receive a 30% discount. Click here to obtain your discount code(s) for ...
liido-isle-newport-beach_720

NERC CIP Version 5 Bootcamp – Newport Beach, CA – November 4-6, 2014

EnergySec/NESCO Members receive a 30% discount. Click here to obtain your discount code(s) for ...
Phoenix_AZ_Downtown_from_airplane

NERC CIP Version 5 Bootcamp – Phoenix, AZ – January 13-15, 2015

EnergySec Members receive a 30% discount. Send an email to info@energysec.org for ...

Latest News

Castle

“The Perimeter is Dead” Should be Laid to Rest

The new EnergySec white paper, “Network Perimeter Defense: ‘The Perimeter is Dead’ Should be Laid to Rest,” is the beginning of a series of white papers, technical documents, and how-to articles. This paper introduces the series, and examines how perimeter defense applies to various cybersecurity frameworks and regulations such as NIST standards, the NERC CIP […]

Continue Reading
6718260_l

OpenICS ICS Protocol Decoder Builds Data Dictionaries | Threatpost

“Operators and engineers are generally tasked with one thing: uptime. Service availability is king and that often comes at the expense of patching systems, for example, that might require a service to be temporarily taken down. The processes for monitoring and analyzing incidents are even less refined, experts say. That’s the gap Scott Weston sought […]

Continue Reading
Computer Web Signin User Security

Webinar: NERC CIP Version 5 – Compliance Support with Microsoft

Partnered with: Abstract Listen to Oxford Computer Group (OCG), Microsoft, EnergySec and other utility security experts in this panel discussion exploring how Microsoft can strengthen your internal compliance and identity systems. Access control and data protection in relation to identities using Bulk Electric System (BES) cyber systems that must be protected represent a major component of NERC CIP V5 requirements. […]

Continue Reading
photodune-6669940-businessmen-collaborating--s

Incident Response For Small & Medium Sized Utilities Working Group

EnergySec launches a collaborative working group focused on incident response for small and medium sized utilities.  There is no shortage of topics that need to be addressed but EnergySec felt this is particular issue is near the top and it is an issue with potentially significant opportunity to make a positive difference. The working group […]

Continue Reading
filename-knoxville-jpg

Distributed Network Protocol (DNP3) Secure Authentication Workshop | April 29-30, 2014

EnergySec/NESCO Members receive a 30% discount. Click here to obtain your discount code(s) for 2014 events. EnerNex and EnergySec have teamed to bring you this workshop delivered in a hands-on environment at EnerNex’s Smart Grid Labs with a focused and in-depth look at the secure authentication v5 (SAv5) functionality of the IEEE Std 1815-2012 (DNP3) standards, along […]

Continue Reading
Page 1 of 2112345...1020...Last »