EconPapers    
Economics at your fingertips  
 

IT modernisation in the energy sector: Preventing cyberthreats to critical infrastructure

Pamela K. Isom
Additional contact information
Pamela K. Isom: Architecture Engineering Technology and Innovation, Office of the Chief Information Officer, US Department of Energy

Cyber Security: A Peer-Reviewed Journal, 2020, vol. 3, issue 3, 208-219

Abstract: IT modernisation is essential for safeguarding information and nations are investing in cyber security advancements that strengthen protection of critical infrastructure, including power grids. Renewable energies are incorporated and distribution channels are optimised to adequately supply buildings, homes, vehicles and customer demands, and advancement in energy storage is progressing to accommodate a variety of sources. The Internet, the varying Internet of Things (IoT) and operational technologies (OT) leveraged to meet supply and demand are compelling to customers, yet such capability broadens the risk of vulnerabilities affecting customer confidence. The energy sector is embracing modernisation as a vehicle for mitigating risks through grid modernisation.1 Energy is an enterprise strategic asset and there remain opportunities for smarter management and modelling so that the state of utilities is known at any given time and energy is continuously available. With analogies to random incidents, scenarios and data as a strategic asset, this paper shares IT modernisation considerations for cyber risk mitigation in the energy sector.

Keywords: cyber security; IT modernisation; energy; smarter data modelling; smarter data management; architecture; enterprise strategic asset; modern enterprise architecture (EA) (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2020
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/5402/download/ (application/pdf)
https://hstalks.com/article/5402/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2020:v:3:i:3:p:208-219

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2020:v:3:i:3:p:208-219