Cybersecurity

Report: Government should backstop efforts to protect grid

Placeholder Image for Article Template

A successful cyberattack on the nation's power grid could bring unimaginable chaos. Incident reporting from the U.S. Computer Emergency Readiness Team indicates that the grid is a popular target among adversaries, with 59 percent of the 256 critical infrastructure attacks in 2013 involving the energy sector, particularly electrical systems.

The proliferation of network-based industrial control systems for critical infrastructure is multiplying the number of entry points and potentially creating attack opportunities for determined adversaries. Last October, for example, two engineers discovered a vulnerability in software code widely used in electricity distribution that could be used to facilitate a cyberattack.

A new report from the Bipartisan Policy Center recommending that the electric industry create a new organization to set cybersecurity requirements and that government at all levels collaborate on streamlining the process for responding to attacks. The report's authors include former National Security Agency and CIA Director Gen. Michael Hayden.

The bulk power generation systems at the heart of the grid and nuclear generators in particular are subject to mandatory cybersecurity standards developed by the industry and backed by the Federal Energy Regulatory Commission. But the standards do not cover the local distribution facilities that move power to users.

The report advocates creating a new industry organization called the Institute for Electric Grid Cybersecurity. It would be modeled on the Institute of Nuclear Power Operations, which was established in the aftermath of the 1979 accident at the Three Mile Island nuclear power plant. The organization accredits and evaluates nuclear plants on safety and performance, and those ratings factor into insurance costs.

Although participation in the proposed new group would be voluntary, the federal government could offer incentives to companies that comply with industry standards -- backstopping insurance policies for liabilities incurred during cybersecurity events, for example.

The report also urges the government to clarify its plans for responding to a cyberattack on the electrical grid, including establishing a chain of command among federal agencies. There should also be a clear protocol in place for triggering a response by the Federal Emergency Management Agency.

Currently, plans for responding to weather-related and cybersecurity disasters could come into conflict in the event of a widespread, long-term power outage. Additionally, Hurricane Sandy showed that existing processes for restoring the power grid are inadequate.

"The federal government is always at the risk of being in the way by having too many points of contact," said Paul Stockton, managing director of economic advisory firm Sonecon and a former assistant secretary for homeland defense and Americas' security affairs at the Defense Department, during a Bipartisan Policy Center event on Feb. 28. "Industry has to lead the definition of requirements so the federal government can be useful rather than being in the way."

About the Author

Adam Mazmanian is FCW's senior staff writer, and covers Congress, health IT and governmentwide IT policy. Connect with him on Twitter: @thisismaz.

The 2015 Federal 100

Meet 100 women and men who are doing great things in federal IT.

Featured

  • Shutterstock image (by venimo): e-learning concept image, digital content and online webinar icons.

    Can MOOCs make the grade for federal training?

    Massive open online courses can offer specialized IT instruction on a flexible schedule and on the cheap. That may not always mesh with government's preference for structure and certification, however.

  • Shutterstock image (by edel): graduation cap and diploma.

    Cybersecurity: 6 schools with the right stuff

    The federal government craves more cybersecurity professionals. These six schools are helping meet that demand.

  • Rick Holgate

    Holgate to depart ATF

    Former ACT president will take a job with Gartner, follow his spouse to Vienna, Austria.

  • Are VA techies slacking off on Yammer?

    A new IG report cites security and productivity concerns associated with employees' use of the popular online collaboration tool.

  • Shutterstock image: digital fingerprint, cyber crime.

    Exclusive: The OPM breach details you haven't seen

    An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data, and the government's step-by-step response.

  • Stephen Warren

    Deputy CIO Warren exits VA

    The onetime acting CIO at Veterans Affairs will be taking over CIO duties at the Office of the Comptroller of the Currency.

  • Shutterstock image: monitoring factors of healthcare.

    DOD awards massive health records contract

    Leidos, Accenture and Cerner pull off an unexpected win of the multi-billion-dollar Defense Healthcare Management System Modernization contract, beating out the presumptive health-records leader.

  • Sweating the OPM data breach -- Illustration by Dragutin Cvijanovic

    Sweating the stolen data

    Millions of background-check records were compromised, OPM now says. Here's the jaw-dropping range of personal data that was exposed.

  • FCW magazine

    Let's talk about Alliant 2

    The General Services Administration is going to great lengths to gather feedback on its IT services GWAC. Will it make for a better acquisition vehicle?

Reader comments

Tue, Mar 4, 2014

Ref: 95 Fed CIO - Security committee meetings when the grid was still considered a National Strategic asset. Ind clearly stated their reqmts as buckets of unlimited cash upfront or wait till the grid crashed and then pay for rebuilding it. 19 yrs later and we are still being positioned to pay the tab for Ind complete failure to accept accountability or responsibility for operating something so vital to the nation. Civilization as we know it has been delegated to the whims of the boardrooms whose only concern is their corp bottom-line and their next bonus check.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above