{"id":16113,"date":"2019-11-26T14:00:31","date_gmt":"2019-11-26T17:00:31","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=16113"},"modified":"2019-11-26T13:07:21","modified_gmt":"2019-11-26T16:07:21","slug":"incentivizing-cyber-security-investment-in-the-power-sector-using-an-extended-cyber-insurance-framework","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/incentivizing-cyber-security-investment-in-the-power-sector-using-an-extended-cyber-insurance-framework\/","title":{"rendered":"Incentivizing Cyber Security Investment in the Power Sector Using an Extended Cyber Insurance Framework"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-16114\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2019\/11\/incentivizing-cyber-security-investment-in-the-power-sector-using-an-extended-cyber-insurance-framework.jpg\" alt=\"Incentivizing Cyber Security Investment in the Power Sector Using an Extended Cyber Insurance Framework\" width=\"145\" height=\"189\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2019\/11\/incentivizing-cyber-security-investment-in-the-power-sector-using-an-extended-cyber-insurance-framework.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2019\/11\/incentivizing-cyber-security-investment-in-the-power-sector-using-an-extended-cyber-insurance-framework-115x150.jpg 115w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Jack Rosson, Mason Rice, Juan Lopez, David Fass<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Cyber incidents have bridged the divide from data compromise to physical effects. The Stuxnet worm\u2019s physical destruction of Iranian centrifuges and the recent cyber induced Ukrainian power outages provide evidence that attitudes must transition from \u201cwhat if?\u201d to \u201cwhen will cyber attacks result in physical damage in the power sector?\u201d The Department of Homeland Security\u2019s (DHS) most recent fiscal year&#8217;s Strategic Plan emphasizes this shift in focus by highlighting cyber security of critical infrastructure as a top priority of their cyber mission. The power industry\u2019s viability, as the foundation of all other critical infrastructure\u2019s functional capability, is crucial to the national security and well-being of the United States. However, the ownership of the power enterprise remains largely private, presenting regulatory and practical challenges in implementing effective security measures across the industry. To date, the primary concern of critical infrastructure (CI) operators is to ensure system availability and reliability, while the security of their control systems is considered a secondary objective. The conflict between availability and security is understandable, given that security often complicates operations. However, as more control systems are retrofitted for remote management or internetworked with enterprise business systems, they become exposed and vulnerable to cyber threats not foreseen when initially developed. Convincing CI asset owners to further strain budgets by investing in security that may or may not prevent damage is a hard sell. It is difficult to balance availability and reliability with security, and this, combined with the burgeoning costs of cyber risk management, presents a hurdle for effective cyber-security implementation in industrial control system dominated sectors, especially the power sector.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2019\/11\/incentivizing-cyber-security-investment-in-the-power-sector-using-an-extended-cyber-insurance-framework.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jack Rosson, Mason Rice, Juan Lopez, David Fass R\u00e9sum\u00e9: Cyber incidents have bridged the divide from data compromise to physical effects. The Stuxnet worm\u2019s physical destruction of Iranian centrifuges and the recent cyber induced Ukrainian power outages provide evidence that attitudes must transition from \u201cwhat if?\u201d to \u201cwhen will cyber attacks result in physical damage in the power sector?\u201d The Department of Homeland Security\u2019s (DHS) most recent fiscal year&#8217;s Strategic&hellip; <\/p>\n","protected":false},"author":3,"featured_media":16114,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,23,6,19,20,25,112],"tags":[],"class_list":["post-16113","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-gestao-da-seguranca-empresarial","category-livros","category-risco-e-perdas","category-seguranca-da-informacao","category-seguranca-publica-e-defesa","category-download"],"views":162,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=16113"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16113\/revisions"}],"predecessor-version":[{"id":16115,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/16113\/revisions\/16115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/16114"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=16113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=16113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=16113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}