{"id":2936,"date":"2022-11-24T21:07:00","date_gmt":"2023-09-04T21:07:29","guid":{"rendered":"https:\/\/www.salesforce.com\/?p=2936"},"modified":"2023-10-17T14:43:34","modified_gmt":"2023-10-17T14:43:34","slug":"cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector","status":"publish","type":"post","link":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/","title":{"rendered":"Cyber Challenges &#038; Defence Strategies For Energy &#038; Utilities Sector"},"content":{"rendered":"\n<p>Security, ultimately, is all about culture. The way an organisation approaches security and integrates the tools and processes needed to achieve it. It is vital to create a culture in which security is designed into every technology and human action. Security by Design is achieved when every aspect of an increasingly complex and distributed organisation contributes to people, data, and systems instead of being a potential vulnerability. <\/p>\n\n\n\n<p>Threats against Critical National Infrastructure (CNI) in all its forms are rising. A recent <a adhocenable=\"false\" href=\"https:\/\/www.accenture.com\/gb-en\/insights\/security\/invest-cyber-resilience\" target=\"_blank\" rel=\"noopener\">Accenture Report <\/a>contains some stark figures showing that hackers understand the potential profits to be made from undermining basic utilities like power and water. The attack on the Colonial Pipeline in the USA in May 2021 made global headlines. It brought home to ordinary people the possibility that the utilities and services they depend on each day can be disrupted by cybercrime. <\/p>\n\n\n\n<p>Earlier this year, the UK Government reported that Great Britain was the third most targeted country by hostile states. Its statement referred to all public services as CNI \u2013 everything from utilities to pensions, health and state-stored personal data of citizens. <\/p>\n\n\n\n<p>In the past, attacking CNI meant infiltrating a physical plant or operational technology (OT) system. Now it just takes a few strokes on a keyboard once the hacker has found a gap in IT security \u2013 a phishing attack, a bad password, or an unpatched bit of software \u2013 and an entire system could be frozen. That is when the gas or water or electricity stops and an entire community or even nation is brought to a halt. Most scenarios imagine that state actors are the biggest threat. But that is also changing. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-attacking-cni-is-now-the-business-model-for-criminal-hackers\"><b>Attacking CNI is now the business model for criminal hackers<\/b><\/h2>\n\n\n\n<p>Attacks based on pure financial greed are rising fast. Ransomware attacks have been growing exponentially over the past few years. Everyone remembers the famous UK National Health Service incident when, for a few days, it was feared the entire network had been compromised. Attacks on water, gas, electricity, and other utilities are regularly in the headlines &#8211; criminals know they can exploit the digital transformation of CNI. Increasing connectivity, reliance on third parties and an extended supply chain open a broader (and deeper) attack surface. Accenture\u2019s <a href=\"https:\/\/www.accenture.com\/gb-en\/insights\/security\/invest-cyber-resilience\" target=\"_blank\" adhocenable=\"false\" rel=\"noopener\">State of Cyber report<\/a> showed that attacks through the supply chain have increased by 26% in the UK, accounting for 64% of breaches. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-securing-cni-demands-a-culture-change-and-a-holistic-approach\"><b>Securing CNI demands a culture change and a holistic approach<\/b><\/h2>\n\n\n\n<p>That is why it\u2019s important to foster a culture change across the utilities sector.<\/p>\n\n\n\n<p>There is a lot of change in the sector which introduces potential risks to the organisations. This includes business consolidation and digital transformation that the organisations are going through, but also regulatory changes affecting Critical National Infrastructure (CNI) such as the EU NIS Directive with new requirements for reporting and supply chain management. Accenture\u2019s report emphasises that every CNI organisation needs a threat-centric and business-aligned approach across people, process, and technology domains.<\/p>\n\n\n\n<p>Accenture\u2019s MD and Cyber lead for energy and resources, Kristian Alsing highlighted defence-in-depth and zero trust as some of the established good practices to build into a holistic security approach including \u201cthe ability to link each activity anywhere within your system to the identity of the device, the person and the data that\u2019s being accessed or used.\u201d and implementing both \u201cpreventative as well as detective control to confirm if it has been circumvented\u201d. He also highlighted the importance of real security assurance through testing of controls and exercises of security processes. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-role-of-cloud\"><b>The role of Cloud<\/b><\/h2>\n\n\n\n<p>Cloud is a huge opportunity and from a business perspective making the most of the benefits represented by the cloud is a priority, but many Security departments struggle to really understand what the business is doing. For instance, massive investment is in the new initiatives which are largely enabled by the cloud, with the change happening at a much faster pace than what organisations used to. \u201cMany organisations struggle to understand the broad range of assets they have and how they interact on a moment-by-moment basis,\u201d says Kristian, \u201cIt\u2019s hard to understand a complex utility, but CNI organisations must be clear about who is doing what. How do you integrate the cloud into the wider controls and frameworks already in place within the organisation? What does the cloud provider do and what do you need to do to secure the connections and protect data and systems? That takes a lot of work.\u201d<\/p>\n\n\n\n<p>Organisations should use structured approaches when assessing and implementing security (in the cloud and otherwise). Some of the relevant resources such as NCSC CAF guidance for CNIs (and the related list of \u2018actions to take when the cyber threat is heightened\u2019), a general NIST CSF (Cyber Security Framework), or cloud-specific guidances such as CSA (Cloud Security Alliance) best practices, should be considered and adapted for your specific situation. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-you-need-to-know-exactly-what-you-re-responsible-for\"><b>You need to know exactly what you\u2019re responsible for<\/b><\/h2>\n\n\n\n<p>Your security function needs to lead. There is still a lot of misconception among non-security professionals that you can just turn on the security in the cloud and you are done. As an organisation, you have to understand which security functions YOU are responsible for and which are provided by your cloud provider. \u201cYou need to consider what is available natively with the cloud provider, and what controls you may want to centralise &#8211; such as managing keys or access to critical functions. It also needs to be integrated into your broader cybersecurity framework and operations,\u201d Kristian told me.<\/p>\n\n\n\n<p>It\u2019s a task that demands commercial and legal agility as well as a deep understanding of your technical controls and who is responsible for what. That must be clearly stated and always followed.<\/p>\n\n\n\n<p>Naturally, engaging with suppliers is also vital. And it\u2019s also important to make sure you can provide relevant visibility and reporting to both the board and regulators. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-so-what-are-the-top-three-things-cni-organisations-need-to-do\"><b>So, what are the top three things CNI organisations need to do?<\/b><\/h2>\n\n\n\n<p>Summarising our conversation, Kristian\u2019s list is both simple and logical:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Know your risks; understand how your applications, infrastructure, services, and your business fit together.<\/li>\n\n\n\n<li>Focus on business resilience; know what the critical business systems are and how to restore them in various scenarios.<\/li>\n\n\n\n<li>Deliver real security assurance through testing of controls and exercises of security processes.<\/li>\n<\/ol>\n\n\n\n<p>It is therefore vital that there is a shared responsibility in place between a cloud provider like Salesforce and a CNI organisation. Kristian stresses an integrated approach across all departments; \u201cDon\u2019t rely on one department or team and don\u2019t rely on the contract. Adapt to the changing threat landscape with agility across all involved\u201d Sound advice in dangerous times. <\/p>\n\n\n\n<div class=\"layout-six wp-block-salesforce-blog-offer\">\n\t<div class=\"wp-block-offer__wrapper\">\n\n\t\t<div class=\"wp-block-offer__content\">\n\t\t\t<h2 class=\"wp-block-offer__title\">Cyber Security Challenges &amp; Priorities<\/h2>\n\t\t\t\t\t\t\t<p class=\"wp-block-offer__description\">Listen to Industry experts share their views on the current and future challenges we are facing.<\/p>\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"wp-block-button\">\n\t\t\t\t\t<a class=\"wp-block-button__link\" target=\"_blank\" href=\"https:\/\/www.salesforce.com\/uk\/form\/events\/webinars\/form-rss\/3894146?d=inc-blog-banner\">Watch Now<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"wp-block-offer__media\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2022\/11\/einstein-generic.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2022\/11\/einstein-generic.jpg 768w, https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2022\/11\/einstein-generic.jpg?w=300&amp;h=169 300w, https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2022\/11\/einstein-generic.jpg?w=150&amp;h=84 150w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>\t\t<\/div>\n\t<\/div>\n\n\t\n\t<\/div>\n\n\n\n<p><b> <i>For more on Salesforce\u2019s security and resilience efforts, <\/i><a href=\"https:\/\/trust.salesforce.com\/en\/\" target=\"_blank\" adhocenable=\"false\" rel=\"noopener\"><i>visit our trust website<\/i><\/a><i>. Need help with your security efforts? Trust is our No 1 value and Salesforce is continuously developing and improving capabilities so our customers to use Salesforce clouds in a secure and compliant manner. Learn more at our <a href=\"https:\/\/www.salesforce.com\/products\/platform\/solutions\/data-security\/\" target=\"_blank\" adhocenable=\"false\" rel=\"noopener\">security page<\/a>.<\/i><\/b><\/p>\n\n\n\n<p> <span id=\"authorRoot\" path=\"\/content\/blogs\/gb\/en\/authors\/\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security, ultimately, is all about culture. It is vital to create a culture in which security is designed into every technology and human action.<\/p>\n","protected":false},"author":1,"featured_media":2938,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sf_justforyou_enable_alt":true,"optimizely_content_id":"d6a33bc57df547ad8db66e09a19a89d6","post_meta_title":"","ai_synopsis":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"sf_topic":[1,3],"sf_content_type":[],"coauthors":[197],"class_list":["post-2936","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","sf_topic-digital-transformation","sf_topic-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Challenges &amp; Defence Strategies For Energy &amp; Utilities Sector - Salesforce<\/title>\n<meta name=\"description\" content=\"Security is all about culture. It is vital to create a culture in which security is designed into every technology and human action.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Challenges &amp; Defence Strategies For Energy &amp; Utilities Sector\" \/>\n<meta property=\"og:description\" content=\"Security, ultimately, is all about culture. It is vital to create a culture in which security is designed into every technology and human action.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/\" \/>\n<meta property=\"og:site_name\" content=\"Salesforce\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-04T21:07:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-17T14:43:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/Enegy-_-Utilities-Resource-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ivan Djordjevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ivan Djordjevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/\"},\"author\":[{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/11430b9354c5e1bc7e42568fadd59c57\"}],\"headline\":\"Cyber Challenges &#038; Defence Strategies For Energy &#038; Utilities Sector\",\"datePublished\":\"2023-09-04T21:07:29+00:00\",\"dateModified\":\"2023-10-17T14:43:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/\"},\"wordCount\":1167,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/Enegy-_-Utilities-Resource-2.jpg\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/\",\"name\":\"Cyber Challenges & Defence Strategies For Energy & Utilities Sector - Salesforce\",\"isPartOf\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/Enegy-_-Utilities-Resource-2.jpg\",\"datePublished\":\"2023-09-04T21:07:29+00:00\",\"dateModified\":\"2023-10-17T14:43:34+00:00\",\"author\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3\"},\"description\":\"Security is all about culture. It is vital to create a culture in which security is designed into every technology and human action.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#primaryimage\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/Enegy-_-Utilities-Resource-2.jpg\",\"contentUrl\":\"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/Enegy-_-Utilities-Resource-2.jpg\",\"width\":768,\"height\":432,\"caption\":\"Cyber Challenges and Defence Strategies For the Energy and Utilities Sector\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.salesforce.com\/eu\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Challenges &#038; Defence Strategies For Energy &#038; Utilities Sector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#website\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/\",\"name\":\"Salesforce\",\"description\":\"News, tips, and insights from the global cloud leader\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.salesforce.com\/eu\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/11430b9354c5e1bc7e42568fadd59c57\",\"name\":\"Ivan Djordjevic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"Ivan Djordjevic\"},\"description\":\"Ivan is a Principal Security Architect at Salesforce. He advises customers from different industries on Security, Identity and Privacy aspects of Salesforce services, helping them map it against their business and regulatory requirements and derive risk-reducing solutions. Ivan has over 20 years of experience in Cybersecurity across solution architecture, consulting and leadership roles. He has held positions at several startups and large organisations, including British Telecom and Deloitte. Ivan has co-authored 3 patents and a number of publications in the area, and holds a PhD from the University of London. He is a member of ISC2, IAPP and SANS.\",\"url\":\"https:\/\/www.salesforce.com\/eu\/blog\/author\/ivan-djordjevic\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Challenges & Defence Strategies For Energy & Utilities Sector - Salesforce","description":"Security is all about culture. It is vital to create a culture in which security is designed into every technology and human action.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/","og_locale":"en_GB","og_type":"article","og_title":"Cyber Challenges & Defence Strategies For Energy & Utilities Sector","og_description":"Security, ultimately, is all about culture. It is vital to create a culture in which security is designed into every technology and human action.","og_url":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/","og_site_name":"Salesforce","article_published_time":"2023-09-04T21:07:29+00:00","article_modified_time":"2023-10-17T14:43:34+00:00","og_image":[{"width":768,"height":432,"url":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/Enegy-_-Utilities-Resource-2.jpg","type":"image\/jpeg"}],"author":"Ivan Djordjevic","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ivan Djordjevic","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#article","isPartOf":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/"},"author":[{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/11430b9354c5e1bc7e42568fadd59c57"}],"headline":"Cyber Challenges &#038; Defence Strategies For Energy &#038; Utilities Sector","datePublished":"2023-09-04T21:07:29+00:00","dateModified":"2023-10-17T14:43:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/"},"wordCount":1167,"commentCount":0,"image":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/Enegy-_-Utilities-Resource-2.jpg","inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/","url":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/","name":"Cyber Challenges & Defence Strategies For Energy & Utilities Sector - Salesforce","isPartOf":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#primaryimage"},"image":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#primaryimage"},"thumbnailUrl":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/Enegy-_-Utilities-Resource-2.jpg","datePublished":"2023-09-04T21:07:29+00:00","dateModified":"2023-10-17T14:43:34+00:00","author":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/601f410a2801f4ddcf6f00cb182e69d3"},"description":"Security is all about culture. It is vital to create a culture in which security is designed into every technology and human action.","breadcrumb":{"@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#primaryimage","url":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/Enegy-_-Utilities-Resource-2.jpg","contentUrl":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/Enegy-_-Utilities-Resource-2.jpg","width":768,"height":432,"caption":"Cyber Challenges and Defence Strategies For the Energy and Utilities Sector"},{"@type":"BreadcrumbList","@id":"https:\/\/www.salesforce.com\/eu\/blog\/cyber-challenges-and-defence-strategies-for-the-energy-and-utilities-sector\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.salesforce.com\/eu\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Challenges &#038; Defence Strategies For Energy &#038; Utilities Sector"}]},{"@type":"WebSite","@id":"https:\/\/www.salesforce.com\/eu\/blog\/#website","url":"https:\/\/www.salesforce.com\/eu\/blog\/","name":"Salesforce","description":"News, tips, and insights from the global cloud leader","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.salesforce.com\/eu\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.salesforce.com\/eu\/blog\/#\/schema\/person\/image\/11430b9354c5e1bc7e42568fadd59c57","name":"Ivan Djordjevic","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g23494c9101089ad44ae88ce9d2f56aac","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Ivan Djordjevic"},"description":"Ivan is a Principal Security Architect at Salesforce. He advises customers from different industries on Security, Identity and Privacy aspects of Salesforce services, helping them map it against their business and regulatory requirements and derive risk-reducing solutions. Ivan has over 20 years of experience in Cybersecurity across solution architecture, consulting and leadership roles. He has held positions at several startups and large organisations, including British Telecom and Deloitte. Ivan has co-authored 3 patents and a number of publications in the area, and holds a PhD from the University of London. He is a member of ISC2, IAPP and SANS.","url":"https:\/\/www.salesforce.com\/eu\/blog\/author\/ivan-djordjevic\/"}]}},"jetpack_featured_media_url":"https:\/\/www.salesforce.com\/eu\/blog\/wp-content\/uploads\/sites\/14\/2023\/09\/Enegy-_-Utilities-Resource-2.jpg","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Salesforce","distributor_original_site_url":"https:\/\/www.salesforce.com\/eu\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/2936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/comments?post=2936"}],"version-history":[{"count":5,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/2936\/revisions"}],"predecessor-version":[{"id":4537,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/posts\/2936\/revisions\/4537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/media\/2938"}],"wp:attachment":[{"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/media?parent=2936"}],"wp:term":[{"taxonomy":"sf_topic","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/sf_topic?post=2936"},{"taxonomy":"sf_content_type","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/sf_content_type?post=2936"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.salesforce.com\/eu\/blog\/wp-json\/wp\/v2\/coauthors?post=2936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}