Fulcrum Industry Report
Shifts in climate, security and industry regulations are driving innovation and spending in the utilities industry. See what’s coming for utilities professionals in 2013.
Disaster Planning, Continuity of Business and Recovery
Our thoughts are with those who have been affected by the landfall of Hurricane Sandy and its aftermath in the U.S. Northeastern and Mid-Atlantic states.
As the storm passes to the north and our coastal areas begin the disaster recovery and rebuilding process, we stand ready to help our CATS customers maintain continuity of business and speed the rebuilding of their critical infrastructure systems.
In the disaster preparation leading up to the storm, the Fulcrum CATS Enterprise Asset Management system has been used to help our Communication Service Providers (CSPs) and Utility customers to locate, track and pre-position emergency assets, including COWs (Cell on Wheels) mobile cell sites deployed on trucks and trailers – as well as much needed mobile generators to provide temporary power for disaster recovery operations.
Denver, Colorado, October 15 – 18, 2012
The Industrial Control Systems Joint Working Group (ICSJWG), part of the Department of Homeland Security’s Critical Infrastructure Partnership Advisory Council (CIPAC), is focused on securing and protecting critical infrastructure assets throughout the United States. This Working Group joins government and private sector stakeholders to better understand and mitigate exposure of critical control systems (such as power, gas and water supply, and traffic) to risks.
Fulcrum CATS Enterprise Asset Management solution provides organizations, such as utilities (electrical generation, transmission, and distribution), oil and natural gas producers, and waste water recycling and treatment plants, with a change control system that tracks detailed location, status, and configuration information about their critical operational infrastructure; regardless if the assets are on or offline.
CATS’ ability to track assets is particularly useful for identifying which industrial control systems (ICS) are strongly separated, e.g. isolated from networks, or unified, e.g. connected to external paths of attack, such as private networks or the Internet. The concluding panel of the conference, Separation or Unification – The Great Debate, moderated by Neil Hershfield, U.S. Department of Homeland Security, Control Systems Security Program/ICS-CERT, Deputy Director, discussed the impact of openly available automated attack tools exploiting ICS as well as the increasing number of ICS now being connected to external paths of attack.