Overview
The Infrastructure Protection & Security Interest Group is a technical forum for utility personnel tasked with the physical and cyber security of generation, transmission, and distribution assets. The program includes both a strategic component – with a focus on security program design, implementation, operation, evaluation, and improvement – and a tactical component, which enables rapid exchange of information and intelligence on an ad hoc basis.

Focus areas

  • Benefit-arrowimg
    Cyber and Physical Response and Recovery to Incidents and Emergencies
  • Benefit-arrowimg
    Cyber and Physical Security Assets and Threats
  • Benefit-arrowimg
    Cyber and Physical Training for Employees and Contractors
  • Benefit-arrowimg
    Cyber Detection 
  • Benefit-arrowimg
    Cyber and Physical New Technologies and Operational Practices
  • Benefit-arrowimg
    Cyber and Physical Security Assessment of Risks

This group is for

Cyber and physical security directors, managers, engineers, and specialists
EXPLORE MEMBERSHIP
Technical Advisor Support
Paul Silba
Paul Silba
Infrastructure Protection & Security

Paul Silba is a Cyber Security and IT Systems Professional with 23 years of experience in cyber security program management. He worked as Director of Cyber Security for NY Power Authority, managing a staff of over a dozen cyber specialists in the areas of vulnerability prevention, cyber awareness, and computer forensics. He also worked with the Power Operations Team to maintain NERC-CIP compliance and develop/maintain auditable defense of standards compliance.

+
Lisa Moller
Lisa Moller
Infrastructure Protection & Security

Lisa Moller brings 35 years of utility experience spent between Alliant Energy and American Transmission Company, with the last 24 years spent in managing physical security and the protection of assets. Her broad band of experience covers the development of implementing an Integrated Security Operation Center, contract guard services, theft prevention and asset protection through a variety of technologies, controlled access programs, background investigations and PRA's and NERC CIP protection of assets. Lisa has held leadership roles in EEI working groups as well as ASIS Chapters. Lisa holds a Bachelor's Degree in Business Management and a CPP certification through ASIS.

+
Top Resources
ASSESSMENT TOOL
Physical Security Maturity Matrix (PSMM)
CEATI’s Physical Security Maturity Matrix (PSMM) tool helps electric utilities assess the maturity of their physical security programs. The PSMM enables you to evaluate the current capabilities of your organization's physical security practices, processes, and methods, as well as set goals and priorities for improvement.
GUIDANCE DOCUMENT
Electric Utility Guideline for Inventory and Asset Management of Cyber Security Assets 
This guide provides a basis for understanding the equipment that falls under cyber security, the terms and definitions that allow for communication alignment, and best practices for asset lifecycle management, including procurement, installation and commissioning, operations and maintenance, and disposal. The guide also contains information on general risks to consider during the cyber security asset management process and high-level financial information on lifecycle costs.
RESEARCH REPORT
Best Practices in Copper Theft Mitigation 
This report assists utilities in making quick decisions in response to copper theft and presents a spectrum of available mitigation solutions. It 1) captures various staged responses in the event of theft, 2) identifies several utility assets requiring protection against copper theft, and 3) details numerous broad measures that are or can be adopted by utilities to deter copper theft or can be applied by engaging law enforcement or via legislative action. Each of these copper theft mitigation measures are discussed and analyzed based on pros and cons, approximate cost, complexity, and efficiency. 
GUIDANCE DOCUMENT
Electric Utility Guideline for Asset Management of Physical Security Assets 
This guide provides a basis for understanding the equipment that falls under physical security, the terms and definitions that allow for communication alignment, and best practices for lifecycle management of these assets, including procurement, installation, commissioning, operations, maintenance, and disposal. The guide also contains information on general risks to consider during the asset management process of physical security assets and high-level financial information on lifecycle costs.
WORKSHOP
Drones and Security in the Electric Utility Sector
Drones are becoming more common tools in the electric utility sector, as well as society in general. This session will illustrate how one of CEATI’s member organizations implemented their drone program and their process of responding to suspicious drone activity, including both internal and external threats.